1/41
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Internet Protocols
A set of rules that allow computers and other devices to communicate over the Internet.
Internet Protocol (IP)
Assigns unique addresses to devices on the internet to ensure correct data delivery.
Internet Protocol Address (IP Address)
A unique identifier assigned to a device in a network, similar to a house address.
Dividing Data into Packets
Splitting information into smaller units.
Addressing
Assigning a destination to each packet.
Routing
Sending packets through various paths to the destination.
Reassembly
Putting packets back together at the destination.
Handling Missing Packets
Managing lost or corrupted data.
Dividing Data into Packets
Addressing
Routing
Reassembly
Handling Missing Packets
5 Step by step working of internet protocol:
TCP/IP
The fundamental protocol for communication between devices over the Internet.
Transmission Control Protocol (TCP)
Ensures data is accurately transmitted and received.
Internet Protocol (IP)
Defines addressing and routing of data.
Enables communication between different networks.
Works for small and large networks.
Uses open standards for compatibility.
Ensures reliable data transfer with error-checking.
4 Advantages of Transmission Control Protocol/Internet Protocol (TCP/IP)
Complex configuration.
Lacks built-in security.
Inefficient for small networks.
3 Disadvantages of Transmission Control Protocol/Internet Protocol (TCP/IP)
Simple Mail Transfer Protocol (SMTP)
Application-layer protocol used for sending and relaying emails.
Sends emails through a Mail Transfer Agent (MTA).
Uses request and response messages.
Notifies the recipient upon email arrival.
3 Step by Step Working of SMTP:
End-to-End Method
Store-and-Forward Method
2 SMTP Models:
End-to-End Method
An SMTP Model that is used between different organizations.
Store-and-Forward Method
An SMTP Model that is used within an organization.
Supports bulk emailing.
Reliable email delivery.
Allows email tracking.
3 Advantages of SMTP
Can be blocked by firewalls.
Lacks strong security.
Limited character set (7-bit ASCII).
3 Disadvantages od SMTP:
Point-to-Point Protocol (PPP)
A data link layer protocol used to establish direct network connections.
Flag
Address
Control
Protocol
Data
FCS (Frame Check Sequence)
6 PPP Frame Format:
Flag
Determine the PPP Frame Format:
Marks the start and end of a frame.
Address
Determine the PPP Frame Format:
Typically set to broadcast.
Control
Determine the PPP Frame Format:
Default unnumbered frame.
Protocol
Determine the PPP Frame Format:
Identifies encapsulated data.
Data
Determine the PPP Frame Format:
Contains actual information.
FCS (Frame Check Sequence)
Determine the PPP Frame Format:
Error-checking mechanism.
File Transfer Protocol (FTP)
A protocol for transferring files between a client and a server.
Anonymous FTP
Types of FTP:
Allows public access without credentials.
Password Protected FTP
Types of FTP:
Requires authentication.
FTP Secure (FTPS)
Types of FTP:
Uses encryption for security.
FTP over Explicit SSL/TLS (FTPES)
Types of FTP:
Encrypts commands and data transfer.
Secure FTP (SFTP)
Types of FTP:
Uses SSH for secure file transfers.
Control Connection - Manages session commands.
Data Connection - Transfers files.
2 Types of FTP Connections:
Control Connection
Types of FTP Connections:
Manages session commands.
Data Connection
Types of FTP Connections:
Transfers files.
Port 21 - Used for command control.
Port 20 - Used for data transfer.
2 FTP Ports:
Port 21
FTP Ports:
Used for command control.
Port 20
FTP Ports:
Used for data transfer.