Research paper topics, free example research papers
Free research papers and essays on topics related to: network layer
- 6 results found, view research papers on page:
- Cable Modems: Cable Tv Meets The Internet - 3,910 words
... downstream traffic travels through the cable modem's Media Access Control mechanism. The MAC mechanism's functions are fairly complex. The MAC mechanism's main purpose is to implement MAC protocols under the direction of the CMTS. MAC protocols are used to time-share the cable media among the various cable modems in a cable data network. The MAC processes can be implemented in hardware, or a combination of software and hardware. Both the CMTS and the MAC mechanism implement MAC protocols to perform ranging procedures to compensate for cable media delays and line losses. The CMTS also interfaces with the MAC mechanism in each cable modem to assign upstream frequencies and upstream time s ...
Related: cable, cable modems, internet access, internet connection, internet protocol, internet service, internet usage
- Convergence - 1,829 words
Convergence TABLE OF CONTENTS Executive Summary 1 Introduction 2 Part I Business Factors 3 What is Convergence? 3 Toll Bypass 3 Utilization Getting Your Moneys Worth 3 Part II Technical Overview 4 Mixed-Media Requirements 4 Problems: - Delay 4 - Packet Loss 5 - Jitter 5 Network Technology 5 Voice over ATM 5 Voice over Frame Relay 6 Voice over IP 7 Inter-Vendor Support 8 H.323 8 Part III Implementations 10 Types of VoIP Implementations VoIP through a router 10 LAN Telephones 10 IP PBX 11 VoIP Gateway 12 Conclusion 13 Appendix A Works Cited 14 Illustrations Chart 1 Cost of International Voice Calls 3 Graph 1 Long 1-Way Voice Transmission 4 Chart 2 Summary of H.32x Standards 8 Picture 1 C ...
Related: convergence, network layer, packet switching, network architecture, upgrading
- Network Design And Implementation Solution - 3,002 words
Network Design and Implementation Solution Table of Contents 1. Executive Summary 1.1. Purpose of the Project 3 1.2. Strategic Recommendation 3 1.3. Implementation Consideration 3 1.4. Benefits of the Solution 4 2. Designing Requirements 2.1. Existing Network 5 2.2. Network Requirements 5 3. Design Solution 3.1. Proposed Network Topology 6 3.2. Hardware and Media Recommendation for the LAN 6 3.3. Hardware and Media Recommendation for the WAN 7 3.4. Network Layer Addressing and Naming Model 8 3.5. Routing and Bridging Protocols Recommendation for the Network 9 3.6. Software Features Provisioned for the Network 9 3.7. Network Management Strategy 10 4. Summary 4.1. Benefits of Working with Cisc ...
Related: business network, implementation, network, network design, network layer, network management, network security
- Security On The Web - 1,337 words
... ed screening systems to reduce the damage that could happen if a subnets routing tables got confused or if a systems Ethernet card malfunctioned. When companies began connecting to what is now the Internet, firewalls acted as a means of isolating networks to provide security as well as enforce, otherwise known as an administrative boundary. Early hackers were not very sophisticated; neither were early firewalls. Today, firewalls are sold by many vendors and protect tens of thousands of sites. The products are a far cry from the first-generation firewalls, now including fancy graphical user interfaces, intrusion detection systems, and various forms of tamper-proof software. To operate, a ...
Related: computer security, internet security, network security, network layer, internet works
- Tcpip Security - 5,299 words
TCP/IP Security The TCP/IP protocols, the basis for today's Internet, lack even the most basic mechanisms for security, such as authentication or encryption. As usage of the Internet and TCP/IP protocols increases, their lack of built-in security has become more and more problematic. This paper describes a variety of basic flaws in TCP/IP protocols and their implementations, and discusses solutions and work-arounds to these problems. Also covered is the new IPv6, the next-generation Internet protocol that, among other goals, seeks to fix many of the current flaws in the current Internet IPv4 protocol. Security in protocols and applications not essential to TCP/IP (such as HTTP, FTP, and SMTP ...
Related: present state, internet protocol, detailed description, performing, finite
- Tcpip Security - 5,160 words
... s in DNS [RFC2065] 2.7. The lack of unique identifiers When the Internet was still young, back in the 1980's, one could use an IP address to safely identify and locate a host. Addresses were both spatially unique (no one else had an identical address) and temporally unique (addresses didn't change). However, this is no longer the case [RFC2101]. Today, IP addresses may exhibit seemly strange behavior that makes identifying and locating hosts much harder. The widespread use of protocols such as PPP/SLIP [RFC1990] and DHCP [RFC1541] allow a specific host's address to change over time: per-connection in the case of PPP/SLIP, while DHCP allows hosts to lease IP addresses for arbitrary length ...
Related: over time, more work, third party, discounting, sake
- 6 results found, view research papers on page: