The purpose of this paper is to present a proposal to implement Internet Protocol version four (IPv4) also known as Transmission Control Protocol/Internet Protocol (TCP/IP) structure as our primary means of communication within our network infrastructure. We are currently using a legacy mainframe system that limits are current means of network connectivity with other evolving network systems and it is in our best interest that we look into the future as well as keep up with changing times as Information Technicians. I will present a detailed analysis of the TCP/IP brief history, understanding of IPv4 addresses, subnetting, configuration, and the benefits of using the TCP/IP structure. This will greatly increase the overall success rate of our business
Our current network infrastructure is using a legacy mainframe system and our collective knowledge as a staff is limited to this network suite only. This is devastating to the productivity and the overall communication of our organization. It is imperative that we expand our horizons, learn and implement newer technologies. This will collectively increase our knowledge of information technologies as a whole. Also, this will allow us to be competitive with many other organizations using newer computer systems which are currently using the latest version of the Internet protocol.
The latest version of the Internet protocol which we should be implemented is IPv4, also known as the TCP/IP structure. The reason why IPv4 is referred to as TCP/IP for the first two main protocols, out of its suite of protocols, which were developed by United States Defense Advanced Research Project Agency, also known as DARPA around the 1970s (Kozierok, 2005). ...
... middle of paper ...
...ge with current technologies.
Hamarsheh, A., Goossens, M., & Al-Qerem, A. (2012). Assuring Interoperability Between Heterogeneous (IPv4/IPv6) Networks Without using Protocol Translation. IETE Technical Review, 29(2), 114-132. doi:10.4103/0256-4602.95384
ITS405-Module1: IPv4. (2013). Retrieved November 2013, from https://csuglobal.blackboard.com/bbcswebdav/courses/KEY_ITS405/courseModules_winter2013a/ITS405_1/its405_1.html#page-all
Kozierok, C. (2005). The TCP/IP Guide - TCP/IP Overview and History. Retrieved November 2013, from http://www.tcpipguide.com/free/t_TCPIPOverviewandHistory.htm
Parker, T., & Siyan, K. (2002). TCP/IP Layers and Protocols | Overview of TCP/IP | InformIT. Retrieved November 2013, from http://www.informit.com/articles/article.aspx?p=28782&seqNum=3
TestOut LabSim. (2013). Retrieved November 2013, from http://labsim.testout.com/
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- The current version of the Internet Protocol IPv4 was first developed in the 1970s, and the main protocol standard RFC 791 that governs IPv4 functionality was published in 1981. With the unprecedented expansion of Internet usage in recent years, especially by population dense countries like India and China, the impending shortage of address space (availability) was recognized by 1992 as a serious limiting factor to the continued usage of the Internet run on IPv4. The Internet Protocol version 6 (IPv6) is the latest revision of the Internet Protocol (IP).... [tags: multicasting, ip addresses]
772 words (2.2 pages)
- IP Proposal Çıflıklı, & Özşahın wrote “Nowadays, the IPv6 protocol is in a transition phase in operational networks. The ratio of its traffic volume is increasing day by day.” (p.727) The IPv4 address pool officially ran out January 31, 2011. While no one can provide an exact date for when the world will have officially exhausted its IPv4 addresses, it is inevitable, and it is close. (ip4depletion) With the world now migrating from IPv4 to IPv6, now is the best time to begin migrating Sample Company to IPv6.... [tags: devices, address space]
752 words (2.1 pages)
- Introduction Each day, millions of people around the world get on some sort of device that connects them to the internet where the answers they seek, or trying to seek, are there for the taking. However, since there are probably around a billion devices that connect to the internet, there must be a routing system in place to direct certain information to the devices that request it. Computers and devices have a system in place to direct pieces of information, called packets, to the right place. This system stack is based on four layers with the top layer being the application related, the second layer being transport, the third layer being the network layer, and lastly the physical layer.... [tags: Internet, IPv6]
870 words (2.5 pages)
- Principle communication protocol for the internet is the Internet Protocol , whose routing function facilitate internetworking, allowing the devices to connect to the internet. It has a task of delivering packets from the source to the destination. A major dominant version of IP is the Internet Protocol Version 4(IPv4). The current version of the IP (IPv4) has some shortcomings and it restricts the further additional development of the internet. The main motivation for IPv6 is the realization that there aren’t enough unique IPv4 addresses (they are about 4.3 billion 8).... [tags: Domain Name System, IP address, Internet Protocol]
1131 words (3.2 pages)
- The Internet Protocol Suite is the communication language utilized on the Internet or World Wide Web. Transmission Control Protocol is the central protocol of Internet Protocol Suite which combined together is known as TCP/IP. It is associated within the Open Systems Interconnection (OSI) models. This protocol was originally designed in the 1970’s under a project funded by US Department of Defense. Project members at Stanford University under guidance from the Department of Defense developed this concept to ensure military communications would continue after a nuclear attack by making use of any remaining networking capacity (soure2).... [tags: OSI model, Internet Protocol Suite]
1277 words (3.6 pages)
- Introduction The following paper will review the Extensible Authentication Protocol (EAP) as a widely accepted standard. A brief description will be provided with visual aids to help with understanding. A current implementation of EAP with the Transport Layer Security (TLS) will be described. Common implemented security measures will also be disused. Following the security measures I will provide research on common attack vectors and ways to mitigate these attacks to protect secure data transmissions.... [tags: Extensible Authentication Protocol]
1893 words (5.4 pages)
- Enhanced Interior Gateway Routing Protocol Enhanced Interior Gateway Routing Protocol is a distance vector routing protocol, where a router shares information with neighboring routers about the network in an autonomous system and shares only the information that neighboring routers don’t have instead of the whole message. It is an enhanced version of Interior Gateway Routing Protocol, both of them uses the same distant vector technology and the distance information within them is not changed.... [tags: router, protocol, features]
588 words (1.7 pages)
- User Datagram Protocol is one of the transport layer protocol which offers limited amount of service when messages are exchanged between hosts. Data is further subdivided into data grams for transmission across the hosts. UDP does not allow retransmission of the damaged or lost packets and there is no acknowledgement for the packet which has been sent. DGRAM_SOCK is the type of socket used for transmission of data. Unlike TCP, however, UDP does not provide the service of dividing a message into packets (datagram's) and reassembling it at the other end.... [tags: data, udp, internet protocol]
988 words (2.8 pages)
- One other flaw to the Kyoto Protocol which could be a cause of the current challenge the protocol faces with not being as successful as it needs to be, is that it does not overtly require commitments from tourism as an individual economic sector contributing to GHG emissions, in its reduction targets (Pleumarom, 2009). This seems illogical when litrature recognises that tourism, especially the commercial airline industry, is a significant contributor of GHG emissions. In fact, Scott et al (2009) calculated that if tourism as a whole was converted into a country, in terms of GHG emissions, it would be placed as the fifth biggest global contributor in ranking of countries.... [tags: Greenhouse gas, Global warming, Kyoto Protocol]
711 words (2 pages)
- International Trade and The Kyoto Protocol Pollution, specifically global warming, is of growing concern to people and governments. It is a controversial issue whose validity is still being debated by scientists. The Kyoto Protocol is an international attempt to address global warming through emissions controls. Traditional neoclassical economic models do not incorporate pollution in rudimentary theories of supply, demand, or pricing, as a result, firms do not consider pollution as a cost of production, which leaves government regulation as the primary method for controlling these externalities.... [tags: Kyoto Protocol Pollution Enivronmental Essays]
2554 words (7.3 pages)