Common TCP/IP Protocols Flashcards

1
Q

Protocol

A

A set of standards for communication between network hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protocol suite

A

A group of protocols intended to be used together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name Web services protocols

A
  • Hypertext Transfer Protocol (HTTP)

* HTTP over SSL (HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hypertext Transfer Protocol (HTTP)

A
  • Is used by web browsers and web servers o exchange files (such as web pages) through the World Wide Web and intranets.
  • Can be described as an information requesting and responding protocol.
  • Is typically used to request and send web documents, but is also used as the protocol for communication between agents using different TCP/IP protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HTTP over SSL (HTTPS)

A

Is a secure form of HTTP that uses SSL to encrypt data before it is transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name Security protocols

A
  • Secure Sockets Layer (SSL)

* Transport Layer Security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure Layer Security (SSL)

A
  • Secures messages being transmitted on the Internet
  • Uses RSA for authentication and encryption
  • Web browsers use SSL to ensure safe web transactions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Transport Layer Security (TLS)

A
  • Ensure the messages being transmitted on the Internet are private and tamper proof.
  • TLS is implemented in two protocols
  • TLS Record provides connection security with encryption (with DES for example)
  • TLS Handshake provides mutual authentication and choice of encryption method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the file transfer protocols

A
  • File Transfer Protocol (FTP)
  • Trivial File Transfer Protocol (TFTP)
  • Secure File Transfer Protocol (SFTP)
  • Secure Copy (SCP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

File Transfer Protocol (FTP)

A
  • Generic method of transferring files
  • Protect access to files by requiring usernames and passwords, and allows file transfer between dissimilar computer systems
  • Can transfer both binary and text files including HTML to another host
  • *** FTP does not use encryption. All data are sent over the network in clear text **
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trivial File Transfer Protocol (TFTP)

A
  • Does not provide user authentication or error detection
  • Used when files need to be transferred between systems quickly
  • Since it does not perform error detection TFTP is faster than FTP but is susceptible to transmission errors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Secure File Transfer Protocol (SFTP)

A
  • Uses SSH to secure data transfer

* SSH ensures that SFTP transmission use encrypted commands and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Secure Copy (SCP)

A
  • Used to securely transfer files between systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name Email Protocols

A
  • Simple Mail Transfer Protocol (SMTP)
  • Post Office Protocol 3 (POP3)
  • Internet Message Access Protocol version4 (IMAP4)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Simple Mail Transfer (SMTP)

A
  • Is used to route electronic mail through the internetwork
  • Is used between mail severs for sending and relaying mail
  • Is used by all email clients to send mail
  • by some email client programs, such as Outlook for receiving mail from an Exchange server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Post Office Protocol 3 (POP3)

A
  • Is used to retrieve email from a remote server and download it to a local client over TCP/IP connection
  • *** An email client that uses POP3 for receiving mail uses SMTP for sending mail **
17
Q

Internet Message Access Protocol version4 (IMAP4)

A
  • Designed to enable users to access their mail for various locations, with out the need to transfer messages or files back and forth between computers
  • Messages remain on the remote mail server and are not automatically downloaded to a client system
  • *** An email client that uses IMAP4 for receiving mail uses SMTP for sending mail **
18
Q

Network Services Protocols

A
  • Dynamic Host Configuration Protocol (DHCP)
  • Domain Name System (DNS)
  • Network Time Protocol (NTP)
  • Lightweight Directory Access Protocol (LDAP)
19
Q

Dynamic Host Configuration Protocol (DHCP)

A
  • Is used to automatically assign addresses and other configuration parameters to network hosts
  • Using a DHCP server, hosts receive configuration information at startup, reducing the amount of manual configuration required on each host
20
Q

Domain Name System (DNS)

A
  • A distributed system throughout the internetwork that provides addresses and name resolution
  • EX www.mydomain.com would be mapped to a specific IP address
21
Q

Network Time Protocol (NTP)

A
  • Used to communicate time synchronization information between systems on a network
22
Q

Lightweight Directory Access Protocol (LDAP)

A
  • Used to search, retrieve data from, and update a directory service
  • This protocol follows a client/server model.
  • One or more LDAP servers contain the directory data
  • The client connects to an LDAP Server to make a directory service request
23
Q

Network Management Protocols

A
  • Simple Network Management Protocol (SNMP)
  • Remote Terminal Emulation (Telnet)
  • Secure Shell (SSL)
24
Q

Simple Network Management Protocol (SNMP)

A
  • Designed for managing complex networks
  • Lets network hosts exchange configuration and status information.
  • This information can be gathered by management software and is used to monitor and manage the network
25
Q

Remote Terminal Emulation (Telnet)

A
  • Allows a computer to remotely access the console of a computer system somewhere else in the network
  • Was used for remote management task but rarely used today
  • Does not use encryption - recommended to use a secure alternative to Telnet for remote management task, such as SSH
26
Q

Secure Shell (SSH)

A
  • Allows for secure interactive control of remote systems
  • Uses RSA public key cryptography for both connection and authentication
  • Uses the IDEA algorithm for encryption by default, but is can use Blowfish and DES
  • Is a secure and preferred alternative to Telnet
27
Q

Transport Protocols

A
  • Transmission Control Protocol (TCP)

* User Datagram Protocol (UDP)

28
Q

Transmission Control Protocol (TCP)

A
  • Provides services that ensure accurate and timely delivery of network communication between two hosts
  • Sequencing of data packets
  • Flow control
  • Error checking
  • Acknowledgement of packets sent
  • Retransmission of lost packets
29
Q

User Datagram Protocol (UDP)

A
  • Host to host protocol like TCP but
  • Doesn’t acknowledge each packet transmitted
  • Doesn’t allow for retransmission of lost packets
  • That reduces overhead allowing for faster communications
  • Ideal of streaming audio and video
  • Speed come at the expense of possible errors or data loss
30
Q

Control Protocols

A
  • Internet Control Message Protocol (ICMP)

* Internet Group Membership Protocol (IGMP)

31
Q

Internet Control Message Protocol (ICMP)

A
  • Works closely with IP to prevent errors and control information by allowing host to exchange packet status information
  • Ping and traceroute use ICMP message to check network connectivity
  • ICMP also works with IP to send notices
  • When destinations are unreachable
  • Which route and hops a packets takes through a network
  • Whether devices can communicate across the network
32
Q

Internet Group Membership Protocol (IGMP)

A
  • Defines host groups
  • All group members can receive broadcast messages (multicasts) intended for the group
  • Multicast groups can be composed of devices within the same network or across networks (connected with a router)