Premium Essay

Tcp/Ip Research Paper

In:

Submitted By ninotorious
Words 1457
Pages 6
NT1210T

In the past, networking was often associated with interacting with other individuals to develop contacts, usually to build rapport and further their career. The groundwork put forth during that period was time consuming and tiresome. Telephone, written mail, or conducting a face-to-face meeting prevailed as their main method of communication. Fast forward to today, the click of a mouse button sends out e-mails to a handful of individuals or connects video conferencing calls between people across the globe. The term networking evolved and took on new meaning through the advancement in technology.
The world has changed with the way technologies in computers and communications have developed over the years. Interconnecting individuals throughout the country, let alone the world, is a proven necessity in today’s world. The invention of the internet has come to be known as one of the most prevalent methods of communication in modern day. The internet itself is simply a large network of computers connected together via some type of connection communicating back and forth. While many individuals are exposed to the internet on a daily basis, those individuals may not know the complex process that the information goes though.
Enormous amounts of ones and zeroes are processed and translated daily throughout the internet. The basis of how we communicate with a computer includes inputs turned into these bits, processing these bits, and producing an output. Fortunately, when it comes to machine language, these very bits stay the same and the rules that are in place help to translate any spoken language in order to communicate throughout the internet. While many languages may vary throughout the world, speaking and writing to communicate with one another requires certain rules so the conversation is understood from both parties.
The machine language used to access

Similar Documents

Free Essay

Resource

...to 2,500-word paper including the following: -     Identify network system elements (routers, switches, servers and workstations etc) in use. (10 pts) -     Identify network protocols in use within each of the seven OSI layers. (5 pts) -     Research on networks deployed by other health care organizations and recommend additional network elements and protocols that may be used to enhance current network. (5 pts)   Hints and clarifications: 1       With regard to network system elements, please describe what elements are used and where. Also briefly explain why the elements are used when appropriate (e.g, “The VPN router serves as a VPN concentrator/server and provides VPN access to remote users.”). 2       For network protocols, identify which of following core protocols are in use and expand around them: a.                             Layer 1 and 2: what network interfaces are involved? Example of network interfaces are Ethernet, FDDI, ATM, Frame-Relay, T1 etc. b.                             Layer 3: It’s important to first determine which network protocol suite(s) is/are used in the network(example of network protocol suites are TCP/IP, Appletalk, IPX/SPX etc). The core protocol for layer 3 is then IP for TCP/IP, DDP for Appletalk, IPX for IPX/SPX. Other important protocols in this layer include various routing protocols and network address to physcial address mapping protocols (e.g, ARP in TCP/IP). c.                             Layer 4: For TCP/IP, the core layer...

Words: 376 - Pages: 2

Free Essay

Tcp/Ip Security Concerns

...is on the TCP/IP security. As we have seen the transmission of data as securely as possible has become top on the list for many companies and persons. As we have begun using the Internet more and more to conduct business remotely, we need to ensure that our most sacred data is protected from harm. To ensure that we understand the transmission of data using TCP/IP, I will explain the history of the protocol and the reason for this being the established standard used. As we have read and know it is a combination of two known protocols that were combined to become one. The Transport Control Protocol is used to ensure successful delivery of data. It carries the destination and source information such as the address for both. The IP protocol or Internet Protocol is the second. This protocol is only for sending data. It combined with TCP will ensure that the data is transmitted successfully. When the protocols began to communicate they can use on of many ways to ensure successful communication. One being the hand shake method. There are more than one and will be explained in the paper. With that transmission come the possibility of interference and high jacking of data. One common discussed security hole is the prediction of the send sequence. There is also the SYN and FIN scanning, which each attack. Then there is UDP security concerns, which an attacker uses empty UDP ports to send datagram’s. These are just a few ways there are security holes defined with using TCP/IP and I will...

Words: 373 - Pages: 2

Premium Essay

Brief History of the Internet

...information dissemination, and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. The Internet represents one of the most successful examples of the benefits of sustained investment and commitment to research and development of information infrastructure. Beginning with the early research in packet switching, the government, industry and academia have been partners in evolving and deploying this exciting new technology. Today, terms like "bleiner@computer.org" and "http://www.acm.org" trip lightly off the tongue of the random person on the street. 1 This is intended to be a brief, necessarily cursory and incomplete history. Much material currently exists about the Internet, covering history, technology, and usage. A trip to almost any bookstore will find shelves of material written about the Internet. 2 In this paper,3 several of us involved in the development and evolution of the Internet share our views of its origins and history. This history revolves around four distinct aspects. There is the technological evolution that began with early research on packet switching and the ARPANET (and related technologies), and where current research continues to expand the horizons of the infrastructure along several dimensions, such as scale, performance, and higher-level functionality. There is the operations and management aspect of a global and complex operational infrastructure. There is the social aspect, which...

Words: 8457 - Pages: 34

Premium Essay

TCP/IP Network Model

...ABSTRACT Without TCP/IP, there would be no internet. TCP and IP are two separate data communication and transmission protocols. They are considered the core protocols of TCP/IP network model. The model encompass four layers; application layer, host-to-host transport layer, Internet layer, and network access layer. Each layer process data that it receives and push up and down the model layers according to its intended function. This paper will provide an analysis of the layered protocol structure of TCP/IP networks. Keywords: TCP/IP networks model, application layer, host-to-host transport layer, Internet layer, and network access layer. INTRODUCTION All internet services that we use and rely on in our daily life are based on TCP/IP networks....

Words: 1024 - Pages: 5

Free Essay

Tcp/Ip

...TCP/IP This week’s paper will provide an overview into the world of the Transmission Control Protocol (TCP) and Internet Protocol (IP), and how they are used together in business and telecommunications. Frist, the current TCP/IP offerings as, as they apply to the OSI model, will be discussed. Second, the future of TCP/IP will be discussed with relevant research support as well as recommendations for new software and equipment. Finally, an overview of different methods for reducing network congestion through the use of equipment, software and multiplexing will be given. Current Offerings of TCP/IP In business, the OSI and TCP/IP have been the standard method of network classification for many years. The Open Systems Interconnect Model (OSI) can be thought of as an idea or guideline, while TCP/IP more closely relates to reality. Both models do mostly the same thing, but TCP/IP is a more efficient method, and usually matches up directly with the network. Because OSI is more of an idea, it is not utilized as much as TCP/IP. With the creation of smart switches and other advanced network equipment and functions, more layers can be combined and a more streamlined process can be gained. Because of this, TCP/IP is the most used model in modern networks, while OSI is used for describing network activity. Improving TCP/IP As TCP/IP ages and new technology comes about, there is a need to upgrade software and hardware to keep up with the demands of modern networking. Below we will...

Words: 1158 - Pages: 5

Premium Essay

Intro to Internet

...information dissemination, and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. The Internet represents one of the most successful examples of the benefits of sustained investment and commitment to research and development of information infrastructure. Beginning with the early research in packet switching, the government, industry and academia have been partners in evolving and deploying this exciting new technology. Today, terms like "bleiner@computer.org" and "http://www.acm.org" trip lightly off the tongue of the random person on the street. 1 This is intended to be a brief, necessarily cursory and incomplete history. Much material currently exists about the Internet, covering history, technology, and usage. A trip to almost any bookstore will find shelves of material written about the Internet. 2 In this paper,3 several of us involved in the development and evolution of the Internet share our views of its origins and history. This history revolves around four distinct aspects. There is the technological evolution that began with early research on packet switching and the ARPANET (and related technologies), and where current research continues to expand the horizons of the infrastructure along several dimensions, such as scale, performance, and higher-level functionality. There is the operations and management aspect of a global and complex operational infrastructure. There is the social aspect, which...

Words: 8826 - Pages: 36

Premium Essay

Paper

...computer set the stage for this unprecedented integration of capabilities. The Internet is at once a world-wide broadcasting capability, a mechanism for information dissemination, and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. The Internet represents one of the most successful examples of the benefits of sustained investment and commitment to research and development of information infrastructure. Beginning with the early research in packet switching, the government, industry and academia have been partners in evolving and deploying this exciting new technology. Today, terms like "bleiner@computer.org" and 1 "http://www.acm.org" trip lightly off the tongue of the random person on the street. This is intended to be a brief, necessarily cursory and incomplete history. Much material currently exists about the Internet, covering history, technology, and usage. A trip to almost any bookstore 2 will find shelves of material written about the Internet. 3 In this paper, several of us involved in the development and evolution of the Internet share our views of its origins and history. This history revolves around four distinct aspects. There is the technological evolution that began with early...

Words: 9306 - Pages: 38

Premium Essay

Network Security

...together”. An attack is defined as “an aggressive and violent act against a person or place”. Lastly, security is defined as “the state of being free from danger or threat”. Since the beginning of networking there have been users out there with malicious intent to either gain information or disrupt it. Technicians may not be able to stop the initiation of attack but there are certainly tools and techniques to fight back. This paper will discuss the protocol layers of networking, the associated threats and applicable solutions. This research paper will include an analysis of networking and examples of attacks. While not all solutions will be touched upon, this paper will give you a basic understanding of the way forward. Many references sited in my research are scholarly, peer reviewed journals and are considered experts in their field of Information Technology Technology is the basis of many operations in society today. While technological advances have made numerous processes easier and faster, it has also introduced an equal number of negative practices. This paper will discuss the theoretical model of networking which breaks up the data transmission process into multiple layers. We will first take a look at the original networking model and its functions compared to the newer model. Next we will take a look at vulnerabilities that are susceptible to attacks within each layer. Finally we will take a look at possible solutions to thwart malicious activity. Before we begin, let’s...

Words: 3311 - Pages: 14

Free Essay

System Engineerring Roles in Software Enginerring

... term paper topic-system engineerring roles in software enginerring cap 590 rollno.46 section-1101 reg no-11001009 submitted to-pawan sir submitted by-jaspreet singh TABLE OF CONTENTS Introduction to tcp/ip tcp ip operaction ,s of tcp/ip layers in tcp/ip model tcp/ip protocols References INTRODUCTION TCP/IP------------ The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP. Applications that do not require the reliability of a TCP connection may instead use the connectionless User Datagram Protocol (UDP), which emphasizes low-overhead operation and reduced latency rather than error checking and delivery validation. TCP---------- The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite. TCP provides reliable...

Words: 2390 - Pages: 10

Premium Essay

Ip Spoffing

...IP Spoofing by Farha Ali, Lander University The Internet Protocol, or IP, is the main protocol used to route information across the Internet. The role of IP is to provide best-effort services for the delivery of information to its destination. IP depends on upper-level TCP/IP suite layers to provide accountability and reliability. The heart of IP is the IP datagram, a packet sent over the Internet in a connectionless manner. An IP datagram carries enough information about the network to get forwarded to its destination; it consists of a header followed by bytes of data . The header contains information about the type of IP datagram, how long the datagram should stay on the network (or how many hops it should be forwarded to), special flags indicating any special purpose the datagram is supposed to serve, the destination and source addresses, and several other fields, as shown in Figure 1. Figure 1: The IP Header Layers above IP use the source address in an incoming packet to identify the sender. To communicate with the sender, the receiving station sends a reply by using the source address in the datagram. Because IP makes no effort to validate whether the source address in the packet generated by a node is actually the source address of the node, you can spoof the source address and the receiver will think the packet is coming from that spoofed address. Many programs for preparing spoofed IP datagrams are available for free on the Internet; for example, hping lets...

Words: 3368 - Pages: 14

Free Essay

Dr. Cert

...Case Study Final Dr. Vint Cerf: Father of the Internet Rebekah N. Diaz ISSC363 Dr. Tannoury December 28th, 2013 Diaz 2 Technology refers to, the making, usage, modification, and size of machines, tools, methods applied by an order when dealing with problems. It also applies to methods applied when improving an already existing solution and when performing a duty or achieving a goal. The superficial IT evolution can be said to be preceded by hand and print revolutions. All the things that one can now handle within a short spun of time just by the click of a button is quite different from the past. Systems like phones, computers and other electronic devices can carry out a bunch of work just by the click of the correct button within a minimum duration unlike in the past. They have made the lives of young people comfortable and swifter, as explained by Keith (100). Modern technology has led to globalization. This has made the world smaller. It has allowed the world’s economy to be a separate business unit. This business unit is interdependent. The Internet, televisions, and cell phones are enlightening socialization by making both positive and negative impacts on the lives of children. Internet is the first group having enormous influence in technology. It has changed how people communicate, when they talk, where they relate from and the frequency at which they do so. The Internet allows for globalization, interconnection and sharing of information. It has made the...

Words: 2715 - Pages: 11

Free Essay

Spcc

...Table of Contents 1. Acknowledgement 3 2. Introduction 4 2.1 Smart Home Control System 4 2.2 LabVIEW 5 3. Project Requirement 6 3.1 Project Requirement fulfilled by using LabVIEW 6 3.2 Why should I Use LabVIEW? 7 3.3 How does LabVIEW work? 8 3.3.1 Front Panel 8 3.3.2 Block Diagram 9 3.3.3 Icon 9 4. System Analysis 10 4.1 Flow Chart – Client 10 4.2 Flow Chart – Server 11 4.3 Floor Plan 12 5. Protocol Design 13 5.1 The Internet and Client-Server Model 13 14 5.2 Using TCP/IP with LabVIEW 15 5.3 Control Interface - Client Connection 16 5.3.1 TCP Open Connection 16 5.3.2 TCP Write 16 5.4 Indicator Interface - Server Connection 17 5.4.1 TCP Listen VI 17 5.4.2 TCP Read 17 6.4.3 TCP Close Connection 18 5.4.4 Clear Error VI 18 6. Hardware Research 19 7. Extra Features 22 7.1 Alarm 22 7.2 Smart Control 23 7.3 Multiple User Login 23 7.4 Master Control 24 8. Assumption 25 9. Limitation 26 10. Future Enhancement 27 11. Conclusion 28 12. References 29 13. Appendix 31 13.1 User Manual 31 13.2 Class Work Program 37 13.2.1 Television 37 1. Acknowledgement First and foremost, I would like to express my deepest gratitude to everyone that made it possible for me to complete this System Programming and Computer Control (SPCC) assignment. This assignment was one of the most challenging task for me but putting in massive amount of determination, awareness and perseverance eventually helped me to excel and complete...

Words: 5590 - Pages: 23

Free Essay

Firewalls: Guidelines and Procedures

...other network environments. For example, many enterprise networks employ firewalls to restrict connectivity to and from the internal networks used to service more sensitive functions, such as accounting or personnel. By employing firewalls to control connectivity to these areas, an organization can prevent unauthorized access to its systems and resources. Inclusion of a proper firewall provides an additional layer of security (Broida, 2011). This research paper will give a background on firewalls. The background will cover an overview of firewall technologies, as well as firewall technologies, the common requirements of firewalls, and firewall policies. This paper will also give an analysis of firewalls which will consist of what I have learned in doing this research and my opinion on the research. Overview of Firewall Technologies Several types of firewall technologies are available. One way of comparing their capabilities is to look at the Transmission Control Protocol/Internet Protocol [TCP/IP] layers that each is able to examine. TCP/IP communications are composed of four layers that work together to transfer data between hosts. When a user wants to transfer data across networks, the data is passed from the highest layer through intermediate layers to the lowest layer, with each layer adding more information. The lowest layer sends the accumulated data through the physical network, with the data then passed upwards through the layers to its destination. Simply put, the data...

Words: 3077 - Pages: 13

Premium Essay

Ip Spoofing

...12/7/2014 IP Spoofing ­ Cisco Systems The Internet Protocol Journal, Volume 10, No. 4 IP Spoofing HOME ABOUT CISCO PUBLICATIONS AND MERCHANDISE THE INTERNET PROTOCOL JOURNAL ISSUES VOLUME 10, NUMBER 4, DECEMBER 2007 Book Review Call for Papers Download PDF Fragments From the Editor IP Spoofing Looking Toward the Future Remembering Itojun Security Standards Layers above IP use the source address in an incoming packet to identify the sender. To communicate with the sender, the receiving station sends a reply by using the source address in the datagram. Because IP makes no effort to validate whether the source address in the packet generated by a node is actually the source address of the node, you can spoof the source address and the receiver will think the packet is coming from that spoofed address. Many programs for preparing spoofed IP datagrams are available for free on the Internet; for example, hping lets you prepare spoofed IP datagrams with just a one­line command, and you can send them to almost anybody in the world. You can spoof at various network layers; for example, you can use Address Resolution Protocol (ARP) spoofing to divert the traffic intended for one station to someone else. The Simple Mail Transfer Protocol (SMTP) is also a target for spoofing; because SMTP does not verify the sender's address, you can send any e­mail to anybody pretending to be someone else. This article focuses on the various types of attacks that involve IP spoofing on networks...

Words: 3181 - Pages: 13

Premium Essay

Director

...Subject: Strategic paper - Cisco Category: Business and Money > Economics Asked by: k9queen-ga List Price: $60.00 |Posted: 02 Dec 2003 08:37 PST Expires: 01 Jan 2004 08:37 PST Question ID: 282626 | | |For the company CISCO, PLease give a SWOT analysis. Explain what | |their core competency is, do they have any forward/backward | |integration? What do they or are they trying to do to be competitive | |in the market? Etc. | |[pic] | |Request for Question Clarification by politicalguru-ga on 02 Dec 2003 08:52 PST | |Dear Queen, | | | |I found several ready-made SWOT analyses online. Would you like me to | |refer you to the sites where you could find them? ...

Words: 2725 - Pages: 11