Chapter 6 Flash Cards - TCP/IP, Applications, Security
Describe the TCP/IP Transport Layer Function: Multiplexing using ports
Function that allows receiving hosts to choose the correct application for which the data is destined, based on the port number.
Describe the TCP/IP Transport Layer Function: Error Recovery (Reliability)
Process of numbering and acknowledging data with Sequence and Acknowledgment header fields.
Describe the TCP/IP Transport Layer Function: Flow Control using windowing
Process that uses window sizes to protect buffer space and routing devices.
Describe the TCP/IP Transport Layer Function: Connection Establishment and temination
Process used to initialize port numbers and sequence and acknowledgement fields.
Describe the TCP/IP Transport Layer Function: Ordered data transfer and data segmentation
Continuous stream of bytes from an upper-layer process that is “segmented” for transmission and delivered to upper-layer processes at the receiving device, with the bytes in the same order.
What are dynamic port numbers?
Ports allocated by host starting at 1024 because the ports below are reserved for well-known applications.
Give the Protocol and Application for the given Port: 20
TCP/ FTP Data
Give the Protocol and Application for the given Port: 21
TCP/ FTP Control
Give the Protocol and Application for the given Port: 22
TCP/ SSH
Give the Protocol and Application for the given Port: 23
TCP/ Telnet
Give the Protocol and Application for the given Port: 25
TCP/ SMTP
Give the Protocol and Application for the given Port: 53
UDP,TCP/ DNS
Give the Protocol and Application for the given Port: 67, 68
UDP/ DHCP
Give the Protocol and Application for the given Port: 69
UDP/ TFTP
Give the Protocol and Application for the given Port: 80
TCP/ HTTP (WWW)
Give the Protocol and Application for the given Port: 110
TCP/ POP3
Give the Protocol and Application for the given Port: 161
UDP/ SNMP
Give the Protocol and Application for the given Port: 443
TCP/ SSL
Give the Protocol and Application for the given Port: 16,384-32,767
UDP/ RTP-based Voice (VoIP) and Video
Define Connection-Oriented Protocol
A protocol that requires an exchange of messages before data transfer begins or that has a required preestablished correlation between two endpoints.
Define Connectionless Protocol
A protocol that does not require an exchange of messages and that does not require a preestablished correlation between two endpoints.
What are the QoS requirements for VoIP?
- Low delay: VoIP requires a very low delay between the sending phone and the receiving phone–typically less than 200 milliseconds (.2 seconds). This is a much lower delay than what is required by typical data applications.
- Low jitter: Jitter is the variation in delay. VoIP requires very low jitter as well whereas data applications can tolerate much higher jitter. For example, the jitter for consecutive VoIP packets should not exceed 30 milliseconds (.03 seconds), or the quality degrades.
- Loss: If a VoIP packet is lost in transit because of errors or because a router doesn’t have room to store the packet while waiting to send it, the VoIP packet is not delivered across the network. Because of the delay and jitter issues, there is no need to try to recover the lost packet. It would be useless by the time it was recovered. Lost packets can sound like a break in the sound of the VoIP call.
Define Denial of Service (DoS) attacks.
An attack whose purpose is to break things.
DoS attacks called destroyers try to harm the hosts, erasing data and software.
DoS attacks called crashers cause harm by causing hosts to fail or causing the machine to no longer be able to connect to the network.
Also, DoS attacks called flooders flood the network with packets to make the network unusable, preventing any useful communications with the servers.
Define Reconnaissance attacks.
This kind of attack may be disruptive as a side effect, but its goal is gathering information to perform an access attack. An example is learning IP addresses and then trying to discover servers that do not appear to require encryption to connect to the server.