1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Internet Protocols
These are the sets of rules governing communication within and between computers on a network.
Protocols
Requires messages to arrive within a certain amount of time so that computers do not wait indefinitely for messages that may have been lost.
IP Address
FOUR MAIN ITEMS FOR INTERNET CONNECTIVITY:
Host's identity on the internet.
Subnet Mask
FOUR MAIN ITEMS FOR INTERNET CONNECTIVITY:
Size of Host's network
Default Gateway
FOUR MAIN ITEMS FOR INTERNET CONNECTIVITY:
Router's IP Address
Subnet Mask
FOUR MAIN ITEMS FOR INTERNET CONNECTIVITY:
Size of Host's network
Default Getaway
FOUR MAIN ITEMS FOR INTERNET CONNECTIVITY:
Router's IP Address
DNS Server IP(s)
FOUR MAIN ITEMS FOR INTERET CONNECTIVITY:
Translate domain names to IP's
Identifying Errors
Compressing the Data
Deciding how the data should be sent
Addressing the data
Deciding how to announce sent and received data
What are the main functions of protocols?
TCP/IP or Transmission Control Protocol/Internet Protocol
Suite of protocols has become the dominant standard for internetworking. It represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks.
IPX/SPX or Internetwork Packet Exchange/Sequenced Packet Exchange
It is the protocol suite originally employed by Novell Corporation's network operating system, Netware.
NetBEUI
It is a protocol used primarily on small Windows NT networks.
AppleTalk
It is a protocol suite used to network Macintosh computers. It is composed of a comprehensive set of protocols that span the seven layers of the Open System Interconnections (OSI) reference model.
HTTP or HyperText Transfer Protocol
It governs how files such as text, graphics, sound, and video are exchanged on the World Wide Web (WWW).
FTP or File Transfer Protocol
Provides services for file transfer and manipulation. It also allows multiple simultaneous connections to remote file systems.
SSH or Secure Shell
Used to securely connect to a remote computer.
TelNet
It is an application used to connect to a remove computer that lacks security features.
POP or Post Officer Protocol
Is used to download e-mail from a remote mail server.
IMAP or Internet Message Access Protocol
Is also used to download e-mail from a remote mail server.
SMTP or Simple Mail Transfer Protocol
Is used to send e-mail to a remove e-mail server.