Chapter 6- Supplement - Sheet1 (1) Flashcards
TCP or UDP? And What Port? Telnet
TCP, 23
TCP or UDP? And What Port? SMTP
TCP, 25
TCP or UDP? And What Port? HTTP
TCP, 80
TCP or UDP? And What Port? FTP
TCP, 20, 21
TCP or UDP? And What Port? DNS
TCP & UDP, 53
TCP or UDP? And What Port? HTTPS
TCP, 443
TCP or UDP? And What Port? SSH
TCP, 22
TCP or UDP? And What Port? POP3
TCP, 110
TCP or UDP? And What Port? SNMP
UDP, 161
TCP or UDP? And What Port? TFTP
UDP, 69
TCP or UDP? And What Port? BOOTPS/DHCP
UDP, 67,68
TCP or UDP? And What Port? NTP
TCP 123
TCP or UDP? And What Port? IMAP4
TCP 143
TCP or UDP? And What Port? RDP
TCP 3389
Name the 7 differences between TCP and UDP
Sequenced v Unsequenced, Reliable v Unreliable, Connection-oriented v Connectionless, Virtual Circuit v No virtual circuit, High overhead v Low overhead, Acknowledgements v No acknoledgements, Windowing flow control v No windowing or flow control
Name the layers of TCP/IP
Process/Application, Host-to-host, Internet, Network Access
Name which layers in DoD or TCP/IP match to which layers in OSI model
Process/Application->Application/Presentation/Session, Host-to-Host->Transport, Internet->Network, Network Access->Data Link/Physical
Define telnet
allows a user
on a remote client machine, called the Telnet client, to access the resources of another
machine, the Telnet server
File Transfer Protocol (FTP)
the protocol that actually lets you transfer files across an IP
network, and it can accomplish this between any two machines that are using it. Also a program.
Secure File Transfer Protocol (SFTP)
Link FTP, but uses SSH to secure connection.
Trivial File Transfer Protocol (TFTP)
stripped-down, stock version of FTP, but it’s
the protocol of choice if you know exactly what you want and where to find it. No authentication required. Insecure.
Simple Mail Transfer Protocol (SMTP)
Used to send mail
Post Office Protocol (POP)
used to receive mail.
Internet Message Access Protocol (IMAP)
Used to manage mail on a remote server. Gives client more security by giving it the ability to download selected messages and selected portions of messages.
Remote Desktop Protocol (RDP)
It allows
you to connect to another computer and run programs. RDP operates somewhat like Telnet,
except instead of getting a command-line prompt as you do with Telnet, you get the actual
graphical user interface (GUI) of the remote computer
Transport Layer Security (TLS) / Secure Sockets Layer (SSL)
cryptographic protocols that come in really handy for enabling secure online data-transfer
activities like browsing the Web
Session Initiation Protocol (SIP) (VoIP)
hugely popular signaling protocol used to construct
and deconstruct multimedia communication sessions for many things like voice and video
calls, videoconferencing, streaming multimedia distribution, instant messaging, presence
information, and online games over the Internet
Real-time Transport Protocol (RTP)
a packet-formatting standard for delivering
audio and video over the Internet. commonly employed for streaming media, videoconferencing,
and push-to-talk systems
Simple Network Management Protocol (SNMP)
collects and manipulates valuable network
information. It gathers data by polling the devices on the network from a management station
at fixed or random intervals, requiring them to disclose certain information
Secure Shell (SSH)
sets up a secure (encrypted!) Telnet session over a standard TCP/IP connectio
Hypertext Transfer Protocol (HTTP)
It’s used to manage communications
between web browsers and web servers and opens the right resource when you
click a link, wherever that resource may actually reside
Hypertext Transfer Protocol Secure (HTTPS)
secure version of HTTP that arms you
with a whole bunch of security tools for keeping transactions between a web browser and
a server secure.
Network Time Protocol (NTP)
used to synchronize the clocks on our computers to one standard time source. ensure that all computers on a given network agree on the time
Secure Copy Protocol (SCP)
Through SSH, it first establishes and then sustains a secure,
encrypted connection between the sending and receiving hosts until file transfer is complete.
When armed with SCP, your Hail Mary pass can be caught only by your intended
receiver—snap! In today’s networks, however, the more robust SFTP is used more commonly
than SCP.
Lightweight Directory Access
Protocol (LDAP)
This protocol standardizes how you access directorie
Internet Group Management Protocol (IGMP)
used for managing
IP multicast sessions. It
Domain Name Service (DNS)
resolves hostnames—specifically, Internet names, such as
www.lammle.com, to their corresponding IP addresses.
Dynamic Host Configuration Protocol (DHCP)
assigns IP addresses to hosts with information
provided by a server. It allows easier administration and works well in small to even
very large network environments
Name the two host-tohost layer protocols important to remember
TCP, UDP
Transmission Control Protocol (TCP)
takes large blocks of information from an application
and breaks them into segments. It numbers and sequences each segment so that the destination’s
TCP process can put the segments back into the order the application intended.
User Datagram Protocol (UDP)
Protocol for sending information, but is connectionless, low overhead, and is considered unreliable.
Name the internet layer protocols important to remember
Internet Protocol (IP), Address Resolution Protocol (ARP), Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP) works at the Network layer and is used by IP
for many different services. ICMP is a management protocol and messaging service provider
for IP. Its messages are carried as IP packets.
ICMP packets have the following characteristics:
NN They can provide hosts with information about network problems.
NN They are encapsulated within IP datagrams.
Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP) finds the hardware address of a host from a known IP
address
Differences between connection-oriented and connectionless network services
Connection-oriented services use acknowledgements and flow control to create reliable session. They use more overhead. Connectionless services are used tos end data with no acknoledgemetns or flow control (handled at the software layer). This is considered unreliable.
What might be the problem if a DHCP client suddenly finds itself in a different IP subnet
from the one it should be in?
The most likely problem is that a rogue DHCP server has been introduced into the network
and is handing this device an incorrect lease.
Name the protocol that uses both TCP ports 20 and 21.
FTP uses both TCP ports 20 and 21 for the data channel and the control channel,
respectively.
What two Transport layer protocols does a DNS server use?
A DNS server uses TCP port 53 for zone transfers and UDP port 53 for name resolutions.
Which protocol dynamically reports errors to source hosts by using IP directly to build
packets?
ICMP uses IP directly to build error-reporting packets that are transmitted back to the
originating source host when issues arise during the delivery of data packets. ICMP is
also used during ping and some Traceroute operations.
What could cause a server that you can ping not to provide the particular TCP/IP
service, such as FTP, HTTP, and so on, that you expect it to offer?
Quite simply, the service might not be running currently on that server. Another possibility
might be that a firewall between the client and the server has blocked the protocol
in question from passing.
What might cause your email to stop functioning properly when you change Internet
service providers?
Incorrect MX Record
Which Unix command is used for terminal emulation in the same way Telnet is used?
The Unix command rlogin functions similarly to Telnet
What protocol is at the heart of the ping and tracert commands in a Windows
operating system?
ICMP is the protocol that the ping and tracert commands rely on. If you’re having
trouble getting pings and Traceroutes through a router, you might need to check if
ICMP is being allowed thorough.
Which destination Transport layer protocol and port number does a TFTP client use to
transfer files over the network?
TFTP servers respond to UDP messages sent to port 69.
What well-known port numbers do SMTP, POP3, RDP, and IMAP4 servers use?
SMTP uses TCP port 25, POP3 uses TCP port 110, RDP uses TCP port 3389, and
IMAP4 uses TCP port 143.