Chapter 6 Flashcards
(TCP/IP) stands for what. p157
Transmission Control Protocol/Internet Protocol (TCP/IP)
(DoD) stands for what. p157
Department of Defense (DoD)
(IETF) stands for what. p157
Internet Engineering Task Force (IETF)
(NCP) stands for what. 157
Network Control Protocol (NCP)
The DoD model is basically a condensed version of the OSI model—it’s composed of four, instead of seven, layers: p158
Process/Application layer
Host-to-Host layer
Internet layer
Network Access layer
When the different protocols in the IP stack are discussed, the layers of the OSI and DoD models are what. p158
interchangeable
To integrate the various activities and duties spanning the focus of the OSI’s corresponding top three layers. p158
Process/Application layer
Parallels the functions of the OSI’s Transport layer, defining protocols for setting up the level of transmission service for applications. p159
Host-to-Host layer
Corresponds to the OSI’s Network layer, designating the protocols relating to the logical transmission of packets over the entire network. p159
Internet layer
Monitors the data exchange between the host and the network.
Network Access layer
What is Telnet? p160
Telnet is the chameleon of protocols—its specialty is terminal emulation. It allows a user on a remote client machine, called the Telnet client, to access the resources of another machine, the Telnet server.
Is the protocol that actually lets you transfer files across an IP network, and it can accomplish this between any two machines using it. p160
File Transfer Protocol (FTP)
Is used when you need to transfer files over an encrypted connection. It uses an SSH session more on this later which encrypts the connection. P161
Secure File Transfer Protocol (SFTP)
Is the stripped-down, stock version of FTP, but it’s the protocol of choice if you know exactly what you want and where to find it. It doesn’t give you the abundance of functions that FTP does, though. p161
Trivial File Transfer Protocol (TFTP)
Once a message has been sent to a destination, the message is spooled to a device—usually a disk. The server software at the destination posts a vigil, regularly checking the queue for messages. p162
Simple Mail Transfer Protocol (SMTP)
Basically, how this protocol works is when a client device connects to a POP3 server, messages addressed to that client are released for downloading. p162
Post Office Protocol (POP)
makes it so you get control over how you download your mail, with it, you also gain some much-needed security. It lets you peek at the message header or download just a part of a message.p162
Internet Message Access Protocol, Version 4 (IMAP4)
Is a proprietary protocol developed by Microsoft. It allows you to connect to another computer and run programs. p162
Remote Desktop Protocol (RDP)
Are cryptographic protocols that come in really handy for enabling secure online data-transfer activities like browsing the Web, instant messaging, internet faxing, and so on. p163
Transport Layer Security (TLS)
Is a hugely popular signaling protocol used to construct and deconstruct multimedia communication sessions for many things like voice and video calls, video conferencing, streaming multimedia distribution, instant messaging, presence information, and online games over the Internet. p163
SIP (VoIP)
Describes a packet-formatting standard for delivering audio and video over the Internet. Although initially designed as a multicast protocol, it’s now used for unicast applications too. p163
RTP (VoIP)
Collects and manipulates valuable network information. It gathers data by polling the devices on the network from a management station at fixed or random intervals, requiring them to disclose certain information. p163
Simple Network Management Protocol (SNMP)
When all is well, SNMP receives something called a what? p163
baseline
These network watchdogs are called _____ and when aberrations occur, agents send an alert called a _____ to the management station. p163
agents
trap
sets up a secure Telnet session over a standard TCP/IP connection and is employed for doing things like logging into other systems, running programs on remote systems, and moving files from one system to another.p164
Secure Shell (SSH)
Allowed a host to retrieve a large amount of data at once.p163
GETBULK
It’s used to manage communications between web browsers and web servers and opens the right resource when you click a link, wherever that resource may actually reside.p164
Hypertext Transfer Protocol (HTTP)
t’s a secure version of HTTP that arms you with a whole bunch of security tools for keeping transactions between a web browser and a server secure. p164
Hypertext Transfer Protocol Secure (HTTPS)
Both _______and ______ is used to encrypt packets over your intranet and the internet. p164
SSH (port 22)
HTTPS (port 443)
Works in conjunction with other synchronization utilities to ensure all computers on a given network agree on the time. p164
Network Time Protocol (NTP)
Transferring data, usernames and passwords get sent right along with the file request in the clear for all to see with no encryption. p165
Secure Copy Protocol (SCP)
This protocol standardizes how you access directories, and its first and second inceptions are described in RFCs 1487 and 1777, respectively. p165
Lightweight Directory Access Protocol (LDAP)
What is Internet Group Management Protocol (IGMP) p165
is the TCP/IP protocol used for managing IP multicast sessions. It accomplishes this by sending out unique IGMP messages over the network to reveal the multicast-group landscape and to find out which hosts belong to which multicast group.