TCP/IP Flashcards
The __________ suite was designed and implemented by the Department of Defense (DoD) to ensure and preserve data integrity as well as maintain communications in the event of catastrophic war.
Transmission Control Protocol/Internet Protocol (TCP/IP)
What is DoD?
Department of Defense
True or False:
TCP/IP network can be a secure, dependable and resilient one.
True
TCP first came on the scene way back in 1973, and in 1978, it was divided into two distinct protocols: ____and ____.
TCP and IP
Later, in 1983, TCP/IP replaced the ______ and was authorized as the official means of data transport for anything connecting to ARPAnet, the Internet’s ancestor.
Network Control Protocol (NCP)
The DoD’s_____ created this ancient network way back in 1957 in a cold war reaction to the Soviet’s launching of Sputnik.
Advanced Research Projects Agency (ARPA)
In 1983, ARPA was redubbed DARPA and divided into _____ and _____ until both were finally dissolved in 1990.
ARPAnet and MILNET
It may be counterintuitive, but most of the development work on TCP/IP happened at UC Berkeley in Northern California, where a group of scientists were simultaneously working on the Berkeley version of UNIX, which soon became known as the _____ series of UNIX versions.
Berkeley Software Distribution (BSD)
______ bundled with TCP/ IP began as shareware in the world of academia. As a result, it became the foundation for the tremendous success and unprecedented growth of today’s Internet as well as smaller, private and corporate intranets.
BSD Unix
________ —that sealed its popularity because this quality guarantees a solid connection between myriad hardware and software platforms with no strings attached.
TCP/IP family of protocols
The DoD model is basically a condensed version of the OSI model that comprises four instead of seven layers:
- Process/Application layer
- Host-to-Host layer or Transport layer
- Internet layer
- Network Access layer or Link layer
______ defines protocols for node-to-node application communication and controls user-interface specifications.
Process/Application layer
_______ parallels the functions of the OSI’s Transport layer, defining protocols for setting up the level of transmission service for applications.
The Host-to-Host layer or Transport layer
It tackles issues like creating reliable end-to-end communication and ensuring the error-free delivery of data. It handles packet sequencing and maintains data integrity.
The Host-to-Host layer or Transport layer
The _______ corresponds to the OSI’s Network layer, designating the protocols relating to the logical transmission of packets over the entire network.
Internet layer
It takes care of the addressing of hosts by giving them an IP (Internet Protocol) address and handles the routing of packets among multiple networks.
Internet layer
The _______ or Link layer implements the data exchange between the host and the network.
Network Access layer
It was one of the first Internet standards, developed in 1969, and is the chameleon of protocols—its specialty is terminal emulation.
Telnet
It allows a user on a remote client machine, called the ______ client, to access the resources of another machine, the Telnet server, in order to access a command-line interface.
Telnet
_____ achieves this by pulling a fast one on the Telnet server and making the client machine appear as though it were a terminal directly attached to the local network. This projection is actually a software image—a virtual terminal that can interact with the chosen remote host.
Telnet
A drawback is that there are no encryption techniques available within the _____ protocol, so everything must be sent in clear text, including passwords!
Telnet
_______ sets up a secure session that’s similar to Telnet over a standard TCP/IP connection and is employed for doing things like logging into systems, running programs on remote systems, and moving files from one system to another. And it does all of this while maintaining an encrypted connection.
Secure Shell (SSH) protocol
______ actually lets us transfer files, and it can accomplish this between any two machines using it.
File Transfer Protocol (FTP)
_____ isn’t just a protocol; it’s also a program. Operating as a protocol, it is used by applications. As a program, it’s employed by users to perform file tasks by hand.
File Transfer Protocol (FTP)