...Huffman Trucking Service Request SR-ht-010 NTC/361 Huffman Trucking Service Request SR-ht-010 Huffman Trucking is a national transportation company that provides carrier services for various vendors, including the United States Government. At present the company has a main office in Cleveland Ohio and hubs located in California, Missouri, and New Jersey (Apollo Group, Inc., 2012) . The ability to remain competitive relies on capable employees and efficient systems that operate at full capacity. The company is in the midst of developing the yearly budget and is examining all of the current systems in place. The Chief Information Officer (CIO) has requested a full review of all the current telephone and data network systems in all locations. Along with the review, recommendations for changes are also required. This document will outline Huffman Trucking’s systems and identify areas for improvement to maintain the company’s high level of service. Telephone Systems Looking at the current systems in the four plants and offices one can see that all four of the offices and plants have different telecommunication systems. Huffman Trucking has locations in four states with offices and plants located in California, Missouri, New Jersey, and Ohio. Many of the locations are using wiring that is not adequate for the system to have the capabilities to function in a business capacity. The California and New Jersey locations use a plain old telephone system (POTS), Private Branch Exchange...
Words: 3605 - Pages: 15
...Unit 1 discussion 1: familiar protocols Q 1) What role does TCP/IP play for internet communications? TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP. Q 2) What role does IP play in data transfer over the internet? IP is a protocol. Simply said, a protocol is a set of rules governing how things work in a certain technology, so that there is some kind of standardization. When put into a network communication context, a protocol is the set of rules governing how packets are transmitted over a network. When you have a protocol, you are sure that all machines one a network (or in the world, when it comes to the Internet), however different they might be, speak the 'same language' and can integrate into the whole framework. IP is probably the most common protocol over the Internet. It is the set of rules governing how packets are transmitted over the Internet. The IP protocol standardizes the way machines over the Internet or any IP network forward or route their packets based on their IP addresses. Q 3) How does Dynamic host configuration protocol ease management of IP addresses...
Words: 573 - Pages: 3
...stands for 1x Evolution - Data Voice, and is characterized by a maximum data rate of 5.2 Mbps and the ability to support wireless Voice over IP (VoIP) services. 1xRTT. The first phase of CDMA2000, characterized by the ability to support a maximum data rate of 1.44 Kbps. 1xRTT stands for 1x, denoting the one radio channel of 1.25 MHz in Radio Transmission Technology. 2G. The second generation of wireless technology that was characterized by its use of digital transmissions rather than analog methods. Radio bandwidth is used for data transmissions. Data transmissions are limited to a maximum rate of 1.44 Kbps for CDMA 2G services (9.6 Kbps for GSM 2G). Radio bandwidth is consumed whenever the Mobile Node (MN) is connected to the Internet, regardless of whether it is receiving or transmitting data. This is based on the IS-95A standard for CDMA. 2.5G. An evolutionary step between 2G and 3G wireless services wherein two enhancements were introduced over 2G. The first is that the MN only consumes radio bandwidth when data is being transmitted or received. The second is that the maximum data rate increased to approximately 64 Kbps. Most 2.5G services only support data rates between 1.15 Kbps and 384 Kbps. This is based on the IS-95B standard for CDMA. 3G. The third generation of wireless technology, wherein data services are packetized, with speeds up to 2 Mbps. Based on the CDMA2000 standards. 3GPP. Third Generation Partnership Project. A group of organizational...
Words: 7125 - Pages: 29
...Security Proposal Nickolas Dunkle Isaac Mundt Michael Yeager Thomas Sevastos John Dyer Jacob Skrzynski Joseph Weidner Pam Marshall Christopher Montgomery ITT Technical Institute Network Systems Administration Capstone Project Ryan Rucker May 17, 2015 Part 1 - Structure of WAN In this design of a high level network for ABC Company we will provide a basic written infrastructure of both the local and wide area networks we are to build for them, being such an early stage this document is subject to change. This design includes the infrastructure for the corporate headquarters located in San Francisco, as well as the other design centers in Detroit, Paris, Tokyo, and Sao Paulo. We then follow up by explaining the infrastructure of the sales offices, which may not require as high grade of equipment as the design centers depending on its requirements. Finishing with the overview of the entire wide area network, connecting each site to the corporate headquarters which is where we will begin our design. The corporate office being the main headquarters will include many services such as file, print, email, directory, and application. These services will be separated onto at least two different servers due to the constant strain we may see from directory and email services. If necessary we will implement an application server as well to run any in-house programs the company may be familiar with. We also suggest the use of a database server dedicated to storing...
Words: 5812 - Pages: 24
...(VPN) is used to transport data from a private network to another private network over a public network, such as the Internet, using encryption to keep the data confidential. In other words, a VPN is an encrypted connection between private networks over a public network, most often the Internet. VPNs provide the following services: Confidentiality: VPNs prevent anyone in the middle of the Internet from being able to read the data. The Internet is inherently insecure as data typically crosses networks and devices under different administrative controls. Even if someone is able to intercept data at some point in the network they won’t be able to interpret it due to encryption. Integrity: VPNs ensure that data was not modified in any way as it traversed the re Internet. Authentication: VPNs use authentication to verify that the device at the other end of VPN is a legitimate device and not an attacker impersonating a legitimate device. Cost savings - VPNs enable organizations to use the global Internet to connect remote offices and remote users to the main corporate site, thus eliminating expensive, dedicated WAN links and modem banks. Security - VPNs provide the highest level of security by using advanced encryption and advanced authentication protocols that protect data from unauthorized access. Scalability - Because VPNs use the Internet infrastructure within ISPs and devices, it is easy to add new users. Corporations are able to add large amounts of...
Words: 6523 - Pages: 27
...Computer Engineering ELEG 777 Internet Engineering ( TERM PAPER ) Use of IPSec in Mobile IP DONE BY: SALEM ITANI SUBMITTED TO: Dr. AYMAN KAYSSI DATE: MAY 21, 2001 ID #: 20011003 INTRODUCTION As mobile computing has become a reality, new technologies and protocols have been developed to provide to mobile users the services that already exist for non-mobile users. Mobile IP, one of these technologies, enables a node to change its point of attachment to an internet in a manner transparent to applications running on top of the protocol stack, since its IP address does not change. To provide this transparency, new elements are required: the “home agent”(HA), located in the home network, will forward all incoming packets addressed to the mobile node’s (MN) new location. The foreign agent (FA) is responsible for providing a temporary address to the MN. The flexibility of communication through the Internet allows the existence of such protocols as Mobile IP. As much as this is true, it is as well the fact that every time new protocols or services are made available on the Internet, new security challenges arise. IPSec has been developed as a protocol to provide security at the IP layer. That is to say, using IPSec all communications on the Internet can be accomplished in a secure fashion. Providing security is not an easy task, since many situations have to be taken into account. The approach IPSec uses to address security is by managing two key concepts: ...
Words: 9748 - Pages: 39
...(N10-004). If you would like to report an error or contribute additional information, please use the contact link at the bottom of the site, or post in our forums. We hope you find this guide useful in your studies. Sponsor Domain 1.0: Network Technologies Domain 1.1: Common Networking Protocols TCP - TCP breaks data into manageable packets and tracks information such as source and destination of packets. It is able to reroute packets and is responsible for guaranteed delivery of the data. IP - This is a connectionless protocol, which means that a session is not created before sending data. IP is responsible for addressing and routing of packets between computers. It does not guarantee delivery and does not give acknowledgement of packets that are lost or sent out of order as this is the responsibility of higher layer protocols such as TCP. UDP - A connectionless, datagram service that provides an unreliable, best-effort delivery. ICMP - Internet Control Message Protocol enables systems on a TCP/IP network to share status and error information such as with the use of PING and TRACERT utilities. SMTP - Used to reliably send and receive mail over the Internet. FTP - File transfer protocol is used for transferring files between remote systems. Must resolve host name to IP address to establish communication. It is connection oriented (i.e....
Words: 1264 - Pages: 6
...Technical security officer: responsible for the configuration, design, deployment and maintenance of information security program, including policies, procedures, technical systems, and workforce training in order to maintain the confidentiality, integrity, and availability of data within the company. ABOUT ETIHAD: founded on 2003, based on Abu Dhabi. Slogan: “from AD to the world”. Etihad Airways is the 4th largest airline in the Middle East and 2nd largest airline in the UAE, after Emirates airlines….James Hogan Chief Executive Officer on 2006…sponsored many sports events such as rugby and formula 1 Abu Dhabi Grand Prix.…..received many awards such as “Best First Class", "Best First Class Seats" and "Best First Class Catering" 2010 opened route from AD to Seoul….Last week sign agreement with Korean air… #1) What attracted you to the field of Information Security? #2) What brings you to us? #3) Do you pursue any information security research outside of your current employer? I like to see candidates who enthusiastically brag about their test lab at home, or what they have recently done at an Information Security conference or convention. I want people on my team who take pride in their work, not a ticket pusher who is just in it to close as many tickets as possible and go home. #4) Why would you like to work in this position? - To help the organization succeed with their achievements by securing their confidentialities and ease to communicate with outsiders. #5) How...
Words: 1244 - Pages: 5
...Austrie Unit 8Assignment Purdue University IT279 Certified Information Systems Security Professional 2 Professor Laurent Boucard 6/13/18 1) What is a common implementation for the IPSec protocol? The best and commonly used implementation for the IPSec is VPN that uses the Cisco routers to protect the system against risk vulnerabilities. There are four major basic steps applied in utilizing IPSec VPN protocol that ensures the system is same and free from external attacks. The four steps include the encryption of data transmission, validation of data integrity, authentication of data source, as well as ensuring data integrity (International Council of E-Commerce Consultants, 2010). 2). which command should you use?...
Words: 921 - Pages: 4
...Mr. McClain April 8, 2013 IPv6 What does IPv6 stand for? What exactly is IPv6? IPv6 stands for Internet Protocol version 6. IPv6 is the next generation internet protocol that is in the making of taking over the current internet protocol which is IPv4 or Internet Protocol version 4. Continue reading to learn more about IPv6. “The current version of the Internet Protocol IPv4 was first developed in the 1970s, and the main protocol standard RFC 791 that governs IPv4 functionality was published in 1981. With the unprecedented expansion of Internet usage in recent years - especially by population dense countries like India and China. The impending shortage of address space (availability) was recognized by 1992 as a serious limiting factor to the continued usage of the Internet run on IPv4. With admirable foresight, the Internet Engineering Task Force (IETF) initiated as early as in 1994, the design and development of a suite of protocols and standards now known as Internet Protocol Version 6 (IPv6), as a worthy tool to phase out and supplant IPv4 over the coming years. There is an explosion of sorts in the number and range of IP capable devices that are being released in the market and the usage of these by an increasingly tech savvy global population. The new protocol aims to effectively support the ever-expanding Internet usage and functionality, and also address security concerns. IPv6 uses a128-bit address size compared with the 32-bit system used in IPv4 and will allow...
Words: 950 - Pages: 4
...Jashawn Dixon CSCI 501: Overview of Computer Security Discussion Board One Dr. Huggins July 1, 2015 Since the birth of the internet, we have seen numerous changes within the world progress day to day and along with these changes, we have seen issues that have also had effects on the security feature of numerous assets that works side by side with the operation of the internet. This week’s discussion board question ask for a summary of a recent security incident and to link that information to a topic from Chapter 1 of our text, along with a biblical example that could be tied to the topic at hand. My current event computer security incident comes from Computer Weekly and the post is on how “Most VPNs leak user details, study shows” by Warwick Ashford. Ashford posting is about virtual private network (VPN) and it speaks on how 80 percent of the tested VPN providers, has shown some form of user’s information being leaked by their software, due to a vulnerability known as IPv6 leakage. According to Kim & Solomon (2014) text under Wide Area Network (WAN) Domain connects, “a VPN is a dedicated encrypted tunnel from one endpoint to another.” The purpose of a VPN is to ensure the proper level of security to the connected systems when the primary network set-up alone cannot provide it. The term vulnerability is known as “a weakness that allows a threat to be realized or to have an effect on an asset;” according to Kim & Solomon (2014) text and this IPv6 leakage occurred...
Words: 713 - Pages: 3
...growth of Internet, will IPv4 survive?” (Focus on security, quality of service, and migration method) “We are about 10.2 percent (IPv4 address space) remaining globally,” John Curran, president and CEO of American Registry for Internet Numbers (ARIN) told InternetNews.com in January 7, 2010. That is means, we will run out of Internet Protocol version four (IPv4) address space and the real difficult part is that there is no exact date. If things continue, we will have to say no for the very first time. Say no to an Internet Protocol version four (IPv4) request will be shocking to some organizations, which is why American Registry for Internet Numbers (ARIN) is trying to get the word out now on the importance of moving to Internet Protocol version six (IPv6). The Internet Protocol version six (IPv6) address space, the next generation of Internet Protocol (IP) addressing, provides 340 trillion trillion trillion (34x10 to the 38th power) internet addresses. The question is what will happen to Internet Protocol version four (IPv4) in future? Is Internet Prorocol version four (IPv4) may be available for a longer period of time? Before further discussing the topic, we should know what is Internet Protocol (IP). Internet Protocol (IP) is a set of technical rules that defines how computers communicate over a network. Now, there are two versions of Internet Protocol (IP), there are Internet Protocol version four (IPv4) and Interner Protocol version six (IPv6). Internet Protocol version...
Words: 3742 - Pages: 15
...Network Security Planning By: Marticia Goodwin CIS 532 / Professor Danielle Babb August 19, 2012 Strayer University SAFE is a reference architecture that network designers can use to simplify the complexity of a large internetwork in which the architecture lets you apply a modular approach to network design. Traditional point security tools are limited in their ability to support and securing a business transformation, either leaving critical new resources unprotected or preventing the deployment of new services as they do not secure new processes and protocols. At the same time, organizations are facing a host of new threats that target many of these new services and impact network and service availability (Lippis, 2012). With SAFE, you can analyze the functional, logical, and physical components of a network and thus simplify the process of designing an overall enterprise network, but CISCO SAFE architecture is especially concerned with security. SAFE takes a defense in-depth-approach in which multiple layers of protection are strategically located throughout the network and the layers are under unified strategy for protecting the entire network and the various components of the network, including individual network segments, infrastructure devices, network services, endpoints, and applications (Oppenheimer, 2011). SAFE architecture is comprised of the following major modules: core, data center, campus, management, WAN Edge, Internet Edge, branches, extranet, partner...
Words: 974 - Pages: 4
...Internet Protocol is a set of technical rules that defines how computers communicate over a network. There are currently two versions: IP version 4 (IPv4) and IP version 6 (IPv6). IPv4 was the first version of Internet Protocol to be widely used, and accounts for most of today’s Internet traffic. There are just over 4 billion IPv4 addresses. While that is a lot of IP addresses, it is not enough to last forever. IPv6 is a newer numbering system that provides a much larger address pool than IPv4, amongst other features. It was deployed in 1999 and should meet the world’s IP addressing needs well into the future. The major difference between IPv4 and IPv6 is the number of IP addresses. There are 4,294,967,296 IPv4 addresses. In contrast, there are 340,282,366,920,938,463,463,374, 607,431,768,211,456 IPv6 addresses. IPv6 has many advantages compared with the older Internet protocol IPv4. The most useful advantages of IPv6 are address space extention, and simplified header format for efficient packet handling. Processing packets of IPv6 by routers is easier than processing packets of IPv4, because the hardware program knows in advance that the coming header is static in length. Thus the packet processing speed increases. There are three types of address in IPv6: anycast, unicast and multicast. In IPv4 there are unicast, broadcast, and multicast address. The anycast address is an additional address to IPv6, for sending the packet to the nearest node in the...
Words: 936 - Pages: 4
...“With the growth of Internet, will IPv4 survive?” Note: Please focus on security, quality of service, and migration method. Introduction Humans are social who depend on the interaction with others for daily needs. Throughout human history, people some of them with few exceptions, have expended on the structure of various community networks for carrier, safety, food and companionship. Actually, people have been networked for a very long time. The ways in which humans interact are constantly changing. For this time being, sounds and gestures were all humans used to communicate is now replaced by the Internet which allows people share all types of communication such as documents, pictures, sound and video with billions of people near and far using computers. For the students and educational purposes the internet is widely used to gather information so as to do the research or add to the knowledge of any sort of subject they have. Even the business personals and the professions like lecturers, engineers doctors need to access the internet to filter the necessary information for their use. The internet is therefore the largest encyclopedia for everyone, in all age categories. Besides, not to forget internet is useful in providing with most of the fun these days such as games, social network service, instant messaging, networking conferences, video sharing or the online movies, songs, dramas and quizzes. In that, internet has provided people with a great opportunity to eradicate...
Words: 2988 - Pages: 12