05 IS 2639 - Lesson 5: Network Protocols

studied byStudied by 38 people
5.0(1)
Get a hint
Hint

Protocols

1 / 110

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

111 Terms

1

Protocols

Rules and procedures for communication and behavior

New cards
2

Protocol Suite or Protocol Stack

A set of protocols works cooperatively it is called a ?

New cards
3

Transmission Control Protocol/Internet Protocol (TCP/IP)

Most common protocol stack

New cards
4

Application Layer Protocol HTTP

Formats a request for your home page by using the?

New cards
5

Data

unit of information the application layer works with is simply?

New cards
6

Transport-Layer protocol (TCP)

The Application-Layer Protocol HTTPpasses the request down to the _______

New cards
7

Segment

The unit of Information the transport layer works with is called a?

New cards
8

Internetwork Layer Protocol

TCP passes the segment to the ___________

New cards
9

Application Layer

provides network services to user applications that access network resources

New cards
10
  • Access by applications to network services

  • Client/Server Data Access

  • Name Resolution

  • Dynamic Address Assignment

  • Authentication/User Logon

  • Data Formatting and Translation

Application Layer provides these functions:

New cards
11

True

True or False

Originally, HTTPs main purpose was to transfer static web pages written in HTML

New cards
12

TCP

HTTP uses ____ as its Transport-Layer Protocol

New cards
13

Post Office Protocol Version 3 (POP3)

used to download incoming messages from email servers to local desktops, it uses TCP port 110

New cards
14

Internet Message Access Protocol Version 4 (IMAP4)

used to manage email messages locally yet stores them on a server, uses port 143

New cards
15

Simple Mail Transfer Protocol (SMTP)

standard protocol for sending email over the Internet, uses TCP port 25

New cards
16

File Transfer Protocol

a client/server protocol used to transfer files and manage files across network

New cards
17

Users sending control commands

FTP uses TCP ports 20 and 21, port 21 is for?

New cards
18

Transferring file data

FTP uses TCP ports 20 and 21, port 20 is for?

New cards
19

True

True or False

FTP is not a secure protocol

New cards
20

Trivial File Transfer Protocol

a simple protocol for transferring files

has little file management capability

it uses UDP port 69

New cards
21

Server Message Block (SMB)

  • protocol Windows file and printer services use to share resources between Windows computers.

  • Almost exclusively in a private network instead of across the Internet

  • Uses TCP port 445

New cards
22

Remote Desktop Protocol

used to access a Windows computer remotely by using the Windows GUI

uses TCP port 3389

New cards
23

Telnet and Secure Shell (SSH)

used to connect to a device across a network via a command-line interface

New cards
24

Simple Network Management Protocol (SNMP)

used to monitor and manage network devices and gather statistics about network traffic

New cards
25

True

True or False

A drawback of using TCP/IP in a large network is keeping track of assigned addresses and to which machine they are assigned

New cards
26

Dynamic Host Configuration Protocol (DHCP)

used to automatically assign IP addresses as needed

New cards
27

DHCP server, Broadcast message

When a computer is turned on, it requests an IP address from a server that is configured as a _____, then the request is sent in the form of a ______

New cards
28

Lease

The server assigns an address for a specific amount of time called?

New cards
29

IP Address Scope

a range of IP addresses the server leases to clients

New cards
30

Scope Options

IP settings such as default gateway, DNS servers, a domain name, and other options

New cards
31

Reservations

an IP address tied to a particular MAC Address

New cards
32

Exclusions

one or more IP addresses excluded from the IP address scope

New cards
33

DHCP Server Service

runs in the background and listens on UDP port 69 for IP address requests

New cards
34

Computers can easily be moved and request new IP configuration from DHCP server on the new segment

Benefit of using DHCP

New cards
35

True

True or False
DHCP servers are usually located on the same network and DHCP messages are short

New cards
36

DHCPDiscover

client announces to the network that it’s looking for a DHCP server

New cards
37

DHCPOffer

server replies and offer the client an IP address for lease

New cards
38

DHCPRequest

client wants the offered IP address

New cards
39

DHCPack

server acknowledges the transaction and the client can now use the IP address

New cards
40

DHCP client software

runs as a service that starts when the computer starts

New cards
41

Domain Name System (DNS)

A name-to-address resolution protocol that keeps a list of computer names and their IP addresses

New cards
42

True

True or False

Using DNS, a user can use a computer’s name instead of using it’s IP address

New cards
43

True

True or False

DNS uses UDP because DNS messages usually consist of a single packet of data

New cards
44

Treelike Hierarchy

DNS is organized as a ?

New cards
45

Fully Qualified Domain Name (FQDN)

When you put all the names of a branch together, separate by periods, you have the_________

New cards
46

Top-Level Domains

Are organized into categories such as commercial (.com), nonprofit organizations (.org), government (.gov), or country of origin indicated by two-letter code

New cards
47

Second-Level Domain

usually the name of a company or institution

New cards
48

Subdomain Level

optional and can consist of names separated by a period

New cards
49

Host Level

represents individual computers hosting network services

New cards
50

Second-Level, Top-Level Domain, Subdomain

A zone is named by using the ______ and ________ and _______

New cards
51

DNS Server Database

contains a list of IP Addresses that point to root servers

New cards
52

Resolver Cache

  • DNS clients in most OSs maintain a DNS cache

  • This cache stores name and IP address pairs and other data for names that have been resolved recently

New cards
53

DNS client

responsible for communicating with a DNS server to resolve computer and domain names to IP addresses

New cards
54

Resolver

DNS client is referred to as a?

New cards
55

One Address

An OS must be configured to use DNS and needs at least _____ of a DNS server that it can query

New cards
56

Preferred DNS server

first DNS server configured is called?

New cards
57

Alternate DNS Server

Second DNS server is called?

New cards
58

True

True or False

DNS servers require a domain in addition to a computer name

New cards
59

Primary DNS Suffix

The default domain appended to DNS lookups is called?

New cards
60

Windows support Dynamic DNS

allows computers and other devices to contact their primary DNS server whenever their name or address changes

New cards
61

DNS zones

a database of primarily hostname and IP address pairs

New cards
62

Resource Records

the data contained in a zone

New cards
63

Cache

results of queries are cached so that if the same query occurs again, local DNS server can respond without having to contact another server

New cards
64

Root Hints

file containing a list of all IP addresses of Internet root servers

New cards
65

DNS Server Services

Runs in the Background and listens for DNS queries on UPD port 53

New cards
66

True

True or False

DNS servers can be configured with no zones at all

New cards
67

Caching-only server

DNS servers can be configured with no zones at all, this is a configuration called a ______

New cards
68

Transport-Layer Protocols

Used with most application-layer protocols because they:

  • Supply a header field to identify the Application layer

  • Provide reliability and flow control for applications that typically transfer a large amount of data

New cards
69

Transmission Control Protocol (TCP)

connection oriented and designed for reliable transfer of information in complex internetworks

New cards
70

User Datagram Protocol (UDP)

connectionless and designed for efficient communication of generally small amounts of data

New cards
71
  • Work with segments (TCP) or Datagrams (UDP)

  • Provide a means to identify the source and destination applications involved in a communication

  • Protect data with a checksum

Both TCP and UDP perform the following tasks:

New cards
72

Segments, Datagrams

TCP works units of data called _____ and UDP works with units of data called ____

New cards
73

Internetwork-Layer Protocol

With incoming data, the __________ de-encapsulates the packet and forwards the resulting segment or datagram to the Transport-Layer protocol

New cards
74

Port Numbers

  • TCP and UDP use _______ to specify the source and destination Application-Layer Protocols

  • Are 16-bit values assigned to specific applications running on a computer or network device

New cards
75

Internet Assigned Numbers Authority

assigns a dedicated port number to every well-known network service

New cards
76

True

True or False

If an application requires reliable data transfer, it uses TCP as the Transport-Layer protocol

New cards
77
  • Establishing connection

  • Segmenting large chunks of data

  • Ensuring flow control with acknowledgements

TCP provides reliability by using these features that aren’t available in UDP:

New cards
78

acknowledgement-synchronization (ACK-SYN) or reset connection (RST) segment

When the server receives the SYN segment, it responds by sending either an ______ or a ______

New cards
79

RST

An ____ is sent when the server refused the request to open the session

New cards
80

ACK-SYN

If an _____ is returned, the client completes the three-way handshake by sending a ACK segment back to the server

New cards
81

Flow Control

prevents a destination from becoming overwhelmed by data, resulting in dropped packets

New cards
82

Window Size

TCP establishes a maximum number of bytes, called the _____, that can be sent before the destination must acknowledge the receipt of data

New cards
83

Internetwork Layer

  • where administrators usually do the most network configuration

  • Where the IP protocol operates and is the heart of the TCP/IP protocol suite

New cards
84
  1. Defines and Verifies IP addresses

  2. Routes packets through an internetwork

  3. Resolves MAC Addresses from IP addresses

  4. Delivers packets efficiently

The internetwork layer is responsible for four main tasks:

New cards
85
  • Identify a network device at the internetwork layer

  • Identify the network on which a device resides

IP addresses are used for two main purposes:

New cards
86

True

True or False

When a device receives an IP packet, it compares the destination IP address with it’s own:

  • If it matches or is a broadcast, the packet is processed

  • It it does not match then it is discarded

New cards
87
  • IPv4

  • IPv6

  • ARP

  • ICMP

  • IPsec

Some of the most commonly used Internetwork-layer protocols:

New cards
88

IP

IPv4 is also known as ___

New cards
89

IPv4

Most common version in networks and the first version that was in widespread use

New cards
90

34-bit dotted decimal

IPv4 defines a ______ IP address

New cards
91
  1. Version

  2. Time to Live

  3. Protocol

  4. Checksum

  5. Source and Destination Address

Important Fields in an IP Packet

New cards
92

Internet Protocol Version 6

Uses a different format for IP addresses than IPv4

Can run alongside IPv4 without needing to change the Transport Layer or Network Access Layer

New cards
93
  • Larger address space

  • Hierarchical address space

  • Autoconfiguration

  • Built-in Quality of Service Support

  • Built-in Support for security

  • Support for mobility

  • Extensibility

Improvements and changes from IPv4

New cards
94

Address Resolution Protocol (ARP)

used to resolve a logical (IP) address to physical (MAC) address

New cards
95

Internet Control Message Protocol

used to send error, status, and control messages between systems or devices

a specialized IP packet with its own header

New cards
96

ICMP echo packets

The ping program uses _________ to request a response from another computer or to verify whether it is available for communication

Indicates whether the host is reachable and how long the message’s round trip from sender to receiver took

New cards
97

Ping Program

The _____ uses ICMP echo packets to request a response from another computer or to verify whether it is available for communication

New cards
98

Tracert Program

The _____ uses ICMP echo packets to determine the route a packet takes through an internetwork

New cards
99

Internet Protocol Security

works with IPv4 to ensure secure delivery of packets

New cards
100

Authentication and Encryption

Internet Protocol Security provides security by using _________ and _________

New cards

Explore top notes

note Note
studied byStudied by 132 people
... ago
5.0(1)
note Note
studied byStudied by 55 people
... ago
4.5(2)
note Note
studied byStudied by 7 people
... ago
5.0(1)
note Note
studied byStudied by 30 people
... ago
5.0(1)
note Note
studied byStudied by 37 people
... ago
5.0(1)
note Note
studied byStudied by 6 people
... ago
5.0(1)
note Note
studied byStudied by 16 people
... ago
5.0(1)
note Note
studied byStudied by 23129 people
... ago
4.8(187)

Explore top flashcards

flashcards Flashcard (21)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (93)
studied byStudied by 13 people
... ago
5.0(2)
flashcards Flashcard (27)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (58)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (83)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (68)
studied byStudied by 29 people
... ago
5.0(2)
robot