Preview

NETW320 WEEK1 PAPER

Good Essays
Open Document
Open Document
624 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NETW320 WEEK1 PAPER
Explanation of the RFC and the Internet Draft
Converged Networks with Lab

Explanation of the RFC and the Internet Draft In this paper, my purpose is to educate the reader and by the end of this paper, you will be more informed on these following concepts; what the RFC is what an Internet Draft is, as well as the organization that produces the documents and lastly, the process that allows the documents to be produced. This paper will briefly tour the history behind these concepts and show how they are affecting our Internet usage. The RFC stands for Request for Comments and it was created by a man named Steve Crocker. Currently the RFC is a publication stemming from the Internet Society and the Internet Engineering Task Force (IETF). Standards are usually set by these governing bodies over The Internet. Shortly before they were created, Steve was working with a group of staff and graduate students at U.C.L.A. At that time he had just graduated and was working on a project funded by the Government. The project dealt with communication over a network that connected the four research centers together. Teams from all the research centers collaborated on the project. Once Steve and others a part of the team begin to inform people, receive input, and form new ideas, “we’d put together a few temporary, informal memos on network protocols, the rules by which computers exchange information, I offered to organize our early notes.” (CROCKER). After Steve started organizing and making informal memos, he wanted to avoid sounding as if he was making official decisions on the protocols of The Internet, so he created the Request For Comments. This was a process for implementing standards and once more input came into, “choosing standards eventually became more formal, unnamed meetings grew larger and organized into the Network Working Group. The Working Group is also known as ARPA, which is the Advanced Research Projects Agency. In



Cited: CROCKER, S. (n.d.). Retrieved from http://www.nytimes.com/2009/04/07/opinion/07crocker.html?_r=2&em& IETF. (n.d.). Retrieved from http://www.ietf.org/id-info/

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 9 Exam Paper

    • 486 Words
    • 2 Pages

    For QAM, each carrier is ASK modulated. The two independent signals are simultaneously transmitted and at the receiver, the two signals are demodulated, and the results combined to produce the original binary input.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The CMOS, or Complementary Metal Oxide Semiconductor, is the chip in a computer that holds the most basic of settings for a computer. These settings include the date, time, and system setup parameters. The most common way to access the CMOS to change these parameters is hitting a specific key during the computer’s initial startup (CMOS, 2013). Since the inception there have been many changes made to the CMOS. The CMOS memory has been changed from analog to digital and the speed at which it is accessed has been increased (CMOS, 2013).…

    • 244 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    1 Which statements are true concerning the shared memory buffering used by an Ethernet switch? (Choose two.)…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    1. One megabyte equals approximately 1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes 2. Data going into the computer is called? 1) Output 2) Algorithm 3) Input 4) Calculations 5) Flowchart 3. Which of the following refers to the memory in your computer? 1) RAM 2) DSL 3) USB…

    • 5339 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    Designing a fault-tolerant system can be done at different levels of the software stack. We call general purpose the approaches that detect and correct the failures at a given level of that stack, masking them entirely to the higher levels (and ultimately to the end-user, who eventually see a correct result, despite the occurrence of failures). General-purpose approaches can target specific types of failures (e.g. message loss, or message corruption), and let other types of failures hit higher levels of the software stack. In this section, we discuss a set of well-known and recently developed protocols to provide general-purpose fault tolerance for a large set of failure types, at different levels of the software stack, but always below the…

    • 1211 Words
    • 5 Pages
    Good Essays
  • Better Essays

    So what's next on the wireless horizon? A new standard, known as Very High Throughput (VHT), will feature data rates of between 4Gbps and 7Gbps, nearly five times the rate of 802.11n, and will operate on the 60GHz frequency band. As such, the new standard will likely have limited range and will be best suited to peer-to-peer applications such as streaming video from one device to another or moving very large chunks of data in a matter of seconds.…

    • 820 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    1 - A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization.…

    • 1464 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Term Paper

    • 453 Words
    • 2 Pages

    * Not “having all eggs in one basket”, risk is being diversified when suppliers or vendors are not able meet expectations…

    • 453 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Using the data from your class, create a class histogram based off of who won for each person/group.…

    • 357 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    A Network Management system, or NMS is a collection of software to be used as tools to monitor a network of computers. This software performs multiples tasked specifically designed to help keep a network managed properly and running smoothly. There are many components that can make up a Network management system. With all the options out there a network administrator is able to customize what features to utilize depending on their specific needs. This allows for real-time monitoring as well as report generated analyses. However, there are a few cornerstone components that should be explored. The Manager, Agent, MIB, Probe, SNMP, and RMON are probably the most valued components.…

    • 771 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    It is major to see that private broadband speed ask for has an immensely fluctuating character. Families move stunningly in their centrality of usage, the kind of occupations they use their relationship for and the measure of progress these applications make. In this consider, we address this respectable mix by constraining between different groupings of customers, and our general outcomes are midpoints over these outlines. While the advance of the intensity for exchange speed is related to that of download speeds, their improvements are not by any associate of the creative vitality poorly characterized. Despite phenomenal things, download speeds are from time to time more desperate to customers as they are dependably holding up to use substance or use an application, while they are normally less squashed while exchanging data.…

    • 626 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IT321 Final Exam Paper

    • 1235 Words
    • 5 Pages

    A review guide is just that, a guide. It is not a blueprint of what you will be tested on. This guide will consist of key points that have a very high probability of being on the quiz/test/exam that you will see. I feel review guides are important because students new to the topic may waste time and study the wrong materials. This normally leads to frustration and concepts not covered that are deemed important in not only passing this course, but what would/could be asked of the student in a real world situation.…

    • 1235 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    Because of this they are looking into a new found technology which is virtualization. Virtualization is not a new concept. It has been around since the main frame computer systems. What is virtualization? It is defined as “the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources” (Rouse, Virtualization, 2010). Virtualization falls into three main categories: Operating System, Storage, and Applications. Because of this virtualization can be applied to almost any part of an IT infrastructure. According to Rackspace after conducting a survey found that 57 percent of companies use virtualization with their internal infrastructures (Connor, 2007). Along with that Gartner.com states that “Virtualization will continue as the highest-impact issue challenging infrastructure and operations through 2015, changing how you manage, how and what you buy, how you deploy, how you plan and how you charge” (Press Release, 2010). In this paper we will discuss server…

    • 2369 Words
    • 10 Pages
    Best Essays
  • Good Essays

    NETW204week1labreport

    • 436 Words
    • 3 Pages

    In your own words, summarize what you have learned about Configuring Static and Default Routes.…

    • 436 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Published: October 22, 2009 Updated: July 8, 2010 Applies To: Windows 7 Note This content applies to Windows 7. For Windows 8 content, see Windows Deployment with the Windows ADK. The System Preparation tool, Sysprep.exe, is used to prepare an installation of Windows® for imaging or delivery to a customer. This topic includes: Sysprep Executable Sysprep Process Using Answer Files with Sysprep Resetting Windows Activation Booting to Audit Mode or Windows Welcome Detecting the State of a Windows Image Sysprep Log Files…

    • 2287 Words
    • 10 Pages
    Good Essays