Free Essay

Internet Ips

In:

Submitted By fearx3
Words 2443
Pages 10
The Internet was launched more than three decades earlier, when the U.S. government is funding the project. Internet has been the source of several universities and government, he eventually rose to some private companies / research institutions belong. Thus, the first users of the Internet to be a scientist / engineer who was also in the running of the network (and who had no intention of modern pirates) know. Motivated the Internet at that time was to create a national network of reliable communication, and the opportunity to exchange research results / resources around nation1. The original architecture of the Internet is often described as the architecture from end to end. From one end to the other decentralized architecture ", a mechanism should not be placed on the network if it can be placed at the endpoint," in which second heart This construction gives the network simple and universal.

Since then, however, the scope of the Internet has grown exponentially. It has become more difficult for the network supported by the government on a scale of measurement so that the government released gradually into a network by the private sector. Since the government is not responsible for Internet access, private companies - Internet Service Provider (ISP) - were created to ensure access to this vast network. These vendors, of course, to private companies, the main objective to make a profit - a radical difference to the original purpose of the supplier, the U.S. government. The growth of the Internet service provider, today as the dominant players of the Internet was the catalyst for a more centralized network that goes from the original end to end design was injured this change negatively related to their group The most important of the Internet - the end user.

One of the fundamental changes in the early days of the Internet was now the transition to privatization. The provider-end profits that controls their actions, and it is this interest that vendors are trying to move the Internet from its end to start. To make a profit, Internet service providers must first attract a large number of customers to buy their services, and then get a nice profit for the services they provide. Have a free market economy, ISPs compete with each other to compete in the market for customers, ISPs need to have a certain charm to offer our customers: low prices, with no limit the connection time, high-speed access, or other attractive services that are unique to the ISP. It could be argued that some of these tasks are not necessarily fall on the supplier, but the service now believe that what they do. As Marjory Blumenthal and David Clarke explains, ISPs now the position that these functions are "something to make the party a competitive advantage." 3

It is this need for customers to centralize the network provider to compete away from the simple end to end design on the move. One of the ISP's most successful, AOL, for example, announced a number of unique features: AOL Instant Messaging, and parental control features, exclusive content, AOL, such as streaming audio / clips Video and AOL keyword search4. Most of these functions call your ISP to add the infrastructure network - not the ends. Streaming audio / video content, for example, may require AOL, the nature of the device cache for web users to add the contents of the flow is regular and continuous basis. Parental control, requiring AOL, something like a firewall Add to certain content inaccessible to some users may. Recognize the need for the provider, such a function of pressure is released from start to finish the design. Providers can try out all these functions at the end, but the ISP would be to install for end users (computer users often inexperienced) to maintain and update the system software of the confidence of some. Formulated as Blumenthal and Clark said. "Provider implements the heart of the network ... so that the supplier is likely to add the benefits and limitations to change one part of the network under their control" fifth Thus, the need the leading supplier to the customer in conjunction with easy access to the network core to compete with Internet service providers by the original end to end principle.

In addition to the inherent need to compete, there are several external groups, such as corporate pirates, the government and others that have an impact on Internet service providers. A major concern today is network security. Since the early days of the Internet, the threat of hackers, and users who maliciously hoarding of resources has increased significantly. Thus, suppliers have a strong interest in maintaining a secure network is not only satisfied customers but also to minimize the financial loss for repairs and downtime. Suppliers are now faced with pressure from the government. Agencies like the FCC to adopt rules that providers must follow. Moreover, the government listens to a telephone line for many years, the government could also access the Internet to determine the data content of e-mails or other. Because providers are responsible for the provision, the government can put pressure on suppliers to put information about their customers to open and control their activities and communications. Responding to these requests by the government, ISPs may be additional components in the network is capable of tracking e-mails. In addition to malicious individuals and governments, ISPs face pressure from other companies interested in the growth of the cyber-market. Individual companies can contact the supplier and provide financial incentives for ISPs to integrate their services. For example, a content provider, such as CNBC and CNN, in the vicinity of the supplier and ask them to new exclusive content, including streaming clips of their new site, which also means that the supplier should serve - perhaps a Web cache or mirror - for this content provider. E-commerce may for example be convincing. A similar approach can shop online and ISP partnerships with them to sell their products online directly from the ISP. To reuse a familiar example, AOL has been online stores integrated into the software they offer to their customers. As these cases demonstrate a range of pressure groups outside suppliers.

The problem with these external pressures is that they push from suppliers from start to finish the model. Of course, many of these functions can be implemented either at the end or the network. But in many cases it is advantageous (or necessary) to implement for the supplier to perform the duties in the network. Adding new features requested by the end of the provider-client application or an interface that integrates these functions, such as changing the browser interface. This, however, adds development costs for the supplier and can be a burden on consumers - Internet users in particular novice who has no experience with computers. The user must use the specific interface for all web activities, and the user has to do with the software update. In addition, as described by Blumenthal and Clark said, is quoted ISPs simply trying to change the heart of the network because they have direct access to it. So it is beneficial to ask the ISP, only an external pressure in the heart of the network - it's cheaper and easier. In other words, the various players in the Internet service provider pushing away from the original end to end design.

Having established that groups cause competition and external suppliers of the deviation from end to end principle, the question arises whether this change was positive or negative. Assess the significance of this change, some item or standard can be defined. This is what is best for the Internet? Is the economic interests of competition, technological development or the interests of users? Position that the interests of end users should be considered a priority. Rationale for this position is that the Internet was created, not to sell as a product but also as a tool to communicate to users. The official goal of ISPs and other groups linked to the Internet for customer service in any way. Therefore, priority should be placed on the development of the Internet for the benefit of users. How positively or negatively to judge the end of End-to was Internet service providers and service providers that meet, must first be considered justified.

Ideally, Internet service provider for all groups to which they react under pressure. Of course, ISPs should be sensitive to customers at the end of the supplier of the life force. Another principle of network security is certainly of vital importance for all who use the network to service providers must take steps to secure their networks. When it comes to government, service providers have little choice. Regardless of whether the policy is positive or not, providers must follow to obtain the consent of their legitimate activities. Suppliers should also other commercial interests behind it is often a "good deal". Other companies may bring a lot of revenue for the ISP, should increase profit margins, to allocate resources to explore the network, new technologies to improve and perhaps even below the cost to the consumer. As a result, providers should try to all interests, to put pressure on them to receive the benefit of the Internet Service Provider. The peak due to the fact that these interests require different responses from the manufacturer. Government, business and other security issues is likely to add a product provider's network and away from one end of philosophy. He is to receive the benefit of consumers, but the architecture from end to end.

This tension between maintaining the design from end to end for the consumer and away from it for commercial reasons are usually to the detriment of consumers. In general, government and private sector as a major influence, power, money and men organization. Usually, people do strong institutions that represent them. Moreover, if all suppliers to follow the same practice, people are losing their influence with competing sources, choose to move beyond. Thus, from a business perspective, ISPs are faced with strong incentives for the establishment of government and business groups - which is to go on the Internet from one end to the ideal. However, end to end architecture to limit the control, instead of that other groups may be on the Internet. Limiting the control of other groups leads to freedom for the user and limits the ability of suppliers or other companies to monopolize the Internet. It is based on the Internet are based must be an open network connection who share their thoughts and communicate with other users will be allowed until the end of the beginning. The weakening of one end of the structure the balance of power towards ISPs and commercial interests of restrictions on the freedom that modern users have changed. As Lawrence Lessig in his book Code: "the invisible hand, through trade, an architecture that perfects control building - an architecture that allows to control very effective" 6 This type of control is not in the interest of users. As David Clark and others. other side. suggest that "ensure that users are not in what they can do no more capable than the preservation of limited fundamental design principle of the Internet .... User empowerment is the basic element of "7 Thus, the supplier of the original Internet architecture, which was a negative phenomenon of Internet users have weakened. In short, the Internet service providers to date, not a high priority "user empowerment" given.

While the Internet is not a victim of an "architecture of control" development suppliers have the potential to carry this line of control in the future perfect. The new policy will be vendors, increased competition in broadband services rate and government decisions about a project. idea of how providers make the Internet in the future September-October 2002 Dollars & Sense folders are a very bleak picture of what the Internet can be in hands of the suppliers: "The Internet of today could soon resemble something much like cable TV, with higher prices, limited access and a monotonous diet, the specific content of the company. "Article 8 states that service providers can benefit from certain Web sites to which they have partnerships so that the pages load much faster (according to the article, the cable companies already have the technology to do , and AOL has set priorities for specific sites). The article also describes how providers can different packages that allow users to only visit certain sites to all sites on the Internet, users must pay extra, and the current packages of cable TV. As the elements wisely observes, these measures are a bit short of censorship, with a small individual sites are not running now included in packages9 expensive. The picture becomes even more acute in the vertical integration is considered. As in other industries, the ISP will certainly strive for vertical integration to increase sales. According to Clark et al. other side. "Vertical integration ... requires the removal of some forms of the opening. The user could be forced to use only certain content providers, or to pay for certain protocols, etc. is" 10 Integration Vertical allows Internet service providers has made the use of competitive providers of broadband services, to prohibit, for example. How to merge with the main suppliers of telephone companies and cable for vertical integration, the situation could get worse. Potential FCC decision could stop, the major airlines to share their lines, lines that could cause a sharp rise in prices for small businesses, broadband access and an appreciable restriction of competition in the broadband market11. With such amazing features in mind, we can conclude that the growth of Internet service providers is limited and will continue to be the freedom that Internet users are limited.

In general, it appears that the growth of access to Internet service providers to the Internet is rapidly growing in importance, after the U.S. government stepped in to provide. However, the growth of Internet service providers to a deterioration in the Internet architecture from start to finish led home. This compromise is in the original construction of the Internet for more complex network, which resulted in more controls and regulations. This development will harm individual users of the Internet and has the potential to completely transform the Internet with a network of open communication in a network controlled with little freedom to the user. These events can be neutralized if the supplier to protect people and the recovery from end to end design as the central principle of the end of the Internet are committed. Nevertheless, the prospect of such suppliers movement - remains dark - in the absence of a consumer lobby

Similar Documents

Premium Essay

Ip Addressing

...IP ADDRESSING: An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there." The designers of the Internet Protocol defined an IP address as a 32-bit number[ and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995, standardized as RFC 2460 in 1998, and its deployment has been ongoing since the mid-2000s. In the most widely installed level of the Internet Protocol (IP) today, an IP address is a 32-bit number that identifies each sender or receiver of information that is sent in packets across the Internet. When you request an HTML page or send e-mail, the Internet Protocol part of TCP/IP includes your IP address in the message (actually, in each of the packets if more than one is required) and sends it to the IP address that is obtained by looking up the domain name in the Uniform Resource Locator you requested or in the e-mail address you're sending a note to. At the other...

Words: 1361 - Pages: 6

Premium Essay

Nat Configuration

...Configuring Network Address Translation: Getting Started Document ID: 13772 Contents Introduction Prerequisites Requirements Components Used Conventions Quick Start Steps for Configuring and Deploying NAT Defining NAT Inside and Outside Interfaces Example: Allowing Internal Users to Access the Internet Configuring NAT to Allow Internal Users to Access the Internet Configuring NAT to Allow Internal Users to Access the Internet Using Overloading Example: Allowing the Internet to Access Internal Devices Configuring NAT to Allow the Internet to Access Internal Devices Example: Redirecting TCP Traffic to Another TCP Port or Address Configuring NAT to Redirect TCP Traffic to Another TCP Port or Address Example: Using NAT During a Network Transition Configuring NAT for Use During a Network Transition Example: Using NAT in Overlapping Networks Difference between One−to−One Mapping and Many−to−Many Verifying NAT Operation Conclusion Related Information Introduction This document explains configuring Network Address Translation (NAT) on a Cisco router for use in common network scenarios. The target audience of this document is first time NAT users. Note: In this document, when the internet, or an internet device is referred to, it means a device on any external network. Prerequisites Requirements This document requires a basic knowledge of the terms used in connection with NAT. Some of the definitions can be found in NAT: Local and Global Definitions. Components Used The information in this...

Words: 3234 - Pages: 13

Premium Essay

Personal Statement

...Difference between static and dynamic IPs. When a device is assigned a static IP address, it does not change. The device always has the same IP address. Most devices use dynamic IP addresses, which are assigned by the network when they connect. About static IPs for small business Static IP addresses An Internet Protocol (IP) address is a unique number assigned to each computer on a network. An IP address identifies computers on the Internet. A computer on the Internet can have a static IP address, which means it stays the same over time, or a dynamic IP address, which means the address can change over time. When you might need static IPs You might need static IPs if one or more of these scenarios applies to you: • Maintain your own web server or other Internet server, such as an email server, that requires users to connect from the Internet. • Have external devices or services that must connect to your network via IP address (for example, 74.125.224.72) rather than by name (for example, google.com). • Use a VPN or other service to remotely connect to computers in your business. Well, the first thing I would ask you is what Class of address does 172 fall under? This is vital. (This would be a Class B address because their range is 128-191) Therefore, be definition, the network mask is 255.255.0.0, or /16... Now, with a given IP and mask of 172.25.102.41 /22 you can see that they are using 6 bits for subnetting. (/16 default, and now using /22). This is a mask of...

Words: 464 - Pages: 2

Premium Essay

Ip Addresses Classes and Special-Use Ip Address Space

...IP Addresses Classes and Special-Use IP Address Space The history behind IP address classes can be dated back to September of 1981. With the standardization of IP, each system connected to an IP-based internet required a unique 32-bit internet address value. The first part of the address identifies the network that the host is present in, while the second part identifies that particular host. While more and more host machines are established on a particular network comes the need to properly identify each of them. All host connected to a network share the same network number (which is the first part of the address value) but must have a unique host number (second part). The only way hosts can share the same host number is if they are on 2 different networks. As years past more and more networks were established throughout the entire world. To handle the flexibility of growing networks, internet designers decided that IP address space should be divided into three address classes: Class A, Class B, and Class C. These three classes are the more publicly available classes and are the most well known. There are also two more classes that are not publicly available: classes D and E. These 2 classes are more for experimental purpose and are not issued publicly. Classes are determined by the first few binary bits of a IP address. These bits known as high-order bits are read by IP software to determine the logical network and host addresses for a device. Each class designates what...

Words: 765 - Pages: 4

Premium Essay

Nmnmnnm

...User Guide YML864 Rev1 www.netcomm.com.a� ����4 ��e�� ����e 54Mbps Wireless Router 1 NB504 CoNteNts Package Contents .........................................................................................................................................4 Chapter 1: About this Guide ..........................................................................................................................5 1.1 Purposes ...........................................................................................................................................5 1.2 Conventions .......................................................................................................................................5 1.3 Overview of this User Guide ................................................................................................................5 Chapter 2: Introduction .................................................................................................................................6 2.1 Overview of the Router........................................................................................................................6 2.2 Features ............................................................................................................................................7 2.3 Panel Layout ......................................................................................................................................8 2.3.1 The Front...

Words: 19282 - Pages: 78

Premium Essay

Unknown

...____________________________ Build the OSI Model by providing the following information: Layer # | Layer Name | Function | | | | | | | | | | | | | | | | | | | | | | Internet Protocol The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses contained in the packet. IP defines packet structures that encapsulate the data to be delivered and defines the addressing used to identify the source and destination information. IP is a service in the connection-oriented Transmission Control Protocol (TCP) – thus it is often referred to as the TCP/IP Suite. Two versions of IP: IP Version | Number Format | # of Bits | Example | | | | | | | | | Subnets/Subnetting Subnetting is the practice of dividing a large network into two or more smaller networks (subnets) – this is typically done to improve manageability and performance. Subnet Methods | | | | | Classful: Classful subnetting is a method for allocating IP addresses using five classes of...

Words: 1730 - Pages: 7

Premium Essay

Nt1210 Final Exam

...1. What is a byte? 8 bits 2. When using a truth table, 1 and 0 equal __False____. 3. What do parentheses do in mathematical equations? Indicate what operations do to first 4. What is a node on a network? Hardware connected to the network 5. Which physical topology has the inherent weakness of a single point of failure? Star 6. In a Web address, which part identifies the protocol being used? HTTP 7. What is basic to every networking standard? (Hint: relates to Documentation) Beyond the ideas in a standard, people must agree to a particular version of document 8. Why is the TCP/IP model divided into layers? The layers make TCP/IP easier for humans to understand what TCP/IP does. It also makes it easier to divide the work among different products. * - write protocols, - create standards, - how networks work 9. Which layer of the OSI model is responsible for encryption and compression? Presentation Layer 10. What does the following graphic illustrate? Simple Direct Current being used 11. What is a network encoding scheme? In networking, the encoding scheme defines the electrical equivalent: the electricity that means a 1 or a 0. *Interpreted between nodes 12. What causes full duplex to transmit and receive simultaneously? With full duplex, both endpoints can send at the same time, enabled because the endpoints use multiple wire pairs. Using multiple pairs allows multiple electrical circuits, so the encoders/decoders do not get confused. *for wires ...

Words: 1474 - Pages: 6

Premium Essay

Nt2640 Project Paper

...lookup: a. Routing Table Format- A routing table is used by TCP/IP network routers to calculate the destinations of messages it is responsible for forwarding. The table is a small in-memory database managed by the router's built-in hardware and software. Each IP address identifies a remote router (or other network gateway) that the local router is configured to recognize. For each IP address, the routing table additionally stores a network mask and other data that specifies the destination IP address ranges that remote device will accept. Home network routers utilize a very small routing table because they simply forward all outbound traffic to the Internet Service Provider (ISP) gateway which takes care of all other routing steps. Home router tables typically contain ten or fewer entries. By comparison, the largest routers at the core of the Internet backbone must maintain the full Internet routing table that exceeds 100,000 entries and growing as the Internet expands. b. Routing Lookup Mechanism- c. Classful vs. Classless Routing- Classful Routing, which is sometimes called a classful network. If you are using a classful routing protocol then all of your networks are in different classes and are separated by a router. Remember that the useable IPv4 address ranges are divided into classes. Class A 1-126, Class B 128-191, and Class C 192-223. So when we talk about a classful routing protocol, it will only look at the IP address class and not the subnet mask. This is the problem;...

Words: 3788 - Pages: 16

Premium Essay

Ip Spoofing

...12/7/2014 IP Spoofing ­ Cisco Systems The Internet Protocol Journal, Volume 10, No. 4 IP Spoofing HOME ABOUT CISCO PUBLICATIONS AND MERCHANDISE THE INTERNET PROTOCOL JOURNAL ISSUES VOLUME 10, NUMBER 4, DECEMBER 2007 Book Review Call for Papers Download PDF Fragments From the Editor IP Spoofing Looking Toward the Future Remembering Itojun Security Standards Layers above IP use the source address in an incoming packet to identify the sender. To communicate with the sender, the receiving station sends a reply by using the source address in the datagram. Because IP makes no effort to validate whether the source address in the packet generated by a node is actually the source address of the node, you can spoof the source address and the receiver will think the packet is coming from that spoofed address. Many programs for preparing spoofed IP datagrams are available for free on the Internet; for example, hping lets you prepare spoofed IP datagrams with just a one­line command, and you can send them to almost anybody in the world. You can spoof at various network layers; for example, you can use Address Resolution Protocol (ARP) spoofing to divert the traffic intended for one station to someone else. The Simple Mail Transfer Protocol (SMTP) is also a target for spoofing; because SMTP does not verify the sender's address, you can send any e­mail to anybody pretending to be someone else. This article focuses on the various types of attacks that involve IP spoofing on networks...

Words: 3181 - Pages: 13

Premium Essay

Subnetting Made Easy

...SUBNETTING MADE EASY [pic] [pic] IP Classes The class system has become "old" in the ever demanding Internet paradigm, it has been (partially) replaced by CIDR system, which allows more efficient and practical allocation of IP addresses for the need of smaller networks. Nevertheless, it is important to know and understand what class system is and how it works, which has been the backbone of the IP. IP addresses have been classified into 5 classes and special purpose addresses, depending upon the value in the first octet. Viz- • Class A - This is a class for very large networks, such as IBM which holds IP addresses in the range - 9.0.0.0 - 9.255.255.255. (almost 16,777,216 IP addresses). First Octet - - The first octet is between 1 to 126. (Starts with binary bit - 0). Network Address - The n/w address is denoted by first 8 bits or first octet. Host/Node Address - Host address is denoted by last 24 bits or last 3 octets. This Network-Host IP configuration for class A can be shown as - network.host.host.host and each can have 1 to 3 decimals. Thus forming 126 network addresses (27 - 1) and each of them capable of having 16,777,214 (224 -2) host addresses. • Class B - This is a class for medium-sized networks. First Octet - - The first octet is between 128 to 191. (Starts with binary bits - 10). Network Address - The n/w address is denoted by first 16 bits or first 2 octets. Host/Node Address...

Words: 833 - Pages: 4

Premium Essay

Dns in Small Networks Step-by-Step Guide

...when the domain controller receives a query with the name of the computer. This guide explains how to set up DNS on a simple network that consists of a single domain. Contents Step-by-Step Guide for DNS in Small Networks 5 Planning DNS 6 Understanding the DNS namespace 6 Designing a DNS namespace 8 Creating an Internet DNS domain name 9 Creating internal DNS domain names 9 Creating DNS computer names 9 Installing and Configuring AD DS and DNS 11 Configuring Client Settings 19 Advanced DNS Configuration 27 Adding resource records 28 Automatically removing outdated resource records 29 Troubleshooting DNS 31 Step-by-Step Guide for DNS in Small Networks Domain Name System (DNS) is a system for naming computers and network services that maps those names to network addresses and organizes them into a hierarchy of domains. DNS naming is used on TCP/IP networks, such as the Internet and most corporate networks, to locate computers and services by using user-friendly names. When a user enters the DNS name of a computer in an application, DNS can look up the name and provide other information that is associated with the computer, such as its IP address or services that it provides for the network. This process is called name resolution. Name systems, such as DNS, make it easier to use network resources by providing users with a way...

Words: 5078 - Pages: 21

Premium Essay

Networkd and Webdesign

...which includes the async serial ports which are usually used with the dial up modems and synchronous telecom services. Using Ethernet, only on synchronous links, it will be able to use 100BASE-TX 4B/5B or 1000BASE- X 8B/10B encoding for making an Ethernet-like serial implication. And the result of this will be less efficient too. Point-to point protocol is a commonly used data link protocol for establishing direct connection. The connection authentication, encryption, transcription and compression are provided in by the PPP. The PPP is used in many types of networks like phone line, cellular telephone, serial cable, specialized radio links and fiber optical links. The PPP which is used over the Internet access is called broadband. The most commonly used forms of PPP by the Internet service providers are...

Words: 2617 - Pages: 11

Premium Essay

Ip Address Classes

...IP Addresses Classes and Special-Use IP Address Space The A, B, C IP address classes were first introduced in the 1970s as the original routing scheme to organize IP addresses into manageable, recognizable chunks. They were designed to signify different sizes of networks. Class A was for large networks that didn’t need many networks but instead needed a lot of hosts. Class B was medium sized with more networks but less hosts. Class C was for small organizations that needed many networks but few hosts. This system worked well until the 1990s when, due to demand, a classless system was developed called the CIDR (classless inter domain routing) system. CIDR allows for a more flexible allocation and customization of a network’s routing system. The address spaces are as follows: Class A’s first octet ranges from 1 to 126 Class B’s first octet ranges from 128 to 191 Class C’s first octet ranges from 192 to 223 Class D’s first octet ranges from 226 to 239 and are multicast addresses comprised of either pull or push types. A first octet that starts with 127, 224 and 225 are reserved for government use and testing. RFC 1918 IP address ranges are private and can be used within any network to subnet or expand their network. They will never go over the internet and are automatically dropped by any router connected to the internet. They are as follows: Class A = 10.0.0.1 through 10.255.255.254 Class B = 172.16.0.1 through 172.31.255.254 Class C = 192.168.0.1 through 192.168...

Words: 445 - Pages: 2

Premium Essay

Secured Infrastructure Development for Educational University Using Servers, Firewalls and Biometric Devices

...------------------------------------------------- Department of Electrical, Computer & Communications Engineering ------------------------------------------------- MSc Project Final Project Report ------------------------------------------------- Title: Secured infrastructure development for educational university using servers, firewalls and biometric devices ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Author: Azhar ur Rehman ------------------------------------------------- ------------------------------------------------- Academic Session: 2008-2009 ------------------------------------------------- Supervisor: Mr.Manoj Pongubhati Course Title: Msc computer systems and networking Mode of Study: Full Time ACKNOWLEDGEMENT First and foremost I would like to dedicate my thesis to my parents and want to thank Prof. Mr. Manoj pongubhati, my research dissertation supervisor, for giving me an opportunity to work on the dissertation of my interest and encouraging me throughout my work. His support and patience helped me overcome many difficult times during my dissertation research. I am also deeply grateful to Mr Ali Ahmed, a good friend and guardian who is working as an Assistant Manager with Dynamic Associates Info Pvt Ltd was actively involved with my research. The day I started working under the professional guidance of Dynamic...

Words: 7221 - Pages: 29

Premium Essay

Juyh

...automatically provides an Internet Protocol (IP) host with its IP address and other configurations information such as the subnet mask and default gateway. RFCs 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF) standard based on Bootstrap Protocol (BOOTP), a protocol which DHCP shares many operation details. DHCP allows hosts to obtain required TCP/IP configuration information from a DHCP server. Dynamically Host Configuration Protocol (DHCP) provides four key benefits to managing and maintaining a TCP/IP networks. Those four terms are centralized administration of IP configuration, Dynamic Host Configuration, Seamless IP host configuration, and Flexibility and Scalability. DHCP has reliable IP address configuration, which minimizes configuration errors caused by manual IP address configuration, such as address conflicts caused by the assignment of an IP address to more than one computer at the same time. DHCP also benefits in reducing network administration. DHCP reduce the network administration by using centralized and automated TCP/IP configuration. It has the ability to define the TCP/IP configurations from a central location and the ability to assign a full range of additional TCP/P configuration values by means of DHCP options. DHCP is safe and reliable configuration, and also reduces configuration management. Dynamic Host Configuration Protocol (DHCP) has some advantages over a statically assigning the client with an IP address. One advantage...

Words: 419 - Pages: 2