Ntc300 Unit 1

Improved Essays
To fully understand how servers and clients are able to exchange information across the Internet we must understand the workings of the most widely used protocol used in computing. That protocol is the TCP/IP protocol and associated common set of rules for addressing.

IP addresses
The TCP/IP protocol suite uses an Internet address, or IP address, to identify each network interface on the network. Devices can have more that one interface connected to the network. Each interface must have a unique IP address that identifies that interface. In our earlier conversations we examined MAC addressing and how layer two capable devices we able to utilize the MAC address to route packets to the desired destination. MAC address switching used layer
…show more content…
This organization handles requests for new address space allocations and keeps track of who has been assigned which blocks of address space. They also handle complaints and provide governance.

As a result of rapid expansion of the Internet and the growth of the number of hosts on that network, the available addresses in the space provided by Internet Protocol version four (IPv4) has run out. As a result a newer IPv6 protocol is being adopted slowly across the Internet.

Flexibility and Address Space Conservation

Companies and organizations like Hampshire College needed a way to quickly acquire new flexible address spaces that do not consume already scare address space resources. These groups started to take advantage of private, non-Internet routable address blocks provided
…show more content…
Hampshire College for example was able to place layer three capable devices at the head-end wiring closet of every major building and effectively create highly controllable sub networks. This allows the College to route traffic to different ISP’s based on network ID addressing or do things like control access to certain networks with access control lists.
This design is possible using public addressing, but the ability to quickly roll out experimental address spaces, for testing is a valuable function made possible by private addresses.

NAT

If this addressing is private and publicly un-routable, then how do we get traffic across the Internet?

We can use a method called Network Address Translation to assign routable addresses to non-routable addressed traffic. Simply put, there is a bucket of routable addresses available for use by data packets that are exiting the router or firewall. The packet gets assigned a routable address as it leaves and it drops off that address when it returns. Routers keep track of these pairings in a way that is similar to the MAC address table

Related Documents

  • Improved Essays

    When he was there he had the point of working and supervising 3 facilities so by using this type method of connecting all 3 through distant locations by mere contemplation gave him the idea since he needed several computers and common printers to integrate with each other at same time with all the other stations("Wired and Wireless Routers." Wired and Wireless Routers. N.p., n.d. Web). In addition there was another thing that William Yeager did that help us not only creating the router ,but also the multiprotocol system that made to create the IPV4 and IPV6 that most our routers use that connects to all other routing to the main server of each local area that can be useful for the router to communicate with websites on the internet and find a match for that site and code to recognize to store as memory for the next search for this specific one("History of the Router | EHow."…

    • 1350 Words
    • 6 Pages
    Improved Essays
  • Great Essays

     Explain the difference between network and machine addresses A network address is a unique address which is used as identifier for a node/computer on a network which is internet or intranet. IP address is one of the best known example of network address. Machine address is unique identifier for a host which is also known as Host number. Machine address…

    • 1622 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The IP addresses can change and are often assigned by the DHCP server. Data link layer – Mac Addresses are used to identify which hardware is the sender and which is the receiver. All hardware items have a MAC address. For example: a switch, a computer, and a hub would all have their own MAC address and that address is permanent to each individual device. 2.…

    • 766 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Run the ipconfig command to analyze the IP address and subnet that gives the addressing schema for the network. 2. What information can you retrieve from the Domain Name System (DNS)? From the DNS, the following information can be retrieved a. Number of servers and workstations deployed on the network.…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1310 Unit 7

    • 1416 Words
    • 6 Pages

    When the sending device removes the message from the token, it changes the signal to indicate that the token is available and then sends the token along the network. Through this message, the workstations know that a message can now be sent. 15. How does a network card determine that a message is meant for a particular device? Each packet of data that is sent, contains the unique IP address of the workstation that the data is meant for.…

    • 1416 Words
    • 6 Pages
    Great Essays
  • Great Essays

    The Importance Of Firewall

    • 1169 Words
    • 5 Pages

    For example: One computer in Canada and second one in New Zealand TCP/IP is also defining that how can data format and also give IP address to that data. It is also decide route of data means it’s also work with the help of router give path to data one computer to other computer. 1.11 DHCP (Dynamic Host Configuration Protocol) : Whenever we want to configure a network we have to assign IP address to all computers in our network. If we are creating small network it is easy to assign an IP address manually but if we want to develop a large network we can assign IP address with the help of DHCP server. DHCP server provides automatically IP address to all computers and other information such as default gateway and DNS server address to the computers.…

    • 1169 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Internet architecture is basically a huge network of thousands of networks communicating using a common protocol. The Internet sends a transmission to a host computer that sends it on to another computer that is connected to the host computers network. If the receiving computer is not connected to the host computers network, the host computer sends it on to another computer that can then send it to the receiving computer. It is not unusual for the message to pass through several routers before it finally reaches its destination. The transmission of these messages from one computer to another is the Internet.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Virtual private networks (VPN) are private tunnels in the Internet that are created by __________. a) content indexing b) usernames and passwords c) biometrics d) encryption 41. Several factors are driving the need for messaging and collaboration. All of the following are driving factors except: a) people need to work together and share documents. b) groups make most of the routine and easy decisions in…

    • 1865 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    If the same host is capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel. Since IPv4 VPN puts the remote host on a private network, the natural choice for the IPv6 tunnel is the ISATAP (Intra-Site Automatic Tunnel Addressing Protocol), which is suitable for communication within a location. However, in practice, we can use any type of IPv6 tunnel as long as it is supported by the host and while the gateway is set up within the private network for it. Configurations for IPv4 access to VPN and IPv6 tunnel are completely independent. From the host's perspective, the tunnel configuration depends on the operating system used.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    TCP/IP And OSI Models

    • 957 Words
    • 4 Pages

    b. The two primary protocols are TCP and IP. c. IP provides logical addressing and routing…

    • 957 Words
    • 4 Pages
    Decent Essays

Related Topics