Chapter 7: Introduction to TCP/IP Flashcards
What networking protocol is used by the Internet and the vast majority of business and home networks?
TCP/IP
Protocol
Comon set of rules that govern communications
TCP/IP isn’t just a protocol, it’s _____
A collection of different protocols that work together to delivery connectivity.
TCP/IP stands for
Transmission Control Protocol / Internet Protocol
What are the four layers of the Department of Defense (DoD) networking model?
Process / Application
Host-to-Host
Internet
Network Access
What model does the TCP/IP protocol suite use?
DoD networking model
Telnet, FTP, LPD, SNMP, TFTP, SMTP, NFS and HTTP are all examples of TCP/IP protocols at the DoD’s ____ layer.
Process / Application
TCP and UDP are both TCP/IP protocols located at the DoD’s ____ layer
Host-to-Host
ICMP, ARP, RARP, and IP are all protocols o TCP/IP, located on the DoD’s ____ layer
Internet
Ethernet, Fast Ethernet, Token Ring, and FDDI are all TCP/IP protocols locaed on the DoD’s ____ layer
Network access
HTTP
Hypertext Transfer Protocol
Sites on the Process/Application level of the DoD model
Manages communication between a web server and a client
FTP
File Transfer Protocol
Sits on the Process/Application level of the DoD
Allows for the transfer of files
SMTP
Simple Mail Transfer Protocol
Sits at the Process/Application level of the DoD model
Prococol used to send email messages.
Referred to as a push protocol because it’s only designed to send.
POP3
Post office protocol 3
Sits at the Process/Application level of the DoD model
Used to download email from a server.
UDP
User Datagram Protocol
ICMP
Internet Control Message Protocol
ARP
Address Resolution Protocol
RDP
Remote Desktop Protocol
Sits at the Process/Application level of the DoD model
Used to connect to remote computers and run programs on them.
DHCP
Dynamic Host Configuration Protocol
Sits at the Process/Application level of the DoD model.
Dynamically assigns IP addresses and other IP configuration informaion to network clients.
DNS
Domain Name System
Sits on the DoD’s Process/Application level.
Resolves hostnames to IP addresses.
HTTPS
Hypertext Transfer Protocol Secure
Sits on the Process/Application level of the DoD model
Securely encrypts traffic between a web server and a client. Secured using either SSL or TLS
IMAP
Internet Message Access Protocol
Sits on the process / application level of the DoD model
Used to allow for the management of email on a remote server.
LDAP
Lighweight Directory Access Protocol
Sits on the Process/Application level of the DoD model
Provides centralized access to authentication, contact information, client lists, and configuration data for a network
SFTP
Secure File Transfer Protocol
Sits at the Process/Application level of the DoD model
FTP, but encrypted
SMB
Server Message Block
Sits at the Process/Application level of the DoD model
Microsoft-developed protocol. Used to provide shared access to files, printers, and other network resources.
SNMP
Simple Network Management Protocol
Sits at the Process/Application level of the DoD model
Data from network equipment like routers and switches regarding the operation of those devices. This data is sent using SNMP protocol
SNMP servers can collect the data and allow you to analyze it
SSH
Secure Shell
Sits at the Process/Application level of the DoD model
A secure version of Telnet, which allows remote logins at the commandline.
Telnet
Sits at the Process/Application level of the DoD model
Remote access via command line to another PC
Two TCP/IP protocols that sit at the host-to-host level of the DoD model
TCP
UDP
Major difference between TCP and UDP
TCP gaurantees packet delivery through the use of a “virtual circuit” and data acknowledgements.
UDP does not. It’s a stream of packets that are or are not received correctly.