The OSI Reference Model Flashcards

1
Q

The OSI Model

A
Layer 1: Physical Layer
Layer 2: Data Link Layer
Layer 3: The Network Layer
Layer 4: The Transport Layer
Layer 5: The Session Layer
Layer 6: The Presentation Layer
Layer 7: The Application Layer

Acrostic:
All People Seem To Need Data Processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protocol Data Unit (PDU) Names

A

Layer 4: Transport Layer = Segments
Layer 3: Network Layer = Packets
Layer 2: Data Link Layer = Frames
Layer 1: Physical Layer = Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Layer 1: Physical Layer

A

The concern of the physical layer is the transmission of bits on the network along with the physical and electrical characteristics of the network. The Physical Layer defines the following:

  • How bits are represented on the medium.
  • Wiring standards for connectors and jacks
  • Physical topology
  • Synchronizing bits
  • Bandwidth usage
  • Multiplexing strategy

Examples of devices defined by the physical layer standards include hubs, wireless access points, and network cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical Layer: How to represent bits on the medium

A

Data on a computer network is represented as a binary expression. Electrical voltage (on copper wiring) or light (carried via fiber-optic cabling) can represent these 1s and 0s. The presence or absence of voltage on a wire portrays binary 1 or 0. Similarily, the presence or absence of light on a fiber-optic cable renders a 1 or 0 in binary. An alternate approach to portraying binary data is State Transition Modulation, where the transition between voltages or the presence of light shows a binary value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Physical Layer: Wiring standerds for connectors and jacks

A

TIA/EIA-568-B standard, how to wire an RJ-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Physical Layer: Physical topology

A

Layer 1 devices view a network as a physical topology (as opposed to a logical topology).

Examples:

  • Bus
  • Ring
  • Star
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical Layer: Synchronizing bits

A

For two networked devices to successfully communicate at the physical layer, they must agree on when one bit stops and another bit starts. Specifically, the devices need a method to synchronize the bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Synchronizing bits: Asynchronous

A

With this approach, the sender states that it is about to start transmitting by sending a start bit to the receiver. When the receiver sees this, it starts its own internal clock to measure the next bits. After the sender transmits its data, it sends a stop bits to say that it has finished its tranmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Synchronizing bits: Synchronous

A

This approach synchronizes the internal clocks of both the sender and the receiver to ensure that they agree on when bits begin and end. A common approach to make this synchronization happen is to use an external clock (for example, a clock given by the service provider). The sender and receiver reference this clock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bandwidth Usage:

A

The two fundamental approaches to bandwidth usage on a network are Broadband and Baseband.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bandwidth Usage: Broadband

A

Broadband technologies divide the bandwidth available on a medium (for example, a copper or fiber-optic cabling) into different channels. A sender can then transmit different communication streams over the various channels. For example, consider frequency-division multiplexing (FDM) used by a cable modem. Specifically, a cable modem uses certain ranges of frequencies on the cable to carry incoming data, another range of frequencies for outgoing data, and several other frequency ranges for various TV stations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bandwidth Usage: Baseband

A

Baseband technologies, in contrast, use all the available frequencies on a medium to send data. Ethernet is an example of a networking technology that uses baseband.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical Layer: Multiplexing Strategy

A

Multiplexing allows multiple communication sessions to share the same physical medium. Cable TV, as previously mentioned allows you to receive multiple channels over a single physical medium (for example, a coaxial cable plugged in the back of your television).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multiplexing Strategy: Time-division multiplexing (TDM)

A

TDM supports different communication sessions (for example, different telephoneconversations in a telephony network) on the sane physical medium by causing the sessions to take turns. For a brief period, defined as a time slot, data from the first session is sent, followed by data from the second session. This continues until all sessions have had a turn, and the process repeats itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multiplexing Strategy: Statistical time-division multiplexing (StatTDM)

A

A downside to TDM is that each communication session receives its own time slot, even if one of the sessions dow not have any data to send at the moment. To make a more efficient use of available bandwidth, StatTDM dynamically assigns time slots to communications sessions on as as-needed basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Multiplexing Strategy: Frequency-division multiplexing (FDM)

A

FDM divides a medium’s frequency range in channels, and different communication sessions send their data over different channels. As previously described, this approach to bandwidth usage is called broadband.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Layer 2: The Data Link Layer

A

The data link layer is concerned with the following:

  • Packaging data into frames and transmitting those frames on the network.
  • Performing error detection/correction.
  • Uniquely finding network devices with an address.
  • Handling flow control.

In fact, the data link layer is unique from the other layers in that it has two sublayers of its own: MAC and LLC. Examples of devices defined by the data link layer standards include switches, bridges, and NICs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The Data Link Layer: Media Access Control (MAC) Physical Addressing

A

A MAC address is a 48-bit address assigned to a device’s network interface card (NIC). MAC addresses are written in hexadecimal notation (for example, 58:55:ca:eb:27:83). The first 24 bits of the 48-bit address is the vendor code. The IEEE Registration Authrority assigns a manufacturer one or more unique vendor codes. The last 24 bits of a MAC address are assigned by the manufacturer, and the act as a serial number for the device. No two MAC addresses in the work should have the same value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The Data Link Layer: Media Access Control (MAC) Logical Topology

A

Layer 2 devices view a netowrk as a logical topology.

Example:

  • Bus
  • Ring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The Data Link Layer: Media Access Control (MAC) Method of Transmitting on The Media

A

With several devices connected to a network, there needs to be some strategy for deciding when a device sends on the media. Otherwise, multiple devices might send at the same time and thus interfere with one another’s transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The Data Link Layer: Logical Link Control (LLC) Connection Services

A

When a device on a network recieves a message from another device on the network, that recipient device can give feedback to the sender in the for of and acknowledgement message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Logical Link Control (LLC) Connection Services:

Flow Control

A

Limits the amount of data a sender can send at one time; this prevents the sender from overwhelming the receiver with too much information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Logical Link Control (LLC) Connection Services:

Error Control

A

Allows the recipient of data to let the sen know whether the expected data frame was received or whether it was received but is corrupted. The recipient figures out whether the data frame is corrupt by mathematically calculating a checksum of the data received. IF the calculated checksum does not match the checksum received with the data frame, the recipient of the data draws the conclusion that the data frame is corrupted and can then notify the sender via an acknowledgement message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The Data Link Layer: Logical Link Control (LLC) Synchronizing Transmissions

A

Senders and recievers of data frames need to coordinate when a data frame is being transmitted and should be recieved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Synchronizing Transmissions Synchronizing Transmissions: Isochronous

A

With isochronous transmission, network devices look to a common device in the network as a clock source, which creates fixed length time slots. Network devices can determine how much free space, if any, is available within a time slot and then insert data in an available time slot. A time slot can accommodate more than one data frame. Isochronous transmission does not need to provide clocking at the beginning of a data string (as does synchronous transmission) or for every data frame (as does asynchronous transmission). As a result, isochronous transmission uses little overhead when compared to asynchronous or synchronous transmission methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Synchronizing Transmissions Synchronizing Transmissions: Asynchronous

A

With asynchronous transmission, network devices reference their own internal clocks, and network devices do not need to synchronize their clocks. Instead, the sender places a start bit at the beginning of each frame and a stop bit at the end of each data frame. These start and stop bits tell the receiver when to monitor the medium for the presence of bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Asynchronous: Parity Bit

A

The Parity but, might also be added to the end of each byte in a frame to detect an error in the frame. For example, if even parity error detection (as opposed to odd parity error detection) is used, the parity bit (with value of their 0 or 1) would be added to the end of a byte, causing the total number of 1s in the data frame to be an even number. If the receiver of a byte is configured for even parity error detection and receives a byte where the total number of bits (including the parity bit) is even, the receiver can conclude that the byte was not corrupted during transmission. NOTE: The parity bit might not be effective if a byte has more than one error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Synchronizing Transmissions Synchronizing Transmissions: Synchronous

A

With synchronous transmission, two network devices that want to communicate between themselves must agree on a clocking method to show the beginning and ending of data frames. One approach to providing this clocking is to use a separate communications channel over which a clock signal is sent. Another approach relies on specific bit combinations or control characters to indicate the beginning of a frame or a byte of data. Like asynchronous, synchronous can perform error detection. However, rather than using parity bits, synchronous communications runs a mathematical algorithm on the data to create a cyclic redundancy check (CRC). If both the sender and receiver calculate the same CRC value for the same chunck of data, the receiver can conclude that the data was not corrupted during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Layer 3: The Network Layer

A

The network layer is primarily concerned with forwarding data based on logical addresses. The Network Layer concerns:

  • Logical Addressing
  • Switching
  • Route Discovery and Selection
  • Connection Services
  • Bandwidth Usage
  • Multiplexing Strategy

Devices found at the network layer include touters and multilayer switches. Most common Layer 3 protocol on which the internet is based is, IPv4. However, IPv6 is becoming more common.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The Network Layer: Logical Addressing:

A

The network layer uses logical addressing to make forwarding decisions. A variety of routed protocols (for example, AppleTalk, and IPX) have their own logical addressing schemes, but by far, the most widely deployed routed protocol is Internet Protocol (IP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The Network Layer: Switching:

A

Engineers often associate the term switching with Layer 2 technologies; however, the concept of switching also exists at Layer 3. Switching, at its essence, is making decisions about how data should be forwarded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Layer 3 Switching: Packet Switching

A

With packet switching, a data stream is divided into packets. Each packet has a Layer 3 header that includes a source and destination Layer 3 address. Another term for packet switching is routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Layer 3 Switching: Circut Switching

A

Circut switching dynamically brings up a dedicated communication link between two parties for those parties to communicate.

Example:
Making a phone call on a landline - the telephone company’s switching equipment interconnects your home phone with the phone system of the business you are calling. This interconnection (that is, circuit) only exists for the duration of the call.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Layer 3 Switching: Message Switching

A

Message switching is usually not well suited for real-time application because of the delay involved. Specifically with message switching, a data stream is divided into messages. Each message is tagged with a destination address, and the messages travel from one network device to another network device on the way to their destination. Because these devices might briefly store the messages before forwarding them, a network using message switching is sometimes called a store-and-forward network. Metaphorically, you could visualize message switching like routing an email message, where the email message might be briefly stored on an email server before forwarding to the recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The Network Layer: Route Dicscovery and Selection

A

Because Layer 3 devices make forwarding decisions based on logical network address, a Layer 3 device might ned to know how to reach various network addresses. For example, a common Layer 3 device is a router. A router can maintain a routing table indicating how to forward a packet based on the packet’s destination network address. A router can have its routing table populated via manual configuration (that is by entering static routes), via a dynamic routing protocol (for example, RIP, OSPF, or EIGRP), or simply by the fact that the router is directly connected to certain networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The Network Layer: Connection Services

A

Just as the data link layer offers connection services for flow control and error control, connection services also exist at the network layer. Connection services at the network layer can improve the communication reliability, if the data link’s LLC sublayer is not performing connection services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
Layer 3 Connection Services: 
Flow Control (AKA congestion control)
A

Helps prevent a sender form sending data more rapidly than the receiver is capable of receiving it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Layer 3 Connection Services: Packet Reordering

A

Allows packets to be placed in the proper sequence as they are sent to the receiver. This might be necessary because some networks support load balancing, where multiple links are used to send packets between two devices. Because multiple links exist, packets might arrive out of order.

39
Q

Layer 4: The Transport Layer

A

The transport later acts as a dividing line between the upper layers and the lower layers of the OSI model. Specifically, the messages are taken from upper layers (Layers 5-7) and encapusulated into segments for tranmission to the lower layers (Layers 1-3). Similarily, data streams coming from lower layers are de-encapusulated and sent to Layer 5 (the session layer), or some other upper layer, depending on the protocol.

Layer 4 Protocols:

  • TCP/UDP
  • Windowing
  • Buffering
  • Internet Control Message Protocol (ICMP) used by utilities such as ping and traceroute.
40
Q

Layer 4: Transmission Control Protocol (TCP)

A

A connection-oriented transport protocol. Connection-oriented transport protocols offer reliable transport, in that if a segment is dropped, the sender can detect that drop and retransmit the dropped segment. Specifically, a receiver acknowledges segments that it receives. Based on those acknowledgments, a sender can decided which segments were successfully received and which segments need to be transmitted again.

41
Q

Layer 4: User Datagram protocol (UDP)

A

A connectionless transport protocol. Connectionless transport protocols offer unreliable transport, in that if a segment is dropped, the sender is unaware of the drop, and no retransmission occurs.

42
Q

Layer 4: Windowing

A

TCP communication uses windowing, in that one or more segments are sent at one time, and a receiver can attest to the receipt of all the segments in a window with a single acknowledgment.

43
Q

Layer 4: Sliding Window

A

TCP uses a sliding window, where thewindow size begins with one segment. Ig these is a successful acknowledgment of that one segment (that is, the receiver sends an acknowledgment asking for the next segment), the window size doubles to two segments. Upon successful receipt of those two segments, the next window holds four segments. This exponential increase in window size continue until the receiver does not acknowledge successful receipt of all segments within a certain amount of time-know as the round trip time (RTT), which is sometimes called the real transfer time-or until a configured maximum window size is reached.

44
Q

Layer 4: Buffering

A

With buffering , a device (for example, a router) uses a chunk of memory (sometimes called a buffer or a queue) to store segments if bandwidth is not available to send those segments. A queue has a finite capacity, however, and can overflow (that is, drop segments) in case of sustained network congestion.

45
Q

Layer 5: The Session Layer

A

The session layer is responsible for setting up, maintaining, and tearing down sessions. You can think of a session as a conversation that needs to be treated separately from other sessions to avoid the intermingling of data from different conversations.

Layer 5 Fucntions:

  • Setting up a session
  • Maintaing a session
  • Tearing down a session
46
Q

Layer 5: Setting up a session

A
  • Checking user credentials (username and password).
  • Assigning numbers to a session’s communication flows to uniquely find each one.
  • Negotiating services needed during the session.
  • Negotiating which device begins sending data
47
Q

Layer 5: Maintaining a session

A
  • Transferring data.
  • Reestablishing a disconnected session
  • Acknowledging receipt of data
48
Q

Layer 5: Tearing down a session

A

A session can be disconnected based on agreement of devices in the session. Alternatively, a session might be torn down because one party disconnects (either intentionally or because of an error condition). If one part disconnects, the other party can detect a loss of communication with that party and tear down its side of the session.

49
Q

Layer 5: H.323

A

H.323 is an example of a session layer protocol, which can help set up, support and tear down a voice or video connection.

50
Q

Layer 6: The Presentation Layer

A

The presentaion layer handles formatting the data being exchanged and securing that data with encryption.

Layer 6 Functions:

  • Data Formatting
  • Encryption
51
Q

Layer 6: Data formatting

A

The presentation layer handles formatting the text (or other types of data, such as multimedia or graphic files) in a format that allows compatibility between the communicating devices. As an example of how the presentation layer handles data formatting, consider how text is formatted. Some applicationsmight format text using American Standard Code for Information Interchange (ASCII), while other applications might format text using Extended Binary Coded Decimal Interchange Code (EBCDIC).

52
Q

Layer 6: Encryption

A

Imagine that you are sending sensitive information over a network (for example, your credit card number or bank password). If a malicious user were to intercept your transmission, they might be able to obtain this sensitive information. To add a layer of security for such transmission, encryption can be used to scramble up (encrypt) the data in such a way that if the data were intercepted, a third party would not be able to unscramble if (decrypt). However, the intended recipient would be able to decrypt the transmission.

53
Q

Layer 7: The Application Layer

A

The application layer gives application services to a network. An important (and often- miss understood) concept is that the end-user application (such as Microsoft Word) live at the application layer. Instead, the application layer supports services used by end-user applications. For example, email is an application layer service that does exist at the application layer, whereas Microsoft Outlook (an example of an email client) is an end-user application that does not live at the application layer. Another function of the application layer is advertising available services. Application layer’s networking functions are closest to the end user.

Layer 7 Functions:

  • Application services.
  • Service advertisment.
54
Q

Layer 7: Applicaiton Services

A

Examples of application services living at the application layer include file sharing and email.

55
Q

Layer 7: Service Advertisment

A

Some applications’ services (for example, networked printers) periodically send out advertisements, making their availability known to other devices on the network. Other services, however, register themselves and their services with a centralized directory (for example, Microsoft Active Directory), which can be queried by other network devices seeking such services.

56
Q

The TCP/IP Stack (DoD Model):

A

The ISO developed the OSI reference model to be generic, in terms of what protocols and technologies could be categorized by the model. However, most of the traffic on the Internet (and traffic on corporate networks) is based on the TCP/IP protocol suite. Therefore, a more relevant model for many network designers and administrators to reference is a model developed by United States Department of Defence (DoD). This model is known as the DoD model or the TCP/IP Stack.

57
Q

Layers of the TCP/IP Stack

A

The TCP/IP stack has only four defined layers, as opposed to the seven layers of the OSI model:

Appplication
Presentation Application
Session
—————————————————————–
Transport Transport
—————————————————————–
Network Internet
—————————————————————–
Data Link Network
Physical Interface
—————————————————————–

58
Q

Network Interface:

A

The TCP/IP stack’s network interface layer encompasses the technologies offered by Layers 1 and 2 (the physical and data link layers) of the OSI model.

59
Q

Internet:

A

The internet layer of the TCP/IP stack maps to Layer 3 (the network layer) of the OSI model. Althoughh multiple routed protocols (for examples, IP, IPX, and AppleTalk) live at the OSI model’s network layer, the InternetLayer of the TCP/IP stack focuses on the IP as the protocol to be routed through a network.

60
Q

Transport:

A

The transport layer of the TCP/IP stack maps to Layer 4 (the transport layer) of the OSI model. The two primary protocols found at the TCP/IP stack’s transport later are TCP and UDP.

61
Q

Application:

A

The biggest difference between the TCP/IP stack and the OSI model is found at the TCP/IP stack’s application layer. This layer addresses concepts described by Layers 5, 6, and 7 (the session, presentation, and application layers) of the OSI model.

62
Q

Well Know Ports:

A

Ports numbered 1023 and below are called well-known ports.

63
Q

Ephemoral Ports:

A

Ports numbered above 1023 are called ephemoral ports. The maximum value of a port is 65,535.

64
Q

Dynamic Host Configuration Protocol (DHCP):

A

Dynamically assigns IP address information (for examples, IP address, subnet masks, DNS server’s IP address, and default gateway’s IP address) to a network device. UDP PORT: 67,68

65
Q

Domain Name System (DNS):

A

Resolves domain names to corresponding IP addresses.
TCP PORT: 53
UDP PORT: 53

66
Q

File Transfer Protocol (FTP):

A

Transers files with a remote host (typicalled requires authentication of user credentials)
TCP PORT: 20 and 21

67
Q

H.323

A

A signaling protocol that mprovides multimedia communications over a network.
TCP PORT: 1720

68
Q

Hypertext Transfer Protocol (HTTP):

A

Retrieves content from a web server.

TCP PORT: 80

69
Q

Hypertext Transfer Protocol Secure (HTTP):

A

Used to securely retrieve content from a web server.

TCP PORT: 443

70
Q

Internet Message Access Protocol (IMAP):

A

Retrieves email from an email server.

TCP PORT: 143

71
Q

Internet Message Access Protocol V4 (IMAP4):

A

Retrieves email from an email server.

TCP PORT: 143

72
Q

Lightweight Directory Access Protocol (LDAP):

A

Provides directory services (for example, a user directory that includes username, password, email, and phone number information) to network clients.
TCP PORT: 389

73
Q

Lightweight Directory Access Protocol over SSH (LDAPS):

A

A secured version of LDAP

74
Q

Media Gateway Control Protocol (MGCP):

A

Used as a call control and communication protocol for Voice over IP networks
UDP PORT: 2427, 2727

75
Q

Network Basic Input/Output System (NetBIOS):

A

Provides network communication services for LANs that use NetBIOS.
TCP PORT: 139
UDP PORT: 137, 138

76
Q

Network News Transport Protocol (NNTP):

A

Supports the posting and reading of articles on Usenet news servers.
TCP PORT: 119

77
Q

Network Time Protocol (NTP):

A

Used by a network device to synchronize its clock with a time server (NTP server).
UDP PORT: 123

78
Q

Post Office Protocol V3 (POP3):

A

Retrieves email from an email server.

TCP PORT: 110

79
Q

Remote Desktop Protocol (RDP):

A

A Microsoft protocol that allows a user to view and control the desktop of a remote computer.
TCP PORT: 3389

80
Q

Remote Shell (rsh):

A

Allows commands to be executed on a computer from remote user.
TCP PORT:514

81
Q

Real-time Transport Protocol (RTP):

A

Used for delivering media-based data (such as Voice over IP) through the network.

82
Q

Real-Time Streaming Protocol (RTSP):

A

Communicates with a media server (for example, a video server) and controls the playback of the server’s media files.
TCP PORT: 554
UDP PORT: 554

83
Q

Secure Copy (SCP)

A

Provides a secure file-transfer service over an SSH connection and offers a file’s original date and time information, which is not available with FTP.
TCP PORT: 22

84
Q

Secure FTP (SFTP):

A

Provides FTP file-transfer service over an SSH connection.

TCP PORT: 22

85
Q

Session Initiation Protocol (SIP):

A

Used to create and end sessions for one or more media connections, including Voice over IP calls.
TCP PORT: 5061
UDP PORT: 5060

86
Q

Server Message Block (SMB):

A

Used to share files, printers, and other network resources.

TCP PORT:445

87
Q

Simple Mail Transfer Protocol (SMTP):

A

Used for sending email.

TCP PORT: 25

88
Q

Simple Network Management Protocol (SNMP):

A

Used to moniter and manage network devices.

UDP PORT: 161

89
Q

Simple Network Management Protocol Trap (SNMPTrap):

A

A notification send from an SNMP agent to an SNMP manager.
TCP PORT: 162
UDP PORT: 162

90
Q

Simple Network Time Protocol (SNTP):

A

Supports time synchronization amoung network devices, similar to Network Time Protocol (NTP), although SNTP uses a less complex algorithm in its calculation and is slightly less accurate.
UDP PORT: 123

91
Q

Secure Shell (SSH):

A

Used to securely connect to a remote host (typically via a terminal emulator)
TCP PORT: 22

92
Q

Telnet:

A

Used to connect to a remote host (typically via a terminal emulator).
TCP PORT: 23

93
Q

Trivial File Transfer Protocol (TFTP):

A

Transfers files with a remote host (does not require authentication of user credentials).
UDP PORT: 69