TCP/IP Applications Flashcards

(79 cards)

1
Q

session

A

any singular communication between 1 computer & another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP

A

transmission control protocol

enables-connection oriented communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TCP 3-way handshake

A

client sends a single SYN (synchronize) packet to server

server gets packet > returns single SYN, ACK (synchronize, acknowledge) packet

client then sends server a single ACK packet > immediately requests that server begin sending requested data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP sequence following 3-way handshake

A

server finishes sending requested data > sends FIN (finished) packet

client responds with ACK > sends its own FIN

server responds with ACK

session closed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

UDP

A

user datagram protocol

short distance communication - integrity not important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DHCP (ports)

A

domain host control protocol

clients - UDP 67

servers - UDP 68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NTP / SNTP (ports)

A

network time protocol / simple network time protocol

synchronize clocks of devices on the network

enter IP address of NTP/SNTP server

UDP 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TFTP

A

Trivial File Transfer Protocol

enables transfer of files using UDP from 1 machine to another

UDP port 69

No data protection > computers on same LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ICMP

A

Internet Control Message Protocol

works at layer 3 to deliver connectionless packets

disconnect messages

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

echo request / reply

A

single ICMP packet sent by ping command

response to echo request (no firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

destination host unreachable

A

computer has no route to the address listed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

request timed out

A

no echo reply is generated before the 1-second default time limit

ICMP queries may be blocked by firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

unreachable default gateway

A

ICMP issues on exam

ping default gateway > destination host unreachable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ping of Death

A

malformed ping packets

patched long ago > term is on exam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IGMP

A

Internet Group Management Protocol

enables routers to communicate with hosts to determine a “group” membership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

multicast range

A

Small subnet of Class D (224/4)

224.0.0.0/4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IGMP group

A

multicast does not assign IP addresses to individual hosts

multicast group is assigned to a 224.0.0.0/4 address

devices in this group tell upstream router or switch that they wish to receive multicast messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

port numbers

A

16-bit values between 0 & 65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

well-known port numbers

A

numbers between 0 & 1023

reserved for specific TCP/IP applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ephemeral port numbers

A

1024 - 5000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

dynamic (private) port numbers

A

49152 - 65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IANA recommened ephemeral port numbers

A

49152-65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

registered ports

A

1024 - 49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

socket (endpoint)

A

session information (IP address & port number) stored in the RAM for TCP/IP session (single computer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
socket pairs (endpoints)
connection data stored on 2 computers about the same connection
26
connection (session)
whole connection
27
command to list endpoints currently stored on a device
"netstat -n"
28
open (listening) port
socket that is prepared to respond to any IP packets destined for that socket's port number
29
command to list listening ports
"netstat -an"
30
local address 0.0.0.0
open port works on all NICs displayed this way even if computer only has 1 NIC
31
foreign address 0.0.0.0
no other computers are currently connected
32
established ports
active, working endpoint pairs
33
close_wait
shows graceful closure in which each side of the conversation sees the session closing normally
34
command to see which app is sending specific communication
"netstat -ano"
35
process ID
every program running on your computer gets a number used by the OS to track all running programs
36
command to see the NAME of a specific program sending a communication
"netstat -b"
37
HTML
Hypertext Markup Language
38
XML
Extensible Markup Language
39
HTTP
Hypertext Transfer Protocol underlying protocol used by the web runs on TCP port 80 by default
40
IIS
Internet Information Services Microsoft's web server platform
41
Apache HTTP Server
Web server software run on the majority of UNIX / Linux boxes ~ 50% of active Web site on the Internet
42
Active site
web site that is functioning by serving Web pages
43
Parked sites
domain names that have been purchased / registered but don't really do anything (Web or e-mail servers)
44
web clients
browsers read Web pages supplied by web servers
45
URL
Uniform Resource Locator complete name of the Web server (IP or DNS generated)
46
downside to open ports
security vulnerability
47
requirements for secure Internet app
authentication encryption norepudiation
48
autentication
user name & password
49
encryption
jumbling data so it can't be read as plain text
50
nonrepudiation
source is not able to deny a sent message
51
SSL
Secure Sockets Layer protocol developed by Netscape for transmitting private documents over the Internet
52
how SSL works
public key is used to encrypt communication encrypted communication is sent over a SSL connection Decrypted at the receiving end using a private key supported by all popular Web browsers & servers (HTTPS)
53
HTTPS
Hypertext Transfer Protocol over SSL uses TCP port 443 "Hypertext Transfer Protocol Secure"
54
TLS
Transport Layer Security more powerful replacement for SSL operates functionally the same
55
Telnet Protocol
legacy protocol used to access different mainframes from a singular dumb terminal TCP port 23 no encryption
56
SSH
Secure Shell terminal emulation program that looks exactly like Telnet but encrypts the data and the authentication TCP port 22
57
host name
name or IP address of the computer to which you want to connect
58
primary function of Telnet & SSH
enable control of a remote computer from a local computer over a network
59
e-mail operational basics
e-mail sent to address stored in electronic mailbox on e-mail server tell e-mail client to download the message
60
SMTP
Simple Mail Transfer Protocol protocol used by clients to send e-mail messages TCP port 25
61
POP3
Post Office Protocol version 3 1 / 2 protocols that receive e-mail from SMTP servers TCP port 110
62
IMAP4
Internet Message Access Protocol version 4 2 / 2 protocols that receive e-mail from SMTP servers supports searching server for key words & creating folders TCP port 143
63
Web services
Gmail, Google Docs, Google Sheets, etc.
64
Sendmail
Linux / UNIX no interface
65
Microsoft Exchange
Windows only SMTP & POP3 capable
66
e-mail server
accept incoming mail sort mail for recipients into individual storage area mailboxes kick back messages without known recipient
67
e-mail client
programs that run on a computer to enable sending, receiving, & organizing of e-mail
68
e-mail client communications
SMTP server - send mail IMAP or POP server - download messages from mail server
69
FTP
File Transfer Protocol original protocol used on the Internet for transferring files more reliable & faster than HTTP can transfer with security & data integrity
70
FTP ports
Active (legacy) - TCP ports 20 & 21 Passive - TCP port 21
71
FTP site types
Anonymous - anyone can log on Secured - credentials required
72
FTP server
stores files accepts incoming transmissions verifies login credentials transfers files
73
FTP client
logs in to FTP site (Web site, command line, or FTP app) downloads requested files onto local hard drive
74
Most Web servers are also FTP servers
bundled versions are not as robust
75
FTP limitations
not encrypted by default most anonymous FTP sites limit the number of users that may download to ~ 500 at a time
76
using browser at FTP client
"ftp:// some browsers limit features > Firefox only allows for anonymous logins
77
active FTP
client sends FTP request out on port 21 FTP server responds - directed back to an ephemeral port using port 20 does not work with NAT & firewalls (do not recognize the incoming communication from port 20 as originating from within the network)
78
passive FTP
client sends FTP request out on port 21 server sends back a random port number - telling client which port to listen on for data requests client sends data to the port specified client initiates the conversation - NAT router knows where to send incoming packets client needs to be configured to expect incoming packets from passive FTP
79
TFTP
Trivial File Transfer Protocol transfers files using UDP port 69 no credentials never use on non-secure networks