...INTERNET PROTOCOLS & APPLICATIONS * TCP/IP: The TCP/IP suite of protocols has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. * IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell Corporation’s network operating system, NetWare. It delivers functions similar to those included in TCP/IP. Novell in its current releases supports the TCP/IP suite. A large installed base of NetWare networks continue to use IPX/SPX. * NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each other on a large network. NetBEUI is suitable for small peer-to-peer networks, involving a few computers directly connected to each other. It can be used in conjunction with another routable protocol such as TCP/IP. This gives the network administrator the advantages of the high performance of NetBEUI within the local network and the ability to communicate beyond the LAN over TCP/IP. * AppleTalk: AppleTalk is a protocol suite to network Macintosh computers. It is composed of a comprehensive set of protocols that span the seven layers of the Open Systems Interconnection (OSI) reference model. The AppleTalk protocol was designed to run over LocalTalk, which is the Apple LAN physical topology...
Words: 1711 - Pages: 7
... INTERNET PROTOCOL (IP) The primary network communications protocol used on networks today is the IP (Internet Protocol). IP relays or transfers network packets, also known as datagrams, to destinations on local networks or across the public Internet. It defines the structures which encapsulate information as well as the legal addressing methods used to identify the source and destination network hosts or computing devices. IP was the datagram service included with the TCP (Transmission Control Program) protocol providing a connectionless service coupled with the connection-based TCP protocol. The primary version of the protocol in use on the Internet today is IPv4, Internet Protocol Version 4. TCP (TRANSMISSION CONTROL PROTOCOL): TCP/IP is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network. When we set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that we may send messages to or get information from also has a copy of TCP/IP. TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet...
Words: 720 - Pages: 3
...MEANING OF INTERNET PROTOCOL SECURITY Internet Protocol Security is a framework of open standards for ensuring private secure connections over internet protocol (IP) networks through the use of cryptographic security services. It encrypts and authenticates each communication package on the network in a communication session. It can be used to protect communication between data hosts, security gate ways or security gateway and host. It has been deployed widely to implement virtual private networks. It supports two encryption modes, tunnel and transport. The transport mode encrypts only the data section of each packet while the tunnel mode encrypts both the header and the data section. On the receiving side, an Internet protocol security compliant device decrypts both the header and the data portion to present it to the user in a format he can understand. In the recent past there has been a lot of development in the information technology sector. Much if this development is based in information. It is therefore important to protect the information since it is not only precious and private, but if found in the wrong hands, it could be used to do a lot of damage for example terrorism. It has forced tech companies to develop secure ways of transmitting information without the interception of non-intended users. Information is a strategic resource. A significant portion of organizational budgets is spent on managing information. Hence information is a huge business where loads of...
Words: 1373 - Pages: 6
...8/17/14 The current version of the Internet Protocol IPv4 was first developed in the 1970s, and the main protocol standard RFC 791 that governs IPv4 functionality was published in 1981. With the unprecedented expansion of Internet usage in recent years, especially by population dense countries like India and China, the impending shortage of address space (availability) was recognized by 1992 as a serious limiting factor to the continued usage of the Internet run on IPv4 (Das, 2013). The Internet Protocol version 6 (IPv6) is the latest revision of the Internet Protocol (IP). It is a communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. IPv6 is intended to replace IPv4, which still carries the vast majority of Internet traffic as of 2013. As of late November 2012, IPv6 traffic share was reported to be approaching 1% (Wikipedia, 2013). On the Internet, data is transmitted in the form of network packets. IPv6 specifies a new packet format, designed to minimize packet header processing by routers. Because the headers of IPv4 packets and IPv6 packets are significantly different, the two protocols are not interoperable. However, in most respects, IPv6 is a conservative extension of IPv4. Most transport and application-layer protocols need little or no change to operate...
Words: 913 - Pages: 4
...Deserae Caldwell Ip troubleshooting The Internet Protocol Suite and the OSI Reference Model Traceroute The traceroute utility sends out either ICMP echo request (Windows) or UDP (most implementations) messages with gradually increasing IP TTL values to probe the path by which a packet traverses the network. The first packet with the TTL set to 1 will be discarded by the first hop, and the first hop will send back an ICMP TTL When the machine running the traceroute receives the ICMP TTL exceeded message, it can determine the hop via the source IP address. This continues until the destination is reached. The destination will return either an ICMP echo reply (Windows) or a ICMP port unreachable, indicating that the destination had been reached. Traceroute can return useful information about TCP/IP connectivity across your network Example of traceroute Return Codes | Code | Meaning | Possible Cause(s) | nnmsec | This gives, for each node, the round-trip time (in milliseconds) for the specified number of probes. | This is normal. | * | The probe timed out. | A device along the path either did not receive the probe or did not reply with an ICMP "packet life exceeded" message. | A | Administratively prohibited. | A device along the path, such as a firewall or router, may be blocking the probe and possibly other or all traffic; check access lists. | Q | Source quench. | A device along the path may be receiving to much traffic; check input queues. | H | An ICMP unreachable...
Words: 906 - Pages: 4
...IPv4 Internet Protocol - A Brief History At the end of the 1960's there was a great demand in various US universities and research centers for a network that should permit nationwide utilization of existing computer resources. In addition to that there was the desire for data exchange. On the other hand there was the interest in practical experiences, design, implementation, the use of network techniques in general and packet switching in particular. So the Advanced Research Project Agency, an US government organization, started developing a net called ARPANET. From 1972 the Advanced Research Project Agency dealt with research projects of military interests and ARPANET was renamed DARPA. The first proposal was made in 1968. The contract was won in December 1968 by the company Bolt, Breakneck and Newman (BBN). The demands for file transfer, remote login and email were on top of the list for NCP (Network Control Protocol, the predecessor of TCP/IP). The first use of ARPANET was in 1971. In 1973, a project was started, developing new lower layer protocols because the existing layers had become functionally inadequate. So Cerf and Kahn specified the following goals for the lower layer protocols in 1974: • Independence from underlying network techniques and from the architecture of the host • Universal connectivity throughout the network • End-to-end acknowledgments • Standardized application protocols In 1981 the TCP/IPv4 was standardized in ARPANET RFC's. The...
Words: 298 - Pages: 2
...Definition Networked computer systems are rapidly growing in importance as the medium of choice for the storage and exchange of information. However, current systems afford little privacy to their users, and typically store any given data item in only one or a few fixed places, creating a central point of failure. Because of a continued desire among individuals to protect the privacy of their authorship or readership of various types of sensitive information, and the undesirability of central points of failure which can be attacked by opponents wishing to remove data from the system or simply overloaded by too much interest, systems offering greater security and reliability are needed. Freenet is being developed as a distributed information storage and retrieval system designed to address these concerns of privacy and availability. The system operates as a location-independent distributed file system across many individual computers that allow files to be inserted, stored, and requested anonymously. There are five main design goals: 1.Anonymity for both producers and consumers of information 2.Deniability for storers of information 3.Resistance to attempts by third parties to deny access to information 4.Efficient dynamic storage and routing of information 5.Decentralization of all network functions The system is designed to respond adaptively to usage patterns, transparently moving, replicating, and deleting files as necessary to provide efficient service without...
Words: 700 - Pages: 3
...ip route 0.0.0.0 0.0.0.0 10.255.255.1 router eigrp 100 network 10.0.0.0 no auto-summary int s0/0/0 ip summary-address eigrp 100 10.1.0.0 255.255.0.0 ip dhcp pool B1_VLAN10 network 10.1.10.0 255.255.255.0 default-router 10.1.10.1 dns-server 10.0.1.4 exit ip dhcp pool B1_VLAN20 network 10.1.20.0 255.255.255.0 default-router 10.1.20.1 dns-server 10.0.1.4 exit ip dhcp pool B1_VLAN30 network 10.1.30.0 255.255.255.0 default-router 10.1.30.1 dns-server 10.0.1.4 exit ip dhcp pool B1_VLAN88 network 10.1.88.0 255.255.255.0 default-router 10.1.88.1 dns-server 10.0.1.4 exit ip dhcp excluded-address 10.1.10.1 10.1.10.10 ip dhcp excluded-address 10.1.20.1 10.1.20.10 ip dhcp excluded-address 10.1.30.1 10.1.30.10 ip dhcp excluded-address 10.1.88.1 10.1.88.24 B2 hostname B2 int s0/0/0 ip address 10.255.255.6 255.255.255.252 no sh encapsulation frame-relay frame-relay lmi-type q933a exit ip route 0.0.0.0 0.0.0.0 10.255.255.5 router eigrp 100 passive-interface fa0/0.10 passive-interface fa0/0.20 passive-interface fa0/0.30 passive-interface fa0/0.99 network 10.0.0.0 no auto-summary int s0/0/0 ip summary-address eigrp 100 10.2.0.0 255.255.0.0 ip dhcp pool B2_VLAN10 network 10.2.10.0 255.255.255.0 default-router 10.2.10.1 dns-server 10.0.1.4 exit ip dhcp pool B2_VLAN20 network 10.2.20.0 255.255.255.0 default-router 10.2.20.1 dns-server 10.0.1.4 exit ip dhcp pool B2_VLAN30 network 10.2.30.0 255.255.255.0 default-router 10.2.30.1 ...
Words: 3046 - Pages: 13
...Voice over Internet Protocol (VoIP) is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular phone line. The technology was introduced in 1995, and has developed into an enormous enterprise since then. I will be presenting an overview of the technologies that brought VoIP to fruition, the methods of connecting, benefits, and drawbacks. VoIP is a general term for a family of transmission technologies for voice communications over the internet. Other terms associated with VoIP are; IP telephony, internet telephony, Voice over Broadband (VoBB), broadband telephony, and broadband phone. All of these terms mean essentially the same thing: voice communications that are sent over the internet instead of through the Public Switched Telephone Network. The technical mechanisms that allow this to happen will be explained in detail later. In 1995, VocalTec released the first commercial internet phone software (Wikipedia, 2010). Called “Internet Phone”, the application was designed to function on a home based computer system similar to how PC phones are used today. Mike Anderson says, “Although many people took a liking to the concept, there were major drawbacks in terms of quality and overall efficiency. At the time, the use of dial-up modems and lack of broadband availability resulted in poor voice quality when compared to the typical analog phone call. Despite the issue of quality, Vocaltec’s achievement is still viewed as...
Words: 1761 - Pages: 8
...Huffman Trucking Service Request SR-ht-010 NTC/361 Huffman Trucking Service Request SR-ht-010 Huffman Trucking is a national transportation company that provides carrier services for various vendors, including the United States Government. At present the company has a main office in Cleveland Ohio and hubs located in California, Missouri, and New Jersey (Apollo Group, Inc., 2012) . The ability to remain competitive relies on capable employees and efficient systems that operate at full capacity. The company is in the midst of developing the yearly budget and is examining all of the current systems in place. The Chief Information Officer (CIO) has requested a full review of all the current telephone and data network systems in all locations. Along with the review, recommendations for changes are also required. This document will outline Huffman Trucking’s systems and identify areas for improvement to maintain the company’s high level of service. Telephone Systems Looking at the current systems in the four plants and offices one can see that all four of the offices and plants have different telecommunication systems. Huffman Trucking has locations in four states with offices and plants located in California, Missouri, New Jersey, and Ohio. Many of the locations are using wiring that is not adequate for the system to have the capabilities to function in a business capacity. The California and New Jersey locations use a plain old telephone system (POTS), Private Branch Exchange...
Words: 3605 - Pages: 15
...Case Study3: Design Scenario Klamath Paper Products Name: Fabio M. Cesar Professor: Edwin Otto Course: Network Architecture and Analysis Date: 12/04/2012 Many routing protocols are based on algorithms designed to obtain the shortest path between two points, disregarding metrics such as delay and congestion. However, the demand for speed and bandwidth on this environment is causing the depletion of resources available in the current network’s infrastructure. The users are constantly seeking larger applications, causing congestion and degradation of performance. Therefore, the goal is that the network support the various services and user’s requirements effectively by the techniques of Quality of Service (QoS). The Internet service is based on end-to-end without connection, which provides transport of best-effort data by using TCP / IP (Transmission Control Protocol / Internet Protocol). The QoS functions are expected to guarantee delivery and to differentiate IP services to network resources and for controlling the operation of the network. QoS is a set of service requirements that must be known by the network in the “Flow of Transportation” guaranteeing the service for the end-to-end, based on policy measured on performance, resource allocation, switching, routing, routing of packets and packet loss mechanisms. With the use of QoS in IP, networks can support the existing applications and emerging applications...
Words: 797 - Pages: 4
...Network Interface Card 3. Expand the acronym MAC. Media Access Control 4. Expand the acronym LAN. Local Area Network 5. Expand the acronym WAN. Wide Area Network Section 1-2: 6. Define the term protocol. Set of rules established for users to exchange information. 7. Define the term topology. Architecture of a network. 8. Define the term deterministic. Access to the network is provided at fixed time intervals 9. A disadvantage of the token-ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding a Token-ring hub (A hub that manages the passing of the token in a Token-Ring network.) 10. State the network topology being used in the following figures (Bus, Star, Ring, or Mesh). a. Mesh b. Bus c. Ring d. Star 11. What is the difference between a hub and a switch? Hub – Broadcasts data it receives to all devices connected to its ports. Switch – Establishes a direct connection from the sender to the destination without passing the data traffic to other networking devices. Section 1-3: 12. Define the acronym CSMA/CD and the protocol that uses CSMA/CD. Carrier Sense Multiple Access with Collision Detection, The networking protocol Ethernet. 13. What information is not included in an Ethernet frame? a. Frame size 14. What is the minimum size of the data payload in an Ethernet frame? 46 bytes The data being transmitted...
Words: 1934 - Pages: 8
...Lab 5.1 Connect the Internetwork Lab Review Questions 1. For what purpose is a transceiver used? A transceiver can be used for converting one type of Ethernet connector to another or by converting one type of I/O port to an Ethernet port. 2. This lab connects routers directly to each other via serial cables. Is this a typical configuration? No, By default, Cisco routers are DTE (Data Terminal Equipment)/ DCE (Data Circuit-Terminating Equipment) If not, to what equipment does the DCE end of the serial cable usually connect? If Router A is connected to the DTE end of the cable, Router B must be connected to the DCE end 3. What does a rollover (console) cable look like? Rollover cable is often used to connect a computer terminal to a router's console port. This cable is typically flat (and has a light blue color) with a DB-9 Female end to RJ-45 Male end. 4. What kind of port does the console cable attach to on the computer? Serial Port (dial-up modem) 5. What kind of port does the UTP patch cable attach to on the router? The console port Lab 5.2 Configure HyperTerminal to Access a Cisco Router Review Questions 1. What program on a Windows computer is typically used for configuring a Cisco router? HyperTerminal 2. What are the important settings to configure in HyperTerminal to access a Cisco router? You must then configure how you will connect to the router and the system configuration 3. Where is the HyperTerminal program in most Windows computers? All Programs/Accessories/Communications...
Words: 2124 - Pages: 9
...Configure OSPF routing on all routers Configure OSPF router IDs Verify OSPF routing using show commands Configure a static default route Propagate default route to OSPF neighbors Configure OSPF Hello and Dead Timers Configure OSPF priority Understand the OSPF election process Document the OSPF configuration Scenarios In this lab activity, there are two separate scenarios. In the first scenario, you will learn how to configure the routing protocol OSPF using the network shown in the Topology Diagram in Scenario A. The segments of the network have been subnetted using VLSM. OSPF is a classless routing protocol that can be used to provide subnet mask information in the routing updates. This will allow VLSM subnet information to be propagated throughout the network. In the second scenario, you will learn to configure OSPF on a multi-access network. You will also learn to use the OSPF election process to determine the designated router (DR), backup designated router (BDR), and DRother states. CCNA Exploration Routing Protocols and Concepts: OSPF Lab 11.6.1: Basic OSPF Configuration Lab Topology Diagram -- Scenario A Addressing Table Device Interface IP Address Subnet Mask R1 -- Don’t forget to add your clock rates on the serial interfaces!!! Fa0/0 172.16.1.17 255.255.255.240 S0/0/0 192.168.10.1 255.255.255.252 S0/0/1 192.168.10.5 255.255.255.252 R2 Fa0/0 10.10.10.1 255.255.255.0 S0/0/0 192.168.10.2 255.255.255...
Words: 3741 - Pages: 15
...Linux Advanced Routing & Traffic Control HOWTO Bert Hubert Netherlabs BV Gregory Maxwell Remco van Mook Martijn van Oosterhout Paul B Schroeder Jasper Spaans Revision History Revision 1.1 DocBook Edition 2002−07−22 A very hands−on approach to iproute2, traffic shaping and a bit of netfilter. Linux Advanced Routing & Traffic Control HOWTO Table of Contents Chapter 1. Dedication.........................................................................................................................................1 Chapter 2. Introduction ......................................................................................................................................2 2.1. Disclaimer & License.......................................................................................................................2 2.2. Prior knowledge................................................................................................................................2 2.3. What Linux can do for you...............................................................................................................3 2.4. Housekeeping notes..........................................................................................................................3 2.5. Access, CVS & submitting updates..................................................................................................3 2.6. Mailing list..............................................
Words: 28706 - Pages: 115