MTA 98-366, Chapter 4: Core TCP/IP Protocols

¡Supera tus tareas y exámenes ahora con Quizwiz!

(TFTP) Trival File Transfer Protocol

A scaled down version of FTP. TFTP uses UDP as its transport protocol which reduces overhead and keeps traffic to a minimum. Network administrators often use TFTP when transferring configuration files to network devices such as routers and switches.

Remote Desktop Services (RDS)

Can host applications or entire desktops that are accessible to users on a network. Also known as terminal services. TCP 3389.

Hyper Text Transfer Protocol (HTTP)

Defines how files on the World Wide Web (WWW) are formatted, transmitted, and rendered in web browsers. Most sites use encryption to protect data in transmission. HTTP over SSL HTTPS provides this protection.

Secure Sockets Layer (SSL)

Encryption protocol used for wide assortment of purpose. Encrypts data into Cipher text. Ensures integrity by checking the data at different points to ensure it has not been modified. Ensures that computer prove their identity based on their identity access can be granted or denied.

Difference between TCP and UDP

TCP provides guaranteed delivery with acknowledgments, sequence numbers , and flow control. UDP provides best effort delivery without guarantee.

TCP guaranteed Delivery process

TCP uses an error checking process called a cyclical redundancy check CRC. if any of the segments are missing or corrupt, Sally's computer sends a negative acknowledge NACK packet instead, requesting the missing or corrupt segment. If the sending computer receives a NACK, it re transmits the segments in the sliding window. Eventually, Sally's computer will receive all the segments and be able to reassemble them into the original MP3 file sent by Bob's computer.

Telnet

Telnet is a command-line interface that allows bidirectional communication with network devices and other systems on the network. As a command-line interface, all commands are typed at a command prompt instead of using point-and-click methods within a Windows graphical user interface (GUI).

Understanding TCP/UDP

This chapter presents many of the more popular protocols with a high-level overview of these protocols and their purpose. It's important to understand the basics of TCP and UDP, such as which one is connection-oriented and which is connection-less. However, you don't need in-depth knowledge of the common protocols other than understanding their primary purpose. Many common protocols also use specific ports identified as well-known ports. You should also have a good understanding of how ports work and the well-known ports used with specific protocols.

File Transfer Protocol (FTP)

Used to upload and download files to and from computers on the internet and on some internal networks. FTP uses TCP for guaranteed delivery.

(ARP) Address Resolution Protocol

Uses broadcast transmissions to identify the Media Access Control MAC address of computers. The IP address routes the traffic to the correct subnet. When the destination subnet is reached, ARP protocol broadcast the IP address to all computers on the subnet. When a computer resolves a MAC address using ARP, It stores it in cache for two to ten minutes, depending on the operating system. If it wants to communicate with them again then it doesn't have to send another ARP request.


Conjuntos de estudio relacionados

Chapter 17/3: Florida General Regulations Continued

View Set

Chapter Exam - Life Premiums and Benefits

View Set

Exam 3 Online Quiz Questions (18e)

View Set

Chapter 17 - Process Cost Systems

View Set

Unit 15: The Real Estate Market and Analysis

View Set

Chapter 16 and 19 Mastering Biology

View Set

ATI Nurse Logic: Priority Setting Frameworks

View Set