...Unit 3 Assignment: IPv6 Addressing Cuneo, Thomas / NT1230 4-5-13 Research the following organizations and explain their involvement with the internet public IP addresses. a. American Registry for Internet Numbers (ARIN): The non-profit corporation responsible for managing internet number resources (IPv4 and IPv6 addresses). The need for this organization is due to the internet addresses being unique and limited there is a need for some control and allocate address number blocks. b. Internet Assigned Numbers Authority (IANA): This entity oversees global IP address location, autonomous system number location, root zone management in the Domain Name System (DNS), media types, and other Internet Protocol related symbols and numbers. This department is also operated by the Internet Corporation for Assigned Names and Numbers (ICANN). c. Asia Pacific Network Information Center (APNIC): Organization that manages the assignment of the Internet number resources within the Asian continent. They also set the rules and regulations/standards that all designated organizations must abide by and implement. One of their purposes is to provide standard-based inter-networking methods for IPv4 and IPv6 across such networks as Ethernet and so forth. 1. How many IPv4 addresses are possible? There are approx. 4,294,967,295 (4.3 billion) 2. How many IPv6 addresses are possible? There are about 3.4x10^38 (18 quintillion) 3. Why do you think the world is running out of IPv4 addresses? Because...
Words: 377 - Pages: 2
...Unit 3. Assignment 1. IPv6 Addressing 1. Research the following organizations and explain their involvement with the Internet public IP addresses a. American Registry for Internet Numbers (ARIN) ARIN, a nonprofit member-based organization, supports the operation of the Internet through the management of Internet number resources throughout its service region; coordinates the development of policies by the community for the management of Internet Protocol number resources; and advances the Internet through informational outreach. IP address space allocation, transfer, and record maintenance https://www.arin.net/about_us/overview.html b. Internet Assigned Numbers Authority (IANA) IANA is responsible for global coordination of the Internet Protocol addressing systems, as well as the Autonomous System Numbers used for routing Internet traffic. http://www.iana.org/numbers c. Asia-Pacific Network Information Center (APNIC) The Asia Pacific Network Information Centre (APNIC) is an organization that manages the assignment of Internet number recourses within the Asian continent. APNIC sets the rules, regulations and standards that all designated organizations must abide by and implement. End-user organizations and Internet service providers take direction from Regional Internet Registries (RIRs) like APNIC to provide Internet resources within certain regions. The Internet number resources include antonymous system numbers as well as IP addresses that assist in clearly defined...
Words: 577 - Pages: 3
...Jennifer Schneider – NT 1230 – Client-Server Networking – Unit 3; Assignment 1 IPv6 Addressing 1.) Research the following organizations and explain their involvement with the Internet Public IP Addresses a. American Registry for Internet Numbers: Allocates, transfers and records maintenance of IP addresses as well as reverse DSN. b. Internet Assigned Numbers Authority: Allocates IP addresses from the pools of unallocated addresses to the RIRs according to their needs as described by global policy and to document protocol c. Asia-Pacific Network Information Center: Distributes and maintains IPv6 addresses 2.) Approximately how many IPv4 addresses are possible? There are approximately 4.3 billion IPv4 addresses available. 3.) Approximately how many IPv6 addresses are possible? There are 340,282,366,920,938,463,463,374,607,431,768,211,456 Ipv6 addresses available 4.) Why do you think the world is running out of IPv4 addresses? The internet really started in the 70s as a DARPA research project. At the time, there were 60 or so institutions expected to connect. As the interested research community grew, the addressing scheme was expanded from 8 bits (256 addresses in the predecessor to Internet Protocol (IP) known as Network Control Protocol (NCP)) to 32 bits (the IPv4 addresses we have today). At the time, it was still expected that the internet would serve largely defense, research, and educational institutions. It was essentially a laboratory experiment on a really large...
Words: 411 - Pages: 2
...Unit 3 Assignment 1 IPv6 Addressing 1. Research the following organizations and explain their involvement with the internet public IP addresses. * American Registry for internet Numbers (ARIN) IP address space allocation & transfer and record maintenance. Directories Registration transaction information (WHOIS) Routing information DNS (Reverse) * Internet Assigned Numbers Authority (IANA) IANA coordinates the global pool of IP and AS numbers. It provides the Regional Internet Registries. * Asia-Pacific Network Information Center (APNIC) APNIC allocates IPv4 & IPv6 address space. Mantins the public Whois Database for the Asia Pacific region. Also represents the interests of the Asia Pacific Internet community on the global stage. 2. Approximately how many IPv4 addresses are possible? 32 bit. About 4.294 Billion addresses. 3. Approximately how many IPv6 addresses are possible? 128 bit. IPv6 can theoretically hold 2^128 IP addresses. 4. Why do you think the world is running out of IPv4 addresses? Because it is popular and there are many computers and cellphones, tablets all connected to a IP address. 5. How long do you think it will take before the IPv4 addresses are completely exhausted? I believe they have ran out already. Everything I read said that it should of ran out by 2012. 6. Since IPv6 is the long-term solution for this issue, why do you think we are still using the assigning IPv4 addresses on the internet? I...
Words: 305 - Pages: 2
...Unit 3. Assignment 1. IPv6 Addressing 1a. The American Registry for Internet Numbers (ARIN) is the nonprofit corporation responsible for managing Internet number resources (IPv4 and IPv6 addresses and Autonomous System Numbers) for Canada, many Caribbean and North Atlantic islands and the United States. The Internet addresses must be unique and because address space on the Internet is limited, there is a need for some organization to control and allocate address number blocks. IP address management was formerly a responsibility of the Internet Assigned Numbers Authority (IANA), which contracted with Network Solutions Inc. for the actual services. b. IANA (Internet Assigned Numbers Authority) is the organization under the Internet Architecture Board (IAB) of the Internet Society that, under a contract from the U.S. government, it has overseen the allocation of Internet Protocol addresses to Internet service providers (ISPs). IANA also has had responsibility for the registry for any for Internet operation. c. The Asia Pacific Network Information Centre (APNIC) is an organization that manages the assignment of Internet number recourses within the Asian continent. APNIC sets the rules, regulations and standards that all designated organizations must abide by and implement. End-user organizations and Internet service providers take direction from Regional Internet Registries (RIRs) like APNIC to provide Internet resources within certain regions. 2. Approximately how many IPv4...
Words: 253 - Pages: 2
...NT1230 Unit 3. Assignment 1. Ipv6 Addressing 1. A. American Registry for Internet Numbers (ARIN)- Provides services involving technical coordination and management of internet number resources. They support the internet through the management of internet number resources and coordinates the development of policies for the management of IP number resources. They also provide services for technical coordination and management of internet number resources in its respective services region. The services include IP address space allocation and ASN allocation, transfer and record maintenance. B. Internet Assigned Numbers Authority (IANA)- Responsible for the allocation of globally unique names and numbers that are used in Internet protocols that are published as RFC documents and for coordinating some of the key components that keep the internet running efficiently. They allocate and maintain unique codes and numbering systems that are used in the technical standards/protocols that drive the internet. Among such protocols are the domain names, number resources and Protocol assignments. C. Asia-Pacific Network Information Center (APNIC)- An organization that manages the internet number resources within Asia. They provide the number resource allocation and registration services that support the global operation of the internet. 2. An Ipv4 uses 32 bit IP addresses. The max number of of IPv4 addresses is about 4 billion. 3.The max number of Ipv6 addresses is about 48 billion...
Words: 291 - Pages: 2
...Kaplan University IT542 Ethical Hacking and Network Defense Unit 2 Assignment Assignment 2 Jamie Carter Professor North Assignment 2 1. Ping, DNS lookup, traceroute utilities, and, Internet Explorer, the web browser are primary tools that come equiped in Windows. The DOS or MSDOS allow use of ping and traceroute specifically, these utilities allow for network mapping and network address or IP address identification, as well as port information. 2. The differences in the organizations are coverage areas. IANA covers the resources delegated to the other organizations (IANA, N,d,). ARIN is delegated to cover the regions of United States, Canada, several parts of the Caribbean region, and Antarctica. RIPE covers northern parts of Asia, Northern Africa, Europe, and Middle Eastern countries. 3. Sam Spade includes tools that can run WhoIs, HTML source code retrieval, trace route, ping, finger, and nslookup. These functions allow retrieval of data from network traffic, electronic mail headers, and identify origins of addresses. 4 Trace route does exactly as the name states, it traces the route of packets back to the originator. This is useful in finding different jump points and pathways to the targeted website, It traces the routes packets take from the user to the target. It shows a route by hops. They target the host address. 5. WhoIs provides general data such as address or domain owner, contact information for owner, and linked sites to a domain...
Words: 699 - Pages: 3
...STUDENT COPY The following sections contain student copies of the assignments that must be distributed to students at least two weeks prior to the due dates for those assignments. Online students will have access to those documents in PDF format available for downloading at any time during the course. ------------------------------------------------- Graded Assignment Requirements Assignment Requirements documents provided below must be printed and distributed to students as the guidance for completing the assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1. Lab 1. Preparing a Virtual Workstation Image Windows 7 Virtual Machine “Keyless” Installation and Re-arm Process Purpose: This section describes the reason for and the procedure to use the “keyless” installation for Windows 7 Professional applicable to our lab environment for IT109/NT1230, and to use the “Re-arm” procedure to extend the trial period to meet our curriculum needs. Background: In installing Windows 7 Professional into a virtual machine in the VMware Player for the labs in our lab environment, if the Product Key for Windows 7 Professional is applied and activated during or at the end of the installation, the installed virtual machine will be authorized...
Words: 5558 - Pages: 23
...Day 1 I. Unit Focus: Volleyball, Chapter 30 II. Lesson Overview: Teach Basic fundamentals and different types of of serving a volleyball III. Psychomotor Objective: Grade 3, St. 1, No.4 The student will be able to perform correctly demonstrate ability to strike a volleyball back to a partner using their hands and forearms IV. Cognitive Objective: Grade 3, St. 3, No.1 The student will be able to detect, Identify at least one activity for participation on a regular basis V. Affective Objective: Grade 3, St.6, No. 2 The student will be able to Show consideration of others in physical activity settings VI. Equipment Needs: 10 volleyballs VII. Lesson Focus: 1 minute> Taking roll asking their favorite activity to do outside of school. I will do this to get the students involved early. 3 minutes > Good morning guys. Today we are going to work on our fitness using Volleyball. (Introduce volleyball and origin) then tell them the focus of the day. We will first go through a station of stretching together. This is important when starting all physical activity. After stretching, we will go through four stations which we will learn the 4 types of serves. You will each have volleyball and I will say go to begin the each station and stop to end. 6 minutes > Now we will begin our stretching. Does anyone know why it is important to stretch? (Correct answer) to prevent injury and to ensure that all our muscles are loose and ready for performance. (Go...
Words: 2711 - Pages: 11
...NT1210 Final Exam Review 8 to 10 Introducing the Internet Protocol (IP) TCP/IP Model review: Layers 1 and 2 Protocols Example LAN/WAN Standards and Types in the TCP/IP Model 2 Figure 8-1 Introducing the Internet Protocol (IP) TCP/IP Model review: Upper layers define non-physical (logical) networking functions Various Perspectives on the TCP/IP Model and Roles 3 Figure 8-2 Introducing the Internet Protocol (IP) Network Layer protocols IP: Most important protocol defined by Network layer Almost every computing device on planet communicates, and most use IP to do so Network layer also defines other protocols 4 Introducing the Internet Protocol (IP) Network Layer protocols: Part 1 Name ICMP ARP DHCP DNS Full Name Comments Messages that hosts and routers use to manage Internetwork Control and control packet forwarding process; used by Message Protocol ping command Address Resolution Used by LAN hosts to dynamically learn Protocol another LAN host’s MAC address Dynamic Host Used by host to dynamically learn IP address Configuration Protocol (and other information) it can use Allows hosts to use names instead of IP Domain Name address; needs DNS server to translate name System/Service into corresponding IP address (required by IP routing process) Other TCP/IP Network Layer Protocols Table 8-1 5 Introducing the Internet Protocol (IP) Network Layer protocols: Part 2 Name Full Name ...
Words: 9644 - Pages: 39
...CHAPTER Firewall Fundamentals 2 T o some network administrators, a firewall is the key component of their infrastructure’s security. To others, a firewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of firewalls stems from a basic misunderstanding of the nature of firewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defines the fundamentals of firewalls. These include what a firewall is, what a firewall does, how it performs these tasks, why firewalls are necessary, the various firewall types, and filtering mechanisms. Once you understand these fundamentals of firewalls, you will be able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefits of effective firewall architecture will become clear. Like any tool, firewalls are useful in solving a variety of problems and in supporting essential network security. Chapter 2 Topics This chapter covers the following topics and concepts: • What a firewall is • Why you need a firewall • How firewalls work and what they do • What the basics of TCP/IP are • What the types of firewalls are • What ingress and egress filtering is • What the types of firewall filtering are • What the difference between software and hardware firewalls is • What dual-homed and triple-homed firewalls are • What the best placement of a firewall is 43 Chapter 2 Goals When you complete...
Words: 15367 - Pages: 62
...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...
Words: 15354 - Pages: 62
...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...
Words: 15354 - Pages: 62
...Exam : 312-50 Title : Ethical Hacker Certified Ver : 02-23-2009 312-50 QUESTION 1: What is the essential difference between an 'Ethical Hacker' and a 'Cracker'? A. The ethical hacker does not use the same techniques or skills as a cracker. B. The ethical hacker does it strictly for financial motives unlike a cracker. C. The ethical hacker has authorization from the owner of the target. D. The ethical hacker is just a cracker who is getting paid. Answer: C Explanation: The ethical hacker uses the same techniques and skills as a cracker and the motive is to find the security breaches before a cracker does. There is nothing that says that a cracker does not get paid for the work he does, a ethical hacker has the owners authorization and will get paid even if he does not succeed to penetrate the target. QUESTION 2: What does the term "Ethical Hacking" mean? A. Someone who is hacking for ethical reasons. B. Someone who is using his/her skills for ethical reasons. C. Someone who is using his/her skills for defensive purposes. D. Someone who is using his/her skills for offensive purposes. Answer: C Explanation: Ethical hacking is only about defending your self or your employer against malicious persons by using the same techniques and skills. QUESTION 3: Who is an Ethical Hacker? A. A person whohacksfor ethical reasons B. A person whohacksfor an ethical cause C. A person whohacksfor defensive purposes D. A person whohacksfor offensive purposes Answer:...
Words: 34575 - Pages: 139
...Chapter-1 1.0 Introduction With the tremendous advancement of Internet, different aspects of it are achieving the highest peak of growth. An example of it is e-commerce. More and more computers get connected to the Internet, wireless devices and networks are booming and sooner or later, nearly every electronic device may have its own IP address. The complexity of networks is increasing, the software on devices gets more sophisticated and user friendly – interacting with other devices and people are a main issues. At the same time, the complexity of the involved software grows, life cycles are getting shorter and maintaining high quality is difficult. Most users want (or need) to have access to information from all over the world around the clock. Highly interconnected devices which have access to the global network are the consequence. As a result, privacy and security concerns are getting more important. In a word, information is money. There is a serious need to limit access to personal or confidential information – access controls are needed. Unfortunately most software is not bug free due to their complexity or carelessness of their inventors. Some bugs may have a serious impact on the access controls in place or may even open up some unintended backdoors. Security therefore is a hot topic and quite some effort is spent in securing services, systems and networks. On the internet, there is a silent war going on between the good and the bad guys – between the ones...
Words: 8365 - Pages: 34