Networking Ports and Protocols Flashcards

1
Q

What is the main difference between Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?

A

The main difference between TCP (transmission control protocol) and UDP (user datagram protocol) is that TCP is a connection-based protocol and UDP is connectionless. While TCP is more reliable, it transfers data more slowly. UDP is less reliable but works more quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the steps of the 3-way handshake?

A

Step 1: A connection between server and client is established
Step 2: The server receives the SYN packet from the client node
Step 3: Client node receives the SYN/ACK from the server and responds with an ACK packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some of the most common uses of UDP?

A

UDP is frequently used when communications are time-sensitive. For users, it is better to have the overall transmission arrive on time than wait for it to get there in a near-perfect state. For this reason, UDP is commonly used in Voice over Internet Protocol (VoIP) applications as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which protocols does email use?

A

The common protocols for email delivery are Post Office Protocol (POP), Internet Message Access Protocol (IMAP), and Simple Mail Transfer Protocol (SMTP). Each of these protocols has a standard methodology to deal with the emails and also has defined functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What port does Hypertext Transfer Protocol Secure (HTTPS) use?

A

HTTPS operates on port 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TCP (Transmission Control Protocol)

A

A connection-oriented protocol. This means that when data is sent between two hosts, the TCP protocol ensures that every packet sent is received before sending the next packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

UDP (User Datagram Protocol)

A

A connectionless protocol. Instead of verifying that each packet sent is received, UDP sends the packets one at time and the receiver processes them as they come in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Port

A

A part of a computing device that can connect to peripherals or cables. A computer port is like a door into the system. There are 65,536 possible network ports. The port number tells the host device the type of traffic sent and where to send it to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3-way handshake

A

The process two devices go through to establish a TCP connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A connection-oriented protocol. This means that when data is sent between two hosts, the TCP protocol ensures that every packet sent is received before sending the next packet.

A

TCP (Transmission Control Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A connectionless protocol. Instead of verifying that each packet sent is received, UDP sends the packets one at time and the receiver processes them as they come in.

A

UDP (User Datagram Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A part of a computing device that can connect to peripherals or cables. A computer port is like a door into the system. There are 65,536 possible network ports. The port number tells the host device the type of traffic sent and where to send it to.

A

Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The process two devices go through to establish a TCP connection.

A

3-way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a set of rules that define how devices will communicate on the network.

A

protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

protocol

A

a set of rules that define how devices will communicate on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

For devices to communicate, both sender and receiver must use the same protocol.

A

Facts

17
Q

The two most used transmission protocols are

A

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP

18
Q

For devices to communicate, both sender and receiver must use the same protocol.

A

facts

19
Q

Before data is sent across a network, the sending host first breaks it into smaller, more manageable chunks and encapsulates those data chunks inside a packet.

A

facts

20
Q

Each packet contains a packet header which is a special label that defines the sender, receiver, and order position of the packet.
When the receiving host receives all the packets, it puts them together in order and processes the data.

A

facts

21
Q

Network devices can handle only one packet at a time. If a large chunk of data is sent across the network, a switch would need to process all of that data before the next packet could be processed. Using smaller data packets allows packets from multiple hosts to be processed extremely quickly.

A

facts

22
Q

The transmission control protocol is a connection-oriented protocol. When data is sent between two hosts, the TCP protocol ensures that every sent packet is received before sending the next packet. This ensures reliable, guaranteed delivery.

A

facts

23
Q

When using TCP, two hosts first establish a connection through a 3-way handshake. This handshake process is:

The first host sends a SYN packet asking to create a new session.
The receiving host replies with a SYN-ACK packet acknowledging that the session can be created.
The first host replies with a ACK packet which then opens the session.

A

facts

24
Q

Once the 3-way handshake has been completed, the two hosts can send data back and forth. Each data packet sent is numbered so the receiving host knows which packets it’s received. For each packet received, the receiving host sends an ACK packet back to the sender. Think of this as a phone call and both parties are reliably sending and receiving information.

A

facts

25
Q

If the sending host does not receive the ACK packet within a specified time, it sends another copy of the missing packet.
If the receiving host says that a packet was received out of order and one is missing, the sending host knows to send another copy of the missing packet.

A

facts

26
Q

TCP is most often combined with the Internet Protocol (IP) to send data across the internet. The two protocols used together is known as the TCP/IP protocol suite. IP is responsible for determining how to deliver data between two hosts; TCP is responsible for segmenting and sequencing of the data packets.

A

facts

27
Q

UDP is also used with IP to send data across a network. Unlike TCP, UDP is a connectionless protocol. Instead of verifying that each packet sent is received, UDP sends the packets one at time and the receiver processes them as they come in. If a data packet is dropped along the way, it is not resent. Think of UDP communications like sending a postcard or putting a message in a bottle; you are not expecting to receive any communication back. It is best effort in delivery, but not guaranteed.

A

facts

28
Q

UDP is used in applications that require a low latency. Losing some packets will not be detrimental to the receiver processing the data. The most common uses of UDP are:

Video and audio streaming
Online gaming
DNS queries
Voice over IP (VOIP)
DHCP
Trivial File Transfer Protocol (TFTP)

A

facts