Internet Protocol

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Internet Protocol (IP)

  • is a set of rules that allows devices to communicate with each other over the Internet.

  • It is like the address system used for sending data.

2
New cards

IP address

  • A unique address that identifies the device over the network.

  • It is almost like a set of rules governing the structure of data sent over the Internet or through a local network.

3
New cards

Dividing Data into Packets

  • When you send information over the internet, IP split it into small parts called packets

  • Each packet contains a piece of the data and the address of where it needs to go.

4
New cards

Addressing

  • Every device connected to the internet has its own IP address.

  • This address helps identify where the data is being sent from and where it should be delivered

5
New cards

Routing the Packets

  • As the packets travel across the internet, they pass through several devices called routers.

  • These routers help direct the packets toward the correct destination, like how mail is sorted at different post offices.

6
New cards

Reassemble the Data

  • Once all the packets arrive at the destination, they are put back together to recreate the original message or file

7
New cards

Handling Missing Packets

If some packets don’t arrive, the system can request that they be sent again, making sure the complete data is received

8
New cards

Types of Internet Protocol

  • TCP/IP

  • SMTP

  • PPP

  • FTP

  • SFTP

  • HTTP

  • HTTPS

  • TELNET

  • POP

  • IPv4

  • IPv6

  • ICMP

  • UDP

  • IMAP

  • SSH

  • Gopher

9
New cards

Transmission Control Protocol/ Internet Protocol

the IP protocol ensures that each computer that is connected to the Internet is having a specific serial number called the IP address.

  • also known as a connection-oriented protocol.

  • It specifies how data is exchanged over the internet and how it should be broken into IP packets.

10
New cards

Simple Mail Transfer Protocol

  •  is important for sending and distributing outgoing emails

  • This protocol uses the header of the mail to get the email id of the receiver and enters the mail into the queue of outgoing mail.

11
New cards

Point-to-Point Protocol

is a communication protocol that is used to create a direct connection between two communicating devices.

12
New cards

File Transfer Protocol

  • This protocol is used for transferring files from one system to the other.

  • This works on a client-server model.

13
New cards

Secure File Transfer Protocol

  • also known as SSH FTP refers to File Transfer Protocol (FTP)

  •  it encrypts both commands and data while in transmission.

  • acts as an extension to SSH and encrypts files and data then sends them over a secure shell data stream.

14
New cards

Hyper Text Transfer Protocol

  • is used to transfer hypertexts over the internet and it is defined by the www(world wide web) for information transfer.

  • This protocol defines how the information needs to be formatted and transmitted.

15
New cards

HyperText Transfer Protocol Secure

  •  is an extension of the Hypertext Transfer Protocol (HTTP).

  • It is used for secure communication over a computer network with the SSL/TLS protocol for encryption and authentication.

16
New cards

Terminal Network

  • is a standard TCP/IP protocol used for virtual terminal service given by ISO.

  • This enables one local machine to connect with another.

  • The computer which is being connected is called a remote computer

  • which is connecting is called the local computer.

17
New cards

Post Office Protocol 3

  • It has two Message Access Agents (MAAs) where one is client MAA (Message Access Agent) and another is server MAA(Message Access Agent) for accessing the messages from the mailbox.

18
New cards

IPv4

  • The fourth and initially widely used version of the Internet Protocol

  • It is the most popular version of the Internet Protocol and is in charge of distributing data packets throughout the network.

19
New cards

IPv6

  • The most recent version of the Internet Protocol

  • A maximum of 4.3 billion unique addresses are possible with IPv4’s 32-bit addresses.

20
New cards

Internet Control Message Protocol - ICMP

  • is a network protocol that is used to send error messages and operational information about network conditions.

  • It is an integral part of the Internet Protocol (IP) suite and is used to help diagnose and troubleshoot issues with network connectivity

21
New cards

User Datagram Protocol - UDP

  • is a connectionless, unreliable transport layer protocol.

  • Unlike TCP, it does not establish a reliable connection between devices before transmitting data, and it does not guarantee that data packets will be received in the order they were sent or that they will be received at all.

22
New cards

Internet Message Access Protocol

  • Is a protocol used for retrieving emails from a mail server.

  • It allows users to access and manage their emails on the server, rather than downloading them to a local device.

23
New cards

Secure Shell

  • is a protocol used for secure remote login and other secure network services.

  • It provides a secure and encrypted way to remotely access and manage servers, network devices, and other computer systems

24
New cards

Gopher

  •  a type of file retrieval protocol that provides downloadable files with some description for easy management, retrieving, and searching of files.