General Important Protocols for Examination of IA Examination 2018

Similar documents
Introduction to Networking

MTA_98-366_Vindicator930

Lecture-4. TCP/IP-Overview:

Section 1.1: Networking Overview

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

Solved MCQ of Computer networking. Set-1

Chapter 2. Communicating Over The Network

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

Chapter 14: Introduction to Networking

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

Study Guide. Module Two

01/17/08 TDC /17/08 TDC363-03

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

Copyleft 2005, Binnur Kurt. Objectives

MARUTHI SCHOOL OF BANKING (MSB)

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period

Computer Networks Question Bank

Defining Networks with the OSI Model. Module 2

access link basic service set (BSS) broadband cable ad hoc wireless network Address Resolution Protocol (ARP) broadcast broadcast domain

Network Communications Standards. Applied Information Technology

Hands-On TCP/IP Networking

University of Southern California EE450: Introduction to Computer Networks

COMPONENTS OF DATA COMMUNICATION

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Introduction to TCP/IP

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Communicating over the Network

Joint ITU-T/IEEE Workshop on Next Generation Optical Access Systems. IEEE 802 Standards Overview

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Addresses, Protocols, and Ports Reference

Review: Networking Fall Final

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

2. A collection of interconnected networks is called an internetwork. 3. Each machine is connected to a central hub with a point-to-point connection.

Computer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D. Kasetsart University, Bangkok, Thailand

and Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

OSI Model with Protocols. Layer Name PDU Address Protocols Device

Cisco Interconnecting Cisco Networking Devices Part 1.

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

The Internet software layers

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

Department of Information Technology. CS6551 Computer Networks. Anna University - Two Mark Questions

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

Data Communication and Network. Introducing Networks

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam.

Ethernet / TCP-IP - Training Suite Application level protocols

Essential Elements of Medical Networks. D. J. McMahon rev cewood

Lecture 3 Protocol Stacks and Layering

CompTIA Network+ Course

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

Network-Based Application Recognition

Section 3 - Configuration. Enable Auto Channel Scan:

Network Access Layer Internet Layer Transport Layer Application Layer. Presentation. Transport. Physical

Domain 1.0 Network Technologies

Introduction to Computer

DHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL

Need For Protocol Architecture

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

IEEE-SA Standardization Activities for Smart Grid in Communications & Networking. Max Riegel Nokia Siemens Networks Chair IEEE 802 OmniRAN EC SG

A5500 Configuration Guide

Faculty of Science and IT Course title. Pre-requisite/corequisite

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13

TCP/IP Protocol Suite and IP Addressing

ITEC 3800 Data Communication and Network. Introducing Networks

LSI Industries AirLink Network Security. Best Practices. System Information 01/31/18. Physical Access. Software Updates. Network Encryption

( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture

OFTP2 kurs Odette File r Transfer ansfer Pr otocol

Cisco Wireless LAN Controller Module

Advanced Encryption Standard (AES) Application Level Gateway (ALG) Authentication Server Shared Secret. Authentication server authentication port

User Manual Gemtek WiMAX Modem

GS-2610G L2+ Managed GbE Switch

SAE-PE QSFP-NMS

802.11a g Dual Band Wireless Access Point. User s Manual

IT4405 Computer Networks (Compulsory)

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

CompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ]

OER uses the following default value if this command is not configured or if the no form of this command is entered: timer: 300

Introduction to Wireless Networking ECE 401WN Spring 2009

Gigabit SSL VPN Security Router

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

Network+ Week 5: Introduction to TCP/IP

Gigabit Managed Ethernet Switch

ASIT-33018PFM. 18-Port Full Gigabit Managed PoE Switch (ASIT-33018PFM) 18-Port Full Gigabit Managed PoE Switch.

Internetworking models

PSGS-2610F L2+ Managed GbE PoE Switch

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

SYED AMMAL ENGINEERING COLLEGE

Selected Sections of Applied Informatics

CCNA. Course Catalog

Chapter 12 Network Protocols

Application Layer: OSI and TCP/IP Models

BVRIT HYDERABAD College of Engineering for Women Department of Information Technology. Hand Out

GS-1626G Web Smart+ GbE Switch

Avaya WLAN Access Point 9123

Transcription:

Protocol General Important Protocols for Examination of IA Examination 2018 DNS - Domain Name System - translates network address (such as IP addresses) into terms understood by humans (such as Domain Names) and vice-versa DHCP - Dynamic Host Configuration Protocol - can automatically assign Internet addresses to computers and users FTP - File Transfer Protocol - a protocol that is used to transfer and manipulate files on the Internet HTTP - HyperText Transfer Protocol - An Internet-based protocol for sending and receiving webpages IMAP - Internet Message Access Protocol - A protocol for e-mail messages on the Internet IRC - Internet Relay Chat - a protocol used for Internet chat and other communications POP3 - Post Office protocol Version 3 - a protocol used by e-mail clients to retrieve messages from remote servers IMAP(Intermediate Mail Access Protocol) Here the user may access the mail box on the server from different machines so there is no point in downloading the mail before hand. Instead when the mail has to be read one has to log on to the server. (IMAP thus provides authentication) DMSP(Distributive Mail System Protocol) There are multiple mailboxes on different servers. SMTP - Simple Mail Transfer Protocol - A protocol for e-mail messages on the Internet ESMTP ESMTP stands for Extended Simple Mail Transfer Protocol ICMP (Internet Control Message Protocol): is a network layer protocol that handles error reporting RIP ( ROUTING INFORMATION PROTOCOL)RIP uses the distance-vector algorithm SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) The Simple Network Management Protocol (SNMP) is a framework for managing devices in an internet using the TCPIIP protocol suite. It provides a set of fundamental operations for monitoring and maintaining an internet. OPEN SHORTEST PATH FIRST (OSPF) MOSPF (Multicase Open Shorted Path First)- This protocol is an extension of the OSPF protocol that uses multicast link state routing to create source based trees. DVMRP(Multicast Distance Vector Routing)- The multicast distance vector routing algorithm is based on four decision making strategies. ARP: Find the MAC (Physical) address of the next hop( Maps an IP address to a MAC address). Data link layer encapsulates this address into the frame RARP : Maps a MAC address to an IP address RARP has been replaced by DHCP. ICMP: Handle unusual situations such as the occurrence of an error. IGMP :IP is designed for unicast delivery so we need IGMP For Multicast delivery (such as multimedia application) Common TCP/IP Protocols and Ports File Transfer Protocol (FTP) Port Numbe r Description 20/21 FTP is one of the most commonly used file transfer protocols on the Internet and within private networks. An FTP server can easily be set up with little networking knowledge and provides the ability to easily relocate files from one system to another. FTP control is Page1

handled on TCP port 21 and its data transfer can use TCP port 20 as well as dynamic ports depending on the specific configuration. Secure Shell (SSH) 22 SSH is the primary method used to manage network devices securely at the command level. It is typically used as a secure alternative to Telnet which does not support secure connections. Telnet 23 Telnet is the primary method used to manage network devices at the command level. Unlike SSH which provides a secure connection, Telnet does not, it simply provides a basic unsecured connection. Many lower level network devices support Telnet and not SSH as it required some additional processing. Caution should be used when connecting to a device using Telnet over a public network as the login credentials will be transmitted in the clear. Simple Transfer (SMTP) Mail Protocol Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP) Trivial File Transfer Protocol (TFTP) 25 SMTP is used for two primary functions, it is used to transfer mail (email) from source to destination between mail servers and it is used by end users to send email to a mail system. 53 The DNS is used widely on the public internet and on private networks to translate domain names into IP addresses, typically for network routing. DNS is hieratical with main root servers that contain databases that list the managers of high level Top Level Domains (TLD) (such as.com). These different TLD managers then contain information for the second level domains that are typically used by individual users (for example, cisco.com). A DNS server can also be set up within a private network to private naming services between the hosts of the internal network without being part of the global system. 67/68 DHCP is used on networks that do not use static IP address assignment (almost all of them). A DHCP server can be set up by an administrator or engineer with a poll of addresses that are available for assignment. When a client device is turned on it can request an IP address from the local DHCP server, if there is an available address in the pool it can be assigned to the device. This assignment is not permanent and expires at a configurable interval; if an address renewal is not requested and the lease expires the address will be put back into the poll for assignment. 69 TFTP offers a method of file transfer without the session establishment requirements that FTP uses. Because TFTP uses UDP instead of TCP it has no way of ensuring the file has been properly transferred, the end device must be able to check the file to ensure proper transfer. TFTP is typically used by devices to upgrade software and firmware; this includes Cisco and other network vendors equipment. Page2

Hypertext Transfer Protocol (HTTP) 80 HTTP is one of the most commonly used protocols on most networks. HTTP is the main protocol that is used by web browsers and is thus used by any client that uses files located on these servers. Post Office Protocol (POP) version 3 Network Time Protocol (NTP) NetBIOS 137/138 /139 Internet Access (IMAP) Message Protocol Simple Network Management Protocol (SNMP) Border Gateway Protocol (BGP) Lightweight Directory Access Protocol (LDAP) 110 POP version 3 is one of the two main protocols used to retrieve mail from a server. POP was designed to be very simple by allowing a client to retrieve the complete contents of a server mailbox and then deleting the contents from the server. 123 One of the most overlooked protocols is NTP. NTP is used to synchronize the devices on the Internet. Even most modern operating systems support NTP as a basis for keeping an accurate clock. The use of NTP is vital on networking systems as it provides an ability to easily interrelate troubles from one device to another as the clocks are precisely accurate. NetBIOS itself is not a protocol but is typically used in combination with IP with the NetBIOS over TCP/IP (NBT) protocol. NBT has long been the central protocol used to interconnect Microsoft Windows machines. 143 IMAP version3 is the second of the main protocols used to retrieve mail from a server. While POP has wider support, IMAP supports a wider array of remote mailbox operations which can be helpful to users. 161/162 SNMP is used by network administrators as a method of network management. SNMP has a number of different abilities including the ability to monitor, configure and control network devices. SNMP traps can also be configured on network devices to notify a central server when specific actions are occurring. Typically, these are configured to be used when an alerting condition is happening. In this situation, the device will send a trap to network management stating that an event has occurred and that the device should be looked at further for a source to the event. 179 BGP version 4 is widely used on the public internet and by Internet Service Providers (ISP) to maintain very large routing tables and traffic processing. BGP is one of the few protocols that have been designed to deal with the astronomically large routing tables that must exist on the public Internet. Hypertext Transfer Protocol over 389 LDAP provides a mechanism of accessing and maintaining distributed directory information. LDAP is based on the ITU-T X.500 standard but has been simplified and altered to work over TCP/IP networks. 443 HTTPS is used in conjunction with HTTP to provide the same services but doing it using a secure connection which is provided by Page3

SSL/TLS (HTTPS) either SSL or TLS. Lightweight Directory Access Protocol over TLS/SSL (LDAPS) 636 Just like HTTPS, LDAPS provides the same function as LDAP but over a secure connection which is provided by either SSL or TLS. FTP over TLS/SSL 989/990 Again, just like the previous two entries, FTP over TLS/SSL uses the FTP protocol which is then secured using either SSL or TLS. Question IEEE 802.1 IEEE 802.2 IEEE 802.3 IEEE 802.4 IEEE 802.5 IEEE 802.6 IEEE 802.7 IEEE 802.8 IEEE 802.9 IEEE 802.10 IEEE 802.11 Standard IEEE 802 list Main list Answer Higher Layer LAN Protocols LLC Ethernet Token bus Token ring MAC layer MANs (DQDB) Broadband LAN using Coaxial Cable Fiber Optic TAG Integrated Services LAN (ISLAN or isoethernet) Interoperable LAN Security Wireless LAN (WLAN) & Mesh (Wi-Fi certification) IEEE 802.12 IEEE 802.13 100BaseVG Unused[2] IEEE 802.14 Cable modems Page4

IEEE 802.15 IEEE 802.16 Wireless PAN Broadband Wireless Access (WiMAX certification) Question IEEE 802.15.1 IEEE 802.15.2 IEEE 802.15.3 IEEE 802.15.4 IEEE 802.15.5 IEEE 802.15.6 IEEE 802.15.7 IEEE 802.16.1 IEEE 802.16.2 IEEE 802.17 Resilient packet ring IEEE 802.18 IEEE 802.19 IEEE 802.20 IEEE 802.21 IEEE 802.22 IEEE 802.23 IEEE 802.24 IEEE 802.25 Bluetooth certification Radio Regulatory TAG Coexistence TAG Mobile Broadband Wireless Access Media Independent Handoff Wireless Regional Area Network Emergency Services Working Group Smart Grid TAG Omni-Range Area Network Sub list Answer IEEE 802.15 and IEEE 802.11 coexistence High-Rate wireless PAN (e.g., UWB, etc.) Low-Rate wireless PAN (e.g., ZigBee, WirelessHART, MiWi, etc.) Mesh networking for WPAN Body area network Visible light communications Local Multipoint Distribution Service Coexistence wireless access Page5

IEEE 802.11 IEEE 802.11 Wireless Local Area Networks (WLAN) Working Group EEE 802.11 Standards There is a plethora of standards under the IEEE 802 LMSC (LAN / MAN Standards Committee). Of these even 802.11 has a variety of standards, each with a letter suffix. These cover everything from the wireless standards themselves, to standards for security aspects, quality of service and the like: 802.11a - Wireless network bearer operating in the 5 GHz ISM band with data rate up to 54 Mbps. 802.11b - Wireless network bearer operating in the 2.4 GHz ISM band with data rates up to 11 Mbps. 802.11e - Quality of service and prioritisation 802.11f - Handover 802.11g - Wireless network bearer operating in 2.4 GHz ISM band with data rates up to 54 Mbps. 802.11h - Power control 802.11i - Authentication and encryption 802.11j - Interworking 802.11k - Measurement reporting 802.11n - Wireless network bearer operating in the 2.4 and 5 GHz ISM bands with data rates up to 600 Mbps. 802.11s - Mesh networking 802.11ac - Wireless network bearer operating below 6GHz to provide data rates of at least 1Gbps per second for multi-station operation and 500 Mbps on a single link. 802.11ad - Wireless network bearer providing very high throughput at frequencies up to 60GHz. 802.11af - Wi-Fi in TV spectrum white spaces (often called White-Fi). 802.11ah - Wi-Fi using unlicensed spectrum below 1 GHz to provide long range communications and support for the Internet of Everything. Page6