Internet Protocols

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/51

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

52 Terms

1
New cards

Internet Protocol

a set of rules that allows devices to communicate with each other over the Internet.

2
New cards

Internet Protocol

It is like the address system used for sending data.

3
New cards

IP Address

A unique address that identifies the device over the network

4
New cards

IP Address

It is almost like a set of rules governing the structure of data sent over the Internet or through a local network.

5
New cards

IP Address

helps the Internet to distinguish between different routers, computers, and websites

6
New cards

IP Address

 It serves as a specific machine identifier in a specific network and helps to improve visual communication between source and destination.

7
New cards

Dividing Data into Packets

When you send information over the internet, IP split it into small parts called packets. Each packet contains a piece of the data and the address of where it needs to go.

8
New cards

Addressing

Every device connected to the internet has its own IP address. This address helps identify where the data is being sent from and where it should be delivered.

9
New cards

Routing the Packets

As the packets travel across the internet, they pass through several devices called routers. These routers help direct the packets toward the correct destination, like how mail is sorted at different post offices.

10
New cards

Reassemble the Data

Once all the packets arrive at the destination, they are put back together to recreate the original message or file.

11
New cards

Handling Missing Packets

If some packets don’t arrive, the system can request that they be sent again, making sure the complete data is received.

12
New cards

TCP/IP(Transmission Control Protocol/ Internet Protocol)

the IP protocol ensures that each computer that is connected to the Internet is having a specific serial number called the IP address.

13
New cards

TCP/IP(Transmission Control Protocol/ Internet Protocol)

specifies how data is exchanged over the internet and how it should be broken into IP packets.

14
New cards

TCP/IP(Transmission Control Protocol/ Internet Protocol)

makes sure that the packets have information about the source of the message data, the destination of the message data, the sequence in which the message data should be re-assembled, and checks if the message has been sent correctly to the specific destination.

15
New cards

TCP/IP(Transmission Control Protocol/ Internet Protocol)

also known as a connection-oriented protocol.

16
New cards

SMTP(Simple Mail Transfer Protocol)

protocol is important for sending and distributing outgoing emails.

17
New cards

SMTP(Simple Mail Transfer Protocol)

This protocol uses the header of the mail to get the email id of the receiver and enters the mail into the queue of outgoing mail. And as soon as it delivers the mail to the receiving email id, it removes the email from the outgoing list.

18
New cards

SMTP(Simple Mail Transfer Protocol)

The message or the electronic mail may consider the text, video, image, etc. It helps in setting up some communication server rules.

19
New cards

PPP(Point-to-Point Protocol)

a communication protocol that is used to create a direct connection between two communicating devices.

20
New cards

PPP(Point-to-Point Protocol)

This protocol defines the rules using which two devices will authenticate with each other and exchange information with each other

21
New cards

 FTP (File Transfer Protocol)

This protocol is used for transferring files from one system to the other.

22
New cards

 FTP (File Transfer Protocol)

This works on a client-server model.

23
New cards

 FTP (File Transfer Protocol)

 When a machine requests for file transfer from another machine, the FTO sets up a connection between the two and authenticates each other using their ID and Password. And, the desired file transfer takes place between the machines.

24
New cards

SFTP(Secure File Transfer Protocol)

also known as SSH FTP refers to File Transfer Protocol (FTP) over Secure Shell (SSH) as it encrypts both commands and data while in transmission.

25
New cards

SFTP(Secure File Transfer Protocol)

acts as an extension to SSH and encrypts files and data then sends them over a secure shell data stream.

26
New cards

SFTP(Secure File Transfer Protocol)

This protocol is used to remotely connect to other systems while executing commands from the command line.

27
New cards

HTTP(Hyper Text Transfer Protocol)

used to transfer hypertexts over the internet and it is defined by the www(world wide web) for information transfer.

28
New cards

HTTP(Hyper Text Transfer Protocol)

This protocol defines how the information needs to be formatted and transmitted. And, it also defines the various actions the web browsers should take in response to the calls made to access a particular web page.

29
New cards

HTTP(Hyper Text Transfer Protocol)

Whenever a user opens their web browser, the user will indirectly use HTTP as this is the protocol that is being used to share text, images, and other multimedia files on the World Wide Web.

30
New cards

 HTTPS(HyperText Transfer Protocol Secure)

extension of the Hypertext Transfer Protocol (HTTP).

31
New cards

 HTTPS(HyperText Transfer Protocol Secure)

It is used for secure communication over a computer network with the SSL/TLS protocol for encryption and authentication

32
New cards

TELNET(Terminal Network)

a standard TCP/IP protocol used for virtual terminal service given by ISO. This enables one local machine to connect with another

33
New cards

TELNET(Terminal Network)

The computer which is being connected is called a remote computer and which is connecting is called the local computer.

34
New cards

TELNET(Terminal Network)

lets us display anything being performed on the remote computer in the local computer.

35
New cards

TELNET(Terminal Network)

This operates on the client/server principle.

36
New cards

POP3(Post Office Protocol 3)

has two Message Access Agents (MAAs) where one is client MAA (Message Access Agent) and another is server MAA(Message Access Agent) for accessing the messages from the mailbox.

37
New cards

POP3(Post Office Protocol 3)

This protocol helps us to retrieve and manage emails from the mailbox on the receiver mail server to the receiver’s computer.

38
New cards

POP3(Post Office Protocol 3)

It can also be called a one-way client-server protocol. The POP3 works on two ports i.e port 110 and port 995.

39
New cards

IPv4

It is the most popular version of the Internet Protocol and is in charge of distributing data packets throughout the network.

40
New cards

 IPv6

A maximum of 4.3 billion unique addresses are possible with IPv4’s 32-bit addresses. Contrarily, IPv6 uses 128-bit addresses, which enable a significantly greater number of unique addresses.

41
New cards

ICMP

a network protocol that is used to send error messages and operational information about network conditions. It is an integral part of the Internet Protocol (IP) suite and is used to help diagnose and troubleshoot issues with network connectivity.

42
New cards

ICMP

can also be used by network management tools to test the reachability of a host and measure the round-trip time for packets to travel from the source to the destination and back.

43
New cards

UDP

a connectionless, unreliable transport layer protocol.

44
New cards

UDP

Unlike TCP, it does not establish a reliable connection between devices before transmitting data, and it does not guarantee that data packets will be received in the order they were sent or that they will be received at all.

45
New cards

UDP

simply sends packets of data to a destination without any error checking or flow control.

46
New cards

IMAP

Internet Message Access Protocol

47
New cards

IMAP

 a protocol used for retrieving emails from a mail server. It allows users to access and manage their emails on the server, rather than downloading them to a local device. This means that the user can access their emails from multiple devices and the emails will be synced across all devices.

48
New cards

IMAP

more flexible than POP3 (Post Office Protocol version 3) as it allows users to access and organize their emails on the server, and also allows multiple users to access the same mailbox.

49
New cards

SSH

protocol used for secure remote login and other secure network services. It provides a secure and encrypted way to remotely access and manage servers, network devices, and other computer systems.

50
New cards

Gopher

a type of file retrieval protocol that provides downloadable files with some description for easy management, retrieving, and searching of files. All the files are arranged on a remote computer in a stratified manner. It is an old protocol and it is not much used nowadays.

51
New cards
52
New cards