Introduction to TCP/IP Flashcards
This suite was designed and implemented by the Department of Defense (DoD)to ensure and preserve data integrity as well as maintain communications in the event of catastrophic war.
Transmission Control Protocol/Internet Protocol (TCP/IP)
This can be a secure, dependable and resilient one.
Transmission Control Protocol/Internet Protocol (TCP/IP)
When was TCP first came on the scene
1973
When was divided into two distinct protocols: TCP and IP.
1978
This is when TCP/IP replaced the Network Control Protocol (NCP) and was authorized as the official means of data transport for anything connecting to ARPAnet, the Internet’s ancestor.
1983
In 1983, TCP/IP is replaces with _________
NCP - Network Control Protocol
Meaning of ARPA
Advances Research Projects Agency
The DoD’s Advanced Research Projects Agency (ARPA) created this ancient network way back in a cold war reaction to the Soviet’s launching of Sputnik. What year is this?
1957
This is when ARPA was redubbed DARPA and divided into ARPAnet and MILNET
1983
When was ARPAnet and MILNET dissolved?
1990
The DoD model is basically a condensed version of the OSI model that comprises four instead of seven layers. What are those 4?
- Process/Application layer
- Host-to-Host layer or Transport layer
- Internet layer
- Network Access layer or Link layer
This defines protocols for node-to-node application communication and controls user-interface specifications.
Process/Application Layer
This is defining protocols for setting up the level of transmission service for applications. It tackles issues like creating reliable end-to-end communication and ensuring the error-free delivery of data. It handles packet sequencing and maintains data integrity.
The Host-to-Host layer or Transport layer
This corresponds to the OSI’s Network layer, designating the protocols relating to the logical transmission of packets over the entire network. It takes care of the addressing of hosts by giving them an IP (Internet Protocol) address and handles the routing of packets among multiple networks.
The Internet Layer
This implements the data exchange between the host and the network.
The Network Access layer
This was one of the first Internet standards, developed in 1969, and is the chameleon of protocols—its specialty is terminal emulation.
Telnet
It allows a user on a remote client machine, to
access the resources of another machine, the Telnet server, in order to access a command-line interface.
Telnet Client
This achieves this by pulling a fast one on the Telnet server and making the client machine appear as though it were a terminal directly attached to the local network. This projection is actually a software image—a virtual terminal that can interact with the chosen remote host.
Telnet
This sets up a secure session that’s similar to Telnet over
a standard TCP/IP connection and is employed for doing things like logging into systems, running programs on remote systems, and moving files from one system to another. And it does all of this while maintaining an encrypted connection.
Secure Shell (SSH) protocol
This actually lets us transfer files, and it can accomplish this between any two machines using it.
File Transfer Protocol (FTP)
True or False:
But FTP isn’t just a protocol; it’s also a program. Operating as a protocol, FTP is used by applications. As a program, it’s employed by users to perform file tasks by hand.
True
This allows for access to both directories and files and can accomplish certain types of directory operations, such as relocating into different ones
File Transfer Protocol
This is the stripped-down, stock version of FTP,
but it’s the protocol of choice if you know exactly what you want and where to find it because it’s fast and so easy to use!
Trivial File Transfer Protocol
This collects and manipulates valuable network information
Simple Network Management Protocol
It gathers data by polling the devices on the network from a network management station (NMS) at fixed or random intervals, requiring them to disclose certain information, or even asking for certain information from the device.
Simple Network Management Protocol
This a report delimiting the operational traits of a healthy network.
Baseline
This protocol can also stand as a watchdog over the network, quickly notifying managers of any sudden turn of events. These network watchdogs are called
Agents
when aberrations occur, agents send an alert called
Trap
It’s used to manage communications between web browsers and web servers and opens the right resource when you click a link, wherever that resource may actually reside.
Hypertext Transfer Protocol
Hypertext Transfer Protocol Secure is also knows as
Secure Hypertext Transfer Protocol
It uses Secure Sockets Layer (SSL). which were slightly different protocols, but since Microsoft supported HTTPS, it became the de facto standard for securing web communication.
Hypertext Transfer Protocol Secure (HTTPS)
it’s a secure version of HTTP that arms you with a whole
bunch of security tools for keeping transactions between a web browser and a server secure.
Hypertext Transfer Protocol Secure (HTTPS)
This works by synchronizing devices to ensure that all computers on a given network agree on the time
Network Time Protocol
resolves hostnames—specifically, Internet names.
Domain Name Services
This allows to use a domain name to specify an IP address. You can change the IP address as often as you want and no one will know the difference.
Domain Name Services
This assigns IP addresses to hosts. It allows for easier administration and works well in small to very large network environments.
Dynamic Host Configuration Protocol (DHCP)
assigns an IP address to a host but the host’s hardware address must be entered manually in a BootP table.
BootP
This is also used to send an operating system that a host can boot from.
BootP
DHCP server provides?
- IP address
- Subnet mask
- Domain name
- Default gateway (routers)
- DNS server address
- WINS server address