Nt1310 Unit 5 Research Paper

Improved Essays
The following are the top 10 types of packets:
IPv4:
Internet Protocol version 4 (IPv4) is the standard version of the internet protocol, that acts as the platform for standard internet protocols and existing internet models (ISP). Extensive use of this protocol led to exhaustion of IP addresses. Therefore, we are bound to use IPv6, in the near future. A feature called as sub-netting is used for IP address allocation. It is defined in RFC 791.

IPv6:
Internet Protocol version 6 (IPv6) is the latest version of the Internet Protocol (IP), which provides an identification and location system for computers on networks and routes traffic across the Internet. It is in the initial implementation stages, thus it is not extensively used worldwide. If it is implemented, then we can use many IP addresses in the IPv6 as it has 128 bits for reference, which is higher than the 32 bits of IPv4. Thus it will be future secure.
• UDP:
…show more content…
It is specified in RFC 768. As it is connectionless, the packet safety is missing, i.e. there is no guarantee that the packet is delivered and there is no acknowledgement from the receiver. Thus it is un reliable, but in many cases this does not create an impact owing to its less size. It attaches checksum bits along with the packet to provide data integrity.
• HTTP
The Hypertext Transfer Protocol (HTTP) is basic block of data communication for the World Wide Web (WWW). The logical links between the nodes, containing text, is called hypertext. HTTP is the protocol to exchange or transfer hypertext. It defines how the web servers should act in response to various commands and how the messages have to be formatted and transmitted. HTTP is a stateless protocol because each command is executed individually independently

Related Documents

  • Decent Essays

    The Aegis Secure Key 3.0 has military grade full disk AES 256-bit XTS hardware encryption and is FIPS 140-2 Level 3 validated. You unlock the drive by entering your 7-16 digit PIN before you connect it to your device that way hackers cannot use software on your device to capture your password, and it automatically locks when you unplug it. If an incorrect password is typed 20 consecutive times all the data and the encryption key are erased. It is also dust and water resistant as well as a wear resistant keypad to hide key usage and to help prevent hackers from knowing the commonly used keys. This USB is a Super Speed USB 3.0 that has data transfer rates of 195 for read and 162 for write.…

    • 351 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Since IPv4 VPN puts the remote host on a private network, the natural choice for the IPv6 tunnel is the ISATAP (Intra-Site Automatic Tunnel Addressing Protocol), which is suitable for communication within a location. However, in practice, we can use any type of IPv6 tunnel as long as it is supported by the host and while the gateway is set up within the private network for it. Configurations for IPv4 access to VPN and IPv6 tunnel are completely independent. From the host's perspective, the tunnel configuration depends on the operating system used.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    1. I have completed my survey for the Information Technology Infrastructure Library Course and have received my passing score 26\40. 2. Kim Rymsha’s computer is back in her office and both her personal and network printers have been connected to her Pc. 3. Docsvault has been completely installed on Lisa Cabrera.…

    • 685 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Microsoft Hyper-V Server 2012 R2 is a server designed for virtual machine (VM). Virtualization is creation include storage, device, operation system as virtual rather than physical. Almost similar to VMware vSphere as virtual machine. VMware vSphere is cost for VMware install on server. But the features will be available than Microsoft Hyper-V Server 2012 R2 because it is free virtual machine for stand-alone.…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    This specifies the general interface between the network layer (IP etc.) and the Data Link layer (Ethernet, Token Ring etc.) It’s the standard for the upper Data Link layer sublayer, also known as the Logical Link Control layer. It’s responsible for flow and error control. The Data Link layer wants to send some data over the network, 802.2 LLC helps make this possible. b. 802.3 – Ethernet 802.3 is the standard which Ethernet operates by.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    If the server sends a file to the receiver, and it receives it near the end of the packet lifetime, then the ACK may take longer to receive then what is left on the packet lifetime, so the server may send another packet before it receives the ACK leading to duplicate packets. 4.Give one potential disadvantage when Nagle's algorithm is used on a badly congested network. A big problem can occur when Nagle's algorithm is used alongside Delayed ACK, another method used to help prevent congestion which could possibly be used on a badly congested network. Basically there is a chance that they will work against each other, Nagle's algorithm won't send it's last packet unless it gets an ACK, but the delayed ACK won't be sent because the server still doesn't have all the data it needs.…

    • 412 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 6 Term Paper

    • 620 Words
    • 3 Pages

    1. Structural ex ante constrains on the agencies that prevent deviations before they occur “The most effective means for achieving policy stability are constraints on the flexibility of agencies, rather than reliance on rewards, punishments, and oversight.” Enfranchising the constituents of presidents and congress through administrative structure and process, we can constrain the bureaucrats. We should clarify each political player’s responsibility and right by regulations and laws with negotiation and bargain.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases, and of Bacterial Methods of Warfare (Geneva Protocol) was penned and signed on 17 June, 1925. This was a treaty signed by the Allies at the close of World War I, which was actually just an extension and re-verification of the Treaty of Versailles (signed in 1919) prior to WWI. The Geneva Protocol furthered the Treaty of Versailles in that it expanded the weapons ban to include a ban on bacteriological warfare. In 1969, this protocol was further expanded to include CS gas agents and harassing agents (probably due to their use by the U.S. during the Vietnam War).…

    • 656 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Securing your Macintosh(Mac) OS computer Apple producing their computers with a lot of security features already in them. Mac OS X is one of the most secure operating systems in the market. Still a lot of people make mistakes while using their computers on their daily bases. These mistakes can notably weaken the security of their operation system. To be sure that you computer secure we will consider how to secure your user account, your web browsing, and we will maximize the privacy.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Problem Statement Communication is key, regardless of where you work. Communication can be between people or a computer communicating data to a person. When obtaining data from a computer, people want to be able to trust the data that they are receiving and that none of the packets got lost somewhere along the way. Packets are units of data that are routed between an origin and a destination on the Internet. Networks use Ethernet cables, called Category (more commonly referred to as CAT) cables to send packets to one another.…

    • 460 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Nowadays, the main aspiration of any organization is to make more with fewer resources. Achieving this goal requires processes and working flows can be designed and operated to provide maximum operational efficiency. Understanding the changing external factors and their organizations more efficient business processes can provide continuous improve their management. In recent times the information technologies become increasingly important factor for organizations both in terms point of the outer and from the viewpoint of the internal environment level their application in the management of business processes can contribute to rapid changes in the efficiency of this control as in the direction of improvement and retardation in the direction…

    • 1065 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Internet Case Study

    • 789 Words
    • 4 Pages

    It is an autonomous space where anyone with access to a computer can almost instantly receive and send data in forms such as text, audio and visual (Johnson, 1995, p 109). It does this through a protocol called Hypertext Transfer Protocol, developed in the 1990s, by Tim Berners-Lee. HTTP is the basis of web communication where linked text ‘connects’ to huge networks of linked pages, allowing the user to click them to explore an seemingly endless array of other hyperlinks, (Landow, G, 1992, p. 3 - 4). The introduction of browsers and Hypertext Markup Language, allows users to view linked pages and design pages with a vast array of linkable content, such as graphics and audio/visual. Public awareness of the web since its inception in the early 1990s, and its simplicity, ensures its continuing massive growth (Bekkerman and Gilpin, 2013).…

    • 789 Words
    • 4 Pages
    Improved Essays