1.4.1: TCP/IP Protocol Suite

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

network service protocol: allows devices to receive configuration information from a central server; without this protocol, you would have to visit each computer on a network to manually configure an address

DHCP

how does DHCP work

DHCP's central server assigns addressing and configuration information to each device that connects to the network

network service protocol: allows you to use hostnames to identify computers (ex. www.testout.com) - the logical name (URL) you type in identifies a web server, and when you use this name you initiate the HTTP protocol to read the information that's on the server

DNS

used to transfer a file between computers - uses TCP

File Transfer Protocol (FTP)

used by internet browsers to request information from website servers

HTTP

the same as HTTP, but with a security protocol added

HTTPS

control protocol: can be used to detect which devices are on the network - commonly used to verify that a network host is up and running and that it is reachable over the network medium

Internet Control Message Protocol (ICMP)

control protocol: establishes multicast group memberships, which allow a computer to send a single network packet to multiple hosts on the network at the same time

Internet Group Management Protocol (IGMP)

mail stored on the email server, allowing a user to access their messages from multiple devices

Internet Message Access Protocol (IMAP)

network service protocol: allows users to access directory service information for users on their network, such as name, phone number, and email address

Lightweight Directory Access Protocol (LDAP)

network service protocol: allows devices to synchronize their clocks through a network

Network Time Protocol (NTP)

downloads email messages from the email server and saves them on the client

Post Office Protocol Version 3 (POP3)

used to send mail between email servers - allows you to send emails to addresses that aren't in your domain as long as both email services are using this protocol

SMTP

network management protocol: allows users to access network devices remotely - a secure alternative to TELNET

Secure Shell (SSH)

securely transfer files across a network

Secure file transfer protocol (SFTP) and secure copy protocol (SCP)

network management protocol: lets network administrators set up alerts to monitor the state of the network (ex. you can use this to check storage space on a network shared storage drive)

Simple Network Management Protocol (SNMP)

Examples of UDP

Streaming services

the most commonly used network protocol suite today is the

TCP/IP suite

network management protocol: allows users to access network devices remotely - developed in the 1960s and used for some time, but not really used anymore because it is not secure

TELNET

network management protocols: allow users to access network devices remotely

TELNET and SSH

more advanced version of SSL

TLS

used to transfer a file between computers - uses UDP

Trivial File Transfer Protocol (TFTP)

the advantage of using POP3 is that

after downloading you can access your email even when offline

TCP is

connection-oriented

UDP is

connectionless

both SSL and TLS protect data from wiretapping and other attacks by

encrypting data while it travels between the client and server

services that require a high degree of ____________ use TCP (ex. _____________)

fidelity, email server/file server

a port is just a

part of a protocol

a port represents a

post office box

a standard for how to act or communicate

protocol

a group of protocols that are used together are called a

protocol suite

security for the HTTPS protocol is created by one of two security protocols - either

secure socket layer (SSL) or transport layer security (TLS)

All of the other protocols in the TCP/IP suite work in conjunction with either

the TCP or UDP protocol

when information is transmitted using TCP, the computer does its best to make sure _________________________, which it does by requiring the receiving computer to acknowledge each packet it receives from the sender

the data is transmitted with no errors

UDP may fail to deliver all the packets of data, but it

transfers data quickly

the most important transport protocol is

transmission control protocol (TCP)

TCP/IP stands for

transmission control protocol/internet protocol

you can communicate with other computers over a network if you

use the same network protocols


Ensembles d'études connexes

Business Law and Ethics Final Review True/False

View Set

HCC 2: Fluids/Electrolytes Assessment

View Set

Vocabulario- Benchmark (Unidad 2)

View Set

CAPA : Potatoes, Grains, and Pastas

View Set

Psych Midterm review (college board 2 and 3)

View Set

Module 4: Oral and Topical Medications

View Set

Linux Security 1st In-Class Exam

View Set

text chapter 7 quiz natural disasters

View Set

CH 2: Project Selection and Prioritization Pt 2

View Set

Chapter 36 Geriatric & Hospice Care

View Set