Free Essay

Network and Protocols

In:

Submitted By kbfresh18
Words 1687
Pages 7
Section 11-2

1. List two advantages of wireless networking. 1. User mobility in the workplace. 2. A cost-effective networking media for use in areas that is difficult or too costly to wire.

2. What are the three areas defined for the IEEE 802.11 standard? 1. Physical Layer (PHY) The method of transmitting the data, which may be either RF or infrared (although infrared is rarely used.) 2. Medium Access Control (MAC) I. The reliability of the data service. II. Access control to the shared wireless medium. III. Protecting the privacy of the transmitted data. 3. MAC management protocols and services I. Authentication, association, data delivery, and privacy.

3. What is an ad hoc network? 1. In this network, the wireless clients (stations) communicate directly with each other. This means the clients have recognized the other stations in the WLAN and have established a wireless data link. 2. The fundamental topology of the WLAN is the Basic Service Set (BSS). This is also called the independent Basic Service Set, or ad hoc network.

4. What is the purpose of an Extended Service Set? 1. By adding multiple access points to the network, the range of mobility of a wireless client in the LAN is extended. 2. Definition - The use of multiple access points to extend user mobility Hand-off.

5. What are the four physical layer technologies being used in 802.11 wireless networking? 1. Direct Sequence Spread Spectrum (DSSS) 2. Frequency Hopping Spread Spectrum (FHSS) 3. Infrared 4. Orthogonal Frequency Division Multiplexing (OFDM)

6. Describe the frequency spectrum for the DSSS channels in 802.11b wireless networking. 1. implements 14 channels (each consuming 22 MHz) over approximately 90 MHz of RF spectrum in the 2.4 GHz ISM (industrial, scientific, and medical) band.

North American DSSS Channels
Channel Number Frequency (GHz) 1 2.412 2 2.417 3 2.422 4 2.427 5 2.432 6 2.437 7 2.442 8 2.447 9 2.452 10 2.457 11 2.462

7. Define a pseudorandom sequence as it applies to FHSS. 1. Pseudorandom means the sequence appears to be random but in fact does repeat, typically after some lengthy period of time. 2. FHSS uses 79 channels (each 1 MHz wide) in the ISM 2.4 GHz band. FHSS requires that the transmitting and receiving units know the hopping sequence (the order of frequency changes) so that a communication link can be established and synchronized.

8. What must the FHSS transmitting and receiving units know to communicate? 1. Hopping Sequence - The order of frequency changes.

9. What is the frequency range used by 802.11a, and what modulation technique is used? 1. 5 GHz 2. Orthogonal Frequency Division Multiplexing (OFDM)

10. What is the maximum data rate for the following: a. 802.11b b. 802.11a c. 802.11g d. 802.11n

a. 11 Mbps b. 54 Mbps c. 54 Mbps d. 200+ Mbps

11. Define MIMO as it applies to 802.11n. 1. Multiple Input Multiple Output (MIMO) 2. MIMO uses a technique called space-division multiplexing, where the data stream is split into multiple parts called spatial streams. The different spatial streams are transmitted using separate antennas. With MIMO, doubling the spatial streams doubles the effective data rate.

12. What is the purpose of the power-save mode in 802.11n? 1. 802.11n only uses multiple data paths when faster data transmission is required—thus saving power.

Section 11-3

13. What is the purpose of an access point? 1. Provides a bridge between the wireless LAN and the wired network.

14. How does the access point know if a wireless data packet is intended for its network? A. The answer is the 802.11 wireless LAN devices use an SSID to identify what wireless data traffic is allowed to connect to the network. B. the SSID is the wireless service set identifier, basically a password that enables the client to join the wireless network.

15. What is an association, and what is its purpose? A. The access point uses the SSID to determine whether the client is to become a member of the wireless network. B. The term association is used to describe that a wireless connection has been obtained.

16. Draw a picture of a point-to-point wireless connection.

17. Draw a picture of a point-to-multipoint wireless network.

18. What are the key issues to be obtained from conducting a site survey for each of the following? A. indoor 1. Electrical Power 2. Wired network connection point(s) 3. Access point placement 4. RF coverage - user mobility 5. Bandwidth supported 6. Identify any significant RF interference b. outdoor 1. Electrical power (base access point) 2. Connection back to the home network 3. Antenna selection 4. Bandwidth supported 5. RF coverage 6. Identify any significant RF interference.

-------------------------------------------------------------------------------------------------------
Section 11-4

19. In what frequency band does Bluetooth operate? 1. 2.4 GHz ISM

20. How many output power classes does Bluetooth have? List the power level and the operating range for each class. 1. 3 2. Power Class Maximum Output Power Operating Distance 1 20 dBm ~ 100 m 2 4 dBm ~ 10 m 3 0 dBm ~ 1 m

21. What is a piconet? 1. An ad hoc network of up to eight Bluetooth devices. a. Examples: Computer, Mouse, Headset, Earpiece, and so on.

22. What is the purpose of the inquiry procedure in Bluetooth? 1. When a Bluetooth device is enabled, it uses an inquiry procedure to determine whether any other Bluetooth devices are available. 2. This procedure is also used to allow itself to be discovered.

23. What is the purpose of the paging procedure in Bluetooth? 2. The paging procedure is used to establish and synchronize a connection between two Bluetooth devices.

24. Define the term backscatter. 1. Refers to the reflection of the radio waves striking the RFID tag and reflecting back to the transmitter source with its stored unique identification information.

25. What are the three parameters that define an RFID system? 1. Means of powering the tag 2. Frequency of operation 2. Communications protocol (also called the air interface protocol)

26. Explain how power is provided to a passive RFID tag. 1. Power is provided to the tag by rectifying the RF energy, transmitted from the reader, that strikes the RF tag antenna. 1. The rectified power level is sufficient to power the ICs on the tags and also provides sufficient power for the tag to transmit a signal back to the reader.

27. Cite three advantages for using an active RFID tag. 1. The power consumption of the G2C501 is 10μA in the sleep mode and uses two AA batteries with an expected lifetime of five years. 2. The G2C501 also works in the standard 915 MHz range. 3. The G2C501 also has location capability. 1. This is accomplished by making Receive Signal Strength Indicator (RSSI) measurements from three separate access points.

28. What are the three frequency bands typically used for RFID tags? 1. Low Frequency (LF) 2. High Frequency (HF) 3. Ultra-high Frequency (UHF)

29. What is the WiMax frequency standard for the United States? 1. United States - Unlicensed 5.8GHz and licensed 2.5 GHz spectrum. 2. Internationally 3.5 GHz 3. Worldwide Interoperability for Microwave Access (WiMax)

30. Why was OFDM selected for WiMax? 1. This signaling format was selected for the WiMAX standard IEEE 802.16a standard because of its improved NLOS (non line-of-sight) characteristics in the 2 GHz to 11 GHz frequency range. 1. An OFDM system uses multiple frequencies for transporting the data, which helps minimize multipath interference problems. Some frequencies may be experiencing interference problems, but the system can select the best frequencies for transporting the data. 2. Orthogonal Frequency Division Multiplexing (OFDM)

31. How does WiMax differ from Wi-Fi? 1. The WiMAX (IEEE 802.16e) media access control (MAC) layer differs from the IEEE 802.11 Wi-Fi MAC layer in that the WiMAX system has to compete only once to gain entry into the network.

-------------------------------------------------------------------------------------------------------
Section 11-5

32. What is the most important thing to do if using a wireless network? 1. The wireless security features are turned on.

33. What is the purpose of wireless beacons? 1. In WLAN equipment, the beacons are transmitted so that a wireless user can identify an access point to connect to. 2. Definition - Used to verify the integrity of a wireless link.

34. What information can be obtained from a wireless beacon? 1. The Service Set Identifier (SSID) of the network.

35. What is the purpose of WEP? 1. Wired Equivalent Privacy (WEP) is used to encrypt and decrypt wireless data packets. 2. The exchange and the return of the encrypted text verifies that the client has the proper WEP key and is authorized to be a member of the wireless network.

36. List four guidelines for wireless security. 1. Make sure the wireless security features are turned on. 2. Use firewalls and intrusion detection on your WLAN. 3. Improve authentication of the WLAN by incorporating 802.1x features. 4. Consider using third-party end-to-end encryption software to protect the data that might be intercepted by an unauthorized user. 5. Whenever possible, use encrypted services such as SSH and Secure FTP.

37. Describe the steps used by WPA2 to authenticate a user. 1. WPA2 is an improved version of WPA. The 802.1x standard enhances wireless security by incorporating authentication of the user. Cisco Systems uses an 802.1x authentication system called LEAP. In Cisco LEAP, the user must enter a password to access the network. This means that if the wireless client is being used by an unauthorized user, the password requirement will keep the unauthorized user out of the network.

38. What is a RADIUS server? 1. A Remote Authentication Dial-In User Service (RADIUS) service is sometimes used to provide authentication. This type of authentication helps prevent unauthorized users from connecting to the network. Additionally, this authentication helps to keep authorized users from connecting to rouge of unauthorized access points.

Similar Documents

Free Essay

Network Protocols

...The importance of communication protocols: Unless Patton Fuller Community Hospital has an agreement between the two communicating parties information may get lost or un-communicated. This agreement is called the protocol. Communications protocols usually have a number of parts, Handshake, encoding method, compressions methods, packet / frame structure, and addressing.. This is why protocols are often defined by standards bodies, but some protocols SSL can be used widely even though they are not specifically from a standards body. A protocol must be implemented to enable effective, efficient communication by using a set of rules. Protocols are also described as hardware or software components that carry out the OSI model guidelines for transferring information on a network In short - if we don't have a protocol we won't be able to communicate between different devices. Identify the protocols in your design and provide rationale for your decision Define the overall network architecture. The design of a communications system, which includes the backbones, routers, switches, wireless access points, access methods and protocols used May refer only to the access method in a LAN, such as Ethernet or Token Ring Network architecture is the design of a communications network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in its...

Words: 1950 - Pages: 8

Free Essay

Network Protocols

... Networking Protocols and Facts What is meant by protocol? A protocol is a special set of rules that governs the communications between computers on a network. They specify the interactions between the communicating entities like one computer to another. There is a protocol for every part that connects a network known as TCP/IP which means Transmission Control Protocol and Internet Protocol. They TCP and IP are two different protocols that preform different tasks in the networking world they are built into all major operating systems. TCP allows and enables two computers or hosts to connect and exchange data streams from one to the other guaranteeing that the delivery of data and packets being delivered come in the same order they were sent out. Utilizing the Idea of TCP being like your Mail courier dropping off your mail because he has the link and means to communicate or find your destination. Internet Protocols use a packets instead of streams, also known as datagrams, and addressing scheme. Picture the IP protocol as a post office you drop off a packet of information, without being combined with TCP it cannot be delivered. The TCP part of the protocol it the mail truck or the courier like I stated in the last paragraph. The reasons why IP cannot be a standalone software is because it deals in packets which is small bits of information with now true way of keeping it order, from going missing, and even duplicating itself. A fact of the TCP/IP protocol was that it was...

Words: 365 - Pages: 2

Free Essay

Data

...C H A P T E R 5 AppleTalk Data Stream Protocol (ADSP) 5 This chapter describes the AppleTalk Data Stream Protocol (ADSP) that you use to establish a session to exchange data between two network processes or applications in which both parties have equal control over the communication. You should read this chapter if you want to write an application that supports the exchange of more than a small amount of data between two parties who each can both send and receive streams of data. This chapter also describes the AppleTalk Secure Data Stream Protocol (ASDSP), a secure version of ADSP, that allows users of your application to communicate over an ADSP session after the users’ identities have been authenticated. Users can then exchange encrypted data over the session. For your application to use ASDSP, the system on which it runs must have the AppleTalk Open Collaboration Environment (AOCE) software installed and must have access to an AOCE server. To use ASDSP, you must also use the Authentication Manager, which is a component of the AOCE software. For information on the Authentication Manager, refer to Inside Macintosh: AOCE Application Programming Interfaces. ASDSP enhances ADSP with authentication and encryption features. When this chapter discusses components of ADSP, such as connection ends and connection listeners, you can assume that the information also applies to ASDSP. The sections in this chapter that discuss ASDSP describe any specific differences between it...

Words: 29341 - Pages: 118

Free Essay

Nt2640 Networking Protocol Numbers

...Assignment 2: Network protocols numbers 1. What organization has been given the responsibility for assigning protocol numbers? ICANN – The Internet Corporation for Assigned Names and Numbers 2. Determine the protocol numbers for the protocol names: Protocol| Number| IPv4| 4| IPv6| 41| TCP| 6| UDP| 17| ICMP| 1| VRRP| 112| IPSEC ESP| 50| L2TP| 115| OSPF| 89| EIGRP| 88| 3. Determine the correct ICMP type based on the description provided: ICMP Message Description| Type| Code*| Echo| 8| | Echo Reply| 0| | Time Exceeded| 11| 0| Port Unreachable| 3| 3| Fragmentation Needed| 3| 4| 4. What are the valid ranges of protocol numbers? 0-65535 5. What protocol number(s) is/are specified for experimentation and testing? 253 and 254 6. What organization has been given the responsibility for assigning port numbers, sometimes referred to as “Well Known Ports or Registered Ports”? IANA 7. Determine the protocol numbers for the protocol names: Port| Application / Protocol| TCP -23| telnet| TCP -443| HTTPS| UDP -53| Domain name system| UDP -123| Network time protocol| TCP -110| Post office protocol v3| TCP -25| Simple mail transfer protocol| TCP -80| HTTP| UDP -88| kerberos| TCP -22| SSH| UDP -161| Simple network management| 8. What numeric range is commonly referred to as the “well-known ports”? 0 to 1024 9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023 10. What do you believe would be...

Words: 282 - Pages: 2

Premium Essay

Network Standards and Protocols Pg 99

...Network Standards and Protocols June 29, 2013 Homework: Respond to multiple choice questions 1. A 2. B 3. D 4. C 5. C 6. D 7. B 8. C 9. D 10. D 11. C 12. D 13. B 14. C 15. A 16. D 17. D 18. D 19. A 20. B Define Key table 1.Computer Network is any combinations of many components that work together so that many different devices can communicate. 2. Computer Networking is the gerund form of the term computer network. 3. Application is a function of any kind of computer or electronic device. 4. Email is electronic mail in which user can type text or attach files. 5. Voice call is a modern term for telephone call. 6. Video frame is a grid of pixel location a chosen width by height that contains the lights/ color to be shown in a video. 7. Web server is software that stores web pages and web objects, listens for request for those pages and send the content of the pages/objects to clients. 8. web browser is software controlled directly by a user that request web pages from a web server and after receiving a page display the web in a window. 9. web address is the text that indentifies details about one object in a network so that a client can request that object from a server. 10. Protocol is a set of rules that different devices or software must follow so that the network works correctly. 11. HTTP is the protocol by web browsers and web servers to define the format of URLs and the messages...

Words: 390 - Pages: 2

Free Essay

Frame-Relay

...limiting factors are discussed as well as committed information rates, burst rates, an error handling. Some of the positive aspects of frame-relay are identified along with some options for the future of WAN technologies. Frame-Relay Operating at the physical and datalink layers of the OSI model, frame relay is a high-performing WAN protocol. It was originally designed for use with ISDN integrated services digital network interfacing. It has evolved into being used on multiple types of network interfaces. In 1984 the initial proposal for frame-relay standardization was presented to the CCITT Consultative Committee on international telephone and telegraph. Because interoperability standards were lacking, frame-relay did not fully take off until the 1990s. In 1990 StrataCom, Northern Telecom, Digital Equipment Corporation (DEC), and Cisco created a consortium that focused on the technical development of frame-relay technology. While the CCITT was already discussing frame-relay, the consortium established specifications that while still conforming to the frame-relay protocol, enhanced the protocol with additional features to accommodate more complex internetworking environments. These enhancements are known as the local management interface LMI. On the international front, the international telecommunication Union – telecommunication standards section standardized frame-relay. Frame-relay is an American National Standards Institute ANSI standard. Cisco...

Words: 2574 - Pages: 11

Free Essay

You Decide Week 3

...YOU DECIDE LLOYD BARTSHE NETW 208 Scenario Summary Over the past several weeks, you have carefully considered the devices and media that will be used to communicate between the Pittsburgh and Cleveland offices. You must now move your attention to moving data between the two networks. Kim has recently bought a networking book and began reading up on Frame Relay, but was confused by all of the new terminology. Perhaps with your networking knowledge, you can help Kim in this area. First I think Kim has some serious control issues that at some point should be addressed. The writers of this scenario mustn’t realize that at the understanding that a non-tech person is beginning to read a tech book to help make important tech decisions is equal to an NFL team whose looking for a new coach and gets a resume from someone whose accomplishments only include how many Madden championships he’s won. While on the surface it looks similar, but in reality it’s just scary. I would first explain to Kim that Frame Relay is a WAN implementation methodology which uses virtual circuits to insure an end to end data transmission rate at a guaranteed level of service with additional bandwidth made available if it is not being utilized, but that is not guaranteed. So when considering price, you should only consider the guaranteed rate as opposed to the theoretical additional bandwidth as it is not guaranteed and in a major metropolitan area you might not ever see this extra bandwidth. As it...

Words: 774 - Pages: 4

Premium Essay

Nt1330 Unit 3 Assignment 1 Case Analysis

...Which of these parameters should be verified to make sure the client can connect successfully? Options (A) Client’s wireless NIC settings to ensure the correct drivers are installed (B) The client is associating to the correct SSID and the WLC can see the AP as registered. (C) Client NIC properties to ensure that the associated SSID, certificate used and authentication match with the WLC (D) The AP that the client is connected to is properly associated with the WLC (E) Correct Answer(s) C Explanation For a wireless client to connect successfully and access resources, the associated SSID, certificate used and authentication should match, after which the WLC will register the client as an authentic client and continue normal network services. 7.1 Sub-Objective Name Site Survey...

Words: 1325 - Pages: 6

Premium Essay

The Logistic Company

...The Logistic Company - Case Solution 1. Protagonist a. Satish - night-duty Airport Executive at the Mumbai airport. b. Security guard - Bangalore office. c. Ravi – Responsible for loading on the flight and sending pre-alert. d. Charles - the Asst. Manager Operations, of the Bangalore office. e. Hari - the HR Executive of the Bangalore office. 2. Problem f. Communication gap between the Bangalore office of ABC logistics and Mumbai airport executive. g. Excess booking by other logistic companies and there was no space, so cargo officials of all the airlines refused to accept load. h. Ravi did not intimate the airport executive in Mumbai about the consignment, i.e. they will not be able send the consignment. i. Charles was caught by the night duty patrol cops. 3. Parameters j. Pre-Alert for loaded goods. k. Excess booking by other logistic companies l. Ravi did not intimate 4. Assumptions m. Load will be send every day from Bangalore office to Mumbai via Flight n. If no load is dispatched, information for the same is necessary to be sent Airport Executive at the Mumbai airport o. Ravi is the person in charge for dispatching and sending pre-alert for sending the pre-alert. 5. Various probable solutions p. Information Alert for not loading the goods for XYZ reasons need to be communicated to the Airport Executive at the Mumbai airport. ...

Words: 412 - Pages: 2

Free Essay

Cmit350

...CMIT 350 WAN and SOHO Skills Implementation Prepared for: University of Maryland University College CMIT 250 Prepared by: Devin Manning I. Site “Los Angeles” Challenge and Implementation The site administrator has requested that the site establishes remote IOS storage, remote management of switches, ACL list implementation, and a network time protocol for devices as described in the site specific portion of the scenario. II. Site Solutions and Technologies * The recommended course of action for the request of a remote IOS storage capability at the site would be to establish a remote access server using a HTTP/ HTTPS protocol as opposed to the SSH option mainly because of the security and control over things such as the internet connection to the routers from not only the user database, but the source addresses as well in regards to their perspectives. This particular protocol also requires the timing information to be in setup and in place which would complement the network time protocol solution that has been requested by the site. For this request, I would use the SonicWall software in order to setup up this capability along with the SonicWall UTM appliance that is provided by the company. * In order to address the remote management of the switches request, it would require a console cable and a server that has an available console port such as the Cisco Nexus 2228TP GE Fabric Extender expansion module which is one of the easier servers to use that...

Words: 1625 - Pages: 7

Free Essay

Time and Clocks

...Making time, holding time with or without a GPS. The most ubiquitous way to get accurate time and phase, every time, everywhere is to use a GPS disciplined oscillator (GPSDO). Over the last few years, some concerns have arisen due to the potential impact on critical infrastructure of malevolent attacks such as jamming or due to natural causes such as solar flares. The GPS system has been designed to distribute time around the world. It gets time from a reference called a time scale. They are several time scales in the world. In the US, NIST and USNO are used for the UTC time scale and are referred to as UTC (NIST) and UTC (USNO). USNO also produces the GPS time scale. The time scales around the world are coordinated through an international agency called BIPM. USNO, NIST are all coordinated to BIPM through a mechanism called two-way time transfer. BIPM defines International Atomic Time (TAI) from ensembling atomic clocks that are disseminated around the globe - the duration of the TAI second is kept as close as possible to the SI second. Coordinated Universal Time (UTC) is an atomic time scale derived from TAI to provide a reference scale in step with the irregular rotation of the earth. As a result of this process, the mean solar day, which is nominally 86400 seconds long, is actually getting longer when measured in SI seconds with stable atomic clocks. It is the role of IERS (International Earth Rotation Service) to observe the self-rotation of the earth and to make sure that...

Words: 2079 - Pages: 9

Free Essay

Thoughts About the Ez80 and Its Applications

...The application of eZ80 is a great advancement when it comes to technology, speed and efficiency. The eZ80 Web server CPU is intelligently created equipment that has a controlled network in another piece of equipments. In my view, this technology is indeed a breakthrough that allows the expansion of use of the controllers and networking. The availability of a software model is also a very important as it provides information that regards the software registers, flags, addressing and memory modes and instruction set. I think that this kind if development is vital in the general use of the eZ80 as it comes along with an instruction set as well. The presence of an addressing mode is important as it help sin the location of data needed for an instruction, this data might be stored in a register or memory location. Thus there is the role that shows the simplification of data and hence making it easy to access data in any angle. Arithmetic, logical and bit manipulation instructions are also important features that are used in providing the eZ80 CPU with its number-crunching ability for arithmetic instructions. Logical instructions are also used as they provide the user with the Boolean operations that are necessary in decision making as well as manipulating bits in registers or memory. Bit manipulation instructions are used in the testing; clearing or setting a bit in a register or memory location, thus there is assurance that a bit is registered as soon as it is entered. In my opinion...

Words: 562 - Pages: 3

Free Essay

Implementation and Evaluation of Wireless Mesh Networks on Manet Routing Protocols

...Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols Shashi Bhushan1,Anil Saroliya2 ,Vijander Singh3 Research Scholar, Computer Science, Amity University, Jaipur, India 1 Assistant Professor, Computer Science, Amity University, Jaipur, India 2 Senior Lecturer, Computer Science, Amity University, Jaipur, India 3 Abstract—Wireless Mesh Network (WMN) is a kind of network which is made up of Mesh router and Mesh clients where Mesh router having lesser mobility and form the heart of WMNs. In this paper, Wireless Mesh Network over MANET implemented using routing protocols such as AODV, DSR. In this work NS-2.34 simulator is used for simulations. Various measurements and calculations were figure out in this work like throughput, Average end-end delay, PDR, NRL and Routing packets in Random way point mobility model. WMN have features such as self configuration, self healing and low cost of equipment. This work specifically aims to study the performance of routing protocols in a wireless mesh network, where static mesh routers and mobile clients participate together to implement networks functionality such as routing and packet forwarding in different mobility scenarios Keywords- Ad hoc Network, Routing Protocols, Wireless Mesh Network, Performance, Throughput, PDR, NRL and Routing packets in Random way point mobility model, Simulation on Network simulator NS-2, AODV,DSR , Routing Overhead. I. INTRODUCTION A Mobile Ad-hoc network (MANET) is an autonomous system of...

Words: 4335 - Pages: 18

Free Essay

It-242

...Christy Williams University of Phoenix- Profressor Sims Wk 6 Assignment Router & Switch Conf. "Let’s go through the basic steps of setting up a Cisco router to provide Internet access to a small network. I’ll assume you have some basic IOS knowledge, including how to log on and how to save and clear configurations. I’ll also assume that you have a solid understanding of networking, including what Network Address Translation (NAT) is. I won’t cover items such as setting up Secure Shell (SSH) access and hardening access lists. You can expand into those areas as you feel comfortable and want to experiment more. What You’ll Need You need a Cisco router with at least two Ethernet interfaces. An 806, 836, 851, or 871 is ideal for a home or small office setup—in fact, that’s what those models are geared towards. You can buy an 851 for a few hundred dollars from various online retailers. However, a 2610 works just as well, and you might have one sitting in the equipment bin at your office that you can ask to borrow. Your router should have IOS 12.2 or later. This article is based on a Cisco 851W with IOS 12.4, including the IOS firewall feature set. You also need a Cisco console cable (sometimes called a rollover cable). One end has an eight-position, eight-conductor modular jack to connect to the router; the other end has a DB-9 serial connector. In recent years...

Words: 1763 - Pages: 8

Premium Essay

Ntc/406 Wwek 2 Individual

...Applications Protocol Paper-VoIP security NTC/406 Explains how the application layer manages distributed applications and their protocols  Here in Afghanistan we use Voice over Internet Protocol (VoIP) for our NIPR, SIPR and CENTRIX voice capabilities. We utilize the Cisco MCS 7835 Media Convergence Server which allows for any user with internet access to create and receive calls of varies types.Because of this method of communications, it too is also targeted for attacks by unauthorized access, sniffing, and data capturing techniques. To reduce the exposure of this transmission, policies and protocol should be implemented. VoIP is a protocol with the means of communication that originates from local area network domain and provides the essential functions for audio and visual of live streaming transmission. To ensure reliability and security of these connections, information technology personal will need to address the known issues related to this domain. The Local Area Network is one of seven domains situated within the network and provides the crucial link to interior and exterior connections for accessing information. To address these security issues, we must first consider the known threat, risk, and vulnerabilities associated with this domain and connection type. Voice over internet protocol transfers packets over the network by utilizing the Public Branch Exchange (PBX) and Public Switch Telephone Network or PSTN. This function...

Words: 777 - Pages: 4