Lesson 4. The Intricacies of TCP/IP Protocols and Wireless Network Protection

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

TCP/IP

The foundational communication protocol for the internet, TCP/IP governs how data is packaged, addressed, transmitted, routed, and received.

2
New cards

Transmission Control Protocol (TCP)

A connection-oriented protocol that ensures data is delivered reliably between systems using a method called the three-way handshake.

3
New cards

Internet Protocol (IP)

Responsible for addressing and routing data across networks, IP defines how packets are formatted and delivered from source to destination.

4
New cards

IPv4

A 32-bit addressing system displayed in decimal format (e.g., 192.168.0.1) and divided into four octets.

5
New cards

IPv6

A 128-bit IP addressing system that uses hexadecimal numbers and is separated by colons.

6
New cards

Static IP Address

An IP address manually assigned to a device that does not change over time.

7
New cards

Dynamic IP Address

An automatically assigned IP address that can change periodically, typically managed by a DHCP server.

8
New cards

DHCP

A network protocol that automatically assigns IP addresses to devices.

9
New cards

APIPA

A fallback system that assigns an address in the 169.254.x.x range if a DHCP server is unavailable.

10
New cards

FTP

Uses ports 20/21 to transfer files between systems.

11
New cards

SSH

Uses port 22 and provides a secure command-line interface to manage devices over a network.

12
New cards

Telnet

Uses port 23 and provides a command-line interface like SSH, but without encryption.

13
New cards

SMTP (Simple Mail Transfer Protocol)

Uses port 25 to transfer email between servers. It is a protocol used for outgoing mail.

14
New cards

DNS (Domain Name System)

Uses port 53 to translate domain names (like www.google.com) into IP addresses. It is essential for navigating the internet.

15
New cards

HTTP (Hypertext Transfer Protocol)

Uses port 80 and is the protocol used by web browsers to load webpages. It is not secure by default.

16
New cards

POP (Post Office Protocol v3)

Uses port 110 to retrieve emails from a server. It downloads and often deletes messages from the server after access.

17
New cards

NetBIOS

Uses ports 137/138/139 and enables communication between Windows systems on a local network. It works with TCP/IP via NBT.

18
New cards

IMAP (Internet Message Access Protocol)

Uses port 143 and allows users to access and manage email directly on the mail server. Emails stay on the server unless deleted.

19
New cards

SNMP (Simple Network Management Protocol)

Uses ports 161/162 and allows network administrators to monitor and manage devices remotely.

20
New cards

BGP (Border Gateway Protocol)

Uses port 179 and is the protocol used by internet service providers to exchange routing information on the internet.

21
New cards

LDAP (Lightweight Directory Access Protocol)

Uses port 389 and is used to access and manage directory information such as user data and permissions.

22
New cards

HTTPS (HTTP Secure)

Uses port 443 to secure HTTP communication using SSL or TLS. It ensures encrypted data transmission between browsers and servers.

23
New cards

LDAPS (LDAP Secure)

Uses port 636 to provide secure access to LDAP services via SSL/TLS encryption.

24
New cards

FTPS (FTP Secure)

Uses ports 989/990 and encrypts FTP data transfers using SSL/TLS for secure file transfers.

25
New cards

Wireless Network

A network that connects devices without physical cables, typically using Wi-Fi. While convenient, it requires strong security to prevent unauthorized access.

26
New cards

Wireless Access Point (WAP)

A device that transmits and receives wireless signals, allowing Wi-Fi-enabled devices to connect to a wired network. Placement is key to ensure optimal signal distribution.

27
New cards

Wireless Site Survey

An analysis conducted to evaluate wireless signal strength, interference, and optimal placement of WAPs. It helps determine network feasibility and identify problem areas like dead zones or interference sources.

28
New cards

Co-Channel Interference

Occurs when multiple wireless networks use the same frequency channel, leading to signal overlap. Using non-overlapping channels (like 1, 6, 11 on 2.4 GHz) helps avoid this.

29
New cards

Channel Interference

Caused by other devices or obstacles (including people) that interfere with wireless signals. Site surveys help detect and mitigate such interference.