Information Technology /Cyber-Security: TCP/IP Concepts

Cyber-Security: TCP/IP Concepts

Information Technology26 CardsCreated about 2 months ago

This section outlines the major layers of the TCP/IP model, including the Application, Transport, Internet, and Network layers. It explains their core functions—such as segmenting data, routing packets, and interfacing with physical hardware—and highlights key protocols like HTTP for web communication and FTP for cross-platform file transfers.

Application Layer

This layer includes network services and client software

Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/26

Key Terms

Term
Definition

Application Layer

This layer includes network services and client software

Transport layer

TCP/UDP

This layer is responsible for getting data packets to and from the Application layer by using port numbers. ...

Internet layer

This layer uses IP addresses to route packets to the correct destination network. The Internet Lyaer is responsible for routing a packet to a desti...

Network layer

This layer represents the physical network pathway and the network interface card

Hypertext Transfer Protocol (HTTP)

The primary protocol used to communicate over the Web

File Transfer Protocol (FTP)

Allows different OSs to transfer files between one another

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

Application Layer

This layer includes network services and client software

Transport layer

TCP/UDP

This layer is responsible for getting data packets to and from the Application layer by using port numbers. TCP also verifies packet delivery by using acknowledgments. The Trasport layer is where data is encapsulated into segments.

Internet layer

This layer uses IP addresses to route packets to the correct destination network. The Internet Lyaer is responsible for routing a packet to a destination address.

Network layer

This layer represents the physical network pathway and the network interface card

Hypertext Transfer Protocol (HTTP)

The primary protocol used to communicate over the Web

File Transfer Protocol (FTP)

Allows different OSs to transfer files between one another

Simple Mail Transfer Protocol (SMTP)

The main protocol for transmitting e-mail messages across the Internet

Simple Network Management Protocol (SNMP)

Primarily used to monitor devices on a network, such as monitoring a router’s state remotely

Secure Shell (SSH)

Enables users to securely log on to a remote server and issue commands interactively

Internet Relay Chat (IRC)

Enables multiple users to communicate over the Internet in discussion forums

Telnet

Enables users to insecurely log on to a remote server and issue commands interactively

Syn Flag

The synchronize flag signifies the beginning of a session

Ack Flag

The acknowledgement flag acknowledges a connection and is sent by a host after receiving a SYN-ACK packet

PSH Flag

The push flag is used to deliver data directly to an application. Data isn’t buffered; it’s sent immediately

URG flag

This flag is used to signify urgent data

RST flag

The reset flag resets or drops a connection

FIN flag

The finish flag signifies that the connection is finished

Intial Sequence Number

The Initial Sequence Number (ISN) is a 32-bit number that tracks packets received by a node and allows reassembling large packets that have been broken up into smaller packets

TCP Ports

A TCP packet has two 16-bit fields containing the source and destination port numbers. A port is the logical, not physical, components of a TCP connection and can be assigned to a process that requires network connectivity.


Port 20 and 21

FTP has been around as long as the internet. It was the standard for moving or copying large files and is till used today, although to a lesser extent because of the popularity of HTTP. FTP uses port 20 for data transfer and port 21 for control. FTP requires entering a login name and password and is more secure than Trivial File Transfer Protocol.

Port 25

Simple Mail Transfer Protocol - Email servers listen to this port. If you attempt to send e-mail to a remote user, your workstation connects to port 25 on a mail server.

Port 53

Domain Name System - If a server on your network uses DNS, it’s using port 53. Most networks require a DNS server so that users can connect to Web sites with URLs instead of IP addresses.

Port 69

Trivial File Transfer Protocol - Many network engineers use TFTP service to transfer router and backup router configurations


Port 80

Hypertext Transfer Protocol - Most certification exams have a question about port 80 being used for HTTP. Port 80 is used when you connect to a web server. If security personnel decided to filter out HTTP traffic, almost every user would notice a problem on the network.

Port 443

Secure Hypertext Transfer Protocol - Port 443, like port 80, is usedwhen you connect to a Web server. However, 443 typically is reserved for secure connections.

Internet Control Message Protocol (ICMP)

ICMP is used to send messages related to network operations. ICMP makes it possible for network professionals to troubleshoot network connectivity problems and track the route a packet traverses from a source IP address to a destination IP address.