9/8 Class Flashcards
TCP and UDP
operate at Transport Layer of OSI Model
TCP: connection oriented(session is established)
guaranteed delivery
UDP: not guaranteed
TCP
three way handshake using a "flag field" set in the header data transmitted in segments SYN SYN - ACK ACK
TCP
the systems agree upon a TCP sliding window and “segment” byte size
after segments are sent error checking occurs
UDP
data transmitted in “datagrams”
not guaranteed, considered unreliable
IANA
assigns ports
well known ports 10-1023
registered ports 1024-49151
dynamic ports 49152-65535
ARP(address resolution protocol)
command shows contents of ARP
cache expires in predefined minutes
caches can be manually expired for troubleshooting
HTTP
plain text runs on TCP port 80
HTTPS
cipher text(encrypted) runs on TCP port 443
FTP
runs on TCP port 21(sometimes port 20 for data transfer)
used command line or via GUI
may or may not require a password
all communication is in plain text (unencrypted)
unless SFTP or FTPS are used
TFTP
runs on UDP port 69
does not require a password
all communication is in plain text(unencrypted)
most often used for system administration, such as booting routers or firmware updates, in a controlled environment
telnet
runs on TCP port 23
command line remote operation of system
usually unix or linux, but can be used in windows
unencrypted, thus rarely used, instead SSH(secure shell) is more commonly used
RDP Remote Desktop Services
runs on TCP port 3389
GUI equivalent of telnet
show the OS desktop in a window
encryption sockets layer (SSL)
secures web sites (via HTTPS) and VPNs
provides encryption for confidentiality integrity and authentication
being replaced by TLS
runs on any TCP port (usually 443 for HTTPS)
Public Key Infrastructure (PKI) is required to manage Digital Certificates that are at the foundation of SSL
transport layer security (TLS) will replace SSL
Secure Shell (SSH)
enables encrypted communications
often used in place of Telnet
does not require PKI instead using share keys
can tunnel other protocols
often used for cloud based communications
internet protocol security IPSec
authentication is accomplished with the AH authentication Header
encryption is accomplished with ESP(encapsulating security protocol)
can be challenging with firewalls
commonly used with VPNs