PROTOCOLS DEFINITIONS - Unit 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

Connection-oriented communication

data delivery is guaranteed, higher overhead, more bandwidth, like TCP

2
New cards

Connectionless communication

information is just sent with no confirmation, used in streaming audio and video, like UDP

3
New cards

Internet Protocol (IP)

used to transport data from one node on a network to another, performs fragmentation and reassembly tasks for network transmissions, addressing; connectionless; operates at network layer

4
New cards

Transmission Control Protocol (TCP)

establishes mutually acknowledged sessions between 2 hosts before communication takes place, reliable IP connections with flow control, sequencing, error detection and correction; connection-oriented; transport layer

5
New cards

3 way handshake

TCP - sends SYN to target host, target host sends ACK, original host sends ACK

6
New cards

User Datagram Protocol (UDP)

brother of TCP but doesnt guarantee delivery like TCP; connectionless protocol; transport layer

7
New cards

Internet Control Message Protocol (ICMP)

works with IP layer to provide error checking and report functionality; has ping utility which sends echo request to another device and if device and connection is working, it responds with an echo reply;

8
New cards

TTL (time to live) (ICMP)

every message on the network has TTL - like a countdown. If it takes too long to arrive, ICMP makes it an expired message

9
New cards

Source quench (ICMP)

sender slows down rate of data sent for receiving host to handle and digest

10
New cards

Internet Protocol Security (IPsec)

provides secure communications between systems such as communication in same network and external networks; IP layer security protocol that can encrypt and authenticate network transmissions; provides data verification, protection from data, and private transactions; operates at network layer; Has AH and ESP

11
New cards

Authentication Header (AH) (IPsec)

authentication and integrity checking for data packets

12
New cards

Encapsulating Security Payload (ESP) (IPsec)

encryption services

13
New cards
Generic Routing Encapsulation (GRE)
tunneling encapsulating protocol used to wrap data and securely send across VPNs and Point to Point links
14
New cards

Encapsulation (GRE)

data packets from source network is encapsulated within GRE header and new IP header before transmitted over IP network
15
New cards

GRE headers

contains fields such as protocol type, key field for security purposes, and sequence number field for packet ordering
16
New cards

New IP Header (GRE)

new header specifies source and destination IP addresses of tunnel endpoints as well as protocol type and TTL field to prevent infinite routing (default 64 hops for macOS/Linux & 128 hops for Windows)
17
New cards

Decapsulation (GRE)

GRE encapsulated packets are decapsulated to extract original packets
18
New cards
File Transfer Protocol (FTP)
uploading and downloading of files from a remote host running FTP server software, as well as viewing content of folder and renaming and deleting files and directories; used to distribute files to general public over networks like the Internet; sends info unencrypted; application layer protocol;
19
New cards

FTP Server

using a computer to log into another computer
20
New cards

Telnet

virtual terminal protocol that enables sessions to be opened on a remote host; used to access UNIX and Linux systems

21
New cards
Secure File Transfer Protocol (SFTP)
uses Secure Shell (SSH) technology to provide authentication between sender and receiver and encryption capabilities
22
New cards
Secure Shell (SSH)
secure alternative to Telnet by encrypting data as it travels between systems
23
New cards
Simple Mail Transfer Protocol (SMTP)
defines how mail messages are sent between hosts; uses TCP connections to guarantee error free delivery of messages; used to send and receive mail
24
New cards
Domain Name System (DNS)
turns hostnames like www.google.com to IP addresses
25
New cards
Dynamic Host Configuration Protocol (DHCP)
automatically assigns IP addresses to devices on a network
26
New cards
Trivial File Transfer Protocol (TFTP)
variation of FTP that is a connectionless file transfer method; uses UDP; application layer
27
New cards
Hypertext Transfer Protocol (HTTP)
enables text, graphics, multimedia, and other materials to be downloaded from HTTP server; connection-oriented protocol that uses TCP as transport protocol; insecure
28
New cards
Network Time Protocol (NTP)
part of TCP/IP protocol that facilitates communication and synchronization of time between sequences; uses UDP
29
New cards
Simple Network Management Protocol (SNMP)
uses port 161 to send data and port 162 to receive data; facilitates network management functionality to central system
30
New cards

SNMP Manager (or NMS – Network Management System)

• The central controller in an SNMP setup.

• Sends Get and Set requests to devices and receives status info.

• Can receive Trap alerts (unsolicited messages from agents).

•Used to monitor devices like routers, switches, printers, etc.

31
New cards
Lightweight Directory Access Protocol (LDAP)
protocol to access and query directory services systems; UNIX/Linux or Microsoft Active Directory based; uses port 389 by default with secure version using port 636
32
New cards
Hypertext Transfer Protocol Secure (HTTPS)
secure version of HTTP where data is encrypted using Transport Layer Security (TLS), formerly known as Secure Sockets Layer (SSL); both client and server need to support it to be used
33
New cards

Server Message Block (SMB)

used on network for providing access to resources like files, printers, ports, etc that run on Windows; operates at application layer

34
New cards

Syslog

UNIX/Linux based systems, network devices, and printers use it for message logging; used for security, troubleshooting, or management reasons; syslog server listens for and logs data messages coming from syslog client

35
New cards

Simple Mail Transfer Protocol Secure (SMTPS)

uses TLS to provide authentication of communication partners along with data integrity and confidentiality by wrapping SMTP data in TLS

36
New cards

Lightweight Directory Access Protocol over SSL (LDAPS)

adds more security to LDAP; compared to LDAP, upon connection, client and server establishes a TLS session before any LDAP messages are transferred and LDAPS connection closes if TLS closes

37
New cards

Structured Query Language (SQL) Server

SQL allows queries to be configured in real time and passes to database servers; uses port 1433 by default with Oracle’s SQLnet using port 1521 and default port for MySQL is 3306

38
New cards

Remote Desktop Protocol (RDP)

used in Windows environment for remote connections; provides a way for client system to remotely connect to a server by operating on the server as if it were a local client application

39
New cards

Voice over IP (VoIP)

enables regular voice convos to occur by traveling through IP packets and via Internet

40
New cards

Session Initiation Protocol (SIP)

application layer protocol designed to establish and maintain multimedia sessions such as video conferencing and online gaming; uses either TCP or UDP; includes security services and encryption

41
New cards

Content Delivery Network (CDN)

globally distributed network of proxy servers used to speed up the process of getting data from one place to another by caching data

42
New cards

Virtual Pritvate Network (VPN)

secure private data traversing a public network by encrypting communication

43
New cards

Quality of Service (QoS)

manages bandwidth priority for applications and can be configured in routers, switches, and firewalls

44
New cards

Address Resolution Protocol (ARP)

data link layer; map an IP address to a physical MAC address

45
New cards

Internet Key Exchange (IKE) (IPsec)

secure connections, encryption, exchange cryptographic keys