Internet Protocols and Services Review

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/132

flashcard set

Earn XP

Description and Tags

Flashcards covering key vocabulary terms and concepts related to internet protocols, network architecture, and common services, based on the provided lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

133 Terms

1
New cards

End System

A device connected to the Internet that runs applications. Examples include web servers and iPhones.

2
New cards

Router

A network device that forwards data packets between computer networks.

3
New cards

Internet Service Provider (ISP)

A company that provides Internet access to organizations and individuals.

4
New cards

Application Programming Interface (API)

A set of defined rules that enable different applications to communicate with each other.

5
New cards

Protocol

A set of rules that govern how data is formatted, transmitted, and received in a network.

6
New cards

Network Protocol Purpose

To define the rules and conventions for communication between network devices.

7
New cards

Access Network (DSL, cable, fiber)

The part of the network that connects end systems to the edge router of an ISP.

8
New cards

DSL vs. Cable

DSL uses existing phone lines, while cable uses existing TV coaxial cable lines for internet access.

9
New cards

Cable vs. Fiber (FTTH)

Cable Internet uses coaxial cables, while Fiber-to-the-Home (FTTH) uses optical fiber directly to the user's home, offering typically higher speeds.

10
New cards

Dual-homed

A system or network connected to two separate networks or ISPs, providing redundancy.

11
New cards

Home Network Components

Includes devices like routers, modems, switches, and various end systems (computers, smartphones, smart devices).

12
New cards

Packet-Switching

A network communication method where messages are broken into smaller units called packets, which are then transmitted independently and reassembled at the destination.

13
New cards

Store-and-Forward

A packet-switching technique where a router must receive the entire packet before it can begin transmitting the first bit of the packet onto the outbound link.

14
New cards

Packet Loss Causes

Occurs when packets arrive at a full queue in a router, leading to the packet being dropped.

15
New cards

Network Core Functions

Routing (determining end-to-end paths) and Forwarding (moving packets from a router's input to its output).

16
New cards

Point of Presence (POP)

An access point from one place to the rest of the Internet, often where ISPs connect.

17
New cards

ISP Interconnection Points

ISPs interconnect at Internet Exchange Points (IXPs) or through peering agreements.

18
New cards

Packet Delays (at each router)

Processing delay, queuing delay, transmission delay, and propagation delay.

19
New cards

Transmission Delay vs. Propagation Delay

Transmission delay is the time required to push all packet's bits onto the link, while propagation delay is the time it takes for a bit to travel from one end of the link to the other.

20
New cards

Queuing Delay Causes

Occurs when packets wait in a router's queue for their turn to be transmitted onto the outgoing link, especially when arrival rate exceeds departure rate.

21
New cards

End-to-End Delay

The total time it takes for a packet to travel from the source host to the destination host, including all processing, queuing, transmission, and propagation delays.

22
New cards

Ping Tool

A network utility used to test the reachability of a host and measure the round-trip time (RTT) for messages sent from the originating host to a destination computer.

23
New cards

Traceroute Tool

A network diagnostic tool used to display the path (route) and measure transit delays of packets across an Internet Protocol (IP) network.

24
New cards

Throughput

The rate at which bits are transferred between sender and receiver.

25
New cards

Bottleneck Link

The link in the end-to-end path that has the lowest available throughput, thus limiting the overall data transfer rate.

26
New cards

Internet Protocol Layers

Application, Transport, Network, Link, Physical (from top to bottom).

27
New cards

HTTP Layer

Application layer.

28
New cards

End System Protocol Layers

All five layers: Application, Transport, Network, Link, Physical.

29
New cards

Router Protocol Layers

Network, Link, Physical layers.

30
New cards

Transport Layer Data Unit

Segment.

31
New cards

Link Layer Data Unit

Frame.

32
New cards

Client-Server Architecture (Always-on)

The server side is typically 'always-on'.

33
New cards

Client-Server Architecture (First Contact)

The client side makes the first contact.

34
New cards

Socket

A software endpoint for communication, typically identified by an IP address and a port number.

35
New cards

Socket Addressing Elements

IP address and port number.

36
New cards

Default HTTP Port

Port 80.

37
New cards

Default Apple WAC Port (Back to My Mac)

Port 4500.

38
New cards

Default SSH TCP Port

Port 22.

39
New cards

Application-Level Protocol

Defines how applications running on different end systems pass messages between themselves. Examples include HTTP, SMTP, FTP.

40
New cards

Email Transport Protocol (and reason)

Email (SMTP) uses TCP because it requires reliable data transfer.

41
New cards

UDP Use Cases (lack of reliability)

Applications use UDP when speed and low overhead are more important than guaranteed delivery, such as for streaming multimedia, DNS, or online gaming.

42
New cards

HTTP Message Types

Request messages (sent by clients) and Response messages (sent by servers).

43
New cards

HTTP Protocol State

HTTP is a stateless protocol, meaning the server maintains no information about past client requests.

44
New cards

HTTP Request Message Information

Includes request line (method, URL, HTTP version), header lines (Host, User-Agent, Accept-Language, etc.), and sometimes entity body.

45
New cards

GET vs. POST HTTP Methods

GET requests typically retrieve data and append form data to the URL, while POST requests send data to be processed (e.g., submitting form data) in the message body.

46
New cards

HTTP Response Message Information

Includes status line (HTTP version, status code, phrase), header lines (Date, Server, Last-Modified, Content-Length, Content-Type, etc.), and entity body (requested object).

47
New cards

HTTP Redirect Status Code

3xx series, commonly 301 (Moved Permanently) or 302 (Found).

48
New cards

Redirect New URI Location

In the 'Location:' header field of the HTTP response.

49
New cards

HTTP Status Code 404

Not Found - the requested resource could not be found on the server.

50
New cards

HTTP Status Code 200

OK - the request has succeeded.

51
New cards

Steps to Retrieve HTML (Non-Persistent HTTP)

Client initiates TCP connection -> Client sends HTTP request -> Server sends HTTP response -> Server closes TCP connection -> Client processes response.

52
New cards

Cookie Purpose

To allow websites to store stateful information (e.g., user preferences, login status) on the client side (browser) across multiple HTTP requests.

53
New cards

HTTP Response Cookie Header

'Set-Cookie:'.

54
New cards

HTTP Request Cookie Header

'Cookie:'.

55
New cards

Session vs. Persistent Cookie

A session cookie is deleted when the browser closes, while a persistent cookie is stored on the user's hard drive and remains until its expiration date.

56
New cards

HTTP Status Code 304

Not Modified - the client's cached copy of the resource is still valid, so the server does not need to send the object again.

57
New cards

Last-Modified Header

Indicates the date and time at which the origin server believes the resource was last modified. Used for caching.

58
New cards

HTTP Requests to Proxy Server

All HTTP requests from a client configured to use a proxy server.

59
New cards

Proxy Cache Hit Action

Serves the object directly from its cache to the client and checks if the cached object is up-to-date with the origin server (using conditional GET).

60
New cards

Proxy Cache Miss Action

Sends a request to the origin server, receives the object, forwards it to the client, and stores a copy in its cache.

61
New cards

Proxy Cache Validation

It uses a conditional GET request to the origin server, typically with 'If-Modified-Since' header, using the 'Last-Modified' date of its cached object.

62
New cards

FTP Control Channel Type

Out-of-band control.

63
New cards

Passive vs. Active FTP

In active FTP, the client sends its port to the server and the server initiates the data connection, while in passive FTP, the server tells the client which port to connect to for data, and the client initiates the data connection.

64
New cards

Client-to-Mail Server Protocol

SMTP (Simple Mail Transfer Protocol).

65
New cards

Mail Server-to-Server Protocol

SMTP (Simple Mail Transfer Protocol).

66
New cards

Email Binary Attachments Encoding

Binary attachments are encoded into 7-bit ASCII using mechanisms like MIME (Multipurpose Internet Mail Extensions) before being sent via SMTP.

67
New cards

SMTP Security (Default)

By default, SMTP is not secure; information, including usernames and passwords, is typically not encrypted.

68
New cards

Email Access Protocols

POP (Post Office Protocol), IMAP (Internet Message Access Protocol), and HTTP (for webmail).

69
New cards

Hostname vs. IP Address

A hostname is a human-readable label (e.g., google.com), while an IP address is a numerical label (e.g., 172.217.160.142) that identifies a device on a network.

70
New cards

DNS Resolution vs. TCP Connection

DNS name resolution occurs before the TCP connection setup because the client needs the IP address of the server to initiate the TCP connection.

71
New cards

Canonical Hostname

The true, official name for a host, often distinct from aliases or frequently used names (e.g., www.example.com might have a canonical name like server.example.com).

72
New cards

DNS Load Distribution

A hostname can resolve to multiple IP addresses, and DNS servers can rotate the order of these IP addresses in responses, distributing requests among multiple servers.

73
New cards

Distributed DNS Rationale

A distributed DNS system offers better scalability, reliability (no single point of failure), manageability, and lower traffic volume compared to a centralized system.

74
New cards

Root, TLD, and Authoritative DNS Servers

Root servers point to TLD (Top-Level Domain) servers (.com, .org); TLD servers point to authoritative DNS servers; and authoritative DNS servers hold the DNS records for specific domains (e.g., example.com).

75
New cards

Local DNS Server

A DNS server used by an organization or ISP, acting as a proxy. It receives queries from hosts and forwards them to other DNS servers, and caches results.

76
New cards

Recursive vs. Iterative DNS Query

In a recursive query, a DNS server takes full responsibility to resolve the name, while in an iterative query, a DNS server replies with the name of another DNS server to contact.

77
New cards

DNS Caching Benefits

By storing previously resolved DNS responses, caching reduces the need to query root, TLD, and authoritative servers repeatedly, thus lowering their load and improving resolution speed.

78
New cards

DNS Resource Record Types

A (hostname-IP address mapping), NS (authoritative name server), CNAME (canonical name for an alias), and MX (mail server).

79
New cards

NS RR Value Field

The domain name of the authoritative name server for the indicated domain.

80
New cards

MX RR Name Field

The alias hostname for the mail server (e.g., smtp.example.com).

81
New cards

RR TTL Field

Time To Live - indicates how long (in seconds) the resource record can be cached by a local DNS server.

82
New cards

Multiple RRs in DNS Response

Yes, a single DNS response can contain multiple resource records.

83
New cards

DNS Reply Sections

Question (query being made), Answer (resource records that directly answer the query), Authority (resource records for authoritative servers), and Additional (helper RRs for the authoritative servers).

84
New cards

DNS Attacks

DDoS attacks, Man-in-the-middle attacks, DNS Cache Poisoning, Domain Hijacking.

85
New cards

Transport-Layer Packet Name

Segments.

86
New cards

Internet Transport Layer Protocols

TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).

87
New cards

Transport Layer vs. Network Layer

The transport layer provides logical communication between processes on different hosts, while the network layer provides logical communication between hosts.

88
New cards

TCP Services

Reliable data transfer, connection-oriented service, flow control, congestion control, and byte-stream service.

89
New cards

Multiplexing (Transport Layer)

The process of gathering data from multiple application-layer processes, encapsulating them with header information, and passing them to the network layer.

90
New cards

Demultiplexing (Transport Layer)

The process of delivering segmented data from the network layer to the correct application-layer process on the receiving host, using port numbers.

91
New cards

Port Numbers Location

Transport layer header.

92
New cards

UDP Socket Identification

By the destination IP address and destination port number.

93
New cards

TCP Socket Identification

By the source IP address, source port number, destination IP address, and destination port number (a 4-tuple).

94
New cards

UDP Guarantees

No, UDP provides no guarantees for reliable data transfer, flow control, or congestion control.

95
New cards

Application Protocol Using UDP

DNS or Streaming applications (e.g., VoIP).

96
New cards

UDP for Streaming Rationale

Lower overhead, faster transmission due to no connection setup or retransmission delay, and tolerance for some packet loss.

97
New cards

Adding Reliability to UDP Applications

Reliability must be built into the application layer itself if desired.

98
New cards

UDP Header Size

8 bytes.

99
New cards

Reliable Data Transfer Protocol Responsibility

To ensure that data sent by the sender is delivered correctly and in order to the receiving application process.

100
New cards

TCP Connection-Oriented Meaning

TCP requires a handshake process to establish a connection between two processes before data can be exchanged, and then a teardown process to close it.