Module 11: Transport layer services Flashcards

1
Q

give an example of a server hosting web and file sharing services and how it distinguishes between these

A

if a server is offering web services and file sharing services then it needs to know which service a host requires if an incoming message is destined for port 80 then the server knows that this message is bound for a web server application and is placed in the appropriate cue to be processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the port(s) and transport protocol(s) of

File Transfer Protcol (FTP)

A

this uses:

  • port 20 TCP for data
  • port 21 TCP for control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this uses:

  • port 67 UDP - on the server
  • port 68 UDP - on the client
A

what are the port(s) and transport protocol(s) of

Dynamic Host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

this uses:

  • port 69 UDP
A

what are the port(s) and transport protocol(s) of

Trivial File Transfer Protocol (TFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this is an address that can locate a resources it includes:

  1. Protocol/scheme - HTTPS or other protocols such as FTP, SFTP, mailto, and NNTP
  2. Hostname - ww.example.com
  3. Path and file name - /author/book.html
  4. Fragment - #page155
A

what is a

Uniform Resource Identifier (URI)

and what 4 parts can it include

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the port(s) and transport protocol(s) of

Internet Message Access Protocol (IMAP)

A

this uses:

  • port 143 TCP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

describe the

Uniform Resource Name (URN)

A

this only includes the namespace of the resource and does not include the protocol or fragment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

describe

User Datagram Protocol (UDP)

A

this is known as a ‘best effort protocol’ and resides on the layer 4 (transport layer). this protocol is in contrast to TCP in that it does not ensure all messages are delivered by using acknowledgments.

instead a message is broken up and sent without care of if they are received or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the

netstat

command used for

A

this is used to view all current connections and listening ports. it may also be usefull in revealing suspicious connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are the port(s) and transport protocol(s) of

Secure Shell (SSH)

A

this uses:

  • port 22 TCP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

describe in six steps the process of sending a message with

Transmission Control Protocol (TCP)

A
  1. it receives a message from the application layer and breaks it up into what are called segments
  2. each segment is then given a sequence number
  3. a given number of segments are then sent to the lower layers to be delivered
  4. the sender then waits for an acknowledgment that all segments sent were recieved
  5. if an acknowledgment is received then the next block of segments are sent
  6. if an acknowledgment is not received after a given time then the sender assumes the segments were lost and resends them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. it receives a message from the application layer and breaks it up into what are called segments
  2. each segment is then given a sequence number
  3. a given number of segments are then sent to the lower layers to be delivered
  4. the sender then waits for an acknowledgment that all segments sent were recieved
  5. if an acknowledgment is received then the next block of segments are sent
  6. if an acknowledgment is not received after a given time then the sender assumes the segments were lost and resends them
A

describe in six steps the process of sending a message with

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

this is a combination of an IP address and a port

example

192.168.1.20:80

A

describe what a

socket

is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

this identifies:

  1. the client and the application
  2. the server and the application/service

example

a client socket could look like

192.168.1.2:5274

a web servers socket might look like

192.168.1.20:80

A

what does a

socket identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a

Uniform Resource Identifier (URI)

and what 4 parts can it include

A

this is an address that can locate a resources it includes:

  1. Protocol/scheme - HTTPS or other protocols such as FTP, SFTP, mailto, and NNTP
  2. Hostname - ww.example.com
  3. Path and file name - /author/book.html
  4. Fragment - #page155
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what does a

socket identify

A

this identifies:

  1. the client and the application
  2. the server and the application/service

example

a client socket could look like

192.168.1.2:5274

a web servers socket might look like

192.168.1.20:80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

describe what a

socket

is

A

this is a combination of an IP address and a port

example

192.168.1.20:80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

often used as source ports these can be used by any application

there range run from 49152 through 65535

A

describe

private ports

and their range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

these are assigned to one of the following:

  1. well known ports
  2. registered ports
  3. private ports

these are managed and maintained by the

Internet Corporation for Assigned Names and Numbers (ICANN)

A

what are the 3 categories that

port numbers

are assigned to and

who manages these assignments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

this uses:

  • port 143 TCP
A

what are the port(s) and transport protocol(s) of

Internet Message Access Protocol (IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

this only includes the namespace of the resource and does not include the protocol or fragment

A

describe the

Uniform Resource Name (URN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

this uses:

  • port 80 TCP
A

what are the port(s) and transport protocol(s) of

Hypertext Transfer Protocol (HTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

this uses:

  • port 20 TCP for data
  • port 21 TCP for control
A

what are the port(s) and transport protocol(s) of

File Transfer Protcol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

this is used to locate a portion or area of the document, such as a page

A

what is the

fragment

of a Uniform Resource Identifier (URI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what are the port(s) and transport protocol(s) of

Telnet

A

this uses:

  • port 23 TCP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

the process is:

  1. the network layer knows the source port and destination port from the information given by the application layer
  2. each segment is then given a header which includes the source and destination port
  3. each segment is then encapsulated in an IP packet
A

describe in 3 steps how

segments are encapsulated into IP packets

27
Q

describe

registered ports

and their range

A

these can be either source or destination ports and can be used by organisations to register an application such as IM or gaming

the range is from 1024 through 49151

28
Q

what do

application layer services

such as HTTP, DNS, FTP, DHCP. decide

A

these will decide:

  1. how client and server will communicate
  2. what information client and server will communicate
  3. the transport layer protocol that will be used
29
Q

describe in 3 steps how

segments are encapsulated into IP packets

A

the process is:

  1. the network layer knows the source port and destination port from the information given by the application layer
  2. each segment is then given a header which includes the source and destination port
  3. each segment is then encapsulated in an IP packet
30
Q

this uses:

  • port 53
    • UDP - for client IP queries. (queries and replies are sent in one packet so if it is lost it can simply be asked for and retransmitted)
    • TCP - for zone transfers - this is a DNS server sharing records with another DNS server
A

what are the port(s) and transport protocol(s) of

Domain Name Service (DNS)

31
Q

this uses:

  • port 161 UDP
A

what are the port(s) and transport protocol(s) of

Simple Network Management Protocol (SNMP)

32
Q

describe what

Transmission Control Protocol (TCP)

is

A

this is a layer 4 (transport layer) protocol that is responsible for ensuring a message is delivered in full and reassembled correctly when received

33
Q

what are the port(s) and transport protocol(s) of

Simple Network Management Protocol (SNMP)

A

this uses:

  • port 161 UDP
34
Q

what is the

fragment

of a Uniform Resource Identifier (URI)

A

this is used to locate a portion or area of the document, such as a page

35
Q

what are the 3 categories that

port numbers

are assigned to and

who manages these assignments

A

these are assigned to one of the following:

  1. well known ports
  2. registered ports
  3. private ports

these are managed and maintained by the

Internet Corporation for Assigned Names and Numbers (ICANN)

36
Q

what are the port(s) and transport protocol(s) of

Hypertext Transfer Protocol Secure (HTTPS)

A

this uses:

  • port 443 TCP
37
Q

this uses:

  • port 22 TCP
A

what are the port(s) and transport protocol(s) of

Secure Shell (SSH)

38
Q
  1. the receiver receives a block of segments and puts them in the correct order
  2. if all segments for that block are received and correct then it sends an acknowledment message back to the sender and waits for the next block of segments
A

describe in 2 steps the process of

receiving a message via

Transmission Control Protocol (TCP)

39
Q

these are destination ports that are associated with common network applications such as HTTP or SSH

there range is from 1 to 1023

A

describe the

well known ports

and there range

40
Q

what is a

socket pair

and what can it identify

A

this is a combination of two sockets, usually a client socket and a server socket

together it can be used to identify a single and unique conversation between client and server applications.

example

192.168.1.2:5274, 192.168.1.20:80

41
Q

this is used to view all current connections and listening ports. it may also be usefull in revealing suspicious connections.

A

what is the

netstat

command used for

42
Q

if a server is offering web services and file sharing services then it needs to know which service a host requires if an incoming message is destined for port 80 then the server knows that this message is bound for a web server application and is placed in the appropriate cue to be processed

A

give an example of a server hosting web and file sharing services and how it distinguishes between these

43
Q

these can be either source or destination ports and can be used by organisations to register an application such as IM or gaming

the range is from 1024 through 49151

A

describe

registered ports

and their range

44
Q

what are the port(s) and transport protocol(s) of

Domain Name Service (DNS)

A

this uses:

  • port 53
    • UDP - for client IP queries. (queries and replies are sent in one packet so if it is lost it can simply be asked for and retransmitted)
    • TCP - for zone transfers - this is a DNS server sharing records with another DNS server
45
Q

what are the port(s) and transport protocol(s) of

Hypertext Transfer Protocol (HTTP)

A

this uses:

  • port 80 TCP
46
Q

describe in 2 steps the process of

receiving a message via

Transmission Control Protocol (TCP)

A
  1. the receiver receives a block of segments and puts them in the correct order
  2. if all segments for that block are received and correct then it sends an acknowledment message back to the sender and waits for the next block of segments
47
Q

where are

port numbers

assigned and what is there use

A

these are assigned at layer 4 (transport layer) and are a way of identifying unique conversations or services

48
Q

what are the port(s) and transport protocol(s) of

Trivial File Transfer Protocol (TFTP)

A

this uses:

  • port 69 UDP
49
Q

this uses:

  • port 110 TCP
A

what are the port(s) and transport protocol(s) of

Post Office Protocol version 3 (POP3)

50
Q

these are assigned at layer 4 (transport layer) and are a way of identifying unique conversations or services

A

where are

port numbers

assigned and what is there use

51
Q

this uses:

  • port 25 TCP
A

what are the port(s) and transport protocol(s) of

Simple Mail Transfer Protocol (SMTP)

52
Q

what are the port(s) and transport protocol(s) of

Simple Mail Transfer Protocol (SMTP)

A

this uses:

  • port 25 TCP
53
Q

these will decide:

  1. how client and server will communicate
  2. what information client and server will communicate
  3. the transport layer protocol that will be used
A

what do

application layer services

such as HTTP, DNS, FTP, DHCP. decide

54
Q

this is known as a ‘best effort protocol’ and resides on the layer 4 (transport layer). this protocol is in contrast to TCP in that it does not ensure all messages are delivered by using acknowledgments.

instead a message is broken up and sent without care of if they are received or not

A

describe

User Datagram Protocol (UDP)

55
Q

this uses:

  • port 23 TCP
A

what are the port(s) and transport protocol(s) of

Telnet

56
Q

describe

private ports

and their range

A

often used as source ports these can be used by any application

there range run from 49152 through 65535

57
Q

describe the

Uniform Resource Locator (URL)

A

this includes the protocol and the namespace of the document, does not include the fragment

58
Q

this is a combination of two sockets, usually a client socket and a server socket

together it can be used to identify a single and unique conversation between client and server applications.

example

192.168.1.2:5274, 192.168.1.20:80

A

what is a

socket pair

and what can it identify

59
Q

what are the port(s) and transport protocol(s) of

Post Office Protocol version 3 (POP3)

A

this uses:

  • port 110 TCP
60
Q

this uses:

  • port 443 TCP
A

what are the port(s) and transport protocol(s) of

Hypertext Transfer Protocol Secure (HTTPS)

61
Q

this is a layer 4 (transport layer) protocol that is responsible for ensuring a message is delivered in full and reassembled correctly when received

A

describe what

Transmission Control Protocol (TCP)

is

62
Q

describe the

well known ports

and there range

A

these are destination ports that are associated with common network applications such as HTTP or SSH

there range is from 1 to 1023

63
Q

this includes the protocol and the namespace of the document, does not include the fragment

A

describe the

Uniform Resource Locator (URL)

64
Q

what are the port(s) and transport protocol(s) of

Dynamic Host Configuration Protocol (DHCP)

A

this uses:

  • port 67 UDP - on the server
  • port 68 UDP - on the client