• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
Describe TCP
(Transmission Control Protocol)
TCP is a host-to-host connection oriented protocol. It enables 2 hosts to establish a connection and exchange data. Unlike IP, TCP guarantees data packet delivery, and reassembles packets back in the same order they were sent.

TCP provides error detection and recovery, flow control, and guaranteed reliable data delivery.

TCP = Reliable
UDP = Speed
Describe UDP
(User Datagram Protocol)
Nicknamed Thin protocol

UDP Is a connectionless, unreliable, low overhead (faster) protocol than TCP.
UDP is good at getting data from one host to another using lower bandwidth and fewer network resources
UDP is also used when its paired with a service such as NFS which contains its own reliability checks
FTP
(File Transfer Protocol)
FTP allows users to upload or download files between hosts.

FTP offers authentication security
SFTP
(Secure File Transfer Protocol)
SFTP is an interactive command prompt, application and file transfer program similar to FTP. SFTP utility comes with SSH to provide encryption over insecure networks such as the internet. SFTP connects and logs into the specified host, and then uses an interactive command prompt for file transfers. SFTP is used when you want to eliminate the security risks involved in using standard FTP file transfers. Because of security risks FTP should only be used for anonymous logins.
TFTP
(Trivial File Transfer Protocol)
TFTP is similar to FTP in that it facilitates file transfers between computers, However FTP uses TCP and is reliable but slower, and TFTP uses UDP whihc is Faster but not as reliable.
TFTP is a simpler version of FTP and doesnt all users to brows files in a directory.
Because TFTP lacks security its seldom used by users
SMTP
(Simple Mail Transfer Protocol)
SMTP is used to send email. SMTP uses the spooled, or queued method to deliver email. An E-mail is sent to a destination and is spooled to a hard disk drive. The destination e-mail server regularly checks the spooled email queue and when it finds new emails it sends them to their destination
HTTP
(Hypertext Transfer Protocol)
HTTP is a control protocol used to transfer files from a webserver, or client pc to a web browser.
HTTPS
(Secure Hypertext Transfer Protocol)
HTTPS is the secure version of HTTP. HTTPS was developed using netscapes implementation of SSL. HTTPS offers secure message-oriented communications. HTTPS allows browers and servers to sign, authenticate, and encrypt an HTTP network packet. HTTPS uses secure socket layer(SSL) and transport layer security (TSL) protocols for security
POP3/IMAP4
(Post office Protocol version3)/(Internet Message Access Protocol Version4)
POP3 is application layer protocol used to download all the messages into your email application. Can be used with or without SMTP.

IMAP4 allows you to download email, look at or download the message header, store messages in a hierachial structure and link to documents and usenet newsgroups. It also allows you to locate messages based on subject, header, or content. Imap4 also allowsusers to manipulate their email and email folders while away from their main messaging system and to synchronize to their message store one the connection is reestablished. IMAP4 also contains authentication components which support the Kerberos authentication method.
Telnet
Telnet stands for telephone network, because most telnet sessions occur over a dial-up connection. Telnet is a Terminal Emulation program.
SSH(Secure Shell)
SSH is an application program used to log into another computer on a network, execute commands, and transfer files. SSH offers secure data transfer unlike rlogin, telnet, or FTP.
SSH is actually a Suite of protocols (slogin, ssh, and scp) and requires the server and client are both running SSH software. SSH use the RSA public-key encryption technology authentication method and can be used on WIN, UNIX, and MAC computers.
ICMP
(Internet Control Message Protocol)
ICMP works with IP at Layer3 to provide network layer management and control. Routers send ICMP control messages in response to undeliverable datagrams. The receiving router places an ICMP message into an IP datagram and sends the datagram back to the source. ICMP provides feedback about network connectivity problems and the processing of datagrams but DOES NOT guarantee reliable delivery. ICMP is built into most NOS such as Windows, UNIX, and Novell.
ARP/RARP
(Address Resolution Protocol)/(Reverse Address Resolution Protocol)
ARP is a network layer protocol that resolves IP addresses into MAC addresses

RARP uses MAC address to discover IP address. The host broadcast its MAC address and the RARP server responds with the host's IP address
NTP
(Network Time Protocol)
NTP is an internet standard application protocol that sets computer clocks to a standard time source.
NNTP
(Network News Transport Protocol)
NNTP is an application Layer protocol used for the distribution, inquiry, retrieval, and posting of news articles and USENET messages.