MODULE 1 - Core internet technologies Flashcards
Why are IP addresses important for data transmission on the internet?
IP addresses are crucial because they function like postal addresses, ensuring that packets of information are delivered to the correct destination.
What are the two most widely used standards of Internet Protocol?
The two most widely used standards are Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6).
How is an IPv4 address structured?
An IPv4 address consists of four octets (A group or set of eight of something) separated by periods or dots. For example, 192.0.2.235.
How is an IPv6 address structured?
An IPv6 address contains eight groups of hexadecimal digits separated by colons. For example, 4527:0a00:1567:0200:ff00:0042:8329.
What are IP packets and what do they contain?
IP packets, also known as datagrams, are the messages sent across a network. They contain a header and a payload. The header includes metadata such as the source and destination IP addresses, while the payload contains the actual data being transmitted.
What are some common issues that can occur during data transmission, similar to postal system issues?
Just like letters can arrive out of order, get damaged, or be lost, IP packets can also arrive out of order, become damaged or corrupted, or be dropped or lost during transit.
How are these transmission issues addressed in data packets?
To address these issues, the payload part of the packets contains other protocols. The most common ones are the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).
What does TCP do to ensure data integrity, and what is its drawback?
TCP ensures that data arrives correctly and in order, solving issues like out-of-order arrival, damage, and loss. However, this comes with a small delay in sending the data.
For what type of data transmission is TCP typically used?
TCP is used for sending data that must arrive correctly and in order, such as text files and images.
What are the characteristics of UDP in data transmission?
UDP can solve the corrupt packet issue but does not ensure that packets arrive in order or that all packets arrive. It allows for faster transmission with some data loss.
For what type of data transmission is UDP typically used?
UDP is used for sending data that can tolerate some loss, such as voice calls or live video streaming.
What is the importance of header in an IP packet?
The header contains essential information required for the packet to reach its destination and for proper handling during transmission.
What is the importance of payload in an IP packet?
The payload contains the actual data being transmitted from the sender to the receiver.
How does TCP ensure reliable data transmission?
TCP ensures reliability through several mechanisms:
1) Connection Establishment: TCP establishes a connection between the sender and receiver using a process called the three-way handshake before data transfer begins.
2) Data Segmentation and Sequencing: Data is broken into smaller segments, each with a sequence number. This allows the receiver to reassemble the data in the correct order.
3) Acknowledgments: The receiver sends back an acknowledgment (ACK) for each segment received. If the sender does not receive an ACK within a certain time, it resends the segment.
4) Error Detection and Correction: TCP checks for errors in the data and ensures that any corrupted data is retransmitted.
What is the Three-Way handshake?
Before data transfer can begin, TCP establishes a reliable connection between the sender and the receiver to ensure that both parties are ready to communicate.
PROCESS:
1) SYN (Synchronize) Packet: The sender starts by sending a SYN packet to the receiver to initiate the connection.
2) SYN-ACK (Synchronize-Acknowledge) Packet: The receiver responds with a SYN-ACK packet, acknowledging the receipt of the SYN packet and indicating its willingness to establish the connection.
3) ACK (Acknowledge) Packet: Finally, the sender sends an ACK packet back to the receiver, confirming that the connection is established.
How does UDP ensure fast data transmission?
UDP achieves fast transmission through the following:
- Connectionless Protocol: UDP does not establish a connection before sending data. Each packet, known as a datagram, is sent independently.
- No Sequencing or Acknowledgments: UDP does not number the packets or wait for acknowledgments, reducing overhead and delay.
- Minimal Error Checking: UDP includes a simple checksum for error checking but does not provide mechanisms for error correction.
How does UDP handle data transmission without a connection?
In UDP, each datagram or data packet is sent individually and includes the destination address. There is no handshake process or acknowledgment of receipt. If a datagram is lost or arrives out of order, UDP does not attempt to resend or reorder it.
SUMMARY
Summary of TCP and UDP
Connection-Oriented (TCP):
* Establishes a connection before data transmission.
* Ensures reliable, ordered delivery of data.
* Involves higher overhead and potential delays.
* Suitable for applications where data integrity and order are critical.
Connectionless (UDP):
* Does not establish a connection before data transmission.
* Each packet is sent independently without acknowledgment.
* Involves lower overhead and reduced latency.
* Suitable for applications where speed is more important than reliability and some data loss is acceptable.
When is TCP typically used?
TCP is used for applications where reliable and ordered delivery of data is crucial, such as:
- Web browsing (HTTP/HTTPS)
- Email (SMTP, IMAP, POP3)
- File transfers (FTP)
- Remote terminal access (SSH, Telnet)
When is UDP typically used?
UDP is used for applications where speed is essential and some data loss is acceptable, such as:
- Live video and audio streaming
- Online gaming
- Voice over IP (VoIP)
- Broadcast and multicast communication
What is HTTP and how does it function in web communication?
HTTP stands for Hypertext Transfer Protocol. It is a fundamental protocol used for transmitting web resources such as HTML documents, images, and stylesheets between a client (like a web browser) and a server (hosting the website). HTTP operates on a request-response model where the client initiates a request and the server responds accordingly.
What does HTTPS stand for and how does it differ from HTTP?
HTTPS stands for Hypertext Transfer Protocol Secure. It is the secure version of HTTP. HTTPS ensures encrypted communication between the client and the server, protecting the integrity and confidentiality of data transmitted over the network. You can identify HTTPS usage by the presence of a lock icon in the browser’s address bar.
What are the primary components of an HTTP request?
An HTTP request consists of:
- Method: Specifies the action to be performed (e.g., GET, POST).
- Path: The location of the resource on the server.
- Version: The HTTP version being used (e.g., HTTP/1.1, HTTP/2.0).
- Headers: Additional metadata about the request.
- Body: Optional data sent with methods like POST.
Can you explain the common HTTP methods used?
- GET: The client requests a resource on the web server.
- POST: The client submits data to a resource on the web server.
- PUT: The client replaces a resource on the web server.
- DELETE: The client deletes a resource on the web server.
- PATCH: The client partially updates a resource on the web server.