Free Essay

Server Administraton

In:

Submitted By jmidds
Words 1202
Pages 5
Lab - Researching RFCs
Objectives
Part 1: RFC Editor
Navigate to the RFC Editor.
Search for RFCs using keywords.
Find RFCs by status.
Search for humorous RFCs.
Part 2: Publishing RFCs
Background / Scenario
Request for Comments (RFCs) were created by Steve Crocker to help record notes on development of Advanced Research Projects Agency Network (ARPANET) in 1969 and eventually evolved into an official collection of memorandum that describes topics that are mainly related to the Internet and the TCP/IP protocol suite. Today the RFCs are managed by the IETF. There are currently over 6,000 RFCs, and the complete list is available at http://www.ietf.org/download/rfc-index.txt.
In this lab, you will learn how an RFC is published today by IETF. Additionally, you will also identify a few well-known RFCs that are used in your network. You can also find a few non-technical RFCs that can provide information or engineering humor.
Required Resources
Device with Internet access
RFC Editor
RFCs started as a collection of memorandum on the development of the first Internet (ARPANET). In this collection, only a few RFCs are considered as Internet standards. Most of the RFCs describe experimental protocols. Some of the RFCs are only informational. The main purpose of RFCs is to stimulate comment and discussion.
Navigate to the RFC Editor.
All the published RFCs are available for access at http://www.rfc-editor.org. The RFC Editor is an RFC repository maintained by the IETF.
At the top banner of this page, you can click any of the links, and these links direct you to the different searches, databases, and information. A link to IETF HOME is also included within this blue banner.
After an RFC is located, you have access to the full text of the document.
Search for RFCs using keywords.
Open a browser and navigate to http://www.rfc-editor.org. On the RFC Editor Homepage, you can search and retrieve RFCs and other information related to the Internet.

In the Finding and Retrieving RFCs, etc. pane, these links can help you search for RFCs using different methods. The Search for an RFC and its meta-data link displays a list of RFCs after inputting your search parameters, such as number, author, title, or keyword. The word, pop, is used in the following example.

Look for Post Office Protocol – Version 3 in the list. The associated RFC number is RFC 1939. This RFC is also an Internet standard, as indicated by the STD number in the Number column.
After an RFC is published and assigned a number, it cannot be changed and the RFC number is never used again for a newer RFC. For example, in the More Info column, RFC 1939 has made the previous RFC 1725 obsolete. The information in RFC 1725 has not been modified, but it has been replaced with the information from RFC 1939. RFC 1939 has been updated by RFC 1957, RFC 2449, and RFC 6186, as indicated in the More Info column. If you click any of these links, the full text of the RFC displays.
Refer to the Status column and locate the Proposed Standard status. They may be technically sound, but require further testing and validation.
Refer to the Status column and locate the Informational status. Informational RFCs can be anything from technical to humorous. For example, RFC 0035 (Network Meeting) provides an insight into the development of a network protocol in the early days of the Internet.

Find RFCs by status.
To find a list of RFCs that are either Internet Standards (STD) or by their status, perform the following tasks:
Navigate back to the RFC Editor Homepage.
Click the Official Internet Protocol Standard RFCs link in the left column. You will find a list of official standard RFCs followed by other RFC status lists. Each RFC link leads to the full RFC text.

Search for humorous RFCs.
Engineering humor can also be found in the RFCs, such as RFC 1300 (Remembrances of Things Past). An Internet search engine can be used to find information on RFCs.
Search the Internet for “engineering humor rfc” to see more examples of whimsical RFCs. What did you find?
____________________________________________________________________________________
Search for RFC 2795. What is the subject of this RFC? _______________________________________
What company does the author of this RFC work for? _________________________________________

Publishing RFCs
The late Dr. Jonathan Postel maintained and managed the archiving of RFCs for 28 years (RFC 2468). Today, RFCs are a collection of documents published and managed by IETF. IETF is a large, open, international community of network designers, operators, vendors, and researchers related to the Internet and the Internet protocol suite.
Anyone can submit a proposal to the RFC Editor for possible publication. The proposal is initially published as an Internet-Draft (I-D). After review by the community and if it is approved by an RFC Editor, it will enter the same publishing process as IETF submission. For more details regarding independent submission, see http://www.rfc-editor.org/indsubs.html.
For proposals that may become Internet Standard or Best Current Practice and some Experimental or Informational RFCs, these submissions are published as Internet-Drafts. The Internet-Drafts are made available for informal review and comments. The Internet-Drafts have no formal status, and they are subject to change or removal at any time. They can be found at http://www.rfc-editor.org/.
Navigate to http://www.rfc-editor.org.
Click I-D SEARCH at the top of the Homepage, and then click SEARCH. This will display a list of the current Internet-Drafts.

The list of results provides links to the full text of the I-Ds and other useful information. The Source column lists the Working Group with IETF that is responsible for the draft. As an example, 6man is a Working Group that submitted multiple drafts. To find out more information about this Working Group, click IETF HOME at the top of the results page.
After arriving at the IETF Homepage, click WG Charters in the left column, listed under Working Groups.
The Active IETF Working Groups page displays. The IETF Working Group’s (WG) primary function is to develop IETF specifications and guidelines. Many of these specifications and guidelines are intended to become standards or recommendations. By scrolling the page, you see a list of Active Working Groups in different development areas for technology related to networking. The 6man Working Group can be found listed in the Internet Area. This working group is responsible for maintenance and advancement of the IPv6 protocol specifications and addressing architecture.
Click 6man to view the complete list of current proposals and other information for this Working Group.
After the I-D has received significant community review and is considered useful, stable, and well-understood by the community, it should become a Proposed Standard. The full text of the Proposed Standard can be found by searching in the RFC-Editor. The Proposed Standard may become an Internet Standard after significant implementation and successful operational experience.
Note: Only a few RFCs published by IETF will become Internet standards.
Reflection
Why are RFCs important for Internet standards and history?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
What are the advantages of RFCs as a collaborative effort?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________

Similar Documents

Free Essay

Brick & Mortar, Nostalgic Record Store

...Information System Proposal May Tia Lee BIS/220 November 14, 2012 Ralph Schwehr Informational System Proposal The following proposal summary has been prepared by the Information Technology (IT) team describing a new information system required by our Advanced Services Network Consulting Engineers (NCEs). The information provided has been summarized and is intended to provide an overview of the proposed project. Executive Summary Within our organization we have a group of Network Consulting Engineers (NCEs) that provide Planning, Design, Implementation, and Operational (PDIO) services to contracted enterprise and service provider clients. On a number of recent occasions, it has come to light that one NCE is struggling with a design or planning issue that has already been addressed by another NCE. And in some cases, the solutions provided to our clients were not consistent between the NCEs. It has been determined a new system is needed that will provide an orderly and organized data repository that would be available to all NCEs. This system needs to provide an easy method for the NCEs to access and leverage previously defined design solutions. This system will provide several key benefits to the NCE team: ▪ NCE will be able to search for data related to the solution being considered ▪ NCE will save time in that we will not "reinvent the wheel" ▪ NCE provided solutions will be more standardized ▪ Using the same solution repeatedly simplifies supporting...

Words: 1688 - Pages: 7

Premium Essay

Case Study

...wireless unit that combined new acquisitions such as DSP Communications Inc. ( a chipset supplier for digital communications) with Intel’s memory operations. 3. Economic Affected by Septemeber 11, 2001 and needed to withdraw investments in new markets (production of network servers and routers and e-commerce service for small businesses) due to direct result of the downturn in economic condition. Intel’s shares also suffered. At $26, were down to 60 pecent compared to their highest over the previous years and get worse after the downturn and fell further to $20 by October. 4. Ecological Not being mentioned in the case. 5. Political Operates on a global basis and so be attuned to different governmental and country requirements in its distribution and sales. The manufacturing plant in Hamburg, Germany suggests an important political dependency that must be monitored. Task Environment or Industry Structure (Five Forces Analysis) 1. Threat of entry - Low Intel has very strong brand and being known in the industry. New entrant needed to encompass this to be able to be competitive. The chip used in the high-end servers, but the market was much smaller than originally been hoped for. 2. Threat of substitute product – Moderate to High...

Words: 424 - Pages: 2

Premium Essay

Education

...It appears that the telephone is no longer the preferred communication tool in the workplace; email has overtaken oral communication, according to the results of a recently released Data monitor report (Leggatt). According to Pew Internet and American Life Project statistics reported in February 2009, 90% of Internet Users between the ages of 18 and 72 use email (Effective Email Communication). A recent report estimated that over 7 trillion emails were sent worldwide last year! Spam messages are jamming in-boxes across the globe and the average office worker now gets between 60-200 messages a day (Friedman). Electronic mail is an effective way of communication that allows messages to be sent and received. In 1971, Ray Tomlinson, a computer engineer was the first person to send an email (Tomlinson). This was done by sending information between two computers that were sitting side by side (Tomlinson). The first email message was the announcement of network email. The exact content is unknown, but it gave instructions about using the (@) sign to separate the user's name from his host computer name. The function of email is the same as it was back then except now we have the ability to filter spam (Tomlinson). The rapid growth of email has been of the most exciting developments in the history of business communication (Flatley, Rentz, Lentz, 2012). Emails have become a common way of communication in the workplace. It has also played a major role of communication in today's society...

Words: 296 - Pages: 2

Free Essay

Ethical Computer Use Policies

...Ethical Computer Use Policies Mr. XX Ms. DARLENE RINGHAND CIS 500 January 28th, 2012 Ethical Computer Use Policy Offensive language and offensive material policy Effective: January 28th 2012 This policy is for all employees that use any desktop computer, laptop, PDA or any device that’s connected to this company network. It is everyone responsibility to use them in an ethical and professional manner without violating any laws. By signing this policy you agree to abide by the following conditions: * Do not view any nudity or sexual content online. * Do not publish, email, or distribute any obscene and or offensive content. * Do not download, print or store any files or services having sexually explicit content. * Do not send picture, photograph, and drawing or similar visual representation displaying sexual content. * Do not view any websites or send emails promoting crime or violence. * Do not view any websites or send emails promoting or criticizing religious beliefs. * Do not view or send Illegal material, such as child pornography. * Do not view or send Information that is sexual in nature that can be considered harassment. If anyone is found guilty of abuse they will be held accountable and may be subject to disciplinary action. Employee Signature: Date: Ethical Computer Use Policy Spam policy Effective: January 28th 2012 This policy is for all employees that use any desktop computer, laptop, PDA or any device that’s...

Words: 386 - Pages: 2

Premium Essay

Importance of Firewall

...Importance of Firewall The importance of a firewall is that it blocks malware that would be able to scan your computer to find its vulnerable areas and then attempt to break it while it is at its weakest point. First of all there is only one way to make your computer completely safe from attack and that is either when it is off or unconnected from the Internet. Other than that there are always vulnerabilities. However, you can make it as close to hacker proof as possible while it is connected to the Internet. The way to do this is to have a personal firewall installed along with antivirus and anti spyware protection. Plus you have to make sure that all three of these are updated on the regular. Additional protection is available to a network that used a router with a firewall feature. Firewalls protect your computer from outside attacks by guarding it from unnecessary Internet traffic. They can however be configured to block certain data while letting other data in. The importance of a firewall on your computer can not be underestimated especially for those who are always connected to the Internet. Firewalls are positioned between your computer and your network and are great for protecting multiple computers but also offer a great degree of protection for single computer use. It allows individual users decide how much content they want to filter through and what websites are safe to use. In some cases users have a very lax opinion of what should and should not be allowed...

Words: 529 - Pages: 3

Premium Essay

Office Administration

...Dan India Furniture Office Admin Case Study Below is a free excerpt of "Dan India Furniture Office Admin Case Study" from Anti Essays, your source for free research papers, essays, and term paper examples. OFFICE ADMINISTRATION Table of Contents Electronic Mail 1 Telephone 3 Importance of Effective Customer Care 4 Organisation 4 Customer 4 Evaluation of Office System and Procedure 6 Customer Complaints Procedure 6     Revised Customer Complaints Procedure 6     DanIndia Furniture Customer Complaints Procedure………………………………………………………………….... 8 Customer Complaints Form……………………………………………………………………………………………………………….9 References……………………………………………………………………………………………………………………………………….10 OUTCOME 3 ASSESSMENT – OFFICE ADMINISTRATION From the case study two methods used by DanIndia Furniture to communicate with customers are via e- mail and by telephone. Electronic Mail “Electronic mail, commonly called e-mail or email, is a method of exchanging digital messages from an author to one or more recipients”. http://en.wikipedia.org/wiki/Email. Date accessed 24/10/2011.   Electronic mail is a computer based method of sending messages from one computer terminal to another. Messages normally consist of single pieces of text but can include more complicated formats such as graphics and word processed documents. Messages can be sent to another user even if the other user is not logged on at the time the message is sent. The message can be read at a later time. The procedure is similar...

Words: 691 - Pages: 3

Premium Essay

Mis 582 Ilab 2

...Everyone is on a first-name basis, even with Peter Charles, the president. Organization Structure Coastline Systems Consulting [pic] Information Systems Facilities PCs Each technician works uses a Dell notebook: o Pentium M class machines with 512 MB RAM, 30-50 GB hard drives The bookkeeper/receptionist has a Dell Optiplex desktop running a Pentium 4, 256 MB RAM, and an 80 GB hard drive: Operating systems - MS Windows Windows XP Professional Tools - MS Office 2003 suite plus other software depending on use Internet Browser – IE 6 and Mozilla FireFox E-mail Client - Mozilla Thunderbird Various inkjet and laser printers Servers Dell PowerEdge 2800 Server o 1 GB of RAM, 80 GB RAID-5 hard drive storage o Operating system - MS Windows Server...

Words: 626 - Pages: 3

Premium Essay

Chapter 9

...evaluated last? Asset A: Switch L47 connects a network to the Internet. It has two vulnerabilities. It is susceptible to hardware failure at a likelihood of 0.2 and is subject to an SNMP buffer overflow attack at a likelihood of 0.1. The switch has an impact rating of 90 and no current controls in place. You are 75% certain of the assumptions and data. Asset B: Sever WebSrv6 hosts a company Web site and performs e-commerce transactions. It has a Web server version that can be attacked by sending it invalid Unicode values. The likelihood of that attack is estimated at 0.1. The server has been assigned an impact value of 100, and a control has been implanted that reduces the impact of the vulnerability by 75%. You are 80% certain of the assumptions and data. Asset C: Operators use an MGMT45 control console to monitor operations in the server room. It has no passwords and is susceptible to unlogged misuse by the operators. Estimates show the likelihood of misuse is 0.1. There are no controls in place on this asset; it has an impact rating of 5. You are 90% certain of the assumptions and data. 3. Suppose XYZ Software Company has a new application development project, with projected revenues of $1,200,000. Using the following table, calculate the ARO and ALE for each threat category that XYZ Software Company faces for this project: |Threat...

Words: 659 - Pages: 3

Premium Essay

Richman Investments

...Memorandum for Distribution To: RI Security Officer From: IT Consultant Subject: Acceptable Use Policy (AUP) Greetings RI Security Officer, Richman Investments expresses the acceptable and unacceptable use of the Internet and e-mail access. The following report will address the “Acceptable Use Policy” (AUP) standard at Richman Investments. All users of Richman Investments agree to and must comply with this Acceptable Use Policy (AUP). Richman Investments does not control or review the content of any Web site. However, Richman Investments may block or remove any materials that, in Richman Investments sole discretion, may be illegal, or which may violate this AUP. Richman Investments may cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrong. Violation of this AUP may result in the suspension or termination of either access to the Services and/or Richman Investments account or other actions as deemed appropriate. User Responsibilities: These guidelines are intended to help you make the best use of the Internet resources at your disposal. You should understand the following. 1. Richman Investments provides Internet access to staff to assist them in carrying out their duties for the Company. It is envisaged that it will be used to lookup details about suppliers, products, to access client information and other statutory information. It should not be used for personal reasons. 2. You may only access the...

Words: 621 - Pages: 3

Premium Essay

Harware/Software Components

...chip that people would be able to program it the way they wanted in their own | | |personal computer. | |PCs |A PC is a person’s personal computer that they can use at home or at work. On this PC,| | |they can store data and have passwords so no one else is able to retrieve the | | |information. | |Network computers |Network computers are computers in a business that are linked to the same server. | |World Wide Web and Internet |The worldwide web and internet is a way to retrieve and share information from a | |...

Words: 298 - Pages: 2

Free Essay

Cloud Computing

...over the Internet. These services are offered from data centers all over the world, which collectively are referred to as the "cloud." This metaphor represents the intangible, yet universal nature of the Internet. The idea of the "cloud" simplifies the many network connections and computer systems involved in online services. In fact, many network diagrams use the image of a cloud to represent the Internet. This symbolizes the Internet's broad reach, while simplifying its complexity. Any user with an Internet connection can access the cloud and the services it provides. Basically, instead of storing all of your information on your phone, hard drive, etc. and taking up space, you can store it in a “cloud”. Otherwise known as a server. Companies purchase server space (i.e. Cloud) instead of actual hardware to back up their files. A cloud computing solution can help your organization at home or your work achieve multiple benefits, including: * Faster time to market due to on demand deployment * Cost Structuring: Predictable operational expenses and IT resources matched to your actual needs compared with implementing and managing excess costs to meet demands. * Increased productivity due to ease of IT management * Easy access for approved users from internet There are many cloud computing companies out there. The few that people recognize are iCloud, Google Drive, and Microsoft SkyDrive. However...

Words: 505 - Pages: 3

Free Essay

Computers and Childrens

...1. Children, adolescents, and the Internet: A new field of inquiry in developmental psychology. Greenfield, Patricia; Yan, Zheng Developmental Psychology, Vol 42(3), May 2006, 391-394. doi: 10.1037/0012-1649.42.3.391 Special Section: Children, Adolescents, and the Internet. http://www.cdmc.ucla.edu/PG_Media_biblio_files/gy-2006_1.pdf In this article Greenfield and Yan survey the new field of inquiry to understand how today’s generation i.e. children and adolescents live in a complex universe of virtual technology. The author used six empirical articles to show various aspects of children and adolescent development in this massive and virtual universe. The major themes of article of this new are: communication on Internet, cognitive development, academic achievements and Internet. This article is useful to my research topic, as it includes and gives information about the impact of Internet on children. This article samples both the positive and negative aspect of the virtual world where children are more focused and increasingly living. This article is useful to supplement the information for my research. 2. Impact of Media on Children and Adolescents: A 10-Year Review of the Research SUSAN VILLANI, M.D. http://www.lionlamb.org/research_articles/01C392.pdf This article deals with the research regarding the impact of the media upon children within past 10 years. Different media categories are researched with computer technology. It has focused on the viewing patterns...

Words: 444 - Pages: 2

Premium Essay

Acceptaple Use Policy

...common oractice for many businesses and educational facilities to require that employees or students sign an acceptable use policy before being granted a network ID. When you sign up with an Internet Service provider (ISPs) such as Verizon, you will usually be presented with an AUP. Which states that you agree to adhere to such stipulations such as: * Not using the service as part of violating the law * Not attempting to break the security of any computer or user * Not posting commercial messages to internet groups without prior permission * Not attempting to send junk e-mail or spam to anyone who doesn’t want to receive it * Not attempting to mail bomb a site with mass amounts of email in order to flood their server Many Alabama K-12 educators Use the instructional resources found via shared educational tools, such as school and division-wide computer networks and the Internet. The increased use of such resources requires administrators, teachers, library media specialists, students, and parents take steps to insure that are used responsibility for K-12 instruction. In response to these concerns, schools or school districts are required To establish guidelines for the appropriate use of computer networks. The University of Pennsylvania has an established AUP it defines the boundaries of “acceptable use” of limited University electronic resources, including computers, networks, electronic mail services and electronic information sources...

Words: 367 - Pages: 2

Premium Essay

Week 4 Checkpoint

...in productivity and the business might have to make the clients pay more. Another setback to using personal e-mail in the workplace is that a business has to hold on to all of its e-mail communication for a specific amount of time or risk paying a heavy penalty. This is mainly due to the fact that if the business is being sued or is suing another entity and the e-mails are needed as evidence. As far as the court system is concerned, if an e-mail is sent from a personal account or a business account, they are the same, It does not matter to the court what exactly is the e-mails makeup, but you can be sure that the business will be assumed to be in charge of the contents within the e-mail. Once an e-mail leaves an organization it goes to a server and then goes to the recipient. What is the effect of instant messaging on organizational networks? What are benefits and drawbacks of using instant messaging in an organization? The effect of instant messaging on an organizational network is the space that is being taken up by the program and the speed of the computer and...

Words: 530 - Pages: 3

Premium Essay

Tech

...In today’s society technology effects many different people. The largest group effected by technology is college students. There are many good things about technology in this period of time. One of the main things that really have a good effect on college students is a computer. There are many things that college students use computers for. One of the real reasons that almost every college student has a computer in their dorm or in their house is to type up all of those papers that are assigned to them by their professors. Another one of the biggest things in technology is the Internet. You would swear that now someone would die if they didn’t have the Internet. People use the Internet almost everyday to either check e-mail, search something from the Internet, or they can even use it for AOL instant messenger. E-mail is one of the new things in technology that almost everyone is using now instead of the mail service. This is a really good thing for college students because this is a cheap way of keeping in touch with everyone you know without having to spend a fortune on phone calls. College students can also e-mail their professors about something that is going wrong, why they won’t be in class, or they can also e-mail their professors their essays or papers. Researching on the Internet is a very famous thing too. College students can use this to look up information on a topic that they have to write a paper on or just look up anything in general. AOL instant messenger is...

Words: 449 - Pages: 2