Free Essay

With the Growth of Internet, Will Ipv4 Survive?

In:

Submitted By AmyNadiaZainol
Words 3742
Pages 15
“With the growth of Internet, will IPv4 survive?”
(Focus on security, quality of service, and migration method)

“We are about 10.2 percent (IPv4 address space) remaining globally,” John Curran, president and CEO of American Registry for Internet Numbers (ARIN) told InternetNews.com in January 7, 2010. That is means, we will run out of Internet Protocol version four (IPv4) address space and the real difficult part is that there is no exact date. If things continue, we will have to say no for the very first time. Say no to an Internet Protocol version four (IPv4) request will be shocking to some organizations, which is why American Registry for Internet Numbers (ARIN) is trying to get the word out now on the importance of moving to Internet Protocol version six (IPv6). The Internet Protocol version six (IPv6) address space, the next generation of Internet Protocol (IP) addressing, provides 340 trillion trillion trillion (34x10 to the 38th power) internet addresses. The question is what will happen to Internet Protocol version four (IPv4) in future? Is Internet Prorocol version four (IPv4) may be available for a longer period of time? Before further discussing the topic, we should know what is Internet Protocol (IP). Internet Protocol (IP) is a set of technical rules that defines how computers communicate over a network. Now, there are two versions of Internet Protocol (IP), there are Internet Protocol version four (IPv4) and Interner Protocol version six (IPv6). Internet Protocol version four (IPv4) was the first version of Internet Protocol (IP) to be widely used, and accounts for most of today’s Internet traffic. There are just over four billion Internet Protocol version four (IPv4) addresses. While that is a lot of Internet Protocol (IP) addresses, but it is not enough to last forever. Internet Protocol version four (IPv4) is a system of addresses used to identify devices on a network. Internet Protocol version four (IPv4) is the most widely used Internet layer protocal, and at this point is used by the vast majority of users to connect to the Internet. Internet Protocol version four (IPv4) addresses are actually 32-bit numbers. However, it has become clear that more addresses that this be required to ensure ongoing growth of the Internet. The unused poll of Internet Protocol version four (IPv4) addresses is predicted run out, so an alternative is required. Internet Protocol version six is an Intenet layer protocol as an alternative to Internet Protocol version four (IPv4). Rather that using 32-bit system, Internet Protocol version six (IPv6) is based on 128-bit addresses. Internet Protocol version six (IPv6) provides enough addresses to allow the Internet to continue to expand. Internet Protocol version six (IPv6) is a newer numbering system that provides a much larger address pool than Internet Protocol version four (IPv4). It was deployed in 1999 and should meet the world’s Internet Protocol (IP) addressing needs well into the future. The major difference between Internet Protocol version four (IPv4) and Internet Protocol version six (IPv6) is the number of Internet Protocol (IP) addresses. There are 4, 294, 967, 296 Internet Protocol version four (IPv4) addresses. In contrast, there are 340, 282, 366, 920, 938, 463, 463, 374, 607, 431, 768, 211, 456 Internet Protocol version six (IPv6) addresses. The technical functioning of the Internet remains the same with both versions and it is likely that both versions will continue to operate simultaneously on networks well into the future. The challenge facing the Internet is based on the fact that the way of handing out Internet Protocol (IP) addresses was set up in the early 1980s. The current system known as Internet Protocol version four (IPv4 ) provides for around 4.4 billion unique Internet Protocol (IP) addresses. When this system was devised, this was thought to be more than enough. The Internet grew larger than anyone expected. The current estimate is that there are more than 100 million hosts and 350 million users actively on the Internet. It became clear, early in the 1990s that space might one day run out. There was nothing unexpected about the Internet running out of Internet Protocol version four (IPv4) addresses, except for how quickly the last few address blocks have been used up. Rod Beckstrom, Internet Corporation For Assigned Names and Numbers (ICANN)’s President and CEO said in the announcement “This is truly a major turning point in the on-going development of the Internet. Nobody was caught off guard by this, the Internet technical community has been planning for IPv4 depletion for quite some time. But it means the adoption of IPv6 is now of paramount importance, since it will allow the Internet to continue its amazing growth and foster the global innovation we’ve all come to expect.” Most of today's Internet uses Internet Protocol version four (IPv4), which is now nearly twenty years old. Internet Protocol version four (IPv4) has been remarkably resilient in spite of its age, but it is beginning to have problems. Most importantly, there is a growing shortage of Internet Protocol version four (IPv4) addresses, which are needed by all new machines added to the Internet. The entire Internet protocol version four address space provides approximately 4.3 billion unique Internet Protocol (IP) addresses. With a current world population of more than 7 billion, that is not enough for even one Internet Protocol (IP) address per person. Nowadays people use multiple methods, such as mobile iPads, phones and laptops, to access Internet content, the number of unique Internet Protocol (IP) addresses required per person has increased significantly. Nowadays, security is certainly one of the biggest challenges faced by network managers. Internet Protocol version four (IPv4) was designes with no security at that moment. Because of it is end-to-end model, Internet Protocol version four (IPv4) relies on the end-hosts to provide the appropriate security during communication. There are security threats on Internet Protocol version four (IPv4), such as Denial of Service Attacks (DOS), viruses and worms distribution, Man-in-the-middle attacks (MITM), fragmentation attacks, port scanning and reconnaissance, and ARP Poison. Denial of Service Attacks (DOS), it is an attempt to make a computer resource unavailable to its intended users. One common method involves flooding the target host with requests, thus preventing valid network traffic to reach the host Second threat on Internet Protocol version four (IPv4) is viruses and worms distribution. These malicious code or programs can propagate themselves from one infected or compromised hosts to another. This distribution is aided by the small address space of Internet Protocol version four (IPv4). The 3rd threat on Internet Protocol version four (IPv4) is Man-in-the-middle attacks (MITM). An attacker is able to read, insert and modify at will messages between two hosts without either hosts knowing that their communication has been compromised. This is because Internet Protocol version four (IPv4) lack of suitable authentication mechanisms. The 4th thread on Internet Protocol version four (IPv4) is fragmentation attacks. Different Operating system has their own method to handle large Internet Protocol version four (IPv4) packets and this attack exploits that method. For example the “ping of death” attacks. This attack uses many small fragmented ICMP packets which when reassembled at the destination exceed the maximum allowable size for an Internet Protocol (IP) datagram which can cause the victim host to crash, hang or even reboot. Fiveth thread on Internet Protocol version four (IPv4) is Port scanning and reconnaissance. This is used to scan for multiple listening ports on a single, multiple or an entire network hosts. Open ports can be used to exploit the specific hosts further. Because of the small address space, port scanning is easy in Internet Protocol version four (IPv4) architecture. And last thread on Internet Protocol version four (IPv4) is ARP Poison. ARP poison attack is to send fake, or ‘spoofed’, ARP messages to a network. The aim is to associate the attacker’s MAC address with the Internet Protocol (IP) address of another node. Any traffic meant for that Internet Protocol (IP) address would be mistakenly sent to the attacker instead. Many techniques or method had been developed to overcome the abovementioned security issues. For instance, the use of ‘IPSec’ to aid the use of encrypted communication between hosts, but this is still optional and continues to be the main responsibility of the end hosts. Support for IPSec in Internet Protocol version six (IPv6) implementations is not an option but a requirement. IPSec consists of a set of cryptographic protocols that provide for securing data communication and key exchange. IPSec uses two wire-level protocols, there are Authentication Header (AH) and Encapsulating Security Payload (ESP). Authentication Header (AH) provides for authentication and data integrity. While Encapsulating Security Payload (ESP) provides for authentication, data integrity, and confidentiality. In IPv6 networks, both the Authentication Header (AH) header and the Security Payload (ESP) header are defined as extension headers. Additionally, IPSec provides for a third suite of protocols for protocol negotiation and key exchange management known as the Internet Key Exchange (IKE). This protocol suite provides the initial functionality needed to establish and negotiating security parameters between endpoints. In addition it keeps track of this information to ensure secure communication at all times. So, is Internet Protocol version six (IPv6) more secure than Internet Protocol version four (IPv4) or is it just a misunderstanding turned into an Internet Protocol version six (IPv6) marketing pitch? So as a conclusion, an Internet Protocol version six (IPv6) is not more secure than Internet Protocol version four (IPv4) as a protocol set. Most of the security challenges faced by an Internet Protocol version four (IPv4) remain in an Internet Protocol version six (IPv6) environments. Network managers must control the Internet Protocol version six (IPv6) traffic as they do for Internet Protocol version four (IPv4). IPsec can be leveraged to secure Internet Protocol version six (IPv6) environments when possible but a global network of IPsec peer-to-peer communication is far from becoming reality, if such a reality is ever possible or desired. Quality of Service (QoS ) developments in Internet Protocol (IP) networks is motivated by new types of applications such as VoIP, audio or video streaming, interactive gaming, networked virtual environments, video distribution, videoconferencing, e-commerce, etc. Quality of Service (QoS ) is a set of service requirements for performance guarantees to be met by the network while transporting a flow. Performance guarantees are usually assessed with the next metrics such as bandwidth, delay, inter-packet delay variation (Jitter) and packet loss. Does Internet Protocol version six (IPv6) offer better Quality of Service (QoS)? Quality of Service (QoS) in Internet Protocol (IP) networks is delivered in the context of two architectures. First architecture is Differentiated Services (DiffServ). Differentiated Services (DiffServ) relies on each network element allocating resources to the forwarding of a packet based on a 6-bit classifier (differentiated code point) carried in the packet header. Second architecture, Integrated Services (IntServ). Integrated Services (IntServ) relies on the Resource Reservation Protocol (RSVP) signaling protocol to set up resources along the path of packets with given transport requirements. Conceptually, Quality of Service (QoS) relates to applications. For example, to make sure high quality for phone calls established over Internet Protocol (IP), VoIP packets has higher priority compared to other traffic types. Means that Quality of service (QoS) policies should be independent of Internet Protocol (IP) version and should depend on application types. Thus, in a dual-stack network, the same priority is assigned to the packets of a given application independent of the Internet Protocol (IP) version it runs over. However, for those very specific conditions that require one Internet Protocol (IP) version to be privileged over the other, it is possible to assign different priorities based on Internet Protocol (IP) version. Why do we read in some publication that Internet Protocol version six (IPv6) offers better Quality of service (QoS) than Internet Protocol version four (IPv4)? The reasons is because of the presence of a 20-bit field named Flow Label in the main Internet Protocol version six (IPv6) header, a field that does not exist in Internet Protocol version four (IPv4). The Flow Label field, is used by a source to label packets of the same flow. Its definition to make sure that the value of information carried cannot be modified by intermediate systems. The Flow Label field is currently unused and may not have practical value in the overall Internet where no definition of Flow Label value has been published or agreed upon by service providers. However, these 20-bits in the main Internet Protocol (IP) header are very precious real, so forms of Flow Label usage will surely be developed in the future. As a conclusion, Internet Protocol version six (IPv6) Quality of service (QoS) is neither better nor worse than Internet Protocol version four (IPv4) Quality of service (QoS). It follows the same architectural models and faces the same inherent challenges. At this time, the presence of the 20-bit Flow Label field in the Internet Protocol version six (IPv6) header is not enough to justify the claim of better Quality of service (QoS). On the other side, is Internet Protocol version six (IPv6) required for mobility? Before further discussing the topic, it is important to clarify what means by “mobility”. A mobile client is a device such as a PDA, laptop, smartphone, iPod, or sensor that regularly changes location but does not necessarily have its own network interface. For example, an Apple iPod will connect through a PC to download contents. An application that runs on a mobile device is a mobile application. Popular audio or video contents (for example, podcasts) consist of files that are downloaded to mobile devices and used later with no need for Internet connectivity. By contrast, VoIP is an example of an application that requires the mobile client to be always connected. They enable mobile devices and applications to be used in any covered location. The mobility features relevant to an Internet Protocol (IP) discussion are Layer 3 mobility, mobile networks, and ad hoc networking. IP Mobility is generally synonymous with the Internet Engineering Task Force (IETF) protocol suite called Mobile IP (MIP) that has been standardized for both Internet Protocol version four (IPv4) and Internet Protocol version six (IPv6). For example, handheld devices compliant with standards from 3rd Generation Partnership Project (3GPP). From 3rd Generation Partnership Project (3GPP), its becomes evident that today we are dealing with billions of mobile devices. This type of environment requires the large address space provided by Internet Protocol version six (IPv6). From 3rd Generation Partnership Project (3GPP) has also addressed the delivery of converged voice, data, and video to mobile devices through the Internet Protocol (IP) Multimedia Subsystem (IMS) standard. IMS requires Internet Protocol version six (IPv6) support, to ensure that each mobile phone is individually addressable with a persistent address for full bidirectional services. There is more to MIPv6 than just the support of large-scale deployments. This makes Internet Protocol (IP) mobility an integrated feature of the Internet Protocol version six (IPv6) as required by RFC 1752 and enables it to easily add capabilities such as path optimization between mobile nodes and their communication peer. Internet Protocol version six (IPv6) is not required for mobility. However, Layer 3 mobility, also named IP mobility, is integrated in the protocol rather than being an add-on, as in the case of Protocol version four (IPv4). The market is developing new business models, new communities of interest, and new products based on standardized protocols like Mobile IPv6 (MIPv6) and Networks Mobility (NEMO). This will make mobility easier to deploy and capable of supporting a much larger number of more full featured handsets and other new devices supporting multi-mode wireless radio, video, and VoIP. The use of IP Multimedia Subsystem (IMS) and other higher-level standards requiring IPv6 support will offer a platform for new maketable products and services not possible with IPv4. Last but not least, Internet Protocol version six (IPv) is going to live on alongside Internet Protocol version four (IPv4). So in future , Internet Protocol version four (IPv4) will survive with it own ways. Internet Protocol version four (IPv4) divide addresses into two parts, there are ‘a network identifier’ and ‘a host identifier’ inside a network. Originally, only the first octet of the number identified the network part, the remaining three are used to identify the host device. Then the idea of a ‘class-based address architecture’ was born. The initial 8/24 bit structure are called as a Class A. Class A allowed up to 127 networks and 16,777,216 host identities. The remaining space was split into 16/16 bits. It allowing up to 16,128 networks, each with up to 65,536 hosts. It is called as Class B. Class C space is divided using a 24/8 bit structure. It allowing for 2,031,616 networks, and up to 256 hosts. The remaining 1/8 of the space was held in reserve. The fact shows, one day the space might run out. There was nothing unexpected about the Internet running out of Internet Protocol version four (IPv4) addresses, except for how quickly the last few address blocks have been used up.What is all of this fuss about the IPv6 transition about? The simplest way to explain the situation is that the current Internet can stay working as it does, using Internet Protocol version four (IPv4) addresses, forever if we are okay with it not growing any more. If no more homes and businesses wanted to get on the Internet, and no more new phones or tablets were produced, and no more websites or applications were created. The long-term objective is to move the whole Internet to the IPv6 standard in order to eliminate the stifling effect of impending and inevitable Internet Protocol (IP) address shortages. It is estimated that there are roughly 2.5 billion current connections to the Internet today, so to say the transition has a lot of moving parts would be an understatement. In the very near future, end-users and servers will no longer be able to get Internet Protocol version four (IPv4) connections to the Internet, and will only connect through Internet Protocol version six (IPv6). The primary transition plan is to “dual-stack” all current devices by adding IPv6 support to everything that currently has an Internet Protocol version four (IPv4) address. By adding Internet Protocol version six (IPv6) functionality to devices using Internet Protocol version four (IPv4), all of that connectivity will be able to connect through Internet Protocol version six (IPv6) without transitional technologies like Network Address Translation (NAT). This work will take several years. Internet Protocol version four (IPv4) is not going to disappear after a certain date. There will still be devices that depend upon IPv4. So what is going to happen? Various technologies are being used to ensure network interoperability. A dual stack, with a packet containing both Internet Protocol version four (IPv4) and Internet Protocol version six (IPv6) addresses is the primary method of connectivity right now, but this reduces the Internet Protocol version six (IPv6) functionality and inherent efficiency of the protocol. Other methods such as various forms of network tunneling can be implemented as well, but as of yet, there is no standard. As time goes on, Internet Protocol version six (IPv6) is going to live on alongside Internet Protocol version four (IPv4). Migrating from Internet Protocol version four (IPv4) to Internet Protocol version six (IPv6) in an instant is impossible because of the huge size of the Internet and of the great number of Internet Protocol version four (IPv4) users. Moreover, many organizations are becoming more and more dependent on the Internet for their daily work, and they therefore cannot tolerate downtime for the replacement of the IP protocol. As a result, there will not be one special day on which Internet Protocol version four (IPv4) will be turned off and Internet Protocol version six (IPv6) turned on because the two protocols can coexist without any problems. The migration from Internet Protocol version four (IPv4) to Internet Protocol version six (IPv6) must be implemented node by node by using autoconfiguration procedures to eliminate the need to configure Internet Protocol version six (IPv6) hosts manually. This way, users can immediately benefit from the many advantages of Internet Protocol version six (IPv6) while maintaining the possibility of communicating with Protocol version four (IPv4) users or peripherals. The fact is the vast majority of the devices connected to the Internet today are not compatible with Internet Protocol version six (IPv6), and the dual stack technology ensures that legacy Internet Protocol version four (IPv4) devices will still work for the foreseeable future and legacy Internet Protocol version four (IPv4) hardware should continue to function well into the future. There is no need to turn it off so long as Internet Protocol version four (IPv4) applications still remain in use. So as conclusion, I strongly state my opinion that Internet Protocol version four (IPv4) will survive in future and Internet Protocol version four (IPv4) will coexist with Internet Protocol version six (IPv6).

Reference

Title: IPv6: Dual-stack where you can; tunnel where you must
Author: Scott Hogg, Network World, May 9, 2007
Link: http://www.networkworld.com/news/tech/2007/090507-tech-uodate.html?page=1

Title: IPv6 Security Issues
Author: Samuel Sotillo, East Carolina University
Link: http://www.infosecwriters.com/text_resources/pdf/IPv6_SSotillo.pdf

Title: Security Implications of IPv6
Author: Michael H. Warfield
Link: http://documents.iss.net/whitepapers/IPv6.pdf

Title: 6to4
Link: http://en.wikipedia.org/wiki/6to4

Title: Technical and Economic Assessment of Internet Protocol, Version 6 (IPv6)
Author: IPv6 Task Force, U.S. Department of Commerce
Link: http://www.ntia.doc.gov/ntiahome/ntiageneral/ipv6/final/ipv6final3.htm

Title: Cisco IOS IPv6 Services Integration and Co-Existence
Author: Patrick Grossetete, Cisco System, Cisco IOS IPv6 Product Manager
Link: www.ipv6.or.kr/ipv6summit/Download/3rd-day/Session-IV/s-4-1.ppt

Title: IPv6-to-IPv4 Transition and Security Issues
Author: Block K, Information Technology & State Store Building, Jalan Gadong, BE1110 Brunei Darussalam, February 20, 2008.
Link: http://www.brucert.org.bn/files/IPv6-to-IPv4%20Transition%20&%20Security%20Issues.pdf

Title: Guidelines for the Secure Deployment of IPv6
Author: Sheila Frankel, Richard Graveman, John Pearce and Mark Rooks
Link http://csrc.nist.gov/publications/nistpubs/800-119/sp800-119.pdf

Similar Documents

Premium Essay

Ipv4 vs Ipv6

...Abstract Internet is global system of computer networks in which networks can brings users at any one computer to interact with other computer to get or give information, making video call, chatting with friends and so on. It also links together millions of businesses, government offices, educational institutions, and individuals. The history of internet began with the development of ARPA (Advanced Research Projects Agency) to build a networking project called ARPANET in 1969 by US Department of Defense also known as Pentagon. The original aims are to allow scientists at different locations to share info and collaborate on military and scientist projects. The advantages of ARPANET’s design was that, because messages could be routed or rerouted in more than one direction, the network could continue to function even if parts of it were destroyed in military attack or other disasters. Nowadays, the Internet has drastic control on culture and business with the rise of instance communication by electronic mail (Email), instant messaging, video calls and the World Wide Web (WWW) with its forums, blogs, social networking and online shopping sites. The internet continues to grow, driven by ever greater amounts of online information and knowledge, business, entertainment and social networking. According to Chuck Semeria, the Internet has entered the public awareness as the world’s largest public data network, doubling in size every nine months. This is because of the...

Words: 2813 - Pages: 12

Free Essay

Growth of the Internet

...“With the growth of Internet, will IPv4 survive?” Note: Please focus on security, quality of service, and migration method. Introduction Humans are social who depend on the interaction with others for daily needs. Throughout human history, people some of them with few exceptions, have expended on the structure of various community networks for carrier, safety, food and companionship. Actually, people have been networked for a very long time. The ways in which humans interact are constantly changing. For this time being, sounds and gestures were all humans used to communicate is now replaced by the Internet which allows people share all types of communication such as documents, pictures, sound and video with billions of people near and far using computers. For the students and educational purposes the internet is widely used to gather information so as to do the research or add to the knowledge of any sort of subject they have. Even the business personals and the professions like lecturers, engineers doctors need to access the internet to filter the necessary information for their use. The internet is therefore the largest encyclopedia for everyone, in all age categories. Besides, not to forget internet is useful in providing with most of the fun these days such as games, social network service, instant messaging, networking conferences, video sharing or the online movies, songs, dramas and quizzes. In that, internet has provided people with a great opportunity to eradicate...

Words: 2988 - Pages: 12

Premium Essay

Case Covad

...In this chapter, you will learn about: ● The origin, growth, and current structure of the Internet ● How packet-switched networks are combined to form the Internet ● How Internet protocols and Internet addressing work ● The history and use of markup languages on the Web, including SGML, HTML, and XML ● How HTML tags and links work on the World Wide Web ● The differences among internets, intranets, and extranets ● Options for connecting to the Internet, including cost and bandwidth factors ● Internet2 and the Semantic Web INTRODUCTION Many business executives made the statement “the Internet changes everything” during the late 1990s. One of the first people to say those words publicly was John Chambers, CEO of Cisco Systems, in a speech at a computer industry trade show in 1996. For his company, the Internet did indeed change 36865_02 10/7/2005 16:35:28 Page 52 everything. Cisco, founded in 1984, grew rapidly to become one of the largest and most profitable 52 companies in the world by 2000. Cisco designs, manufactures, and sells computer networking devices. In this chapter, you will learn about these devices and how they make up the Internet. Cisco’s earnings grew as telecommunications companies purchased the company’s products to build the infrastructure of the Internet. Other companies also wanted to connect their business operations to the Internet; they became lucrative customers for Cisco, too. In its...

Words: 24308 - Pages: 98

Premium Essay

Jon Jons

...by instructors in the CCNA Exploration: Network Fundamentals course as part of an official Cisco Networking Academy Program. Activity 1.1.1: Using Google Earth™ to View the World Learning Objectives Upon completion of this activity, you will be able to: • • • • • Explain the purpose of Google Earth. Explain the different versions of Google Earth. Explain the hardware and software requirements needed to use Google Earth (free edition). Experiment with Google Earth features such as Help | Tutorial. Experiment with Google Earth to explore continents, countries, and places of interest. Background Google Earth is a popular application that executes on the desktop of most operating systems. It requires a broadband connection to the Internet and displays Earth as a manipulated 2D, or 3D image. The popular world news channel, CNN, regularly uses Google Earth to emphasize where a news story has occurred. At the time of writing this activity, there are three versions of Google Earth. The version that fits most needs is Google's free version, Google Earth. A Google Earth Plus version includes GPS support, a spreadsheet importer, and other support features. The Google Earth Pro version is for professional and commercial use. The URL http://earth.google.com/product_comparison.html contains a description of the versions. Use this link to answer the following questions: Which versions support Tilt and 3D rotation? __________________________ Which Google Earth version supports...

Words: 60675 - Pages: 243

Premium Essay

Research

...Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States SEVENTH EDITION Data Communications and Computer Networks A Business User’s Approach Curt M. White DePaul University Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition Curt M. White Editor-In-Chief: Joe Sabatino Senior Acquisitions Editor: Charles McCormick, Jr. Senior Product Manager: Kate Mason Editorial Assistant: Courtney Bavaro Marketing Director: Keri Witman Marketing Manager: Adam Marsh Senior Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Media Editor: Chris Valentine Art and Cover Direction, Production Management, and Composition: PreMediaGlobal Cover Credit: © Masterfile Royalty Free Manufacturing Coordinator: Julio Esperas © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher. For product information and technology assistance...

Words: 234459 - Pages: 938

Free Essay

Kamote Kayo

...Project in Data Communication Helen Grace A. Fernandez 201011542 February 9, 2011 Contents 1 Reaction to the Game 2 Description of Hardware 2.1 First Generation . . . . . . . . . 2.1.1 1G Base Station . . . . . 2.1.2 Copper Node . . . . . . . 2.1.3 Coax Node . . . . . . . . 2.1.4 Optical Node . . . . . . . 2.1.5 20 RAS 5850s . . . . . . . 2.1.6 WAN Switch IGX MGX 2.1.7 WAN Switch BPX . . . . 2.1.8 Router 7200 . . . . . . . . 2.1.9 Router 7500 . . . . . . . . 2.1.10 ONS 15454 . . . . . . . . 2.1.11 Mobile Switch MSC . . . 2.1.12 Cable Headend Analog . 2.1.13 Cable Headend Digital . 2.1.14 Telephone Switch . . . . 2.1.15 Second Generation . . . . 2.1.16 50 WiFi Base Stations . 2.1.17 25 MSPPs . . . . . . . . . 2.1.18 10 CMTS UBRs . . . . . 2.1.19 50 DSLAMs . . . . . . . . 2.1.20 25 MWRs . . . . . . . . . 2.1.21 20 Cat2000 Switches . . 2.1.22 Router 7600 . . . . . . . . 2.1.23 Router 10000 . . . . . . . 2.1.24 Router 12000 . . . . . . . 1 8 10 10 10 12 13 14 15 16 17 18 20 22 23 24 25 26 27 28 29 30 31 32 33 34 36 38 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 35981 - Pages: 144

Premium Essay

Top Down Cisco

...Top-Down Network Design Third Edition Priscilla Oppenheimer Priscilla Oppenheimer Cisco Press 800 East 96th Street Indianapolis, IN 46240 ii Top-Down Network Design Top-Down Network Design, Third Edition Priscilla Oppenheimer Copyright© 2011 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing August 2010 Library of Congress Cataloging-in-Publication data is on file. ISBN-13: 978-1-58720-283-4 ISBN-10: 1-58720-283-2 Warning and Disclaimer This book is designed to provide information about top-down network design. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco...

Words: 79785 - Pages: 320

Premium Essay

Redhat

...edhat® ® Te r r y C o l l i n g s & K u r t W a l l UR ON IT OOLS IN Y T C E CD-R L TH O ED UD M Linux Solutions from the Experts at Red Hat ® ® P R E S S™ SEC Red Hat® Linux® Networking and System Administration Red Hat® Linux® Networking and System Administration Terry Collings and Kurt Wall M&T Books An imprint of Hungry Minds, Inc. Best-Selling Books G Digital Downloads G e-Books G Answer Networks e-Newsletters G Branded Web Sites G e-Learning New York, NY G Cleveland, OH G Indianapolis, IN Red Hat® Linux® Networking and System Administration Published by Hungry Minds, Inc. 909 Third Avenue New York, NY 10022 www.hungryminds.com Copyright © 2002 Hungry Minds, Inc. All rights reserved. No part of this book, including interior design, cover design, and icons, may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording, or otherwise) without the prior written permission of the publisher. Library of Congress Control Number: 2001093591 ISBN: 0-7645-3632-X Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 1O/RT/QT/QS/IN Distributed in the United States by Hungry Minds, Inc. Distributed by CDG Books Canada Inc. for Canada; by Transworld Publishers Limited in the United Kingdom; by IDG Norge Books for Norway; by IDG Sweden Books for Sweden; by IDG Books Australia Publishing Corporation Pty. Ltd. for Australia and New Zealand; by TransQuest Publishers Pte Ltd. for Singapore, Malaysia, Thailand...

Words: 220815 - Pages: 884

Free Essay

Performance Tuning for Windows Server 2008

...tuning parameters and settings that you can adjust to improve the performance and energy efficiency of the Windows Server 2012 operating system. It describes each setting and its potential effect to help you make an informed decision about its relevance to your system, workload, and performance goals. The guide is for information technology (IT) professionals and system administrators who need to tune the performance of a server that is running Windows Server 2012. For the most current version of this guide, see Performance Tuning Guidelines for Windows Server 2012. ------------------------------------------------- Disclaimer: This document is provided “as-is”. Information and views expressed in this document, including URL and other Internet website references, may change without notice. Some information relates to pre-released product which may be substantially modified before it’s commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. You bear the risk of using it. ------------------------------------------------- Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. ------------------------------------------------- This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. ------------------------------------------------- ...

Words: 50142 - Pages: 201

Premium Essay

Impotent Music

...INFORMATION RESOURCE GUIDE Computer, Internet and Network Systems Security An Introduction to Security i Security Manual Compiled By: S.K.PARMAR, Cst N.Cowichan Duncan RCMP Det 6060 Canada Ave., Duncan, BC 250-748-5522 sunny@seaside.net This publication is for informational purposes only. In no way should this publication by interpreted as offering legal or accounting advice. If legal or other professional advice is needed it is encouraged that you seek it from the appropriate source. All product & company names mentioned in this manual are the [registered] trademarks of their respective owners. The mention of a product or company does not in itself constitute an endorsement. The articles, documents, publications, presentations, and white papers referenced and used to compile this manual are copyright protected by the original authors. Please give credit where it is due and obtain permission to use these. All material contained has been used with permission from the original author(s) or representing agent/organization. ii T eofContent abl 1.0 INTRODUCTION........................................................................................................................................................... 2 1.1 BASIC INTERNET TECHNICAL DETAILS ........................................................................................................................ 2 1.1.1 TCP/IP : Transmission Control Protocol/Internet Protocol .........................................

Words: 134858 - Pages: 540

Free Essay

E Commerce

...TECHNOLOGY QUALIFICATION TITLE DIPLOMA IN INFORMATION TECHNOLOGY LEARNER GUIDE MODULE: ECOMMERCE 511 PREPARED ON BEHALF OF PC TRAINING & BUSINESS COLLEGE (PTY) LTD AUTHOR: AJITH RAMPURSAD EDITOR: THEMBA CHINOGWENYA FACULTY HEAD: ISAKA REDDY Copyright © 2015 PC Training & Business College (Pty) Ltd Registration Number: 2000/000757/07 All rights reserved; no part of this publication may be reproduced in any form or by any means, including photocopying machines, without the written permission of the Institution. 1 DIT In Information Technology | ECOMMERCE 511 LESSON PLAN ALIGNED TO MOBILE CONTENT [MOODLE] DIPLOMA SECTION SUBJECT MATTER 1 THE INTERNET-PLATFORM FOR BUSINESS 1.1 Defining Internet and its brief History 1.2 IN INFORMATION TECHNOLOGY Internet Service Provider Lesson 1 Lesson 2 & 3 Review Questions 2 THE NEW ECONOMY AND E-COMMERCE 2.1 Define E-Commerce 2.2 E-Commerce vs. business Lesson 4 Lesson 5 & 6 Review Questions 3 E-COMMERCE AND A NEW WAY OF THINKING 3.1 Changing paradigms Lesson 7 3.2 Portals and Vortals Lesson 8 3.3 E-Relationships Lesson 9 3.4 Return On Investment Lesson 10 & 11 Review Questions 4 BUSINESS OPPORTUNITIES ON INTERENT 4.1 Marketing Research Lesson 12 4.2 Advertising Lesson 13 4.3 Supply Chain Management Lesson 14 4.4 Customer relationship management Lesson 15 4.5 E-Business Lesson...

Words: 49145 - Pages: 197

Premium Essay

Human Resoucre

...HR THE INTERNATIONAL UNIVERSITY OF MANAGEMENT WINDHOEK-NAMIBIA STUDY MANUAL INFORMATION MANAGEMENT SYSTEMS CODE: BIS - 3315 TABLE OF CONTENTS CHAPTER PAGE NUMBER 1. WHY INFORMATION SYSTEMS………………………………………….6 2. Strategic role of information systems…………………..21 3. Information systems in organizations…………………..26 4. Computer and information processing…………………42 5. Managing data resources………………………………………..60 6. Networking and information systems…………………..81 7. Systems development…………………………………………………90 8. Implementation of information systems……………….97 9. Managing knowledge……………………………………………….106 10. Decision support systems………………………………………….129 THE STRUCTURE OF THIS STUDY MODULE The Module has margin icons that show the student the objectives, activities, in-text questions, feedback, further reading, key words and terms, stop and reflex signs. Chapter One covers the importance of Information Systems in running today’s organizations. Chapter Two looks at the strategic role played by information systems in today’s organizations. Chapter Three focuses on the impact of Information Systems on the organizational structure and how information systems help managers improve their decision making. Chapter Four looks at the hardware and software requirements for organizations to be able to implement information systems structures Chapter Five looks at the traditional file environments and the rise of the database...

Words: 43854 - Pages: 176

Free Essay

Telco Regulation

...Tenth Anniversary Edition Tenth Anniversary Edition TELECOMMUNICATIONS REGULATION HANDBOOK TELECOMMUNICATIONS REGULATION HANDBOOK The Telecommunications Regulation Handbook is essential reading for anyone involved or concerned by the regulation of information and communications markets. In 2010 the Handbook was fully revised and updated to mark its tenth anniversary, in response to the considerable change in technologies and markets over the past 10 years, including the mobile revolution and web 2.0. The Handbook reflects modern developments in the information and communications technology sector and analyzes the regulatory challenges ahead. Designed to be pragmatic, the Handbook provides a clear analysis of the issues and identifies the best regulatory implementation strategies based on global experience. February 2011 – SKU 32489 Edited by Colin Blackman and Lara Srivastava Tenth Anniversary Edition TELECOMMUNICATIONS REGULATION HANDBOOK Edited by Colin Blackman and Lara Srivastava Telecommunications Regulation Handbook Tenth Anniversary Edition Edited by Colin Blackman and Lara Srivastava ©2011 The International Bank for Reconstruction and Development / The World Bank, InfoDev, and The International Telecommunication Union All rights reserved 1 2 3 4 14 13 12 11 This volume is a product of the staff of the International Bank for Reconstruction and Development / The World Bank, InfoDev, and The International Telecommunication...

Words: 132084 - Pages: 529

Premium Essay

Monicah

...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission...

Words: 139691 - Pages: 559

Premium Essay

Server 2008 for Dummies

...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission...

Words: 139691 - Pages: 559