Chapter 6 - Internet Protocol Flashcards

1
Q

Network Protocol

A

A network protocol defines rules for communication between network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Without protocol ?

A
  • We cannot make communication between the computers
  • Message cannot be send/receive
  • No proper data format
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Internet Protocol (IP)

A
  • IP prepares packet for transmission across the Internet
  • IP is designed to control data transmission between two nodes and to ensures that a link has been established between source and destination.
  • IP simply transmit the data, it does not care if the packet is delivered correctly. (No error detection)
  • The IP header is encapsulated onto a transport data packet.
  • The IP packet is then passed to the next layer where further network information is encapsulated onto it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Transmission Control Protocol (TCP)

A
  • TCP layer creates a connection between sender and receiver using port numbers.
  • It also ensures packets arrive intact and in correct order.
  • TCP is a connection oriented protocol.
  • TCP can perform end-to-end error correction.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet Control Message Protocol (ICMP)

A

• ICMP Used by routers and nodes
- Perform error reporting for the Internet Protocol.
~ ICMP reports errors such as invalid IP address, invalid port address, and the packet hopped too many times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

User Datagram Protocol (UDP)

A
  • A transport layer protocol used in place of TCP.
  • Where TCP supports a connection-oriented application, UDP is used with connectionless applications.
  • UDP also encapsulates a header onto a application packet, but the header is much simpler than TCP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Address Resolution Protocol (ARP)

A
  • Even through a destination workstation may have an IP address, a LAN does not use IP addresses to deliver frames.
  • ARP translates an IP address into a MAC layer address so the frame can be delivered to the proper workstation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dynamic Host Configuration Protocol (DHCP)

A
  • An IP address can be assigned to a workstation permanently (static management) or dynamically.
  • Dynamic IP address assignment is a more efficient use of fixed IP addresses.
  • When DHCP client issues an IP request, DHCP server looks in its static table. If no entry exists, the server select an IP address from available pool.
  • The address assigned by DHCP server is temporary.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Address Translation (NAT)

A

• NAT lets the router represent the entire local area network to the Internet as a single IP address.
- Thus, all traffic leaving the LAN appears as originating from a global IP addresses.
- All traffic coming into this LAN uses this global IP addresses.
• This security feature allows a LAN to hide all the workstation IP addresses from the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hypertext Transport Protocol (HTTP)

A

• Basic Web pages are created with the Hypertext Markup Language (HTML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Uniform Resource Locator (URL)

A
• Web address
• It is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.
• All URLs consists of FOUR parts:
	- Service type
	- Host or domain name 
	- Directory or subdirectory information
	- Filename
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IP Addressses

A
  • All devices connected to Internet have 32-bit IP addresses associated with them.
  • IP address as a logical address (possibly temporary)
  • 48-bit address on every NIC is the physical, or permanent address (MAC address).
  • Computer, network, and routers use the 32-bit binary address, but a more readable from is the dotted decimal notation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Electronic Mail (E-Mail)

A
  • E-mail programs can create, send, receive, and store e-mail, as well as reply to, forward, and attach non-text files.
  • Early e-mail messages contained text information only and not the rich formats viewed today that include various fonts, pictures, sounds and multimedia.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multipurpose Internet Mail Extension (MIME)

A
  • It is used to send e-mail attachments. MIME protocol encodes additional information known as mail attachments to e-mail protocols that normally could not transfer attachments such as graphics.
  • MIME allows e-mail attachments to be transferred as separates files using SMTP as the transport protocol.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Simple Mail Transfer Protocol (SMTP)

A
  • It is part of the TCP/IP protocol suit and is designed to transfer plain text email from an email client to a mail server and from a mail server to a mail server.
  • When setting up an email account, the mail server is designated as an SMTP server for sending mail and as POP3 or IMAP server for retrieving email mail.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

File Transfer Protocol (FTP)

A

• Used to transfer files across the Internet
• User can upload or download a file
• The URL for an FTP site begins with ftp://…
• The three most common ways to access an FTP site are:
- Through browser
- Using a canned FTP program
- Issuing FTP commands at a text-based command prompt

17
Q

Remote Login (Telnet)

A
  • Allows a user to remotely log in to a distant computer site.
  • User usually needs a login and password to access a remote computer site.
  • After the connection is made, the client communicates with the Telnet server using text based commands. The telnet session allows a user to manipulate a file on the remote computer.
  • Telnet is commonly used to remotely control WAN servers and routers.
18
Q

Voice Over IP (VoIP)

A
  • The transfer of voice signals using a packet-switched network and the IP protocol.
  • VoIP relies on existing TCP/IP technology and TCP/IP equipment.
  • VoIP is less expensive for long distance cells when compared to existing telephone technologies. VoIP typically uses a series of UDP packets to send voice data across the network.