IP Flashcards
What is the most common protocol used?
IP (Internet Protocol)
What 4 pieces are contained within an IP frame?
Ethernet header, IP, Protocol, IP Payload/Data, Ethernet Trailer
What is transported inside the IP packet?
TCP and UDP
What is TCP and what does it do?
Connection-oriented protocol used for reliable delivery of packets. It acknowledges that outgoing data was received.
-It can handle manage out of order messages.
-It has a flow control system that can manage how much data is sent.
At what layer does TCP operate at?
Layer 4 (transport)
What is UDP and what does it do?
One-way connectionless flow of traffic.
–
It has an unreliable delivery, and no data recovery.
–
It cannot reorder data, it just hopes it gets there OK (spray and pray).
What type of communication is UDP most associated with?
Real-time comms because its quick and does not stop to reorganize information.
What are two common examples of protocols that use TCP?
The application doesn’t worry about out of order frames or missing data. TCP handles it all.
What additional destination info is added to TCP and UDP transmissions?
Its like an IP inside an IP except its for an application that’s sending or receiving the data.
What are the fundamental pieces needed for communication between and server and a client?
Client IP address > protocol > client app. port number
What are non-ephemeral ports?
Permanent, well-known port numbers, commonly 0 through 1,023.
What are ephemeral ports?
1,024 through 65,535
–
Determined in real-time by the client.
Are port numbers designed for security?
No. They are for communication and to access the particular services on a device.
T/F: TCP port numbers are the same as USP port numbers.
False
Why is a firewall relevant to port numbers?
Firewalls cant filter out traffic based on the port numbers. This is considered port-based security.
What’s the function of FTP?
File exchange
What is a cryptographic network protocol for secure data comms, remote command-line login, remote command execution, and other secure network services between two networked computers known as?
SSH
(secure shell)
Secure replacement for Telnet
What are three characteristics of Telnet?
-Provides username and password authentication
-Transmits unencrypted data
-Enables remote login and command execution
Less secure alternative of SSH