Table 2-6 Ports and Protocols

Table 2-6 Ports and Protocols - student2.ru

Protocol Name Port Number Use
     
POP3 Email (incoming)
     
IMAP Email (incoming)
     
SMTP Email outgoing to a server or between email serv-
    ers, not from server to client
     
SSH Secure remote access via the command-line inter-
    face (CLI)
     
Telnet Unsecure remote access via the CLI
     
FTP Downloading files
     
HTTP Hypertext Transfer Protocol, connection to unsecure
    website
     
HTTPS Secure HTTP, connections to secure websites
     
DNS Friendly URL names
     
RDP Remote Desktop Protocol; used for Windows
    Remote Desktop Connection
     

DNS

The Domain Name System (DNS) is the name for the network of servers on the Internet that trans-late domain names, such as www.informit.com, and individual hostnames into their matching IP addresses. If you manually configure an IP address, you usually provide the IP addresses of one or more DNS servers as part of the configuration process.

A domain name has three major sections, from the end of the name to the start:

The top-level domain (.com, .org, .net, and so on). The name of the site.

The server type. www indicates a web server, ftp indicates an FTP server, mail indicates a mail server, and search indicates a search server.

Chapter 2: Networking 49

Table 2-6 Ports and Protocols - student2.ru

DHCP

The Dynamic Host Configuration Protocol (DHCP) is used to automatically assign IP addresses to hosts (printers, routers, computers, and so on). In most SOHO networks, a router uses DHCP to assign IP addresses to the client computers. However, your ISP will also use DHCP to assign an IP address to you; usually your router gets this.

LDAP

Lightweight Directory Access Protocol (LDAP) is used to access and maintain distributed directo-ries of information (directory services) such as the kind involved with Microsoft domains.

SNMP

Simple Network Management Protocol (SNMP) is used as the standard for managing and monitor-ing devices on your network. It manages routers, switches, and computers and is often incorpo-rated in software known as a network management system (NMS).

SMB

The Server Message Blocks (SMB) protocol provides access to shared items such as files and printers.

SSH

Secure Shell (SSH) allows data to be exchanged between computers on a secured channel. This protocol offers a more secure replacement to FTP and Telnet. The Secure Shell server housing the data you want to access would have port 22 open.

SFTP

Secure FTP (SFTP). Provides file access over a reliable data stream that is generated and protected by SSH.

TCP Versus UDP

Transmission Control Protocol (TCP) sessions are known as connection-oriented sessions. This means that every packet that is sent is checked for delivery. If the receiving computer doesn’t receive a packet, it cannot assemble the message, and will ask the sending computer to transmit the packet again. No one packet is left behind.

User Datagram Protocol (UDP) sessions are known as connectionless sessions. UDP is used in streaming media sessions. In these cases, if a packet is dropped, it is not asked for again.

50 CompTIA A+ Quick Reference

Table 2-6 Ports and Protocols - student2.ru

Wireless Networks

All Wi-Fi standards for the A+ exams are defined by IEEE 802.11. The four standards are a, b, g, and n. The a standard is not compatible with any of the others and has a small range of 150 feet. The b and g standards are interoperable, and n works with both b and g. Table 2-7 summarizes what is different among those four versions.

Наши рекомендации