2.1 - Compare and contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes.

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/53

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

54 Terms

1
New cards

DoD Model

Process/Application layer, Host-to-Host layer, Internet layer, Network Access layer

2
New cards

What protocols in the TCP/IP suite operate at the process/application layer of the DoD model?

Telnet, FTP, LPD, SNMP, TFTP, SMTP, NFS, HTTP

3
New cards

Internet Layer Protocols

Internet Protocol (IP), Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP), Reverse Address Resolution Protocol (RARP), Proxy ARP

4
New cards

ICMP (Internet Control Message Protocol)

A core protocol in the TCP/IP suite that notifies the sender that something has gone wrong in the transmission process and that packets were not delivered.

5
New cards

Address Resolution Protocol (ARP)

Part of the TCP/IP protocol for determining the MAC address based on the IP address.

6
New cards

RARP (Reverse Address Resolution Protocol)

Resolves MAC addresses to IP addresses

7
New cards

TCP vs UDP

TCP is a connection oriented protocol where UDP isn't. TCP is suitable for connections the require high reliability and transmission time is less critical. TCP establishes a connection with counterpart where UDP doesn't have any guarantee that the packets sent made it to the destination. TCP uses error checking, where UDP does not. TCP uses sequencing (putting frames in the right order) where UDP does not.

8
New cards

FTP (File Transfer Protocol)

20, 21

9
New cards

SSH (Secure Shell)

22

10
New cards

Telnet

23

11
New cards

SMTP (Simple Mail Transfer Protocol)

25

12
New cards

DNS

53

13
New cards

DHCP (Dynamic Host Configuration Protocol)

67, 68 UDP

14
New cards

TFTP (Trivial File Transfer Protocol)

UDP 69

15
New cards

HTTP (Hypertext Transfer Protocol)

80

16
New cards

POP3

110

17
New cards

NetBIOS/NetBT (Network Basic Input/Output System)

137-139

18
New cards

IMAP4

143

19
New cards

SNMP (Simple Network Management Protocol)

UDP 161

20
New cards

LDAP (Lightweight Directory Access Protocol)

TCP 389

21
New cards

HTTPS (Hypertext Transfer Protocol Secure)

443

22
New cards

SMB/CIFS

445

23
New cards

RDP (Remote Desktop Protocol)

3389

24
New cards

Port 20/21—File Transfer Protocol (FTP)

Both a protocol and application, lets you copy files, list and manipulate directories, and view file contents.

Provides insecure file transfers

Downside is it's unsecure. Use alternatives for secure file transfers. Transmits usernames and passwords in plain text, meaning no encryption. Don't use same password for FTP servers as other important services.

25
New cards

Port 22: Secure Shell (SSH)

Provides secure remote control of another machine using a text-based environment such as a command shell

Connection-oriented protocol that can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files., using encryption

Best known for its use as a remote login capability

RWE: Change configuration of my web server, I can login from my house in Puerto Rico to my file server in California over the internet

26
New cards

Port 23 (Telnet)

Provides insecure remote control of another machine using a text-based environment

Used to provide bidirectional interactive text-oriented communication using virtual terminal connections (convoluted way of saying it provides us remote access via the command prompt)

Similar to SSH, has been around forever, but is unsecure like FTP.

27
New cards

Port 25: Simple Mail Transfer Protocol (SMTP)

Designed to send only, considered a "push" protocol. Email client locates its email server by querying the DNS server for a mail exchange (MX) record. Once located, this protocol pushes the message to the email server, which will then process the message for delivery.

28
New cards

Port 53: (DNS) Domain name system

Resolve host names to IP addresses

29
New cards

URL (Uniform Resource Locator)

A location or address identifying where documents can be found on the Internet; a Web address

30
New cards

Port 67/68—Dynamic Host Configuration Protocol (DHCP)

Dynamically assigns IP addresses and other IP configuration information; subnet mask, default gateway, and the DNS server, to network clients.

31
New cards

Port 69: Trivial File Transfer Protocol (TFTP)

Similar to FTP, only simpler and faster. No authentication required, UDP (connectionless), 5 commands vs 70, and it's primary use is transmitting configurations to and from network devices.

32
New cards

Port 80 (Hypertext Transfer Protocol)

Foundation of data communication for the worldwide web and is used for insecure web browsing

Manages communication between a web server and a client but is not secure and has been supplanted by HTTPS.

33
New cards

Port 110 Post Office Protocol (POP3)

Used for receiving incoming emails, was the preferred protocol for downloading email. Has been replaced by IMAP4.

Uses a "store and forward method of communication". So if somebody sends you an email, it will go to your email server where it will wait until you're ready to receive it.

34
New cards

Port 137/139 - Network Basic Input/Output System (NetBIOS)/NetBIOS over TCP/IP (NetBT)

Used for file or printer sharing in a Windows network, conducting name querying, sending of data, and other functions

Application programming interface (API) that allows computers to communicate with each other over the network. Works in Layer 5 of the OSI model. Because of this, it needs to work with anohter network protocol to handle the functions of Layer 4 and below.

35
New cards

NetBIOS (Network Basic Input/Output System)

Protocol that operates at the Session layer of the OSI seven-layer model. This protocol creates and manages connections based on the names of the computers involved.

36
New cards

Port 143 - Internet Mail Access Protocol (IMAP)

A newer method of retrieving incoming emails which improves upon the older POP3

Secure protocol designed to download email.

Advantages over POP3 include:
works in connected and disconnected modes, allows storage on the server, allows multiple clients to be simultaneously connected to the same inbox.

37
New cards

Port 161-162 - Simple Network Management Protocol (SNMP)

Used to collect data about network devices and monitor their status, including devices such as routers, switches, VoIP phones

Gathers and manages network performance information.

38
New cards

Port 389 - Lightweight Directory Access Protocol (LDAP)

Open vendor-neutral industry standard for accessing and maintaining distributed directory information services for your network

Active Directory in Windows but it's not JUST AD in Windows. AD is microsoft's proprietary version of LDAP

Delivery services protocol based on the X.500 standard. Designed to access information stored in an information directory typically called...?

39
New cards

Port 445 - Server Message Block (SMB)

Used for Windows file and printer sharing services, operating a lot with NetBIOS. NetBIOS does the authentication over port 139 and then SMB will handle the actual passing out of those files

Provides share access to files, printers, and other network resources. in a Windows based network

40
New cards

Common Internet File System (CIFS)

A method for accessing data in Windows networks. CIFS is a public version of Server Message Block (SMB) that was invented by Microsoft.

41
New cards

Port 3389 - Remote Desktop Protocol (RDP)

Provides graphical remote control of another client or server

Allows users to connect to remote computers and run programs on them.

42
New cards

connectionless protocol

A type of Transport layer protocol that services a request without requiring a verified session and without guaranteeing delivery of data.

Audio/video streaming, DHCP, and TFTP

43
New cards

connection-oriented protocol

A type of Transport layer protocol that requires the establishment of a connection between communicating nodes before it will transmit data.

SSH, HTTP, or HTTPS? Why do we require connection-oriented protocols here? Because with SSH, we are doing two-way remote control with a remote server or wks. If we want to reboot the server, if we are using ssh, we know that command got there.

44
New cards

TCP (Transmission Control Protocol)

A connection-oriented,
reliable data transmission
communication service that operates
at the transport layer of the OSI
model. TCP is part of the TCP/IP
suite. Features flow control.

Connection-oriented protocols are HTTPS and SSH.

45
New cards

UDP (User Datagram Protocol)

Protocol that operates instead of TCP in applications where delivery speed is important and quality can be sacrificed. DHCP and TFTP.

Unreliable and it transmits segments called datagrams

Great for streaming because the constant three-way handshake is not occuring

Connectionless, unreliable delivery with no error recovery or flow control

46
New cards

Service Location Protocol (SLP)

Port 427

protocol or method of organizing and locating the resources (such as printers, disk drives, databases, e-mail directories, and schedulers) in a network. This is an alternative protocol to LDAP in newer networks.

47
New cards

Network Time Protocol (NTP)

Port 123, Networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.

48
New cards

System Logging Protocol (Syslog)

Port 514
Used to send logging data back to a centralized server

49
New cards

Well Known Ports

Ports 0 to 1023 are considered well-known and are assigned by the Internet Assigned Numbers Authority (IANA)

50
New cards

Registered Ports

Ports 1024 to 49151 are considered registered and are usually assigned to proprietary protocols

Have to be used by vendors for their own proprietary protocols and each vendor is going to register them with IANA prior to using them

51
New cards

Dynamic or Private Ports

Ports 49152-65535 can be used by any application without being registered with IANA

Usually used by your client whenever it picks a random high number port for its application

Commonly used for gaming, instant messaging, and chat

52
New cards

Port 22 - Secure File Transfer Protocol (SFTP)

Provides secure file transfers and operates on the exact same port we use for SSH because all we are doing is tunneling the FTP protocol

53
New cards

Port 443 Hypertext Transfer Protocol - Secure (HTTPS)

Used as a secure and encrypted version of web browsing, providing browsing over an encrypted tunnel. This tunnel can either use a Secure Socket Layer (SSL) or Transport Layer Security (TLS) to operate.

54
New cards

Three Way Handshake (TCP)

A three-step process in which Transport layer protocols establish a connection between nodes. The three steps are: Node A issues a SYN packet to node B, node B responds with SYN-ACK, and node A responds with ACK.