Chapter 1 - Ports, Protocols and OSI Flashcards

1
Q

TCP Stands for?

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s does TCP do?

A

Established and maintains network communication to exchange data till complete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What other protocol works along side TCP?

A

Internet Protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of connection is it? And what does it mean?

A

Connection orientated.

Provides guaranteed packet delivery and packet re transmission but use of acknowledgments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pro and Con of TCP?

A

Is slow

More reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What protocol uses TCP?

A

File transfer Protocol (FTP)

Port 20 = Data port connecting back to client client (Passive)

Port 21 = Command Port initiates by client (Active)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does IP stand for?

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is IP Protocol used for?

A

Deliver data from one computer to another over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does IP it specify? And what other Protocol is used?

A

Specifies the

  • the format of packets
  • Addressing Scheme

Also uses the TCP Protocol (TCP/IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a connection less Protocol?

A

Packets have no relation to the other units of data.

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Do packets using IP assemble in correct order?

A

Yes. TCP assembles packets in the correct order even if packets arrive out of order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Can IP send packets along different routes to the same machine?

A

Yes and TCP will assemble them in correct order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What layer of the OSI Model does IP OPERATE?

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does IP Handel?

A

Handles routing to ensure packets arrive as the correct location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPv4

A

32bits
4 Bytes
Supports 4 billion addresses
Consists of four groups of 8 bits.

Eg

      1. 1
  1. 00010000.11111110.00000001
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IPv6

A

128bit address space
340 Trillion addresses
Format can be compressed by compressing the leading 0 and groups of 0

2001: 0db8:3902:00c2:0000:0000:0000:fe04
2001: db8:3902:c2::fe04

Most recent OSs IPv6 is default but 4 can also be used

Better at handling VOIP and Video conferencing

Is a more complex addressing scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What’s is UDP?

A

User Datagram Protocol
Ideal for speed
Not as reliable as TCP
Faster than TCP

Data that suffers data loss doesn’t effect the overall quality and relays on app to resend lost packets.

Operates and transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

UDP Transmission Services

A
Trivial File Transfer Protocol (TFTP)
Real Time Streaking Protocol (RTSP)
Simple Network Protocol (SNP)
Domain Names System (DNS)
Internet Control Message Protocol (ICMP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does ICMP do?

A

Provides error reporting and message generating when problems in delivering IP packets

Is a UDP Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What can send ICMP messages?

A

Any IP Network device and send, receive and processes messaged.
-Router - Host - Service

One of the main internet protocols

Commonly used in diagnostics and troubleshooting with PING and TRACERT commands to get a status reply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ICMP message types

A

Error Reporting when something goes wrong

Query Messages when you want to ask about the status of a device.

Doesn’t correct issues.
L

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Connection orientated Protocol benefit and Con

A

Benefits

Less prone to error
More reliable
Data arrives in correct sequence
State fuel connections

Con
Slower protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a connectionless Protocol?

A

When communication is sent between two network endpoints without prior arrangement.

Device sends messages prior to ensuring receiving device is ready.

Some protocols can allow for error correction is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are some connectionless protocols?

A

UDP
IP
ICMP
IPX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Connectionless Protocol Pro and Conns

A

Pro

Is a fast protocol

Cons

Not reliable
No error messages of data is dropped
A stakes communication connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a connection orientated Protocol?

A

A reliable service that guarantees data will arrive in proper sequence

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Connection less Protocol Broadcast Types

A

Broadcast
A single message is sent to all hosts on a network simultaneously (1 to many)

Multicast
Message sent to multiple Hosts which belong to a specific multicast group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

FTP?

A

File Transfer Protocol
Port 20 Passive data port where serve connects back to client
Port 22 Active command port used by client to initiate connection

FTP is and client/server config and used to transfer files.

SFTP ensures authentication between user and server

TCP based Protocol

29
Q

SSH?

A

Secure Shell
Port 22
Used in Linux/Unix to provide confidentiality and integrity when using an in secure network.

Uses Public Key Cryptography

Commonly used to secure remote network logins.

30
Q

Telnet?

A

Port 23
Supports remote logging and communication between two computers
No encryption, data sent in plain text and subject to interception.
Used to run commands or diagnostics on remote systems.

31
Q

SMTP

A

Simple Mail Network Protocol
Port 25
Used for sending internet email transmissions to transfer massages from one server to another. (Email)

Send only protocol for email.
SMPT with authentication uses port 587

32
Q

DNS?

A

Domain Name System
Port 53
Translates URLs into IP Addresses
Uses both TCP and UDP

DNS servers use hierarchical database containing know IP Addresses and corresponding Domain names.

TCP over port 53
Used for data replication for data being copied to a second server of request 1 fails.

UDP over port 53
Used for simple lookups

WHOIS query
Is a passive DNS assessment without connecting with the target.

33
Q

DHCP

A

Dynamic Host Configuration Protocol
Port 67 for servers using UDP
Port 68 for clients using UDP

Used to assign IP addresses to a network device.

IPs can be manually or dynamically assigned.

DHCP requests IP from a sever using DORA
DISCOVER
OFFER
REQUEST
ACKNOWLEDGE 

DCHP Reservation list
Is a list of IP Addresses which won’t be leased to other devices on the network.

34
Q

Trivial File Transfer Protocol

A

Port 69

A network file transfer protocol which uses UDP

35
Q

HTTPS and HTTPS

A

HTTPS Port 80/8080
HTTPS Port 443

Sends and receives web based client requests to view HTML pages or data from a browser.

Client uses a URL to locate and request information from a web server.

Requests are sent back using TCP be default over port 80.

Can used UDP.

HTTP is unencrypted

HTTPS secures wen browsing using SSL to provide strong encryption.

36
Q

PoP3

A

Post Office Protocol v3
Port 110
Port 995 using SSL

Receive only protocol

As client connects the email is downloaded to the device and deleted from the server once send/receive pressed.

37
Q

IMAP

A

Internet Message Access Protocol
Port 143
Port 993 using SSL

Allows emails to sync between multiple devices.

Emails stored on a server instead of being downloaded to a device.

Receive only protocol

38
Q

NTP

A

Network Time Protocol
Port 123

Used to sync time between devices.

39
Q

SNMP

A

Simple Network Management Protocol
Port 161/162

Is an application protocol.

Manages and monitors network devices to catch problems.

Provides common language for network devices in a LAN or WAN.

SNMP v3
Protects packets in transit by authenticating and encrypting SNMP messages.

40
Q

LDAP

A

Leighton Weight Director Access Protocol
Port 389
Port 636 using SSL

Application layer protocol used to search a directory for objects such as
- Organisations - Individuals - Resources - Files and Devices.

Directory allows object organisation BIA a logical hirachy.

41
Q

Benefits of LDAP?

A
Allows multiple independent directories 
Uses a global naming system 
Runs over TCP/UDP and SSL
Supports DMS for name resolution
An open source protocol.
42
Q

SMB?

A

Server Message Block
Port 446

Used to share access to network resources like
-Files -Printers -Serial Port and Devices

Commonly used when using Network Attached Storage (NAS)
Can connect SMB via AFP for Mac when you specify Port # and URL.

43
Q

RDP?

A

Remote Desktop Protocol
Port 3389

Allows remote users to have a GUI while accessing another computer.

Microsoft proprietary protocol

44
Q

SIP?

A

Session Initiation Protocol
Port 5060/5061

is a signalling Protocol used for intimating, maintaining and terminating real time sessions like
Voice and Video applications.

45
Q

OSI Model?

A

Open System Interconnect

Is an architectural approach to developing network communications

Facilitates consistency when developing apps, protocols and devices.

46
Q

Layers of the OSI Model?

A

Has 7 layers

Application
Presentation
Session
Transport
Network
Data Link
Physical 

Interaction between top and or bottom layer only

When sending packets begin at the application layer and works down the stack. And back up the layer stack and the receiving end.

47
Q

Layer 1 OSI

A

Physical

Transmits digital data bits from sender to receiving device over physical network communication media.

Contains physical devices like hardware and contains the definition of hardware specifications for
-Cables -Connections -NIC -Repeaters -Hubs

Little programming involved.

48
Q

Functions of ISO Physical layer

A

Encoding and Signalling
Transforms data from bits into electrical signals which’s are sent over the network.

Data Transmission
Transmitting and receiving of data across the network type (Wired or wireless)

Topology and Physical Network Design

Bit Rate Control
Controls transmission but rage so you don’t over whelm the physical media.

49
Q

Layer 2 ISO Model

A

Data Link Layer

Responsible for node to node data delivery which receives data coming down from the network layer and passes down to the physical layer.

It creates frames and adds physical addresses

  • FRAMES identify the beginning and end of the transmission*
  • Physical Address (MAC) defines who the sender and receiver is*
50
Q

Features of Data Link layer 2

A

Error Free Transfer
Other layers can assume error dress transmission over the media

if an error occurs it ensures data re transmission

Defines data format and errors using

-Checksum
A mathematical calculation applies to data which informs you of its value and what the value should be. If value is lost it requests a data resend.

  • Source and Destination Addressing.
  • Data
51
Q

Data Link layer functions

A
  • Physical Addressing (MAC)

To detect and recover errors at the Physical layer it uses
1/ Frame Traffic Control
2/ Frame Sequencing
3/ Frame Acknowledgement

4/ Fram Delaminating - identify Start and end
5/ Frame error checking - Check Sum
6/ Establish and Terminate links
7/Media Access Management - which indicates who is using the media at a given time.
8/ Flow Control
9/ Error Control
10/Access Control

52
Q

Data Link Sub Layer LLC

A

1/ Logical Link Control (LLC)

The interface between the MedianAccess Methods (Physical Layer) and Network Layer Protocols (Network Layer)

LLC determine if communication within be

1/ Connectionless using UDP OR
2/ Connection Orientated using TCP

  • TCP/UDP operate in the transport layer*
  • LLC implements the communication protocol type*
53
Q

Data Link sub layer MAC

A

Media Access Control
Responsible for connection to the physical media using a MAC address

MAC Address is a
12 digit a hexadecimal number which is unique to each computer/network device.

54
Q

Layer 3 OSI Model

A

Networking

Which is responsible for

1/ Patch Addressing
2/ Converts Address from logical which is editable (IP) to physical which is not editable (MAC)
3/ Source to destination delivery which uses routing to get packets delivered from network to network over the internet.

  • Routing only required for sending data out of your network. *
  • No need for routing on the local network as the MAC address can be used to identify local network devices*
  • layer is responsible for defining Networks*
  • Defines boundaries of a given network and how to pass data between them*
55
Q

Network Layer Functions

A

1/ Subnet Control
Which is a network segment boarded by a router.

It can use throttling to control data transfer.

2/ Subnet usage accounting
Keeps track of frames which can be used to report on how much bandwidth an action takes.

3/ Address Mapping
Translated Logical Address into the physical address.

4/ Inter Networking
Provides logical connection between different Networks and combines various networks to form a larger network.

is the connection of multiple networks located at different locations

5/ Logical Addressing
Enables combining of larger networks and defines a network addressing scheme to uniquely identify each device.

6/ Packetising
Creates packets upon receiving data from upper layers using encapsulation.

IP defines packet format

7/ Fragmentation
Divides larger packets into smaller fragments which can be easily sent on physical medium.

56
Q

What are subnets used for?

A

Used by large networks to organise networks into smaller units.

57
Q

Layer 4 ISO Model

A

Transport Layer

Manages end to end messages delivering from the source to destination.

  • provides error checking to ensure no Duplications or Errors during transfer*
  • Message arrives intact and in correct order*
  • Provides garunteeded delivery and uses acknowledgements*

Can be TCP or UDP

58
Q

Transport layer functions

A

1/Message segmentation
Messages from the session layer are passed into the network layer and splits messages in packets.

2/Message Acknowledgement and Traffic Control

3/ Session Multiplexing
Connects multiple sessions into one logical link and track which messages belong to which session.

4/ Service Point Addressing
Ensures correct packets arrive at correct system and being accessed by correct application.

5/ Flow Control
Prevents source device sending data packets at a faster rate than destination can Handel.

6/ Error Control
Ensures messages arrive without error.

59
Q

What is the layer 5 OSI Model

A
Session
Responsible for communication between two devices looking after the 
- Beginning
- Maintenance of connection
- Ending of a given communication 

Regulating flow of data between two devices

Provides a set of guide line over the entire communication

60
Q

What is session protocol

A

Defines parameters for connections and manages transfer of data for
- who can transfer and for how long.

Don’t want to leave connection open once transfer complete

61
Q

Session layer functions

A

1/ Session Establishment, Maintenance and Transmission
- Establishes two machines to establish a session.

2/ Session Support
- looks after security, Names recognition of users and machines and login credentials.

  • Not concerned about sending data but focuses on how we control the passing of data to a machine*

3/ Dialog Control
- Determines which device communicates first and how much data is sent.

  • Simplex = one way communication at a time.
  • Half Duplex = two way communication but one at a time.
  • Full Duplex = Bidorectional communication both at the same time.

4/ Dialog Separation

  • Adds check points/markers with a message
  • used to indicate beginning and end of a message
  • looks after how a message will resume from interruption (maintenance)
62
Q

Session Layer Protocols

A

NetBIOS
Names Pipes
RPC

63
Q

What is the layer 6 OSI Model?

A

Presentation (Teanslation) layer

Presents data in a uniform format to the application layer and masks differences between different systems.

Translates data into a common format to the application layer at the receiving device.

64
Q

Presentation lauer Functions

A

1/ Character Code Translation
ASCII
EBCDIC

Code standards Look after translation Mathias from Binary to character information

2/Data Conversion

  • Bit order
  • Carriage returns (type writer) / Line feed (Linux)
  • Integer floating point to recognise between floating and while integers.

3/ Data Compression
To reduce # of bits transmitted on the network

4/ Data Encryption
Encrypts data for security but also increases file size.

65
Q

What is the layer 7 OSI Model?

A

Application layer

Serves as a window for users and application processes accessing a network service.

Interface between the program and protocol Stack

66
Q

Network services pro side by application layer

A
  • FTP
  • DHCP
  • DNS
  • SMTP
  • HTTP
  • POP3
  • NFS
67
Q

Application layer functionality

A

Allows a used to interact with applications.

  • It accepts user input and passes data down to the lower layers*
  • Allows for easier application compatibility and Implementation and apps don’t have to be re written for different types of network environments*
68
Q

Examples of application layer functionality

A

1/Email Services
Email apps don’t need to be consistent to send messages across different networks.

2/ File Transfer, Access and Management (FTAM)
Multiple types of FTAM applications can be used to access and modify files remotely.

3/ Browsers
To provide internet access for all networking environments

  • as long as HTTP protocol can be accessed *
  • Don’t need to concern with lower layer protocols as an application developer uses the standard protocols for the app to work at the application layer*