question archive Describe the properties and characteristics of TCP/IP

Describe the properties and characteristics of TCP/IP

Subject:Computer SciencePrice:4.86 Bought9

Describe the properties and characteristics of TCP/IP. Explain common TCP and UDP ports, protocols, and their purpose.

Compare and contrast various Wi-Fi networking standards and encryption

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Explain properties and characteristics of TCP/IP.

 

IP Class A

 

Services mainly large companies with a need to for many host computers that clients can reach

 

-0.0.0.0 to 126.255.255.255

-supports up to 16,777,216 hosts

 

IP Class B

 

Used for medium sized businesses to provide a significant amount of hosts

 

-128.0.0.0 to 191.255.255.255

-supports up to 65,536 hosts

 

IP Class C

 

Present in home and consumer networks, with a small amount of hosts

 

-192.0.0.0 to 223.255.255.255

-supports up to 257 hosts

 

IPv4 (Internet Protocol version 4)

An address of a specific network device in 32 bit values

 

-still used widely despite its successor, IPv6 being available

 

IPv6 (Internet Protocol version 6)

A more complex addressing system used to identify devices in 128 bit values

-less popular than IPv4

-created due to the inevitability of running out of addresses

 

Public

A network with few or no restrictions, granting access to all

-generally for commercial and residential use

 

Private

A network with heavy restriction, granting access to a select few

-generally for government use

 

APIPA (Automatic Private IP Addressing)

Used as a backup when there is no DHCP, configures an IP and subnet mask

-APIPA assigns a class B IP address from 169.254.0.0 to 169.254.255.255

-built in Windows feature

 

Static

Uses the same IP address each time when connecting

-easy to identify the computer

 

Dynamic

Assigns a new IP address each time when connecting

-more difficult to identify the computer

 

Client-side DNS (Domain Name Service)

Translates domain names into IP address the computer can connect to

An example of this translation would be the domain name       "www.k-state.edu" translating into the IP address "129.130.12.1"

 

Subnet Mask

A screen of numbers use to filter IPs into their proper classes, masks the network id

 

Class A: 255.0.0.0

Class B: 255.255.0.0

Class C: 255.255.255.0

 

Default Gateway

A specific node used to forward packets to other networks, default address used to send information

-an example of a default gateway is a cable or DSL router

 

DHCP (Dynamic Host Configuration Protocol)

Allows devices to request an IP as they are starting up

-convenient as it requires less time setting up an address, automatic process

 

 

Explain common TCP and UDP ports, protocols, and their purpose

Ports 

      Port 21 - FTP: Provides services for file transfer and manipulation.

      Port 23 - Telnet: Connects to a remote network device. 

      Port 25 - SMTP: Sends email in a TCP/IP network. 

      Port 53 - DNS: Resolves host names to IP addresses. 

      Port 80 - HTTP: Communication protocol that establishes a request/response connection on the internet. 

      Port 110 - POP3: Downloads email messages from an email server.

      Port 115 - SFTP: Secure file transfer service

      Port 143 - IMAP: Also downloads email messages from an email server. 

      Port 161 - SNMP: Manages and monitors devices on network.

      Port 389 - LDAP: Accesses information directories.

      Port 443 - HTTPS: Uses authentication and encryption to secure data as is travels between the user and web server.

      Port 3389 - RDP: Remote Desktop Protocol

 

Meaning

      FTP: File Transfer Protocol

      SMTP: Simple Mail Transfer Protocol 

      DNS: Domain Name System

      HTTP: HyperText Transfer Protocol

      POP3: Post Office Protocol

      IMAP: Internet Message Access Protocol

      HTTPS: HTTP Secure

      RDP: Remote Desktop Protocol

 

Protocols

      DHCP: Dynamic Host Configuration Protocol

      LDAP: Lightweight Directory Access Protocol

      SNMP: Simple Network Management Protocol

      SMB: Server Message Block 

      CIFS: Common internet file system

      SSH: Secure Shell (Protocol) 

      SFTP: SSH File Transfer Protocol

 

 

What is a Port?

      A port is a process-specific or an application-specific software construct serving as a communication endpoint.

 

Compare and contrast wireless networking standards and encryption types.

802.11x Wireless Standad

A set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communication in the 2.4, 5, and frequency bands

 

802.11a

Wireless

one of several specifications in the 802.11 family applicable to wireless local area networks (wireless LANs or WLANs)

Up to 54Mb/s

5GHz band 

45.7 m (150 ft.)

Not interoperable with 802.11b, 802.11g, or 802.11n. 

 

802.11b

Wireless 

Standad

standard for wireless local area networks (WLANs) - often called Wi-Fi 

Up to 11Mb/s 

2.4GHz band 

91 m (300 ft.)

 Interoperable with 802.11g 

  

802.11g

Wireless 

Standard

a standard for wireless local area networks (WLANs) that offers transmission over relatively short distances at up to 54 megabits per second (Mbps), compared with the 11 Mbps theoretical maximum with the earlier 802.11b standard.

Up to 54Mb/s 

2.4GHz band 

91 m (300 ft.)

Interoperable with 802.11b

 

802.11n

Wireless 

Standard

Increases wireless local area network(WLAN) speed, improve reliability and extend the range of wireless transmissions

Up to 600Mb/s 

2.4 or 5GHz band

91 m (300 ft.)

Interoperable with 802.11a, 802.11b, 802.11g  

 

Encryption Types

Various wireless security protocols were developed to protect home wireless networks. 

 

These wireless security protocols include WEP, WPA, and WPA2

 

 

WEP

(Wired Equivalent Privacy)

 a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN

 

WLANs using the protocol vulnerable to attacks (called wireless equivalent privacy attacks)

 

WPA/ WPA2

(Wi-FI Protected Access(II)

two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks

 

WPA is backward-compatible with WEP devices, and has two modes: personal and enterprise

 

WPA2 is the current standard, newer hardware ensures advanced encryption does not affect performance

 

TKIP

(Temporal Key Integrity Protocol)

an encryption protocol included as part of the IEEE 802.11i standard for wireless LANs (WLANs)

 is useful for upgrading security on devices originally equipped with WEP, it doesn't address all of the security issues facing WLANs and may not be reliable or efficient enough for sensitive corporate and government data transmission

 

AES

(acronym of Advanced Encryption Standard) is a symmetric encryption algorithm (associated with WPA2)

 

Was designed to be efficient in both hardware and software, and supports a block length of 128 bits and key lengths of 128, 192, and 256 Bits.