TCP/IP Stack Flashcards

1
Q

What four layers make up the TCP/IP stack?

A
  • Application
  • Transport
  • Internet
  • Link
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Application Layer?

A

The data that is being sent is encoded into a format that is understandable by the recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Transport Layer?

A

The data is split into parts suitable to be fitted into a data packet. Each data packet is assigned a number to indicate the port it will be delivered to and is also assigned a number to indicate the order in which the data packets can be correctly reordered once they have been received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Internet/Network Layer?

A

The network layer attaches the IP address of the sender of the data and the IP address of the host that will receive the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Link Layer?

A

The MAC address for the hardware device sending the data is added, as well as the MAC address for the device receiving the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Process and connection identification?

A

The TCP / IP process contains an identifier termed as a socket, that is based on its IP address and port number it has been assigned to. Typical socket notation is <IP>:<Port></Port></IP>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a MAC Address?

A

The MAC (media access control) address is the physical address of a device such as a NIC (network interface card). It is a unique identifier assigned by the manufacturer and is stored on the network interface card in a ROM (read-only memory) device.
MAC addresses uniquely identify a network adaptor on a LAN (local area network); on a LAN all devices that are connected can access the network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can Security can be improved on a wireless network?

A

Security can be improved on a wireless network as follows: the router for a wireless network can be set up to only allow access to a list of computers – these computers are identified by their unique MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are ports?

A

TCP/IP networks have ports, which are logical connections that are used by a client program to specify a connection on a networked computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two types of ports?

A
  • Well known ports
  • client ports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are well known ports?

A

these are ports that have numbers that are specifically pre-assigned and universally used ports. Clients need to use the well-known ports that are the destination ports for a client request and, therefore, server inputs for a particular service. So, for example, a server processes email based on the use of the following ports: Port 25 which is a SMTP port and Port 110 which is a POP3 port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are client ports?

A

when a server responds to a client request the port number the client is using must be identified. So the source port of the request is used by the server to send their reply. Clients assign a temporary port for their process rather than a well-known port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly