Chapter 7: Introduction to TCP/IP Flashcards
What networking protocol is used by the Internet and the vast majority of business and home networks?
TCP/IP
Protocol
Comon set of rules that govern communications
TCP/IP isn’t just a protocol, it’s _____
A collection of different protocols that work together to delivery connectivity.
TCP/IP stands for
Transmission Control Protocol / Internet Protocol
What are the four layers of the Department of Defense (DoD) networking model?
Process / Application
Host-to-Host
Internet
Network Access
What model does the TCP/IP protocol suite use?
DoD networking model
Telnet, FTP, LPD, SNMP, TFTP, SMTP, NFS and HTTP are all examples of TCP/IP protocols at the DoD’s ____ layer.
Process / Application
TCP and UDP are both TCP/IP protocols located at the DoD’s ____ layer
Host-to-Host
ICMP, ARP, RARP, and IP are all protocols o TCP/IP, located on the DoD’s ____ layer
Internet
Ethernet, Fast Ethernet, Token Ring, and FDDI are all TCP/IP protocols locaed on the DoD’s ____ layer
Network access
HTTP
Hypertext Transfer Protocol
Sites on the Process/Application level of the DoD model
Manages communication between a web server and a client
FTP
File Transfer Protocol
Sits on the Process/Application level of the DoD
Allows for the transfer of files
SMTP
Simple Mail Transfer Protocol
Sits at the Process/Application level of the DoD model
Prococol used to send email messages.
Referred to as a push protocol because it’s only designed to send.
POP3
Post office protocol 3
Sits at the Process/Application level of the DoD model
Used to download email from a server.
UDP
User Datagram Protocol
ICMP
Internet Control Message Protocol
ARP
Address Resolution Protocol
RDP
Remote Desktop Protocol
Sits at the Process/Application level of the DoD model
Used to connect to remote computers and run programs on them.
DHCP
Dynamic Host Configuration Protocol
Sits at the Process/Application level of the DoD model.
Dynamically assigns IP addresses and other IP configuration informaion to network clients.
DNS
Domain Name System
Sits on the DoD’s Process/Application level.
Resolves hostnames to IP addresses.
HTTPS
Hypertext Transfer Protocol Secure
Sits on the Process/Application level of the DoD model
Securely encrypts traffic between a web server and a client. Secured using either SSL or TLS
IMAP
Internet Message Access Protocol
Sits on the process / application level of the DoD model
Used to allow for the management of email on a remote server.
LDAP
Lighweight Directory Access Protocol
Sits on the Process/Application level of the DoD model
Provides centralized access to authentication, contact information, client lists, and configuration data for a network
SFTP
Secure File Transfer Protocol
Sits at the Process/Application level of the DoD model
FTP, but encrypted
SMB
Server Message Block
Sits at the Process/Application level of the DoD model
Microsoft-developed protocol. Used to provide shared access to files, printers, and other network resources.
SNMP
Simple Network Management Protocol
Sits at the Process/Application level of the DoD model
Data from network equipment like routers and switches regarding the operation of those devices. This data is sent using SNMP protocol
SNMP servers can collect the data and allow you to analyze it
SSH
Secure Shell
Sits at the Process/Application level of the DoD model
A secure version of Telnet, which allows remote logins at the commandline.
Telnet
Sits at the Process/Application level of the DoD model
Remote access via command line to another PC
Two TCP/IP protocols that sit at the host-to-host level of the DoD model
TCP
UDP
Major difference between TCP and UDP
TCP gaurantees packet delivery through the use of a “virtual circuit” and data acknowledgements.
UDP does not. It’s a stream of packets that are or are not received correctly.
Is TCP connectionless or connection-oriented
Connection Oriented
Is UDP conectionless or connection oriented?
Connectionless
Why does TCP and UDP use port numbers?
This enables a server to differentiate requests among different users.
It also signals the requested protocol to be used
What is the range of ports available to TCP and UDP traffic?
0 to 65,535
That’s 65,536 ports
Which range of ports is considered ‘well-known’
0-1023
Which range of ports is considered ‘registered ports”
1024 - 49151
FTP
Which protocol?
Which port number?
TCP
20 or 21
SSH
Which protocol?
Which port number?
TCP
22
Telnet
Which protocol?
Which port number?
TCP
23
SMTP
Which protocol?
Which port number?
TCP
25
DNS
Which protocol?
Which port number?
TCP or UDP
53
HTTP
Which protocol?
Which port number?
TCP
80
DHCP
Which protocol?
Which port number?
UDP
67 or 68
POP3
Which protocol?
Which port number?
TCP
110
IMAP4
Which protocol?
Which port number?
TCP
143
SNMP
Which protocol?
Which port number?
UDP
161
LDAP
Which protocol?
Which port number?
TCP
389
HTTPS
Which protocol?
Which port number?
TCP
443
SMB
Which protocol?
Which port number?
TCP
445
RDP
Which protocol?
Which port number?
TCP
3389
There is only one TCP/IP protocol at the Internet layer of the DoD model. What is it?
IP
Internet Protocol
What is the IP protocol responsible for?
Managing logical network addresses and getting data from point A to point B.
Within IP there are three support protocols known as
ICMP
ARP
RARP
ICMP
Internet Control Messaging Protocol
Responsible for delivering error messages.
Ping uses ICMP
ARP
Address Resolution Protocol
Resolves logical IP addresses to physical MAC addresses.
This is how network clients find a neighboring client’s MAC address.
RARP
Reverse ARP
Resolves MAC addresses to IP addresses.
Allows you to find an IP address if you just have a MAC address.
Host
Any device on a network with an IP address
The format used to express IP addresses
Dotted-decimal notation
How many bits is an IPv4 address?
32 Bits
An IP address is said to be _____, as opposed to flat because _____
Hierarchical
…because the numbers at the beginning of the address identify groups of computers that belong to the same network.
Octet
An 8-bit section of an IP
An IP has four octets
Each IP address is made of two components, the _____ and ____
Network ID
Host ID
Which part of an IP is the network ID and which is the host ID?
This is determined by the subnet mask. Different hosts will use different parts of the IP address, depending on the subnet mask.
Neither the network ID nor the host ID can be set to ____
All zeros or all ones.
That would mean that portion of the IP address would be blank
A network ID of all 0s indicates “this network”
A host ID of all 1s is a broadcast address.
What information does a DHCP server typically provide clients that connect?
IP adress
Subnet mask
Defaut gateway (the “door” to the outside world)
DNS server address
When a client configured to get its network configuraiton via DHCP boots up, how does it request that a DHCP server provide it with its network configuration?
It sends a broadcast on the network called a DHCP DISCOVER, requesting a DHCP server.
The server responds to hte request and fulfills it by returning configuraiton information.
Static IP Addressing
When an administrator assigns a device its IP address.
Why do local networks use private IPs?
The original conception of the Internet was for all devices to have their own, public IP; but we can’t possibly do this as we’re out of public IPs.
Instead we use private IP ranges for private networks. The entire network will share one IP.
NAT
Network Address Translation
NAT runs on a router and handles the translation from a private, nonroutable IP address to a public IP address.
Class A address range reserved from private use.
10.0.0.0 - 10.255.255.255
Subnet Mask: 255.0.0.0
16.7 million hosts
Class B address range reserved for private use.
172.16.0.0 - 172.31.255.255
Subnet Mask: 255.255.0.0
1 million hosts
Class C address range reserved for private use
192.168.0.0 -192.168.255.255
Subnet Mask: 255.255.255.0
65,536 hosts
APIPA
Automatic Private IP Addressing
TCP/IP standard used to automatically configure IP based hosts that are unable to reach a DHCP server.
This is that 169.254.x.x address you see when not connect to a network.
Subnet mask: 255.255.0.0
IPv6 create what sized IP addresses?
128 bit
Instead of dotted-decimal notation, IPv6 uses ____
Hexadecimal notation