Introduction to TCP/IP Flashcards
This suite was designed and implemented by the Department of Defense (DoD)to ensure and preserve data integrity as well as maintain communications in the event of catastrophic war.
Transmission Control Protocol/Internet Protocol (TCP/IP)
This can be a secure, dependable and resilient one.
Transmission Control Protocol/Internet Protocol (TCP/IP)
When was TCP first came on the scene
1973
When was divided into two distinct protocols: TCP and IP.
1978
This is when TCP/IP replaced the Network Control Protocol (NCP) and was authorized as the official means of data transport for anything connecting to ARPAnet, the Internet’s ancestor.
1983
In 1983, TCP/IP is replaces with _________
NCP - Network Control Protocol
Meaning of ARPA
Advances Research Projects Agency
The DoD’s Advanced Research Projects Agency (ARPA) created this ancient network way back in a cold war reaction to the Soviet’s launching of Sputnik. What year is this?
1957
This is when ARPA was redubbed DARPA and divided into ARPAnet and MILNET
1983
When was ARPAnet and MILNET dissolved?
1990
The DoD model is basically a condensed version of the OSI model that comprises four instead of seven layers. What are those 4?
- Process/Application layer
- Host-to-Host layer or Transport layer
- Internet layer
- Network Access layer or Link layer
This defines protocols for node-to-node application communication and controls user-interface specifications.
Process/Application Layer
This is defining protocols for setting up the level of transmission service for applications. It tackles issues like creating reliable end-to-end communication and ensuring the error-free delivery of data. It handles packet sequencing and maintains data integrity.
The Host-to-Host layer or Transport layer
This corresponds to the OSI’s Network layer, designating the protocols relating to the logical transmission of packets over the entire network. It takes care of the addressing of hosts by giving them an IP (Internet Protocol) address and handles the routing of packets among multiple networks.
The Internet Layer
This implements the data exchange between the host and the network.
The Network Access layer
This was one of the first Internet standards, developed in 1969, and is the chameleon of protocols—its specialty is terminal emulation.
Telnet
It allows a user on a remote client machine, to
access the resources of another machine, the Telnet server, in order to access a command-line interface.
Telnet Client
This achieves this by pulling a fast one on the Telnet server and making the client machine appear as though it were a terminal directly attached to the local network. This projection is actually a software image—a virtual terminal that can interact with the chosen remote host.
Telnet
This sets up a secure session that’s similar to Telnet over
a standard TCP/IP connection and is employed for doing things like logging into systems, running programs on remote systems, and moving files from one system to another. And it does all of this while maintaining an encrypted connection.
Secure Shell (SSH) protocol
This actually lets us transfer files, and it can accomplish this between any two machines using it.
File Transfer Protocol (FTP)
True or False:
But FTP isn’t just a protocol; it’s also a program. Operating as a protocol, FTP is used by applications. As a program, it’s employed by users to perform file tasks by hand.
True
This allows for access to both directories and files and can accomplish certain types of directory operations, such as relocating into different ones
File Transfer Protocol
This is the stripped-down, stock version of FTP,
but it’s the protocol of choice if you know exactly what you want and where to find it because it’s fast and so easy to use!
Trivial File Transfer Protocol
This collects and manipulates valuable network information
Simple Network Management Protocol