Network+ Flashcards
Transport Control Protocol/Internet Protocol - TCP/IP
- IP is the part that obtains the address to which data is sent.
- TCP is responsible for data delivery once that IP address has been found.
It also breaks down each message into packets, and those packets are then reassembled on the other end. In fact, each packet could take a different route to the other computer, if the first route is unavailable or congested.
In addition, TCP/IP divides the different communications tasks into layers. Each layer has a different function. Data goes through four individual layers before it is received on the other end (as explained in the following section). TCP/IP then goes through these layers in reverse order to reassemble the data and to present it to the recipient.
Why use protcols to communicate?
The purpose of the layers is to keep things standardized, without numerous hardware and software vendors having to manage communication on their own. It’s like driving a car: All the manufacturers agree on where the pedals are, so that’s something we can count on between cars.
It also means that certain layers can be updated, such as to improve performance or security, without having to upgrade the entire thing.
What are the four layers of TCP/IP
Datalink layer
The datalink layer (also called the link layer, network interface layer, or physical layer) is what handles the physical parts of sending and receiving data using the Ethernet cable, wireless network, network interface card, device driver in the computer, and so on.
Internet layer
The internet layer (also called the network layer) controls the movement of packets around the network.
Transport layer
The transport layer is what provides a reliable data connection between two devices. It divides the data in packets, acknowledges the packets that it has received from the other device, and makes sure that the other device acknowledges the packets it receives.
Application layer
The application layer is the group of applications that require network communication. This is what the user typically interacts with, such as email and messaging. Because the lower layers handle the details of communication, the applications don’t need to concern themselves with this.
Static IP address
Static IP addresses stay the same all the time. They are like the fixed address on your house, an unchanging address.
Dynamic IP address
When a computer system uses a dynamic IP address, it announces, “This is where you can find me!” to the local network – rather like the “address” of a hotel room, where the hotel knows how to find you.
Hyper-Text Transfer Protocol - HTTP
Used for: web services.
OSI Layer: Application Layer
A request-response protocol, HTTP gives users a way to interact with web resources such as HTML files by transmitting hypertext messages between clients and servers.
Which layers in the TCP/IP model maps to which in the OSI model?
The application layer of the TCP/IP model maps to the first three layers, i.e., application, session, and presentation layer of the OSI model.
The transport layer of the TCP maps directly to the transport layer of the OSI model.
The internet layer of the TCP/IP model maps directly to the network layer of the OSI model.
The datalink (link) layer of the TCP/IP model maps to the datalink and physical layer of the OSI model.
File Transfer Protocol - FTP
Used for: File transfers that does not require interaction. Faster than other protocols.
OSI Layer: Application Layer
A reliable, connection-oriented protocol that helps in the sequential transmission of data packets to ensure data reaches the destination on time without duplication.
User Datagram Protocol - UDP
Used for: broadcasts or multicast connections.
OSI Layer: Transport Layer
A communication protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups. It speeds up communications by not formally establishing a connection before data is transferred.
Secure File Transfer Protocol - SFTP
Used for: File Transfers.
OSI Layer: Network Layer
SFTP, or Secure File Transfer Protocol, is a secure file transfer protocol that uses secure shell encryption to provide a high level of security for sending and receiving file transfers. SFTP is similar to FTPS in that it uses AES and other algorithms to secure data as it travels between different systems.
Network Security Protocols (SFTP, HTTPS, SSL)
These protocols ensure safe data transmission over the network connections. Network security protocols define the procedures to secure data from any unauthorized access. These protocols leverage encryption and cryptography to safeguard.
Hyper-Text Transfer Protocol Secure - HTTPS
Used for: Secure Web Browsing.
OSI Layer: Transport Layer
HTTPS is not a separate protocol from HTTP. Rather, it is a variant that uses Transport Layer Security (TLS)/Secure Sockets Layer (SSL) encryption over HTTP to secure communications.
When a web server and web browser talk to each other over HTTPS, they engage in what’s known as a handshake – an exchange of TLS/SSL certificates – to verify the provider’s identity and protect the user and their data.
It protects users against eavesdroppers and man-in-the-middle (MitM) attacks. It also protects legitimate domains from domain name system (DNS) spoofing attacks.
Post Office Protocol version 3 - POP3
used for: E-Mail clients.
OSI Layer: Application Layer
It provides access to an inbox stored in an email server. It executes the download and deletes operations for messages. Thus, when a POP3 client connects to the mail server, it retrieves all messages from the mailbox.
Simple Network Management Protocol - SNMP
Used for: monitoring & managing devices over the internet.
OSI Layer: Application Layer
An internet standard protocol used to monitor and manage network devices connected over an IP. SNMP is used for communication between routers, switches, firewalls, load balancers, servers, CCTV cameras, and wireless devices.
SNMP collects, organizes, and sends data from various devices for network monitoring assisting with fault identification and isolation. Both the monitored endpoints and the monitoring system rely on SNMP for seamless communication.
Address Resolution Protocol - ARP
Used for: establishing connections on a LAN
OSI Layer: Network Layer
ARP broadcasts a request packet to all the machines on the LAN and asks if any of the machines are using that particular IP address. When a machine recognizes the IP address as its own, it sends a reply so ARP can update the cache for future reference and proceed with the communication.
Border Gateway Protocol - BGP
Used for: routing data over the internet.
OSI Layer: Application Layer.
A set of rules that determine the best network routes for data transmission on the internet.
Transport Layer Security - TLS
Used for: secure browsing, messaging, file transfer.
OSI Layer: Application, Presentation, Session, and Transport.
TLS is an assymestric cryptographic protocol that provides end-to-end security of data sent between applications over the Internet. It is mostly familiar to users through its use in secure web browsing, and in particular the padlock icon that appears in web browsers when a secure session is established. However, it can and indeed should also be used for other applications such as e-mail, file transfers, video/audioconferencing, instant messaging and voice-over-IP, as well as Internet services such as DNS and NTP.
Difference between HTTPS & TLS
HTTPS (Hyper Text Transfer Protocol Secure) is the secure version of HTTP where communications are encrypted by SSL/TLS.
Internet Control Message Protocol - ICMP
Used for: detecting problems in transfer.
OSI Layer: Network Layer.
ICMP is a network protocol that devices use to warn about connectivity issues and errors. ICMP can notify devices that a forwarded message was too long or arrived out of order, and will issue an error message requesting that the device resend the content.
Point-To-Point - PPP
Used for: direct connections between endpoints.
OSI Layer: Data Link Layer.
Point-to-Point Protocol (PPP) is a TCP/IP protocol that is used to connect one computer system to another. Computers use PPP to communicate over the telephone network or the Internet.
IPv4/IPv6
Used for: IP-adressing for networks.
OSI Layer: Data Link
The IPv4 address is a 32-bit number that uniquely identifies a network interface on a machine. An IPv4 address is typically written in decimal digits, formatted as four 8-bit fields that are separated by periods.
Medium Access Control address - MAC
Used for: assigning a unique name to a device.
OSI Layer: Data Link
A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network. Primarily specified as a unique identifier during device manufacturing, the MAC address is often found on a device’s network interface card (NIC).