2,0 Networking Flashcards
A series of moving vans(IP)
* Efficiently move large amounts of data
– Think of this as like a :
- The network topology is the road
– _____ system - The truck is the Internet Protocol (IP)
– Hint: roads - The boxes hold your data
– Boxes of ____and ___ - Inside the boxes are more things
– ___ information
-a shipping truck
*
-Ethernet, DSL, cable system
*
-We’ve designed the roads for this truck
*
-TCP, UDP
*
-Application information
TCP and UDP
* Transported inside of IP
– Encapsulated by the ____
* Two ways to move data from place to place
– Different _____ for different ____
* OSI Layer 4
– The ____ layer
* Multiplexing
– Use many different _____ at the same time
– __P and __P
-IP protocol
*
-features, applications
*
-transport
*
-applications
-TCP, UDP
TCP – Transmission Control Protocol
* Connection-oriented
– A formal connection ___and ___
* “Reliable” delivery
– Recovery from ____
– Can manage out-of-order ____ or ____
* Flow control
– The receiver can manage how much ____ is sent
- A formal connection setup and close
*
-Recovery from errors
-Can manage out-of-order messages or retransmissions
*
-The receiver can manage how much data is sent
UDP – User Datagram Protocol
* Connectionless - No formal open/close to the connection
* “Unreliable” delivery
– No ___ recovery
– No reordering of ___ or ____
* No flow control
– Sender determines the amount of data ____
– No error recovery
– No reordering of data or retransmissions
*
– Sender determines the amount of data transmitted
Why would you ever use UDP?
* Real-time communication
– There’s no way to ___ and ___ the data
– Time doesn’t stop for your ___
* Connectionless protocols
– DHCP (_____)
– TFTP (____)
– There’s no way to stop and resend the data
– Time doesn’t stop for your network
*
– DHCP (Dynamic Host Configuration Protocol)
– TFTP (Trivial File Transfer Protocol)
Communication using TCP
* Connection-oriented protocols prefer a “return receipt”
– HTTPS (Hypertext Transfer Protocol Secure)
– SSH (Secure Shell)
* The application doesn’t worry about out of order
frames or missing data
– TCP handles all of the ________ overhead
– The application has ____ job
-Hypertext Transfer Protocol Secure
-Secure Shell
*
-communication
-one
Speedy delivery
* The IP delivery truck delivers from one _____ address to
another (IP) address
– Every house has an address, every computer
has an IP address
* Boxes arrive at the house / IP address
– Each box has a ___ name
* Port is written on the outside of the box
– Drop the box into the right ____
-Every house has an address, every computer
has an IP address
*
-Each box has a room name
*
-Drop the box into the right room
Lots of ports
* IPv4 sockets
– Server IP address, _____l,
server application ___ number
– Client IP address, protocol, client ____ number
Lots of ports
* Non-ephemeral ports – permanent port numbers
– Ports 0 through 1,023
– Usually on a server or service
Lots of ports
* Ephemeral ports – temporary port numbers
– Ports ____ through ____
– Determined in _____ by the client
– Server IP address, protocol,
server application port number
– Client IP address, protocol, client port number
*
-Ports 0 through 1,023
– Usually on a server or service
*
– Ports 1,024 through 65,535
– Determined in real-time by the client
Port numbers
* TCP and UDP ports can be any number between
0 and 65,535
* Most servers (services) use non-ephemeral
(not-temporary) port numbers
– This isn’t ___ the case
– It’s just a ___.
* Port numbers are for communication, not security
* Service port numbers need to be “well known”
* TCP port numbers aren’t the same as UDP port numbers
– This isn’t always the case
– It’s just a number.
Port numbers
* Well-known port number
– Client and server need to ____
- Important for firewall rules - Port-based security
- A bit of rote memorization
– Becomes second nature after a while - Make sure you know port number, protocol,
and how the protocol is used
– Client and server need to match
*
– Becomes second nature after a while
FTP - File Transfer Protocol
* tcp/20 (active mode data), tcp/21 (control)
– Transfers files ___ systems
* Authenticates with a username and password
– Some systems use a _______ login
* Full-featured functionality - List, add, delete, etc
– Transfers files between systems
*
– Some systems use a generic/anonymous login
SSH - Secure Shell
- Encrypted communication link - tcp/22
* Looks and acts the same as Telnet
- Encrypted communication link - tcp/__
Telnet
- Telnet – Telecommunication Network - tcp/__
* Login to devices remotely
– ____ access
Telnet
* In-the-clear communication
– Not the best choice for ___ systems
- Telnet – Telecommunication Network - tcp/23
*
– Console access
*
– Not the best choice for production systems
SMTP - Simple Mail Transfer Protocol
* SMTP - Simple Mail Transfer Protocol
– Server to server email transfer - tcp/25
* Also used to send mail from a device to a mail server
– Commonly configured on mobile devices and email clients
* Other protocols are used for clients to receive email
– I___, P___
– Server to server email transfer - tcp/25
*
-Commonly configured on mobile devices and email clients
*
-IMAP, POP3
DNS - Domain Name System
* Converts names to IP addresses - udp/53
– www.professormesser.com = 162.159.246.164
* These are very critical resources
– Usually multiple ___ servers are in production
- www.____.com = __.__
*
– Usually multiple DNS servers are in production
DHCP - Dynamic Host Configuration Protocol
* Automated configuration of IP address, subnet mask and
other options - udp/67, udp/68
– Requires a ___ server
– Server, appliance, integrated into a ___ router, etc.
DHCP - Dynamic Host Configuration Protocol
* Dynamic / pooled
– IP addresses are assigned in ___-____ from a pool
– Each system is given a lease and must renew at __ intervals
DHCP - Dynamic Host Configuration Protocol
* DHCP reservation
– Addresses are assigned by ___ address in the ___ server
– Manage addresses from ___ location
– Requires a DHCP server
– Server, appliance, integrated into a SOHO router, etc.
*
– IP addresses are assigned in real-time from a pool
– Each system is given a lease and must renew at set intervals
*
– Addresses are assigned by MAC address in the DHCP server
– Manage addresses from one location
HTTP and HTTPS
* Hypertext Transfer Protocol
– Communication in the ___
– And by other ____
* In the clear or encrypted
– Supported by nearly all web __ and ___
– Communication in the browser
– And by other applications
*
– Supported by nearly all web servers and clients
POP3 / IMAP
* Receive emails from an email server
– Authenticate and transfer
* POP3 - Post office Protocol version 3
– tcp/___
– Basic mail ___ functionality
* IMAP4 - Internet Message Access Protocol v4
– tcp/___
– Includes email ____ management from multiple clients
– Authenticate and transfer
*
– tcp/110
– Basic mail transfer functionality
*
– tcp/143
– Includes email inbox management from multiple clients
SMB - Server Message Block
* Protocol used by Microsoft Windows
– File ____, printer ___
– Also called CIFS ()
SMB - Server Message Block
* Using NetBIOS over TCP/IP
(Network Basic Input/Output System)
– __/137 - NetBIOS name services (nbname)
– __/139 - NetBIOS session service (nbsession)
* Direct over tcp/445 (NetBIOS-less)
– Direct SMB communication over TCP without
the ____ transport
– File sharing, printer sharing
– Also called CIFS (Common Internet File System)
SMB - Server Message Block
*
– udp/137 - NetBIOS name services (nbname)
– tcp/139 - NetBIOS session service (nbsession)
*
– Direct SMB communication over TCP without
the NetBIOS transport
SNMP - Simple Network Management Protocol
* Gather statistics from network devices
– Queries: udp/16_
– Traps: udp/16_
SNMP - Simple Network Management Protocol
* v1 – The original
– _____ tables
– In-the-____
SNMP - Simple Network Management Protocol
* v2 – A good step ahead
– Data type enhancements
– ___ transfers
– Still in-the-____
SNMP - Simple Network Management Protocol
* v3 – A secure standard
– Message ___
– _____tion
-______ption
– Queries: udp/161
– Traps: udp/162
*
– Structured tables
– In-the-clear
*
– Data type enhancements
– Bulk transfers
– Still in-the-clear
*
– Message integrity
– Authentication
– Encryption
LDAP
* LDAP (Lightweight Directory Access Protocol) - tcp/389
* Store and retrieve information in a network directory
– Commonly used in Microsoft Active ___
-Microsoft Active Directory
RDP - Remote Desktop Protocol
-Share a desktop from a remote location over tcp/3389
* Remote Desktop Services on many Windows versions
-Can connect to an entire ___ or just an a_____
* Clients for Windows, macOS, Linux, Unix, iPhone,
Android, and others
-Share a desktop from a remote location over tcp/3389
*
-Can connect to an entire desktop or just an application
Network devices
* Many different devices and components
– All have different ___
Network devices
* Some of these functions are combined together
– Wireless r____/s___/fi___
Network devices
* Compare different devices
– Understand when they should be _
– All have different roles
*
– Wireless router/switch/firewall
*
– Understand when they should be used
Routers
* Routes traffic between IP subnets
– Makes forwarding decisions based on IP address
– Routers inside of switches sometimes called
“layer 3 switches”
Routers
* Often connects diverse network types
-L___, W___, co___, f____r
– Makes forwarding decisions based on IP address
– Routers inside of switches sometimes called
*
-L___, W___, co___, f____r
– LAN, WAN, copper, fiber