Free Essay

Rfc Explained

In:

Submitted By kgassassin
Words 606
Pages 3
RFC Explained
Keith Stellmach
7/14/2013
DeVry University

First we should start with an explanation of what an RFC is, an RFC or Request for Comments is a formal document in which contains technical information about the internet. RFC’s include specifications, policies, internet standards and organizational ideas. The Organization that produces these documents is the IETF or the Internet Engineering Task Force and more specifically a small group of people called the Internet society on behalf of the IETF. The RFC’s have a long history and were first created in 1969 as working notes for ARPAnet, since then the RFC database has grown significantly with a multitude of the earlier publications becoming outdated. For the first 29 years of publication, The RFC database was edited and monitored by Jon Postel until his death in 1998. Now that we know a little about RFC’s, let me elaborate on a few topics, lets divulge into what an internet draft is, a little about the IETF, and finally what the process is to produce an RFC. An internet draft is basically a working document used by the IETF. During the creation of a new RFC, draft versions are created and made available so that the public can view it. Doing this, peers and others in the industry can review these drafts and comment on them whether they are commenting on what can be changed or on what they think of the new publication, it gives the editors some new ideas and ways to improve or change the new documentation before it gets published as an RFC. The IETF or the Internet Engineering Task Force is basically a large group of individuals with knowledge about networking protocols and other technical related subjects that work together to develop new policies and internet standards. The IETF is not a club or a prestigious group, anyone can join the IETF and attend meetings and be given a group to work with. Each individual in the work group is given a part of the work so that they can all work together to complete new RFC’s. In order to create a new RFC, there is a process in which the new documentation needs to go though in order to be published. Anyone can create an RFC independently, but they must first create an Internet Draft. It can be published after review by the IETF for technical competence, relevance, and adequate writing. In addition to this it will also be reviewed by the RFC editor and by the IESG once this is completed, the independent publication can go through the same process for publication as IETF submissions. First the submission must wait to receive normative references then it is edited for grammar and spelling, then it goes into a final review with the RFC editor. It is then assigned an RFC number and then the author gets a 48 hour window in which to review the RFC before publication. RFC’s or Request for Comments are used to define internet policies and procedures in which to create a better internet. The RFC’s are maintained and edited by the IETF and there are guidelines and procedures that need to be followed in order for new publications to be released. This database is used to help define internet standards and to help the progression of the internet by creating new and better policies to create a better experience on the internet.

References:

Request for Comments (RFC) Pages. (n.d.). Retrieved July 14, 2013, from http://www.ietf.org/rfc.html
RFC Series Overview. (n.d.). Retrieved July 14, 2013, from http://www.rfc-editor.org/RFCoverview.html

Similar Documents

Premium Essay

Abap

...Servers Table of Contents TCodes used in this Procedure .......................................................................................................................... 3 Major Steps Involved in IDoc Processing ........................................................................................................... 3 Step 1: Creation of Logical System in IDES System for Client 800 ................................................................ 4 Step 2: Creation of Logical System in RD2 System for Client 120 ................................................................. 8 Step 3: Creation of Another Logical System in IDES System......................................................................... 8 Step 4: Creation of RFC Destination in IDES System .................................................................................... 9 Step 5: Creation of tRFC Port in IDES System ............................................................................................. 11 Step 6: Creation of Partner Profile in IDES System ...................................................................................... 12 Step 7: Creation of Distribution...

Words: 2743 - Pages: 11

Premium Essay

Ip Subnetting

...n IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation. Example: 140.179.220.200 It is sometimes useful to view the values in their binary form. 140 .179 .220 .200 10001100.10110011.11011100.11001000 Every IP address consists of two parts, one identifying the network and one identifying the node. The Class of the address and the subnet mask determine which part belongs to the network address and which part belongs to the node address. Address Classes There are 5 different address classes. You can determine which class any IP address is in by examining the first 4 bits of the IP address. Class A addresses begin with 0xxx, or 1 to 126 decimal. Class B addresses begin with 10xx, or 128 to 191 decimal. Class C addresses begin with 110x, or 192 to 223 decimal. Class D addresses begin with 1110, or 224 to 239 decimal. Class E addresses begin with 1111, or 240 to 254 decimal. Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for internal testing on a local machine; [You can test this: you should always be able to ping 127.0.0.1, which points to yourself] Class D addresses are reserved for multicasting; Class E addresses are reserved for future use. They should...

Words: 586 - Pages: 3

Free Essay

Snort

...Intrusion Detection Systems with Snort Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID BRUCE PERENS’ OPEN SOURCE SERIES ◆ Managing Linux Systems with Webmin: System Administration and Module Development Jamie Cameron ◆ Implementing CIFS: The Common Internet File System Christopher R. Hertel ◆ Embedded Software Development with eCos Anthony J. Massa ◆ The Linux Development Platform: Configuring, Using, and Maintaining a Complete Programming Environment Rafeeq Ur Rehman, Christopher Paul ◆ Intrusion Detection Systems with Snort: Advanced IDS Techniques with Snort, Apache, MySQL, PHP, and ACID Rafeeq Ur Rehman Intrusion Detection Systems with Snort Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID Rafeeq Ur Rehman Prentice Hall PTR Upper Saddle River, New Jersey 07458 www.phptr.com Library of Congress Cataloging-in-Publication Data A CIP catalog record for this book can be obtained from the Library of Congress. Editorial/production supervision: Mary Sudul Cover design director: Jerry Votta Cover design: DesignSource Manufacturing manager: Maura Zaldivar Acquisitions editor: Jill Harry Editorial assistant: Noreen Regina Marketing manager: Dan DePasquale © 2003 Pearson Education, Inc. Publishing as Prentice Hall PTR Upper Saddle River, New Jersey 07458 This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, v1.0 or later (the latest version...

Words: 52750 - Pages: 211

Free Essay

Implementation of Smtp and Pop3 Protocol in Java Programming Language

...server. Također su prezentirani sigurnosni mehanizmi koji se koriste u praksi te način njihove upotrebe. U sklopu rada urađena je i aplikacija u programskom jeziku JAVA, objašnjen postupak izrade, i način korištenja aplikacije. Kljuĉne rijeĉi: Mail, Server, JAVA, SMTP, POP3 IMPLEMENTATION OF MAIL SERVER IN JAVA PROGRAMMING LANGUAGE ABSTRACT: This paper is based on topic regarding implementation of SMTP and POP3 mail server with JAVA programming language. Paper is explaining fundamental standards and protocols that every modern Mail Server system must adopt. Also, here are presented security mechanisms that are used by Mail Server systems today. Additionally, we have developed „Mail server“ application in JAVA programming language and explained structure, development process and use of application „Mail server“. Keywords: Mail, Server, JAVA, SMTP, POP3 2 SADRŽAJ POPIS SLIKA .................................................................................................................................. 5 POPIS TABELA .............................................................................................................................. 6 POPIS SKRAĆENICA ....................................................................................................................... 6 1. UVOD ....................................................................................................................................... 7 2. MAIL SERVERI...

Words: 15322 - Pages: 62

Free Essay

Use of Ipsec in Mobile Ip

...communication through the Internet allows the existence of such protocols as Mobile IP. As much as this is true, it is as well the fact that every time new protocols or services are made available on the Internet, new security challenges arise. IPSec has been developed as a protocol to provide security at the IP layer. That is to say, using IPSec all communications on the Internet can be accomplished in a secure fashion. Providing security is not an easy task, since many situations have to be taken into account. The approach IPSec uses to address security is by managing two key concepts: privacy and authentication. In this paper, the MOBILE IPv4 & MOBILE IPv6 with the security considerations are introduced, after that the IPsec is explained, focusing on the IP Authentication Header and the IPsec Encapsulating Security Payload. Then the USE OF IPsec IN MOBILE IP part is treated, finally a performance analysis done in Carnegie...

Words: 9748 - Pages: 39

Free Essay

Analysis, Recommendations of Decrease in Box Office Hits in Film Industry

...Business Research Methods (2014) Decreasing number of box office hits per year in Telugu film industry (Tollywood) - analysis and recommendations Business Research Methods Submitted to Dr Arun Abraham Elias Victoria Management School Victoria University of Wellington New Zealand Submitted by M Rohit PGP/17/151 – Section C Indian Institute of Management, Kozhikode India M Rohit (PGP/17/151) Page 1 Business Research Methods (2014) Abstract This paper talks about the emergence of Telugu films and subsequent growth and development of Telugu film industry (Tollywood). Indian film industry on a whole is facing serious issue in the decrease in number of hits per year. An attempt has been made to study this trend in Tollywood. Entertainment industry is a major source of income in the Indian GDP. Hence this topic of research has been chosen. The industry has seen transformation from Puranas to mass folklore to technological breakthroughs in the form of colour films and many more innovations. Tollywood holds a special place in Indian film industry in terms of quality of films, number of films released, box office collections and cultural and political impacts on India. This paper approaches the industry with behaviour over time analysis and then identifies various stakeholders involved in this complex network. The paper gives a brief idea of the effects of various parties on the industry. An attempt has been made to address various issues relating to technology,...

Words: 4198 - Pages: 17

Free Essay

Information Security Threat Mitigation

...Information Security Threats Mitigation By Francis Nsofwa Mubanga Keller Graduate School of Management Devry University Professor Sandra Kirkland SE572 July 14th, 2011  Table of Contents Introduction 1 Steps 1 Denial-of-Service attacks (DoS) 1 Distributed Denial-of-Service attacks (DDoS) 1 Masquerading and IP Spoofing attacks 2 Smurf attacks 2 Land .c attacks 2 Man-in-the-Middle attacks 3 Conclusion 3 References 4 Introduction Our company faces the largest information security threat and we need to take steps to mitigate the risks associated with each one of them. Steps Denial-of-Service attacks (DoS) We will analyze the attack as best as we can and implement the correct defense. We will ask ourselves if there are any common packet signatures that are easy to filter against. We will ask ourselves if all attackers hitting a single target if they can be sacrificed. We will also need to find out as to which network the attack is coming from, and if we can verify it (remember that spoofed packets can come from anywhere, including our own network). Once we’ve found a reasonable match for the attack, pass the filters to our upstream provider(s) and seek their help getting them propagated outwards. We will need to make sure we filter or redirect traffic with a minimum amount of actual downtime (Kaeo, 2004). Distributed Denial-of-Service attacks (DDoS) CluB: a Cluster-Based architecture is the method we will use to prevent DDoS attacks...

Words: 789 - Pages: 4

Premium Essay

Kl; Ll

...selected, along with worked examples from the syllabus, to create this unique eBook. Written by a top ITIL Consultant who has proven these techniques time and time again with students he coaches. Across 12 content packed chapters you will learn: • • • • • • • • • • • • • The awesome 3-PASS answering strategy to obtain over 26 points Worked examples of ITIL questions and three mistakes you must avoid making! Exam jargon demystified: Stems, Options, Qualifiers and Modifiers – Revealed How to overcoming the challenges and pitfalls of the ITIL Foundation exam How Examiners actually create questions and the secrets you must know How to verify you have the correct answer and avoid changing your mind The ‘DNA’ of ITIL Foundation questions explained – step-by-step How to effectively boost your memory recall using Flashcards Five ways to ensure you quickly eliminate incorrect answers Three ways to ensure you fully understand the question How to quickly overcome exam blackout and anxiety How...

Words: 2487 - Pages: 10

Premium Essay

Itil

...selected, along with worked examples from the syllabus, to create this unique eBook. Written by a top ITIL Consultant who has proven these techniques time and time again with students he coaches. Across 12 content packed chapters you will learn: • • • • • • • • • • • • • The awesome 3-PASS answering strategy to obtain over 26 points Worked examples of ITIL questions and three mistakes you must avoid making! Exam jargon demystified: Stems, Options, Qualifiers and Modifiers – Revealed How to overcoming the challenges and pitfalls of the ITIL Foundation exam How Examiners actually create questions and the secrets you must know How to verify you have the correct answer and avoid changing your mind The ‘DNA’ of ITIL Foundation questions explained – step-by-step How to effectively boost your memory recall using Flashcards Five ways to ensure you quickly eliminate incorrect answers Three ways to ensure you fully understand the question How to quickly overcome exam blackout and anxiety How...

Words: 2492 - Pages: 10

Free Essay

Summary Judgment

...UNITED STATES DISTRICT COURT WESTERN DISCTRICT OF MICHIGAN SOUTHERN DIVISION ESTATE OF ROLAND ROHM, by its Personal Representative, Geraldine Livermore, Plaintiff, vs. Case No. 1:04-CV-552 Hon. Richard Alan Enslen DANIEL LUBELAN, individually, JOHN JULIN, individually, JERRY ELLSWORTH, individually, STEVE HOMRICH, individually, DAVID BOWER, individually, jointly and severally, Defendants. _______________________________________/ Of Counsel: HILL AND ASSOCIATES, LLP DeClercq Druminski & Perlman James D. Hill (P88332) Anthony J. DeClercq Attorney for Defendant Attorney for Plaintiff 161 N. Clark St. 55171 Pacific Ridge Drive Chicago, IL 60601 Macomb, MI 48042 (913) 706-9986 (586) 321-7630 JamesDonaldHill@gmail.com decler16@msu.edu January 12, 2002 DEFENDANTS’ BRIEF IN SUPPORT OF MOTION FOR SUMMARY JUDGMENT TABLE OF CONTENTS Table of Authorities........................................................................................................ii Issues Presented...............................................................................................................1 Statement of Facts...........................................................................................................1 Summary of the Argument..............................................................................................3 Standard of Review................................

Words: 3221 - Pages: 13

Free Essay

Dynamic Source Routing

...Dynamic Source Routing (DSR) DSR was first introduced and described by David B. Johnson, David A. Maltz and Josh Broch in 1994. The protocol is specifically designed for use in multi-hop wireless ad hoc networks. The protocol does not require any existing network infrastructure or administration and is completely self-organizing and self-configuring. The protocol basically consists of the two mechanisms: Route Discovery and Route Maintenance, where the Route Discovery mechanism handles establishment of routes and the Route Maintenance mechanism keeps route information updated. Assumptions Some assumptions concerning the behavior of the nodes that participate in the ad hoc network are made. The most important assumptions are the following: A1. All nodes that participate in the network are willing to participate fully in the protocols of the network. A2. The diameter of an ad hoc network is the minimum number of hops necessary for a packet to reach from any node located at one extreme edge of the ad hoc network to another node located at the opposite extreme. We assume that this diameter will often be small (e.g., perhaps 5 or 10 hops), but it may often be greater than 1. A3. Nodes can detect the error through a standard link-layer checksum or Cyclic Redundancy Check (CRC), and discard corrupted packages . A4. The speed at which nodes move is moderate with respect to packet transmission latency and wireless transmission range of the particular underlying network hardware...

Words: 1841 - Pages: 8

Free Essay

Health Care

...Table of Contents INTRODUCTION: 2 REFERENCES 9 TURNITIN REPORT 10 INTRODUCTION: The face of healthcare is changing as new technologies have been integrated into the existing infrastructure (Roosta, et al., 2006). My health centre was able to provide services to patients with breast cancer in some previous years adding its technology infrastructure, which intends to launch a system service mobile access via mobile phones to give the patient access to needed services. It is planning to introduce a mobile access systems service via mobile devices to help their patients for accessing required services. This report covers a detailed plan of execution, security, privacy and other concerns of using the mobile access system inside and beyond the hospital. MOBILE TECHNOLOGIES INCLUDES THE USE OF: * Mobile phones * Internet-enabled Smartphone’s * Personal digital assistants (PDAs) * Tablet computers * Subnotebook microcomputers * Remote diagnostic and monitoring devices (McGonigle &...

Words: 1713 - Pages: 7

Free Essay

Keylogging

...TRANSACTIONS ON MOBILE COMPUTING, VOL. 1, NO. 8, AUGUST 2014 1 Keylogging-resistant Visual Authentication Protocols DaeHun Nyang, Member, IEEE, Aziz Mohaisen, Member, IEEE, Jeonil Kang, Member, IEEE, Abstract—The design of secure authentication protocols is quite challenging, considering that various kinds of root kits reside in PCs (Personal Computers) to observe user’s behavior and to make PCs untrusted devices. Involving human in authentication protocols, while promising, is not easy because of their limited capability of computation and memorization. Therefore, relying on users to enhance security necessarily degrades the usability. On the other hand, relaxing assumptions and rigorous security design to improve the user experience can lead to security breaches that can harm the users’ trust. In this paper, we demonstrate how careful visualization design can enhance not only the security but also the usability of authentication. To that end, we propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature. Furthermore, using an extensive case study on a prototype of our protocols, we highlight the potential of our approach for real-world deployment: we were able to achieve a high level of usability while satisfying stringent security requirements. Index...

Words: 12707 - Pages: 51

Free Essay

Dsc340

...DSC 340 Study Guide Mick McQuaid Spring 2014 Following is a study guide for DSC 340. It’s a living document to be updated by the instructor every week during the term based on readings, contributions from students, and updates in the rapidly changing world of business information systems. 1. PERSONAL INFORMATION SYSTEMS Extensive research over the past twenty years, some of it by Tom Malone at MIT and Susan Dumais at Microsoft Research, has explored how people organize personal information. One example that helps people understand the problem of personal information is the knife analogy, described below. One important finding about personal information management has been that people are prone to do one or some combination of these two things: filing and piling. After reviewing the following topics, conclude the study of personal information systems by doing the share best practices exercise. 1.1 Knives In the Home Suppose you have just won a complete set of knives for your home. Where should you put them? You could have a single cabinet to store all knives, but it is more likely that you will distribute the knives to different rooms, placing them near where they will be used: steak knives in a buffet in the dining room, cooking knives in the kitchen, handyman knives in a garage workshop. When you need a particular knife, it will be in the context of a current task, such as preparing food, setting a table, or cutting a length of rope for a clothesline. In each...

Words: 8643 - Pages: 35

Premium Essay

Intrusion Detection

...RESEARCH REPORT – CP5603 INTRUSION DETECTION ASHWIN DHANVANTRI JAMES COOK UNIVERSITY AUSTRILIA SINGAPORE CAMPUS STUDENT ID 12878531 Table Of Contents Title Page No Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Types of Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . 2 Working Of Intrusion Detection System. . . . . . . . . . . . . . . . . . . . . 3 System Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Outline Technical Needs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Literature Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Module Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Use case Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Technology Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 ...

Words: 3561 - Pages: 15