TCP/IP protocol suite Flashcards
identify and describe protocols
Hypertext Transfer Protocol (HTTP) 80
(Web services)
Used by browsers and web servers to exchange files (such as web pages) through the world wide web and intranets. HTTP is an information requesting and responding protocol.
It is typically used to request and send web documents, but is also used as the protocol for communication between agents that employ different TCP/IP protocols.
HTTP over SSL (HTTPS) 443
(Web services)
Is a secure form of HTTP that uses SSL to encrypt data before it is transmitted.
Structured Query Language (SQL) 1433
(Web services)
Is a language designed specifically to request data from a database. Requests take the form of a query (basically a question) that asks the database to provide specific information.
SQLnet 1521
(Web services)
Uses Oracle’s Transparent Network Substrate. This technology is a foundation that provides a generic interface for network protocols to connect throughout a network of applications.
Both the client and the server communicate with each other using SQLnet, which serves as an interpreter between the two.
MySQL 3306
(Web services)
Is an open-source relational database management system (RDBMS). This means that MySQL organizes data into tables by data type to help structure the data.
MySQL is used to create, change, and extract information in the database. It also controls user access to the database.
MySQL works with the operating system to:
Implement a relational database in a computer’s storage system.
Manage users.
Allow network access.
Enable tests on database integrity.
Create backups.
Secure Sockets Layer (SSL)
(Security protocols)
Secures messages being transmitted on the internet. It uses RSA for authentication and encryption. Web browsers use SSL to ensure safe web transactions.
URLs that begin with https:// trigger your web browser to use SSL.
Transport Layer Security (TLS)
(Security protocols)
Ensures that messages being transmitted on the internet are private and tamper proof. TLS is implemented through two protocols:
TLS Record can provide connection security with encryption (for example, with DES).
TLS Handshake provides mutual authentication and choice of encryption method.
TLS version 1.2 (TLS1.2) is an updated version that improves security flaws found in TLS 1.0 and 1.1.
File Transfer Protocol (FTP) 20/21
(File transfer)
Provides a generic method for transferring files. It can protect access to files by requiring user names and passwords. It allows file transfer between dissimilar computer systems.
FTP can transfer both binary and text files, including HTML, to another host. FTP URLs are preceded by ftp:// followed by the DNS name of the FTP server.
To log in to an FTP server, enter ftp:// username@servername .
The FTP protocol does not use encryption. All data, including user names, passwords, and files, are sent over the network as clear text.
Trivial File Transfer Protocol (TFTP) 69
(File transfer)
Is similar to FTP. It lets you transfer files between a host and an FTP server. However, it does not provide user authentication or error detection.
TFTP is often used when files need to be transferred between systems quickly. Because it does not perform error detection, TFTP is faster than FTP, but is susceptible to transmission errors.
Secure File Transfer Protocol (SFTP) 22
(File transfer)
Uses Secure Shell (SSH) to secure data transfers. SSH ensures that SFTP transmissions use encrypted commands and data, which prevents clear text data transmissions.
Secure Copy (SCP)
(File transfer)
Used to securely transfer files between systems. Like SFTP, SCP relies on SSH to ensure that data and passwords are not transmitted over the network in clear text.
Simple Mail Transfer Protocol (SMTP) 25
(Email)
Used to route electronic mail through the internetwork. SMTP is used:
Between mail servers for sending and relaying mail.
By all email clients to send mail.
By some email client programs, such as Microsoft Outlook, to receive mail from an Exchange server.
You can make SMTP more secure by adding an encryption protocol, such as TLS (SMTPS). The port for SMTPS is 587.
Post Office Protocol 3 (POP3) 110
(Email)
Used to retrieve email from a remote server and download it to a local client over a TCP/IP connection. You can make POP3 a more secure protocol by adding SSL. In this case, use the port number 995.
An email client that uses POP3 for receiving mail uses SMTP for sending mail.
Internet Message Access Protocol version 4 (IMAP4) 143
(Email)
Is an email retrieval protocol designed to enable users to access email from various locations without the need to transfer messages or files back and forth between computers.
Messages remain on the remote mail server and are not automatically downloaded to a client system. You can make IMAP a more secure protocol by adding SSL. In this case, use the port number 993.
An email client that uses IMAP4 for receiving mail uses SMTP for sending mail.
Dynamic Host Configuration Protocol (DHCP) 67/68
(Network services)
Used to automatically assign addresses and other configuration parameters to network hosts. Using a DHCP server, hosts receive configuration information at startup. This reduces the amount of manual configuration required on each host.