5. TCP/IP protocols

Click the card to flip 👆
1 / 27
Terms in this set (27)
A mechanism that limits the lifespan or lifetime of data in a computer or network. It may be implemented as a counter or timestamp attached to or embedded in the data. Once the prescribed event count or timespan has elapsed, the data is discarded. It is also called the hop limit. Also known as Time to live.
Hypertext Transfer ProtocolThe set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the web.Hypertext Transfer Protocol SecureA protocol used for secure web pages and sites. It includes encryption services.Internet Control Message ProtocolA protocol used by network devices, including routers, to send error messages and operational information indicating, for example, that a requested service is not available or that a host or router could not be reached.Media Gateway Control ProtocolA protocol that controls media gateways used to connect the VoIP systems to conventional telephone networks.peer-to-peerA network resource allocation scheme in which each computer negotiates with all the others as an equal.Post Office Protocol 3A protocol used by the clients to receive an email from servers. It is never used to send an email. POP3 works best for accounts accessed only on one device and uses TCP port 110.privileged portA system port 0-1023 or a well-known port that is referred to as 'privileged' because administrative privileges are required to bind an application to ports in this range.promiscuous modeAn ipconfig mode that allows the interface to read all packets passing through the network segment regardless of where they're addressed.registered portA port that can be used by ordinary user processes or programs on most systems and can be executed by ordinary users. Registered port assignments, numbered 1,024 through 49,151, are used with the UDP to the extent possible.Real-time Transport ProtocolA protocol that delivers streaming audio and video data over networks.Session Initiation ProtocolA protocol that sends control information for multimedia communication sessions, such as VoIP, video, and instant messaging.sliding windowA method by which multiple packets of data can be affirmed with a single acknowledgment.secure sockets layerThe standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral.three-way handshakeA three-step method used in a TCP/IP network to create a connection between a local host/client and server. It requires both the client and the server to exchange SYN and ACK packets before actual data communication begins.tunnelingA protocol that allows for the secure movement of data from one network to another. It involves allowing private network communications to be sent across a public network, such as the Internet.User Datagram ProtocolA part of the Internet Protocol suite used by programs running on different computers on a network and is used to send short messages called datagrams. Overall, it is an unreliable and a connectionless protocol.well-known portA system port 0-1023 or a well-known port that is referred to as 'privileged' because administrative privileges are required to bind an application to ports in this range.