Chapter 8: TCP/IP Applications Flashcards
What are the three steps of the TCP three-way handshake?
- SYN segment, client to server
- SYN, ACK segment, server to client
- ACK segment, client to server
What are five important protocols that use User Datagram Protocol (UDP) in their sessions?
DNS (Domain Name System)
DHCP (Dynamic Host Configuration Protocol)
NTP (Network Time Protocol)
SNTP (Simple Network Time Protocol)
TFTP (Trivail File Transfer Protocol)
What does Domain Name System (DNS) protocol do?
It enables the use of domain names associated with IP addresses for devices connected to IP networks, such as the Internet and private intranets.
What do Network Time Protocol (NTP) and Simple Network Time Protocol (SNTP) do?
They use UDP to synchronize the clocks of devices on a network.
If a device requires NTP/SNTP, then enter the IP address for an NTP/SNTP server onto that device.
How does NTP (Network Time Protocol) operate in a hierarchical fashion?
Using clock strata. Stratum 0 it the highest and stratum 15 is the lowest.
What does Trivial File Transfer Protocol (TFTP) do?
It enables you to transfer files from one machine to another using UDP, but lacks data protection.
What is the typical scenario for using TFTP (Trivial File Transfer Protocol)?
The typical scenario for using TFTP is updating software and configurations on routers, switches, VoIP phones, and other devices on a LAN.
What does Internet Control Message Protocol (ICMP) do?
It works at Layer 3 to handle low-level tasks such as the ping utility sending a single ICMP message called an “echo request” to an IP address you specify.
What does Internet Group Management Protocol (IGMP) do?
It enables routers to communicate with hosts and switches to determine a “group” membership for IP multicast addresses (Class D range).
Define: Well Known Ports
Number Range: _______
Ports reserved for specific TCP/IP applications.
0 - 1,023
Define: Registered Ports
Number Range: _________
Ports that less common TCP/IP applications can register for with IANA.
Anyone can use these port numbers for their servers or for ephemeral numbers on clients.
1,024 - 49,151
Define: Dynamic, Ephemeral, or Private Ports
Number Range: ________
Ports that are pseudo-randomly generated for a client computer’s application use.
49,152 - 65,535
A ____ or ____ are terms for the session information (a combination of the IP address, port number, and Layer 4 protocol - TCP or UDP) held in memory on a single computer.
socket or endpoint
What are socket pairs or endpoints?
Terms for the session information held in memory on two computers about the same connection.
What does the netstat command utility do on Windows and macOS?
Lists the endpoints of your computer’s communication partners.
What does the netstat -n switch do?
It instructs netstat to show port numbers and IP addresses.
netstat -n
What does the netstat -a switch do?
It tells netstat to show all used ports, including “listening” ports not engaged in active communications.
netstat -a