The TCP/IP Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What does TCP/IP stand for and what is it used for?

A
  • TCP / IP stands for transmission control protocol / internet protocol.
  • Used to enable different devices to communicate.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four distinct layers of the tcp/ip stack that the tcp/ip protocol is formed of?

A

Application, transport, network, link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the application layer responsible for?

A
  • It interacts with the user through software such as a web browser
  • It selects and uses the correct protocol to transmit data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the transport layer responsible for?

A
  • Establishes an end to end connection between the sender/receiver.
  • It splits the data into packets and labels them with a sequence number
  • The packets are labeled with the port number to be used (this identifies the protocol in use)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the network layer responsible for?

A
  • Adds the source/destination IP addresses to each packet
  • Routers work within the network layer, using the IP addresses to send packets to their destination.
  • The IP address and port number form the socket address which specify the device the packet must be sent to and the application being used
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the link layer responsible for?

A
  • Controls physical connections between network nodes

- Adds MAC addresses to packets of source/destination so that packets can locate the correct device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do receiver’s MAC addresses identify?

A
  • The hardware to which a packet should be sent to.

- MAC addresses change with every hop through a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens at the receiving end of the tcp/ip stack?

A
  • Once a packet is received, it is stripped of its extra information by reversing the TCP / IP stack.
  • The link layer removes MAC addresses
  • The network layer removes IP addresses
  • The transport layer uses the packet’s port number to determine the correct application to send the packet to. It also uses the packet’s sequence number to put the packets in the correct order.
  • The application layer receives the packets and displays the information to the user.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a socket address and what are they used for?

A
  • A socket address is an IP address combined with a port number. For example: 114.26.20.199:443.
  • They identify which of the applications on the recipient device a packet should be sent to.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Ip addresses formed of?

A
  • They’re split into two parts: a network identifier and a host identifier.
  • Devices in a network share the same network identifier but have individual host identifiers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are subnets and what are subnet masks used for.

A
  • Networks can be divided into smaller networks, called subnets. Each subnet has a different network identifier.
  • The network identifier is determined by a subnet mask.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name a commonly used subnet mask?

A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Give an example of how a subnet mask is used to determine the network identifier?

Find the network identifier, using the ip address 192.168.3.24 and the subnet mask 255.255.255.0

A
  • 192.168.3.24 - IP Address
  • 11000000.10101000.00000011.00011000 - IP Address in binary
  • 255.255.255.0 - The subnet mask
    11111111. 11111111.11111111.00000000 - The subnet mask in binary
    11000000. 10101000.00000011.00000000 - uses a Bitwise AND operation
    192. 168.3.0 - The network identifier in decimal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The more bits that are assigned to the network identifier of an IP address …

A

The more different subnets a network can have and the less bits assigned to the host identifier (the less devices can be connected to each subnet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The more bits that are assigned to

the host identifier…

A

the more different devices can be connected to each subnet simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two types of IP address standards?

A

IPv4 and IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How are IPv4 addresses formed?

Give an example.

A
  • IPv4 addresses consist of 4 parts, separated by dots.

- Each part is assigned 8 bits allowing for numbers from 0-255 to be represented. Example: 192.168.34.7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How are IPv6 addresses formed?

Give an example.

A

IPv6 addresses are formed of eight blocks separated by colons. Each block contains four hexadecimal characters
Example: 2071:0eb8:85a3:8a2f:0000:0000:0370:7264

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many IP addresses does IPv4 allow for?

A

This allows for a total of slightly over 4 billion (256^4

) unique IPv4 addresses.

20
Q

How many IP addresses does IPv6 allow for?

A

IPv6 addresses use 128 bits (IPv4’s use of 32 bits) which allows for far more (in the order of 10^37) unique addresses.

21
Q

What is the difference between routable and non-routable IP address?

A
  • Routable IP addresses are public, non-routable are private.
  • Routable IP addresses are globally unique whereas millions of devices can have the same non-routable IP address
22
Q

What are Global authorities are responsible for?

A

For assigning routable IP addresses, ensuring the same address is never issued twice.

23
Q

What is DHCP and why do we use it?

A

Dynamic host configuration protocol is used to assign IP addresses to devices as they join a network because private IP addresses in private networks are limited

24
Q

How does DHCP avoid wasting IP addresses?

A
  • DHCP uses a pool of available IP addresses and allocates them to new devices for the duration of their session.
  • When a device leaves the network, the IP address used is returned to the pool for reallocation
25
Q

When is port forwarding used?

A

Port forwarding is used when a client needs to communicate with a server that is connected to a private network.

26
Q

How does port forwarding work?

A
  • The packets sent to the router contain the port number of the application running on the server.
  • Then the private networks router forwards the packets to the server using NAT.
27
Q

What is an API?

A
  • application programming interfaces are a set of protocols that govern how two applications communicate with each other.
  • They enable one application to make use of another
28
Q

Why do we use NAT and how does it work?

A
  • Network address translation is when a device on the private network communicates with a device on the Internet.
  • It sends packets through the router, which makes a record of the packet before replacing the devices private IP address with its routable IP address.
  • When a response is received it’s sent to the router’s public IP address, which then forwards the response to the private IP address by using the record it made when sending the packet.
29
Q

What is the websocket protocol?

A
  • Example of an API that allows for fast transmission of data by reducing the size of packet headers and using less security checks
  • An application layer protocol that provides a constant stream of information between two devices using full-duplex communication
30
Q

What does each letter in CRUD stand for and what are their equivalent SQL commands?

What are the CRUD commands used for?

A

Create INSERT
Retrieve SELECT
Update UPDATE
Delete DELETE

  • They are used for querying online databases
31
Q

What does rest stand for and what is it?

A
  • Representational state transfer is a style of systems design for online database applications that are queried with a web browser
  • Allows any client or server to be updated independently of each other without any loss of function
32
Q

What are the HTTP request methods and their equivalent SQL commands?

What are the REST commands used for?

A
POST INSERT
GET SELECT
PUT UPDATE
DELETE DELETE
- They are used for querying databases
33
Q

What do database servers deliver responses to queries in?

A

Either XML or JSON

34
Q

What do XML and JSON stand for?

A
  • XML : Extensible markup language, JSON : JavaScript object notation
  • They are two standard methods for transferring data between the server and the web application
35
Q

What is an advantage of using JSON or using XML

A
  • JSON is more compact, easier to read, easier to create and faster for computers to process than XML
  • XML is more flexible than JSON in terms of structure and the data types that can be used
36
Q

What are the features of thin-client networks?

A
  • The majority of the network’s processing power belongs to servers
  • Servers provide services and resources including storage and processing
37
Q

What are the features of thick-client networks?

A
  • Clients are powerful machines

- They don’t require a server as they provide their own processing power and storage

38
Q

What are unusable IP addresses?

Give the four examples of unusable IP addresses.

A
  • Some IP addresses cannot be used as they are reserved for other purposes:
  • Address ranges 10.x.y.z, 172.16.0.1 to 172.31.255.255 and 192.168.y.z are private, non‐routable addresses
  • x.y.z.0 represents an entire network
  • x.y.z.255 is reserved as the broadcast address for sending data to all hosts on that network
  • 127.x.y.z is reserved for loopback
39
Q

What is the suffix? In classless addressing

A

It determines how many bits are part of the network identifier and network host
210.24.101.0/24 means the network identifier uses 24 bits

40
Q

What is used in classful addressing

A
Different classes are used, class A,B,C,D or E
Each class uses 8 bits more than the last for the network address
41
Q

what are the benefits of splitting a network into subnetworks?

A

-Reduces size of the broadcast domain which improves security, speed and reliability

42
Q

How is a subnet created?

A

-It uses the most significant bits of the host ID.
If the host ID uses 16 bits and subnet ID uses 8 bits,this means the network has 256 sub networks which can each have (256-2 =) 254 hosts on each sub network

43
Q

Give examples of when the websocket protocol is used?

A
  • Video streaming
  • Online games
  • Instant messaging
44
Q

How many IP addresses do router have?

A
  • Routers have two NICs so they have two IP addresses, a private and a public one
45
Q

What are the advantages and disadvantages of thin client computing?

A
  • Easy to add new clients and the clients are inexpensive machines
  • More secure as data is kept centrally in one place
  • Requires expertise to install and maintain the powerful server
  • Reliant on the server, if the server goes down, clients lose functionality
46
Q

What are the advantages and disadvantages of thick client computing?

A
  • Require more powerful clients making the network expensive to install
  • They are harder to maintain because there is no facility to issue updates/manage security from
  • Can operate without a constant connection to the server
  • Robust and reliable, providing greater up-time