Warning:
JavaScript is turned OFF. None of the links on this page will work until it is reactivated.
If you need help turning JavaScript On, click here.
This Concept Map, created with IHMC CmapTools, has information related to: ch3 netw inte, Internet protocols include IP addressing is assigned to each host on the internet, a 32 bit numeric identifier containing a network identifier, which uniquely identifies one of the subnetworks in the internet, and a host identifier, which uniquely identifies the hosts's connection to that network, IP routing ip layer routes packets from their source to their destinations contain backbones the collection of routers that connect nonbackbone areas to the backbone and the links that interconnect those routers are called the backbone of the network, IP routing ip layer routes packets from their source to their destinations contain routing on local subnet using the host identifier of the address to obtain the address of the destination host on the underlying network, Internet protocols include Mobile IP utilizes the DHCP by when in range can get an ip address automatically and can be allowed to sync up with allocated resources, Internet protocols include Firewalls ensuring that incoming communication can be trusted and outgoing communication is private when required. the purpose is to monitor and control all communication into and out of an intranet, is implemented as a set of processes that act as a gateway to the intranet using: service control, behaviour control, user control, IP packet filtering, TCP gateway, application level gateway, Internet protocols include IP version 6 IPv6 uses 16 byte (128 bit) addresses allowing 2128 addressable entities. This is roughly 1,000 IP addresses for each square meter of the surface of the earth, including the oceans., Firewalls ensuring that incoming communication can be trusted and outgoing communication is private when required. the purpose is to monitor and control all communication into and out of an intranet, is implemented as a set of processes that act as a gateway to the intranet using: service control, behaviour control, user control, IP packet filtering, TCP gateway, application level gateway can have a Virtual Private Network VPN extent the firewall protection boundary beyond the local intranet by the use of cryptographically protected secure channels at the IP level, IP protocol Define functions that support network communications in general, and use parameters to make TCP/IP communication a special case. Socket calls refer to all TCP/IP protocols as a single protocol family. The IP protocol transmits datagrams from one host to another with unreliable or best-effort semantics. Delivery is not guaranteed. The IP layer puts datagrams into packets suitable for transmission in the underlying network, such as Ethernet. has address solution is technology dependent, It must also inform the underlying network of the address of the message destination using address resolution., IP routing ip layer routes packets from their source to their destinations contain routing protocols RIP algorithm first algorithm used in the internet OSPF open shortest path first- replaced the original, Internet protocols include IP routing ip layer routes packets from their source to their destinations, Internet protocols include TCP & UDP TCP used for services with a large data capacity, and a persistent connection, while UDP is more commonly used for quick lookups, and single use query-reply actions. Some common examples of TCP and UDP with their default ports: DNS lookup UDP 53 FTP TCP 21 HTTP TCP 80 POP3 TCP 110 Windows shared printer UDP 137 name lookup Telnet TCP 23, IP protocol Define functions that support network communications in general, and use parameters to make TCP/IP communication a special case. Socket calls refer to all TCP/IP protocols as a single protocol family. The IP protocol transmits datagrams from one host to another with unreliable or best-effort semantics. Delivery is not guaranteed. The IP layer puts datagrams into packets suitable for transmission in the underlying network, such as Ethernet. has IP spoofing when ip packets include a manipulated source address, in the data field, it is a loophole and is often used in attacks, IP routing ip layer routes packets from their source to their destinations contain unregistered addresses and network address translation NAT hosts that are conencted to a NAT enabled router don't need a unique address, they can depend on the router to transfer the incoming and outgoing packets correctly, IP routing ip layer routes packets from their source to their destinations contain classless interdomain routing CIDR allocating addresses and managing the entries in routing tables, to allocate a batch of contiguous class c addresses to a subnet requiring more than 255 adresses, Internet protocols include IP protocol Define functions that support network communications in general, and use parameters to make TCP/IP communication a special case. Socket calls refer to all TCP/IP protocols as a single protocol family. The IP protocol transmits datagrams from one host to another with unreliable or best-effort semantics. Delivery is not guaranteed. The IP layer puts datagrams into packets suitable for transmission in the underlying network, such as Ethernet., IP routing ip layer routes packets from their source to their destinations contain default routes gave world regions addresses for the net, north america has 198.0.0.0 to 199.255.255.255, Internet protocols include Domain names DNS is a scheme for the use of symbolic names for hosts and networks