Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
90 Cards in this Set
- Front
- Back
OSI Layer Services: service user
|
the OSI layer that requests services from an adjacent OSI layer
|
|
OSI Layer Services: service provider
|
the OSI layer that provides services to service users
|
|
OSI Layer Services: service access point (SAP)
|
a conceptual location at which one OSI layer can request the services of another OSI layer (kinda like the border between layers)
|
|
Internetworking evolved as a solution to three key problems:
|
isolated LANs, duplication of resources, and a lack of network management
|
|
control information
|
headers & trailers added to data at different layers of the osi model.
|
|
OSI Model: Physical Layer
|
the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between communicating network systems. Physical layer specifications define characteristics such as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, and physical connectors. Physical layer implementations can be categorized as either LAN or WAN specifications.
|
|
OSI Model: Data Link Layer
|
provides reliable transit of data across a physical network link. Different data link layer specifications define different network and protocol characteristics, including physical addressing (ie MAC addresses), network topology (bus, ring), error notification, sequencing of frames, and flow control. split into Logical Link Control (LLC) and Media Access Control (MAC)
|
|
OSI Model: Data Link Layer: Logical Link Control Layer
|
manages communications between devices over a single link of a network.IEEE 802.2. supports both connectionless and connection-oriented services
|
|
OSI Model: Data Link Layer: Media Access Control Layer
|
manages protocol access to the physical network medium. IEEE MAC specification defines MAC addresses
|
|
OSI Model: Network Layer
|
defines the network address. defines the logical network layout. IP lives here.
|
|
OSI Model: Transport Layer
|
TCP & UDP live here. segments the data for transport across the network. responsible for making sure that the data is delivered error-free and in the proper sequence. Flow control. Virtual circuits are established, maintained, and terminated by the transport layer. error checking, error recovery.
|
|
OSI Model: Session Layer
|
establishes, manages, and terminates communication sessions. Some examples of session-layer implementations include Zone Information Protocol (ZIP), the AppleTalk protocol ; and Session Control Protocol (SCP), the DECnet Phase IV session layer protocol.
|
|
OSI Model: Presentation Layer
|
provides a variety of coding and conversion functions that are applied to application layer data. ensure that information sent from the application layer of one system would be readable by the application layer of another system. Some examples of presentation layer coding and conversion schemes include common data representation formats, conversion of character representation formats, common data compression schemes, and common data encryption schemes. Think ASCII, JPEG, 3DES, etc...
|
|
OSI Model: Application Layer
|
interacts directly with user. Telnet, File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP), HTTP. functions typically include identifying communication partners, determining resource availability, and synchronizing communication
|
|
frame, packet, datagram, segment, message, cell
|
frame - data link layer
packet - network layer datagram - network layer (connectionless) segment - transport layer message - application layer cell - data link layer for ATM & SMDS (contains 5 byte header & 48 byte payload |
|
service data units (SDUs), protocol data units, bridge protocol data units (BPDUs)
|
SDU - information units from upper-layer protocols that define a service request to a lower-layer protocol
PDU - OSI terminology for a packet BPDU - used by the spanning-tree algorithm as hello messages |
|
end system (ES), intermediate system (IS), area, and autonomous system (AS)
|
ES - no routing or traffic forwarding ie desktop
IS - performs routing and traffic forwarding (ie routers, switches, bridges.) Interdomain and Intradomain IS's are defined Area - logical group of network segments and their attached devices. subdivisions of an AS AS - collection of networks under a common administration that share a common routing strategy (aka domain). |
|
connectionless vs connection-oriented network services
|
layer 4. TCP vs UDP. TCP = establish connection, transmit, dissolve connection.
|
|
Data Link Layer Addresses
|
physical or hardware address. flat address space. pre-established and typically fixed relationship to a specific device
|
|
MAC Addresses
|
type of data link layer address. used in LANs. Defined by IEEE MAC spec.48 bits as 12 hex digits. First 6 are Organizationally Unique Identifier (OUI) given by IEEE to vendor. Last 6 values administered by the specific vendor
|
|
Address Resolution Protocol
|
maps network addresses to MAC addresses. Hello protocol enables network devices to learn the MAC addresses of other network devices
|
|
Network layer protocols that Imbed MAC addresses
|
IPX, DECNET, Phase IV, XNS
|
|
Network Layer Address
|
hierarchical address space. called virtual or logical addresses. Each Network Interface Must Be Assigned a Network Address for Each Protocol Supported
|
|
Flow Control
|
a function that prevents network congestion by ensuring that transmitting devices do not overwhelm receiving devices with data. L4
|
|
three commonly used methods for handling network congestion
|
buffering - temporarily store bursts of excess data in memory until they can be processed.
transmitting source-quench messages - receiving device sends source-quench messages to request that the source reduce its current rate of data transmission 1 message per dropped packet windowing - a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted |
|
Error-checking schemes
|
determine whether transmitted data has become corrupt or otherwise damaged while traveling from the source to the destination.
|
|
cyclic redundancy check (CRC)
|
detects and discards corrupted data
|
|
Multiplexing
|
multiple data channels are combined into a single data or physical channel at the source (ie, different types of layer 7 data make it into 1 layer 3 packet.
OR when data from different hosts is put on the same physical channel) |
|
multiplexer
|
a physical layer device that combines multiple data streams into one or more output channels at the source and demultiplexes the channels into multiple data streams at the remote end.
|
|
Types of Multiplexing
|
time-division multiplexing (TDM), asynchronous time-division multiplexing (ATDM), frequency-division multiplexing (FDM), and statistical multiplexing.
|
|
Time Division Multiplexing
|
information from each data channel is allocated bandwidth based on preassigned time slots, regardless of whether there is data to transmit
|
|
Asychronous Time Division Multiplexing
|
ATDM, information from data channels is allocated bandwidth as needed by using dynamically assigned time slots. Basically, the same as TDM, but no slots wasted on hosts that have no data to send.
|
|
Frequency Division Multiplexing
|
information from each data channel is allocated bandwidth based on the signal frequency of the traffic
|
|
Statistical Multiplexing
|
bandwidth is dynamically allocated to any data channels that have information to transmit
|
|
nternational Organization for Standardization (ISO)
|
OSI reference model and the OSI protocol suite
|
|
American National Standards Institute (ANSI)
|
subsidiary of ISO, Fiber Distributed Data Interface (FDDI) and other communications standards
|
|
Electronic Industries Association (EIA)
|
electrical transmission standards. EIA/TIA-232 standard (formerly known as RS-232) which defines pinout for DCE/DTE
|
|
Institute of Electrical and Electronic Engineers (IEEE)
|
IEEE 802.3 and IEEE 802.5
|
|
International Telecommunication Union Telecommunication Standardization Sector (ITU-T)
|
developed X.25 and other communications standards.
|
|
Internet Activities Board (IAB)
|
set Internet policies through decisions and task forces. The IAB designates some Request For Comments (RFC) documents as Internet standards, including Transmission Control Protocol/Internet Protocol (TCP/IP) and the Simple Network Management Protocol (SNMP).
|
|
Local Area Network (LAN)
|
a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LAN protocols function at the lowest two layers of the OSI reference model
|
|
LAN Media Access
|
CSMA/CD & token passing
|
|
CSMA/CD
|
Carrier Sense Multiple Access/Collision Detection -- used in Ethernet networks
1. Listen, if no traffic 2. Transmit 3. Look for collision 4. If collision, random backoff restart at 1. |
|
Token Passing
|
Media Access used by Token Ring and Fiber Distributed Data Interface (FDDI). a special network frame called a token is passed around the network from device to device. When a device has data to send, it must wait until it has the token and then sends its data. When the data transmission is complete, the token is released so that other devices may use the network media. main advantage is it is easy to calculate max time until each device will get the token. Good for factories.
|
|
LAN Transmission Methods
|
unicast, multicast, and broadcast
|
|
LAN Topologies
|
bus, ring, star, and tree--logical architectures
|
|
LAN Bus Topology
|
a linear LAN architecture in which transmissions from network stations propagate the length of the medium and are received by all other stations--used by Ethernet/IEEE 802.3 networks-including 100BaseT
|
|
LAN Ring Topology
|
a LAN architecture that consists of a series of devices connected to one another by unidirectional transmission links to form a single closed loop--used by Token Ring/IEEE 802.5 and FDDI
|
|
LAN Tree Topology
|
a LAN architecture that is identical to the bus topology, except that branches with multiple nodes are possible in this case
|
|
LAN Star topology
|
a LAN architecture in which the endpoints on a network are connected to a common central hub, or switch, by dedicated links. Logical bus and ring topologies are often implemented physically in a star topology
|
|
WAN
|
a data communications network that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. They generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer
|
|
WAN L3 Protocols
|
X.25 PLP
|
|
WAN L2 Protocols
|
Frame Relay, HDLC, PPP,
|
|
Point-to-Point Links
|
single pre-established connection between 2 remote networks leased from a carrier (ie phone company). hardware is dedicated. more expensive than shared tech like Frame Relay.
|
|
Circuit Switching
|
only connected when needed. same idea as POTS, wherein one switch circuit "calls" the other end, establishes connection, sends data, disconnects. ISDN is an example.
|
|
Packet Switching
|
users share common carrier resources.
the increased efficiency gained from shared resources translates to much lower costs. -employs virtual circuits -ie ATM, Frame Relay, Switched Multimegabit Data Services (SMDS), X.25 |
|
WAN Virtual Circuit
|
logical circuit between 2 networks.
2 types - Switched Virtual Circuit and Permanent Virtual Circuit |
|
Switched Virtual Circuit
|
virtual circuits that are dynamically established on demand and terminated when transmission is complete
three phases: circuit establishment, data transfer, and circuit termination used in situations in which data transmission between devices is sporadic |
|
Permanent Virtual Circuit
|
a permanently established virtual circuit that consists of one mode: data transfer
used in situations in which data transfer between devices is constant |
|
WAN Switch
|
a multiport internetworking device used in carrier networks
typically switch such traffic as Frame Relay, X.25, and SMDS, and operate at the data link layer of the OSI reference model |
|
Access Server
|
acts as a concentration point for dial-in and dial-out connections
|
|
Modem
|
a device that interprets digital and analog signals, enabling data to be transmitted over voice-grade telephone lines
MODulator/DEModulator |
|
CSU/DSU
|
channel service unit/digital service unit
a digital-interface device used to connect a router to a digital circuit like a T1 also provides signal timing for communication between these devices |
|
Switches & Bridges
|
Layer 2 Devices that break up LANs into different network segments (1 collision domain per port on switches)
|
|
store-and-forward switching
|
an entire frame must be received before it is forwarded--can add latency in cases where frame is large
|
|
Cut-through switching
|
allows the switch to begin forwarding the frame when enough of the frame is received to make a forwarding decision. unlike store-and-forward, this type of switching can result in corrupted frames being forwarded.
|
|
ATM Switch
|
provide high-speed switching and scalable bandwidths in the workgroup, the enterprise network backbone, and the wide area.
switch fixed size data units called "cells" |
|
LAN Switch
|
used to interconnect multiple LAN segments.
provides dedicated, collision-free communication between network devices designed to switch data frames at high speeds. |
|
Packet Switching
|
Routing. Moving packets across the network towards their destination
|
|
Path Determination
|
using metrics to evaluate what path will be the best for a packet to travel
|
|
Routing Metric
|
a standard of measurement used to determine the best path for data to take through the network. (ie bandwidth, hop count, etc...)
|
|
Routing Tables
|
Information on best paths to destinations around the network as decided by routing algorithms. Contain
1. next hop for each destination network in the table 2. desirability/cost of each path 3. Info on which routing protocol reported the route |
|
Switching algorithms
|
a host determines that it must send a packet to another host. Having acquired a router's address by some means, the source host sends a packet addressed specifically to a router's physical (Media Access Control [MAC]-layer) address, this time with the protocol (network layer) address of the destination host
|
|
Routing Algorithms:
Single Path vs Multipath |
multipath algorithms can load balance, or keep more than 1 path to a destination network in the routing table
|
|
Routing Algorithms:
Flat vs hierarchical |
flat routing algorithms consider all Routers to be equal. Hierarchical routing algorithms dedicate certain routers as 'backbone' this is beneficial because it supports areas, domains, etc...
|
|
Routing Algorithms:
Host-Intelligent vs Router-Intelligent |
Host Intelligent = source routing = host knows where its going so just forward packet to next hop.
Router Intelligent = routers decide best path based on calculations |
|
Routing Algorithms:
Link-State vs Distance Vector |
link state = spf. every router sends its full link information out to all and from others knows all paths in the area, calculates its own best paths
faster to converge, more resource intensive, more scalable, more expensive distance vector =Bellman-Ford algorithms. each router sends routing table to neighbors. "routing by rumor" |
|
Network Management
|
a service that employs a variety of tools, applications, and devices to assist human network managers in monitoring and maintaining networks
|
|
Proxy ARP
|
Used in a situation in which a host believes its destination is on the same network when it is not. If the router knows the destination IP is on another network, it will respond to an ARP request for a remote host with its own MAC address. and then pass the data on once its received by the router
|
|
ARP
|
Address Resolution Protocol. mechanism on Ethernet to allow host to obtain layer 2 MAC address of a host given the layer 3 IP address.
1. Host sends a broadcast addressed to an IP address. 2. If the destination host is on the same subnet, it responds with its MAC address 3. Source host puts ethernet address/IP address mapping in the ARP table |
|
Reverse ARP
|
Used to help a host get an IP. In reverse ARP a host broadcasts its Ethernet address and the DHCP server responds with an IP.
|
|
ISO Network Management Model
|
Performance Management
Configuration Management Accounting Management Fault Management Security Management |
|
ISO Network Management Model: Performance Management
|
Gather Data about network performance, Define thresholds, Alert if thresholds exceeded. (optimize)
|
|
ISO Network Management Model:
Configuration Management |
Maintain a database of version information and configuration information for all devices on the network to assist in troubleshooting.
|
|
ISO Network Management Model: Accounting Management
|
Measure network utilization by users or groups--especially important when the costs of the network must be billed. Also, it can be used to see who is overusing or misusing the network resources. establishing quotas falls under accounting mgt.
|
|
ISO Network Management Model: Fault Management
|
detect, log, notify (and if possible fix) faults on the network. most network mgt resources reside here.determine symptoms, identify problem, identify solution, test, (plan and) deploy
|
|
ISO Network Management Model: Security Management
|
identify sensitive assets, control access, monitor usage,
|
|
Internet Protocol
|
The Internet Protocol (IP) is a network-layer (Layer 3) protocol that contains addressing information and some control information that enables packets to be routed. RFC 791
provides connectionless, best-effort delivery of datagrams through an internetwork provides fragmentation and reassembly of datagrams to support data links with different maximum-transmission unit (MTU) sizes |
|
IP Packet Format
|
Version-Indicates the version of IP currently used.
IP Header Length (IHL)-Indicates the datagram header length in 32-bit words. Type-of-Service-Specifies how an upper-layer protocol would like a current datagram to be handled, and assigns datagrams various levels of importance. Total Length-Specifies the length, in bytes, of the entire IP packet, including the data and header. Identification-Contains an integer that identifies the current datagram. This field is used to help piece together datagram fragments. Flags-Consists of a 3-bit field of which the two low-order (least-significant) bits control fragmentation. The low-order bit specifies whether the packet can be fragmented. The middle bit specifies whether the packet is the last fragment in a series of fragmented packets. The third or high-order bit is not used. Fragment Offset-Indicates the position of the fragment's data relative to the beginning of the data in the original datagram, which allows the destination IP process to properly reconstruct the original datagram. Time-to-Live-Maintains a counter that gradually decrements down to zero, at which point the datagram is discarded. This keeps packets from looping endlessly. Protocol-Indicates which upper-layer protocol receives incoming packets after IP processing is complete. Header Checksum-Helps ensure IP header integrity. Source Address-Specifies the sending node. Destination Address-Specifies the receiving node. Options-Allows IP to support various options, such as security. Data-Contains upper-layer information. |
|
distance vector vs link state
|
distance vector rp's broadcast their full routing table to their directly connected neighbors. in distance vector rp's.information on all known links are sent on adjacency formation and then only updates to links are sent. but updates are only sent to neighbors with full adjacency. link state routers have to do all of their own calculations, so more resource intensive.
|