Ntc300 Unit 1

Improved Essays
To fully understand how servers and clients are able to exchange information across the Internet we must understand the workings of the most widely used protocol used in computing. That protocol is the TCP/IP protocol and associated common set of rules for addressing.

IP addresses
The TCP/IP protocol suite uses an Internet address, or IP address, to identify each network interface on the network. Devices can have more that one interface connected to the network. Each interface must have a unique IP address that identifies that interface. In our earlier conversations we examined MAC addressing and how layer two capable devices we able to utilize the MAC address to route packets to the desired destination. MAC address switching used layer
…show more content…
This organization handles requests for new address space allocations and keeps track of who has been assigned which blocks of address space. They also handle complaints and provide governance.

As a result of rapid expansion of the Internet and the growth of the number of hosts on that network, the available addresses in the space provided by Internet Protocol version four (IPv4) has run out. As a result a newer IPv6 protocol is being adopted slowly across the Internet.

Flexibility and Address Space Conservation

Companies and organizations like Hampshire College needed a way to quickly acquire new flexible address spaces that do not consume already scare address space resources. These groups started to take advantage of private, non-Internet routable address blocks provided
…show more content…
Hampshire College for example was able to place layer three capable devices at the head-end wiring closet of every major building and effectively create highly controllable sub networks. This allows the College to route traffic to different ISP’s based on network ID addressing or do things like control access to certain networks with access control lists.
This design is possible using public addressing, but the ability to quickly roll out experimental address spaces, for testing is a valuable function made possible by private addresses.

NAT

If this addressing is private and publicly un-routable, then how do we get traffic across the Internet?

We can use a method called Network Address Translation to assign routable addresses to non-routable addressed traffic. Simply put, there is a bucket of routable addresses available for use by data packets that are exiting the router or firewall. The packet gets assigned a routable address as it leaves and it drops off that address when it returns. Routers keep track of these pairings in a way that is similar to the MAC address table

Related Documents

  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 7 Exercise 1

    • 556 Words
    • 3 Pages

    10. Private Cloud This is a type of cloud computing that similar to a public cloud, but a private cloud is dedicated to one…

    • 556 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    WANs cover larger areas, such as cities, and even allow computers in different nations to connect. LANs are typically faster and more secure than WANs, but WANs enable more widespread connectivity. And while LANs tend to be owned, controlled and managed in-house by the organization where they are deployed, WANs typically require two or more of their constituent LANs to be connected over the public Internet or via a private connection established by a third-party telecommunications…

    • 611 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 1 Assignment

    • 1292 Words
    • 6 Pages

    Nova Southeastern University Graduate School of Computer and Information Science Department of Management Information Systems MMIS 656 - Web Design Technologies Assignment # 1 Mohammed Aljaafari Exercise 1.1 Latest Versions Sources Browser Opera 27.0.1689.66 http://filehippo.com/ Web server Google Chrome 42.0.2292.0 Dev http://filehippo.com/ JavaScript JavaScript FH Plus http://en.softonic.com/ PHP PHP 5.6.5 http://php.net/downloads.php Servlets Java Servlet 3.0 http://www.oracle.com/ ASP.NET ASP.NET 5 http://www.asp.net/vnext…

    • 1292 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Nt1330 Unit 3

    • 483 Words
    • 2 Pages

    Microsoft was the one to develop Active Directory. Directory services are provided by Active Directory to windows domain network. It stores all the information related to files, users, resources and computers. It places them in proper hierarchal logical groupings. It uses this information to provide the right access and authority to the right user.…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    IPsec is often installed on today's IPv4 networks to protect communication over VPN networks. It is used to access VPN, as well as between VPNs. IPv6 transition mechanisms can use this kind of infrastructure to achieve a certain level of protection, even in the absence of IPv6 IPsec. Remote IPv4 hosts access private networks by establishing encrypted VPN access to a gateway device set up for this purpose. If the same host is capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1

    • 360 Words
    • 2 Pages

    These days’ security is a critical factor of I.T whether it be protecting physical devices or information. What are some basic examples of ways to provide physical security for a server? What can be done about logical security? Security in the critical factor for everything related to internet.…

    • 360 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    CS320 Assignment 1 Andrew McConnon 13349871 You want to connect different computers, at different locations, so that they can exchange data with each other. What are the different challenges that you need to overcome? Host Identification on small networks isn’t a problem as it can be set up with manual ways of addressing, but will be exponentially harder the larger a network becomes. Protocols, DHCP servers and addressing are a huge need if you want to create and sustain a large, expanding network.…

    • 399 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The following are the top 10 types of packets: IPv4: Internet Protocol version 4 (IPv4) is the standard version of the internet protocol, that acts as the platform for standard internet protocols and existing internet models (ISP). Extensive use of this protocol led to exhaustion of IP addresses. Therefore, we are bound to use IPv6, in the near future. A feature called as sub-netting is used for IP address allocation. It is defined in RFC 791.…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    QUES 1. A router has the following CIDR entries in the routing table: Address/Mask Next Hop 135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23 Router 1 Default Router 2 For each of the following IP addresses, what does the router do if a packet with that address arrives? 1. 135.46.63.10 2.…

    • 607 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    The protocols that are used are TCP and UDP. The data link layer is responsible for encapsulation of packets into frames and then transferring them to the physical layer. It is also responsible for flow control and addressing. 5. A three-way handshake is when two parties need to synchronize their segment sequence numbers used during their transmission.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Figure 3 demonstrates the 3 layers that make up the SDN structure. Lowest layer represents the Infrastructure Layer or Forwarding Plane, mainly focusing on data forwarding but it also takes care of monitoring local information and gathering statistics. Next layer represents the Control Layer or Control Plane which is responsible for programming and managing the Forwarding Plane. Control Plane makes use of the information gathered by the Forwarding Plane in order to define the route and operation of the network.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    VPN A virtual private network is used by organisations to help secure data on a network. It’s very hard to access these private networks meaning that the data becomes much more secure and it can be used across a large area of a network, including many computers. This isn’t an expensive thing to do anyone can do it by using simple publicly available infrastructures. VPN also makes use of encryption firewalls and authentications services when sending data across the web.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Inspite of its conceptual elegance, RPC (Remote Procedure Call) have a few problems. Discuss any 3 of those in brief. Often times it is unclear who the client is and who the server is in certain situations, in these types of situations RPC would not be suitable. RPC also makes unexpected messages hard or impossible to send if the receiver of the message is not expecting the message.…

    • 412 Words
    • 2 Pages
    Decent Essays

Related Topics