Anda di halaman 1dari 4

Short Terms COMM

1. Telnet: 2. FTP: File Transfer Protocol (FTP) is a standard network protocol used to exchange and manipulate files over a TCP !P "ased network# such as the !nternet. $TP is "uilt on a client% server architecture and utili&es separate control and data connections "etween the client and server applications. 'pplications were originall( interactive command%line tools with a standardi&ed command s(ntax# "ut graphical user interfaces have "een developed for all desktop operating s(stems in use toda(. $TP is also often used as an application component to automaticall( transfer files for program internal functions. $TP can "e used with user%"ased password authentication or with anon(mous user access. The Trivial $ile Transfer Protocol (T$TP) is a similar# "ut simplified# not interopera"le# and unauthenticated version of $TP.

3. TFTP: Trivial File Transfer Protocol (TFTP) is a file transfer protocol, with the functionality of a very basic form of File Transfer Protocol (FTP); it was first defined in 1 !". #1$ %ue to its simple desi&n, TFTP could be implemented usin& a very small amount of memory ' an important consideration at that time. (t was therefore useful for bootin& computers such as routers which did not have any data stora&e devices. (t is still used to transfer small amounts of data between hosts on a networ), such as (P phone firmware or operatin& system ima&es when a remote * +indow ,ystem terminal or any other thin client boots from a networ) host or server. The initial sta&es of some networ) based installation systems (such as ,olaris -umpstart, .ed /at 0ic)start, ,ymantec 1host and +indows 2T3s .emote (nstallation ,ervices) use TFTP to load a basic )ernel that performs the actual installation. Trivial File Transfer Protocol (TFTP) is a simple protocol to transfer files. (t has been implemented on top of the 4ser %ata&ram Protocol (4%P) usin& port number 5 . TFTP is desi&ned to be small and easy to implement, therefore, lac)s most of the features of a re&ular FTP. TFTP only reads and writes files (or mail) from6to a remote server. (t cannot list directories, and currently has no provisions for user authentication. (n TFTP, any transfer be&ins with a re7uest to read or write a file, which also serves to re7uest a connection. (f the server &rants the re7uest, the connection is opened and the file is sent in fi8ed len&th bloc)s of 91: bytes. ;ach data pac)et contains one bloc) of data, and must be ac)nowled&ed by an ac)nowled&ment pac)et before the ne8t pac)et can be sent. < data pac)et of less than 91: bytes si&nals termination of a transfer. (f a pac)et &ets lost in the networ), the intended recipient will timeout and may retransmit his last pac)et (which may be data or an ac)nowled&ment), thus causin& the sender of the lost pac)et to retransmit that lost pac)et. The sender has to )eep =ust one pac)et on hand for retransmission, since the loc) step ac)nowled&ment &uarantees that all older pac)ets have been received. 2otice that both machines involved in a transfer are considered senders and receivers. >ne sends data and receives ac)nowled&ments, the other sends ac)nowled&ments and receives data. Three modes of transfer are currently supported by TFTP? netascii, that it is ! bit ascii; octet (This replaces the @binary@ mode of previous versions of this document.) raw ! bit bytes; mail, netascii

characters sent to a user rather than a file. <dditional modes can be defined by pairs of cooperatin& hosts.

A. HTTP: Hypertext Transfer Protocol (HTTP) is an applicationBlevel protocol for distributed, collaborative, hypermedia information systems.#1$ (ts use for retrievin& interBlin)ed resources, called hyperte8t documents, led to the establishment of the +orld +ide +eb in 1 " by ;n&lish physicist Tim CernersBDee. There are two ma=or versions, /TTP61." that uses a separate connection for every document and /TTP61.1 that can reuse the same connection to download, for instance, ima&es for the =ust served pa&e. /ence /TTP61.1 may be faster as it ta)es time to set up such connections. 9. BOOTP: Bootstrap Protocol, or BOOTP, is a networ) protocol used by a networ) client to obtain an (P address from a confi&uration server. The C>>TP protocol was ori&inally defined in .FE 91. C>>TP is usually used durin& the bootstrap process when a computer is startin& up. < C>>TP confi&uration server assi&ns an (P address to each client from a pool of addresses. C>>TP uses the 4ser %ata&ram Protocol (4%P) as a transport on (PvA networ)s only. /istorically, C>>TP has also been used for 4ni8Bli)e dis)less wor)stations to obtain the networ) location of their boot ima&e in addition to an (P address, and also by enterprises to roll out a preBconfi&ured client (e.&., +indows) installation to newly installed PEs. >ri&inally re7uirin& the use of a boot floppy dis) to establish the initial networ) connection, manufacturers of networ) cards later embedded the protocol in the C(>, of the interface cards as well as system boards with onBboard networ) adapters, thus allowin& direct networ) bootin&. .ecently, users with an interest in dis)less standBalone media center PEs have shown new interest in this method of bootin& a +indows operatin& system.#1$
). DHCP: Dynamic Host Configuration Protocol (DHCP) is a computer networking protocol used "( hosts (DHCP clients) to retrieve !P address assignments and other configuration information.

F. SNMP: Simple Network Management Protocol (SNMP) is a 4%PBbased networ) protocol. (t is used mostly in networ) mana&ement systems to monitor networ)Battached devices for conditions that warrant administrative attention. ,2GP is a component of the (nternet Protocol ,uite as defined by the (nternet ;n&ineerin& Tas) Force ((;TF). (t consists of a set of standards for networ) mana&ement, includin& an application layer protocol, a database schema, and a set of data ob=ects.#1$
*. TCP: Transmission Control Protocol (TCP) is one of the core protocols of the !nternet Protocol +uite. TCP is one of the two original components of the suite (the other "eing !nternet Protocol# or !P)# so the entire suite is commonl( referred to as TCP/IP. ,hereas !P handles lower%level transmissions from computer to computer as a message makes its wa( across the !nternet# TCP operates at a higher level# concerned onl( with the two end s(stems# for example a ,e" "rowser and a ,e" server. !n particular# TCP provides relia"le# ordered deliver( of a stream of "(tes from a program on one computer to another program on another computer. -esides the ,e"# other common applications of TCP include e%mail and file

transfer. 'mong its other management tasks# TCP controls segment si&e# flow control# the rate at which data is exchanged# and network traffic congestion

. U P: User atagram Protocol (U P) is one of the core members of the (nternet Protocol ,uite, the set of networ) protocols used for the (nternet. +ith 4%P, computer applications can send messa&es, in this case referred to as datagrams, to other hosts on an (nternet Protocol ((P) networ) without re7uirin& prior communications to set up special transmission channels or data paths. 4%P is sometimes called the Universal atagram Protocol. The protocol was desi&ned by %avid P. .eed in 1 !" and formally defined in .FE F5!.#1$ 4%P uses a simple transmission model without implicit handBsha)in& dialo&ues for &uaranteein& reliability, orderin&, or data inte&rity. Thus, 4%P provides an unreliable service and data&rams may arrive out of order, appear duplicated, or &o missin& without notice. 4%P assumes that error chec)in& and correction is either not necessary or performed in the application, avoidin& the overhead of such processin& at the networ) interface level. TimeBsensitive applications often use 4%P because droppin& pac)ets is preferable to waitin& for delayed pac)ets, which may not be an option in a realBtime system. (f error correction facilities are needed at the networ) interface level, an application may use the Transmission Eontrol Protocol (TEP) or ,tream Eontrol Transmission Protocol (,ETP) which are desi&ned for this purpose. 1". !P: !nternet Protocol (!P) is a protocol used for communicatin& data across a pac)etB switched internetwor) usin& the (nternet Protocol ,uite, also referred to as TEP6(P.(P is the primary protocol in the (nternet Dayer of the (nternet Protocol ,uite and has the tas) of deliverin& distin&uished protocol data&rams (pac)ets) from the source host to the destination host solely based on their addresses. For this purpose the (nternet Protocol defines addressin& methods and structures for data&ram encapsulation. The first ma=or version of addressin& structure, now referred to as (nternet Protocol Hersion A ((PvA) is still the dominant protocol of the (nternet, althou&h the successor, (nternet Protocol Hersion 5 ((Pv5) is bein& deployed actively worldwide.

11. "#P: "$$ress #esol%tion Protocol &"#P' spoofing, also )nown as "#P poisoning or "#P Poison #o%ting (<P.), is a techni7ue used to attac) an ;thernet wired or wireless networ). <.P ,poofin& may allow an attac)er to sniff data frames on a local area networ) (D<2), modify the traffic, or stop the traffic alto&ether. The attac) can only be used on networ)s that actually ma)e use of <.P and not another method of address resolution.

1:. #"#P: The #everse "$$ress #esol%tion Protocol (#"#P) is a computer networ)in& protocol used by a host computer to re7uest its (nternet Protocol ((PvA) address from an administrative host, when it has available its Din) Dayer or hardware address, such as a G<E address. .<.P is described in (nternet ;n&ineerin& Tas) Force ((;TF) publication .FE "3.#1$ (t has been rendered obsolete by the Cootstrap Protocol (C>>TP) and the modern %ynamic

/ost Eonfi&uration Protocol (%/EP), which both support a much &reater feature set than .<.P. .<.P re7uires one or more server hosts to maintain a database of mappin&s of Din)

Dayer addresses to their respective protocol addresses. Gedia <ccess Eontrol (G<E) addresses needed to be individually confi&ured on the servers by an administrator. .<.P was limited to servin& only (P addresses. .everse <.P differs from the (nverse <ddress .esolution Protocol ((n<.P) described in .FE :3 ", which is desi&ned to obtain the (P address associated with another host3s G<E address. (n<.P is the complement of the <ddress .esolution Protocol used for the reverse loo)up. 13. !(MP: !nternet (ontrol Message Protocol (!(MP) is one of the core protocols of the (nternet Protocol ,uite. (t is chiefly used by networ)ed computers3 operatin& systems to send error messa&es'indicatin&, for instance, that a re7uested service is not available or that a host or router could not be reached. (EGP#1$ relies on (P to perform its tas)s, and it is an inte&ral part of (P. (t differs in purpose from transport protocols such as TEP and 4%P in that it is typically not used to send and receive data between end systems. (t is usually not used directly by user networ) applications, with some notable e8ceptions bein& the pin& tool and traceroute. (EGP for (nternet Protocol version A ((PvA) is also )nown as (EGPvA. (Pv5 has a similar protocol, (EGPv5
1.. PPP: Point-to-Point Protocol# or PPP# is a data link protocol commonl( used to esta"lish a direct connection "etween two networking nodes. !t can provide connection authentication# transmission encr(ption privac(# and compression 1/. SLIP: Serial Line Internet Protocol (SLIP) is a mostl( o"solete encapsulation of the !nternet Protocol designed to work over serial ports and modem connections. !t is documented in 0$C 11//. 2n personal computers# +3!P has "een largel( replaced "( the Point%to%Point Protocol (PPP)# which is "etter engineered# has more features and does not re4uire its !P address configuration to "e set "efore it is esta"lished. 2n microcontrollers# however# +3!P is still the preferred wa( of encapsulating !P packets due to its ver( small overhead.

15. )t*ernet: )t*ernet is a family of frameBbased computer networ)in& technolo&ies for local area networ)s (D<2s). The name comes from the physical concept of the ether. (t defines a number of wirin& and si&nalin& standards for the Physical Dayer of the >,( networ)in& model, throu&h means of networ) access at the Gedia <ccess Eontrol protocol (a subBlayer of %ata Din) Dayer), and a common addressin& format. ;thernet is standardiIed as (;;; !":.3. The combination of the twisted pair versions of ;thernet for connectin& end systems to the networ), alon& with the fiber optic versions for site bac)bones, is the most widespread wired D<2 technolo&y. (t has been in use from around 1 !"#1$ to the present, lar&ely replacin& competin& D<2 standards such as to)en rin&, F%%(, and <.E2;T.

Anda mungkin juga menyukai