• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
protocol
is a set of standards for communicationbetween network hosts. Protocols often provide services, such as e-mail or filetransfer. Most protocols are not intended to be used alone, but instead rely onand interact with other dependent or complimentary protocols. A group ofprotocols that is intended to be used together is called a protocol suite.
HyperText Transfer Protocol (HTTP)
HTTP is used by Web browsers and Web servers to exchange files (such as Web pages) through the World Wide Web and intranets.HTTP can be described as an information requesting and responding protocol. Itis typically used to request and send Web documents, but is also used as theprotocol for communication between agents using different TCP/IP protocols.
Web browsing
HTTP over SSL (HTTPS)
HTTPS is a secure form of HTTP that uses SSL to encrypt data before it is transmitted.
Web browsing

Secure Sockets Layer (SSL)

SSL secures messages being transmitted on the Internet. It uses RSA for authentication and encryption. Web browsers use SSL(Secure Sockets Layer) to ensure safe Web transactions. URLs that begin with https:// trigger your Web browser to use SSL.

Security protocols

Transport Layer Security (TLS)

TLS ensures that messages being transmitted on the Internet are private and tamper proof. TLS is implemented through two protocols: · TLS Record--Can provide connection security with encryption (with DES for example). · TLS Handshake--Provides mutual authentication and choice of encryption method. TLS version 1.2 (TLS1.2) is an updated version which improves on past security flaws found in TLS 1.0 and 1.1

Security protocols

File Transfer Protocol (FTP)

FTP provides a generic method of transferring files. It can include file security through usernames and passwords, and it allows file transfer between dissimilar computer systems. FTP can transfer both binary and text files, including HTML, to another host. FTP URLs are preceded by ftp:// followed by the DNS name of the FTP server. To log in to an FTP server, use:ftp://username@servername.

File transfer

Trivial File Transfer Protocol (TFTP)

TFTP is similar to FTP. It lets you transfer files between a host and an FTP server. However, it provides no user authentication and no error detection. TFTP is often used when transferring files such as video, audio, or images. Because it does not perform error detection, TFTP is faster than FTP, but might be subject to file errors.

File transfer

Secure File Transfer Protocol (SFTP)

SFTP is a file transfer protocol that uses Secure Shell (SSH) to secure data transfers. SSH ensures that SFTP transmissions use encrypted commands and data which prevent data from being transmitted over the network in clear text.

File transfer

Secure Copy (SCP)

SCP is associated with Unix/Linux networks and used to transfer files between systems. Like SFTP, SCP relies on SSH to ensure that data and passwords are not transmitted over the network in clear text.

File transfer

Simple Mail Transfer Protocol (SMTP)

SMTP is used to route electronic mail through the internetwork. SMTP is used:




* Between mail servers for sending and relaying mail.




* By all email clients to send mail.




* By some e-mail client programs, such as Microsoft Outlook, for receiving mail from an Exchange server.

E-mail

Post Office Protocol 3 (POP3)

POP3 is part of the TCP/IP protocol suite and is used to retrieve e-mail from a remote server to a local client over a TCP/IP connection. By default, most POP3 clients download email messages then delete them from the server. However, newer POP3 clients provide an option that allows e-mail messages to be left on the server after download.




An e-mail client that uses POP3 for receiving mail uses SMTP for sending mail.

E-mail

Internet Message Access Protocol 4 (IMAP4)

IMAP4 is an e-mail retrieval protocol designed to enable users to access their e-mail from various locations without the need to transfer messages or files back and forth between computers. Messages remain on the remote mail server and are not automatically downloaded to a client system.




An e-mail client that uses IMAP4 for receiving mail uses SMTP for sending mail.

E-mail

Dynamic Host Configuration Protocol (DHCP)

DHCP is a method for automatically assigning addresses and other configuration parameters to network hosts. Using a DHCP server, hosts receive configuration information at startup, reducing the amount of manual configuration required on each host.

Network services

Domain Name System (DNS)

DNS is a system that is distributed throughout the internetwork to provide address/name resolution. For example, the name www.mydomain.com would be identified with a specific IP address.

Network services

Network Time Protocol (NTP)

NTP is used to communicate time synchronization information between systems on a network.

Network services

Lightweight Directory Access Protocol (LDAP)

LDAP is used to allow searching and updating of a directory service. The LDAP directory service follows a client/server model.One or more LDAP servers contain the directory data, the LDAP client connectsto an LDAP Server to make a directory service request.

Network services

Simple Network Management Protocol (SNMP)

SNMP is a protocol designed for managing complex networks. SNMP lets network hosts exchange configuration and status information. This information can be gathered by management software and used to monitor and manage the network.

Network management

Remote Terminal Emulation (Telnet)

Telnet allows an attached computer to act as a dumb terminal, with data processing taking place on the TCP/IP host computer. It is still widely used to provide connectivity between dissimilar systems. Telnet can also be used to test a service by the use of HTTP commands.

Network management

Secure Shell (SSH)

SSH allows for secure interactive control of remote systems. SSH uses RSA public key cryptography for both connection and authentication. SSH uses the IDEA algorithm for encryption by default, but is able to use Blowfish and DES. SSH is a secure and acceptable alternative to Telnet.

Network management

Transmission Control Protocol (TCP)

TCP provides services that ensure accurate and timely delivery of network communications between two hosts. TCP provides the following services to ensure message delivery:




* Sequencing of data packets


* Flow control


* Error checking

Transport protocols

User Datagram Protocol (UDP)

UDP is a host-to-host protocol like TCP. However, it does not include mechanisms for ensuring timely and accurate delivery. Because it has less overhead, it offers fast communications, but at the expense of possible errors or data loss.

Transport protocols

Internet Control Message Protocol (ICMP)

ICMP works closely with IP in providing error and control information, by allowing hosts to exchange packet status information, which helps move the packets through the internetwork. Two common management utilities, ping and traceroute, use ICMP messages to check network connectivity. ICMP also works with IP to send notices when destinations are unreachable, when devices' buffers overflow, the route and hops packets take through the network, and whether devices can communicate across the network. dz

Control protocols

Internet Group Membership Protocol (IGMP)

IGMP is a protocol for defining host groups. All group members can receive broadcast messages intended for the group (called multicasts). Multicast groups can be composed of devices within the same network or across networks (connected with a router).

Control protocols