|
|
Created by shepworth.sh
over 11 years ago
|
|
| Question | Answer |
| What does TCP/IP stand for? | Transmission Control Protocol/Internet Protocol |
| what does ARPA stand for? | Advanced Research Projects Agency |
| _________/________ layer defines protocols for node-to-node application communication and controls user-interface specifications | Process/Application |
| The ____-__-____layer parallels the functions of the OSI’s Transport layer, defining protocols for setting up the level of transmission service for applications. It tackles issues like creating reliable end-to-end communication and ensuring the error-free delivery of data. It handles packet sequencing and maintains data integrity. | Host-to-Host |
| The _______ ______ corresponds to the OSI’s Network layer, designating the protocols relating to the logical transmission of packets over the entire network | Internet layer |
| The ______ _______ layer implements the data exchange between the host and the network. The equivalent of the Data Link and Physical layers of the OSI model, the Network Access layer oversees hardware addressing and defines protocols for the physical transmission of data. | Network Access |
| _______ allows a user on a remote client machine, called the ______ client, to access the resources of another machine, the ______ server, in order to access a command-line interface. There are no encryption techniques | Telnet |
|
Image:
Telnet.PNG (image/PNG)
|
Image:
Telnet.PNG (image/PNG)
|
| _______ ______ protocol sets up a secure session that’s similar to Telnet over a standard TCP/IP connection and is employed for doing things like logging into systems, running programs on remote systems, and moving files from one system to another. And it does all of this while maintaining an encrypted connection. | Secure Shell (SSH) |
| ____ _______ ______ actually lets us transfer files, and it can accomplish this between any two machines using it. _ _ _ isn’t just a protocol; it’s also a program. Operating as a protocol, _ _ _ is used by applications. | File Transfer Protocol (FTP) |
| ______ ____ _______ _______is the stripped-down, stock version of FTP, but it’s the protocol of choice if you know exactly what you want and where to find it because it’s fast and it can only send and receive files | Trivial File Transfer Protocol (TFTP) |
|
Image:
TFTP.PNG (image/PNG)
|
Image:
TFTP.PNG (image/PNG)
|
| _______ _______ _______ _______collects and manipulates valuable network information. Gathers data by polling the devices on the network from a network management station (NMS) at fixed or random intervals. Requiring them to disclose certain information, or even asking for certain information from the device. | Simple Network Management Protocol (SNMP) |
| When all is well, _ _ _ _ receives something called a baseline—a report delimiting the operational traits of a healthy network. This protocol can also stand as a watchdog over the network, notifying managers of any sudden turn of events. These network watchdogs are called agents, and when aberrations occur, agents send an alert called a trap to the management station. | Simple network management protocol SNMP |
| _ _ _ _ manage communications between web browsers and web servers and opens the right resource when you click a link, wherever that resource may actually reside. | Hypertext Transfer Protocol |
| (URL), which we usually refer to as a web address. What does URL stand for? | Uniform Resource Locator |
| _ _ _ _ _ is what your browser needs to fill out forms, sign in, authenticate, and encrypt an HTTP message when you do things online like make a reservation, access your bank, or buy something. | Hypertext Transfer Protocol Secure (HTTPS) |
| _______ _______ _______ works by synchronizing devices to ensure that all computers on a given network agree on the time. | Network Time Protocol (NTP) |
| ______ ______ _______resolves hostnames— such as www.google.com. | Domain Name Service (DNS) |
|
Image:
DNS.PNG (image/PNG)
|
Image:
DNS.PNG (image/PNG)
|
| An important thing to remember about DNS is that if you can ping a device with an IP address but cannot use its FQDN, then you might have some type of DNS configuration failure. | An important thing to remember about DNS is that if you can ping a device with an IP address but cannot use its FQDN, then you might have some type of DNS configuration failure. |
| _________ ______ ________ ________ assigns IP addresses to hosts. | Dynamic Host Configuration Protocol (DHCP) |
| Common types of information a DHCP server can provide are? | IP address Subnet mask Domain name Default gateway (routers) DNS server address WINS server address |
| A client that sends out a DHCP _________ message in order to receive an IP address sends out a broadcast at both layer 2 and layer 3 | Discover |
| DHCP is ______________, which means it uses User Datagram Protocol (UDP) at the Transport layer, also known as the Host-to-Host layer. | Connectionless |
| 1. The DHCP client broadcasts a DHCP Discover message looking for a DHCP server(Port 67). 2. The DHCP server that received the DHCP Discover message sends a layer 2 unicast DHCP Offer message back to the host. 3. The client then broadcasts to the server a DHCP Request message asking for the offered IP address and possibly other information. 4. The server finalizes the exchange with a unicast DHCP Acknowledgment message. | 1. The DHCP client broadcasts a DHCP Discover message looking for a DHCP server(Port 67). 2. The DHCP server that received the DHCP Discover message sends a layer 2 unicast DHCP Offer message back to the host. 3. The client then broadcasts to the server a DHCP Request message asking for the offered IP address and possibly other information. 4. The server finalizes the exchange with a unicast DHCP Acknowledgment message. |
| The main purpose of the____ __ ____ layer is to shield the upper-layer applications from the complexities of the network. | Host-to-Host |
| ________ _________ ________takes large blocks of information from an application and breaks them into segments. It numbers and sequences each segment so that the destination’s _ _ _ stack can put the segments back into the order the application intended. After these segments are sent on the transmitting host, TCP waits for an acknowledgment of the receiving end’s TCP virtual circuit session, retransmitting any segments that aren’t acknowledged. | Transmission Control Protocol (TCP) |
| Before a transmitting host starts to send segments down the model, the sender’s TCP stack contacts the destination’s TCP stack to establish a ________. This creates a ______ circuit, and this type of communication is known as connection-oriented. During this initial handshake, the two TCP layers also agree on the amount of information that’s going to be sent before the recipient’s TCP sends back an acknowledgment. | Connection Virtual |
| _ _ _ does not sequence the segments and does not care about the order in which the segmentsarrive at the destination. _ _ _ just sends the segments off and forgets about them. | (UDP) User datagram Protocol |
| UDP is considered a ______________ protocol | Connectionless |
|
Image:
TCP_segement.PNG (image/PNG)
|
Image:
TCP_segement.PNG (image/PNG)
|
|
Image:
UDP_segement.PNG (image/PNG)
|
Image:
UDP_segement.PNG (image/PNG)
|
| ___ and ___ must use port numbers to communicate with the upper layers because these are what keep track of different conversations crossing the network simultaneously | TCP and UDP |
| ______ ______ that don’t use an application with a well-known port number are assigned port numbers randomly from a specific range instead. These port numbers identify the source and destination application or process in the TCP segment. | Virtual circuits |
| - Numbers below 1024 are considered well-known port numbers and are defined in RFC 3232. -Numbers 1024 and above are used by the upper layers to set up sessions with other hosts and by TCP and UDP to use as source and destination addresses in the segment. | - Numbers below 1024 are considered well-known port numbers and are defined in RFC 3232. -Numbers 1024 and above are used by the upper layers to set up sessions with other hosts and by TCP and UDP to use as source and destination addresses in the segment. |
| TCP and the upper layers don’t use hardware and logical addresses to understand the sending host’s address as the Data Link and Network layer protocols do. Instead, they use ____ _________. | port numbers |
| A “___” packet is sent to the destination device. This Synch sequence is what’s used to inform the remote destination device that it wants to create a session. | SYN |
| Notice the ___ is valid, which means that the source port was accepted and the device agreed to create a virtual circuit with the originating host | Ack |
| Session __________ is used by both TCP and UDP and basically allows a single computer, with a single IP address, to have multiple sessions occurring simultaneously. just like having multiple browser sessions open | multiplexing |
| Internet Protocol (IP) essentially is the ________ layer. | Internet |
| _______ _______ looks at each packet’s address. Then, using a routing table, it decides where a packet is to be sent next, choosing the best path to send it upon. | Internet Protocol |
| The _____ field is typically a Protocol field. If the header didn't carry the protocol information for the next layer, IP wouldn't know what to do with the data carried in the packet. | Type |
| In this example, the Protocol field tells IP to send the data to either TCP port 6 or UDP port 17. But it will be UDP or TCP only if the data is part of a data stream headed for an upper-layer service or application. It could just as easily be destined for Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP), or another type of Network layer protocol. | |
| ______ _______ _______ ______ works at the Network layer. _ _ _ _ is basically a management protocol and messaging service provider for IP. Its messages are carried as IP datagrams. | Internet Control Message Protocol (ICMP |
| ICMP packets have the following characteristics: They can provide ______ with information about network problems. They are __________ within IP datagrams. | hosts encapsulated |
| ___________ _________ is sent If a router can’t send an IP datagram any further, it uses ICMP to send a message back to the sender, advising it of the situation. | Destination unreachable |
| _______ ____/______ _______ will happen If a router’s memory buffer for receiving incoming datagrams is full, it will use ICMP to send out this message alert until the congestion abates. | Buffer full/source quench |
| _____/____ _______ Each IP datagram is allotted a certain number of routers, called hops, to pass through. If it reaches its limit of hops before arriving at its destination, the last router to receive that datagram deletes it. The executioner router then uses ICMP to send an obituary message, informing the sending machine of the demise of its datagram. | Hops/time exceeded |
| _____ ______ _____ ______ uses ICMP echo request and reply messages to check the physical and logical connectivity of machines on an internetwork. | Ping Packet Internet Groper (Ping) |
| ___________ Using ICMP time-outs, it's used to discover the path a packet takes as it traverses an internetwork | Traceroute |
| All segments or data must go through _______ ________ | Internet Protocol |
| _______ ________ ________finds the hardware address of a host from a known IP address. | Address Resolution Protocol (ARP) |
| ____ resolves IP addresses to Ethernet (MAC) addresses | ARP |
| A ___ is one digit, either a 1 or a 0. | Bit |
| A _____ is 7 or 8 bits, depending on whether parity is used. | Byte |
| 1-126 Class A Public IP 128-191 Class B Public IP 192-223 Class C Public IP 224-239 Class D Multicast address 240-255 Class E | 1-126 Class A Public IP 128-191 Class B Public IP 192-223 Class C Public IP 224-239 Class D Multicast address 240-255 Class E |
| ______ is an address for a single interface, and is used to send packets to a single destination host. | Unicast |
| _________ are packets sent from a single source and transmitted to many devices on different networks. Referred to as “one-to-many.” | Multicast |
| A _______ is defined as a single IP address that’s assigned to a network interface card and is the destination IP address in a packet | Unicast |
| _________ enables multiple recipients to receive messages without flooding the messages to all hosts on a broadcast domain. | Multicast |
| ________ differs from broadcast messages—with _________communication, copies of packets, in theory, are sent only to subscribed hosts. | Multicast |
| ________ _______ is a connectionless protocol that provides network address and routing through an internetwork | Internet Protocol (IP) |
Want to create your own Flashcards for free with GoConqr? Learn more.