1 Network Standard Protocols

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/56

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

57 Terms

1
New cards

Standards

are documented agreements containing technical specifications or other precise criteria that stipulate how a particular product or service should be designed or performed

2
New cards

Common Standardization Organizations (Huawei, 2020)

  • American National Standards Institute (ANSI)

  • Institute of Electrical and Electronics Engineers (IEEE)

  • Electronic Industries Alliance (EIA)

  • Telecommunications Industry Association (TIA)

  • Internet Engineering Task Force (IETF)

  • Organization for Standardization (ISO)

3
New cards

Institute of Electrical and Electronics Engineers (IEEE)

is an international society composed of engineering professionals.

4
New cards

American National Standards Institute (ANSI)

is an organization composed of more than one thousand representatives from industry and government who together to determine standards for electronics, industry and other fields such as chemical and nuclear engineering, health and safety, and construction

5
New cards

Electronic Industries Alliance (EIA)

is a trade organization composed of representatives from electronics manufacturing firms across the United States. This organization writes ANSI standards and legislation favorable to the growth of computer and electronic industries

6
New cards

Telecommunications Industry Association (TIA)

focuses on standards for information technology, wireless, satellite, fiber optics, and telephone equipment.

7
New cards

Internet Engineering Task Force (IETF)

is an organization that is responsible for the overall development of the Internet and the standardization of internetworking technologies. sets standards for how systems communicate over the Internet.

8
New cards

Internet Society (ISOC)

This oversees the overall development on the Internet.

9
New cards

Internet Engineering Steering Group (IESG)

This oversees the activities of IETF and manages the process used to introduce or update Internet standards

10
New cards

Internet Architecture Board (IAB)

This serves as the technology advisory group to the Internet Society and is responsible for the overall development of the protocols and architecture associated with the Internet.

11
New cards

Internet Assigned Numbers Authority (IANA)

This oversees Internet naming and addressing; they are in charge of all “unique parameters” on the Internet including IP (Internet Protocol) addresses.

12
New cards

Organization for Standardization (ISO)

The International Organization for Standardization (ISO) is an international standards organization responsible for a wide range of standards, including many that are relevant to networking.

13
New cards

Application Layer Protocols (Huawei, 2020)

  • Simple Mail Transfer Protocol (SMTP)

  • Post Office Protocol, version 3 (POP3)

  • Trivial File Transfer Protocol (TFTP)

  • File Transfer Protocol (FTP)

  • Network File System (NFS)

  • Domain Name System (DNS)

  • Simple Network Management Protocol (SNMP)

    Terminal Emulation Protocol Network (Telnet)

  • Remote login application (rlogin)

  • Hypertext Transfer Protocol (HTTP)

  • HTTPS (Hypertext Transfer Protocol over Secure Socket Layer)

14
New cards

Managed devices

collect and store management information and make this information available to NMSs using SNMP.

15
New cards

agent

has local knowledge of management information and translates that information into a form compatible with SNMP

16
New cards

NMS

executes applications that monitor and control managed devices. NMSs provide the bulk of the processing and memory resources required for network management.

17
New cards

Secure Sockets Layer (SSL)

is a security protocol that works at a socket level. This layer exists between the TCP layer and the application layer to encrypt/decode data and authenticate concerned entities.

18
New cards

Simple Mail Transfer Protocol (SMTP)

refers to a TCP/IP protocol that specifies a reliable and efficient transfer of electronic mail service on the Internet

19
New cards

Post Office Protocol, version 3 (POP3)

refers to a TCP/IP protocol that is designed to allow a workstation to retrieve mail that the server is holding for it.

20
New cards

Trivial File Transfer Protocol (TFTP)

is a small and simple alternative to FTP that uses UDP to transfer files between systems.

21
New cards

File Transfer Protocol (FTP)

refers to a TCP/IP protocol that enables the sharing of computer programs and/or data between hosts over a TCP/IP network. It uses TCP to create a virtual connection for control information and then creates a separate TCP connection for data transfer.

22
New cards

Network File System (NFS)

refers to a TCP/IP protocol that enables computers to mount drives on remote hosts and operate them as if they were local drives

23
New cards

Domain Name System (DNS)

refers to a TCP/IP protocol that is used on the Internet for translating names of domains and their publicly advertised network nodes into IP addresses

24
New cards

Simple Network Management Protocol (SNMP)

refers to a TCP/IP protocol that monitors and controls the exchange of management information between networks and network components; it enables network administrators to manage configurations, statistics collection, network performance, and security

25
New cards

SNMP model includes three (3) components:

Managed devices

agent

NMS

26
New cards

Terminal Emulation Protocol Network (Telnet)

refers to a TCP/IP protocol that uses the TCP as the transport protocol to establish a connection between server and client.

27
New cards

Remote login application (rlogin)

is a UNIX command that allows authorized users to log in to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer. Once the user is logged into the host, the user can do anything that the host has permitted, such as read, edit, or delete files.

28
New cards

Hypertext Transfer Protocol (HTTP)

refers to an application-level protocol service and an Internet standard developed by the IETF that supports the exchange of information on the World Wide Web, as well as on internal networks

29
New cards

HTTPS (Hypertext Transfer Protocol over Secure Socket Layer)

is a secure message-oriented communications protocol designed for use in conjunction with HTTP.

30
New cards

TCP and UDP Connections (Karumachi, et. al., 2020)

Computers running on the Internet communicate to each other

31
New cards

Transport Control Protocol (TCP)

refers to a connection-oriented TCP/IP standard transport layer protocol that provides reliable data delivery, duplicate data suppression, congestion control, and flow control on which many application protocols depend

32
New cards

User Datagram Protocol (UDP)

refers to a connectionless TCP/IP standard transport layer protocol that provides unreliable, best-effort service

33
New cards

datagrams

o UDP is a protocol that sends independent packets of data, called _____, from one computer to another with no guarantees about arrival.

34
New cards

Port Numbers

Data transmitted over the Internet is accompanied by addressing information that identifies the computer and the port for which it is destined.

35
New cards

32-bit IP address

which it uses IP to deliver data to the specific computer on the network.

36
New cards

Ports are identified by a 16-bit number

which TCP and UDP use to deliver the data to the specific application

37
New cards

0 to 65,535

Port numbers range because ports are represented by 16-bit numbers.

38
New cards

0 - 1023

The port numbers ranging are restricted; they are reserved for use by well- known services such as HTTP and FTP and other system services called well-known ports.

39
New cards

TCP Header Fields

• Source Port

• Destination Port

• Sequence Number

• Acknowledgment Number

• Header Length

• Reserved

• Control Bits

• Window

• Checksum

40
New cards

TCP Source Port

identifies the application that sends the segment. This field is 16 bits long.

41
New cards

TCP Destination Port

identifies the application that receives the segment. This field is 16 bits long.

42
New cards

TCP Sequence Number

refers to every byte of data sent over a TCP connection. The value of this field is equal to the sequence number of the first byte in a sent segment. This field is 32 bits long.

43
New cards

TCP cknowledgment Number

indicates the sequence number of the next segment's first byte that the receiver is expecting to receive. The value of this field is 1 plus the sequence number of the last byte in the previous segment that is successfully received. This field is 32 bits long

44
New cards

TCP Header Length

indicates the length of the TCP header. The unit is 32 bits (4 bytes). If there is no option content, the value of this field is 5, indicating that the header contains 20 bytes

45
New cards

TCP Reserved

this field is always set to 0 as it is intended for future protocol changes. It is 6 bits long.

46
New cards

TCP Control Bits

include FIN, ACK, and SYN flags which indicate the TCP data segments in different states.

47
New cards

TCP Window

is used for TCP flow control. The value is the maximum number of bytes that are allowed by the receiver.

48
New cards

TCP Checksum

is a mandatory field in which it is calculated and stored by the sender and verified by the receiver.

49
New cards

UDP Header Fields

• Source Port

• Destination Port

• Length

• Checksum

50
New cards

Length

specifies the total length of the UDP header and data. The possible minimum length is 8 bytes because the UDP header already occupies 8 bytes

51
New cards

UDP Checksum

field refers to the checksum of the UDP header and UDP data. This field is 16 bits long.

52
New cards

SYN-ACK Handshake (Huawei, 2020)

Three-way handshake

Sequence Number and Acknowledgment Number

Window Sliding Mechanism

TCP Shutdown (Four- Way Handshake)

53
New cards

Three-way handshake

is a method, in which the sender and the receiver inform their respective operating systems that a connection will be initiated before the actual data communication begins

54
New cards

Sequence Number and Acknowledgment Number

fields to implement reliable and ordered data transmission

55
New cards

Window Sliding Mechanism

requires the sender to receive an acknowledgment from the receiver after transmitting a certain amount of data.

56
New cards

TCP Shutdown (Four- Way Handshake)

is engaged when the data transmission is complete in order to disconnect the TCP connection and release system resources

57
New cards