Preview

Transmission Control Protocol and Windows Media Services

Satisfactory Essays
Open Document
Open Document
317 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Transmission Control Protocol and Windows Media Services
Unit 5 Assignment1: Securing Windows Media Services
1. Stream type: Multicast Protocol used: UDP multicast Ports used: 1-65000 Special notes: Multicast streams are broadcast on IPs specified by the Windows Media Administrator within the following range: 224.0.0.1 to 239.255.255.255. The UDP port used for multicast streams is specified by the Windows Media Administrator and falls within the following range: 1 - 65000. Stream type: UDP unicast stream Protocols used: UDP and TCP Ports used: TCP-1755 and a UDP port within the following range: 1024 - 5000 Special notes: When using UDP streams, the client first makes a connection to the Windows Media server using TCP port 1755. After this connection is established, the client and the server choose the UDP port that will be used by the server to stream the Windows Media content down to the client.

2. By using Windows Media Services Administrator for the Web, you can access the local Windows Media server (the server on which the Windows Media Administration Web site is located) and other Windows Media servers on your network. To enable this level of control, configuration and authentication data is sent over the network between the remote computer and the local Windows Media server computer. As the data is sent, it is vulnerable to unauthorized access.

You can add the IIS security measures to your site to provide different levels of protection. Most of the configuration is performed by changing the security settings in the Windows Media Administration site properties in IIS. Secure Sockets Layer (SSL) also requires that you obtain a certificate from a certification authority or create a certificate yourself by using Microsoft Certificate Services.

3. Basic authentication is widely used on networks for collecting user credential information. The advantage of basic authentication is that it is simple to use and works with most browsers, proxy servers, and firewalls.

4. Windows Media Services supports

You May Also Find These Documents Helpful

  • Satisfactory Essays

    - SSL and HTTPS will applied to online transactions. Enabling encrypted connection through user login to encrypted pages until sign out. (System/ Application Domain & LAN Domain & Remote Access Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2670 Lab 5

    • 88 Words
    • 1 Page

    2. No you need to configure the URL and path for the media you want to show.…

    • 88 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    • Authentication – the process for “trust” connection establishing between the server and the applier;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IT205 Week 4 Assignment

    • 641 Words
    • 2 Pages

    The way the system is installed where I work is Internet is set with a LAN to WAN. I have a space where I utilize email trade, server controls enact registry. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another way to prevent people from coming to the server or network, For example if we have important information it will go through a router then you will have a firewall this will prevent people from interring are network. Also every employee in the company as a CAT card, A CAT card as a pin number associate with every employee. This pin number allow you access the computer and also getting in the building but the mean point with the CAT card allow you to access computer and emails. By this will let the company know whom using the computer and access the web and emails. It prevents dishonesty with the company. Now getting that out the way I will explain what I do for work.…

    • 641 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    Is a process of identifying a user and about verifying whether someone is who they claim to be. Typically, authentication is achieved by the user sharing credentials that somehow verify the user's identity. It usually involves a…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Use strong password policies, do not store credentials in insecure manner, use authentication mechanisms, encrypt communication channels, use secure HTTP(HTTPS) only with Forms authentication cookies…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Which of the following is a GPO on a Vista computer (Choose all that apply)…

    • 1935 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1210 Final Exam Review

    • 726 Words
    • 3 Pages

    Truth Table 0 AND 0 = False (0) / 1 AND 0 False (0) / 1 AND 1 True (1)…

    • 726 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Authentication in definition is simply proof that something is real or what it is meant to be. Public networks as well as private networks to include the internet use passwords as authentication to authorize logins. Data is required and is filtered through the password database if an effort to ensure that the user is authentic. Also, before anyone is allowed to access an organization’s intranet they must first be registered by someone that has the appropriate credentials to authorize them to gain access. There are plenty of businesses and alternative in the need of additional authentication methods and one method worthy of mentioning is the utilization of digital certificates issued and verified by a Certificate Authority or as commonly used the acronym CA.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Securing Windows Media

    • 481 Words
    • 2 Pages

    | The Windows Media distribution server uses a port within this UDP In port range to receive data packets from the origin server.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Comparing Iis to Apache

    • 392 Words
    • 2 Pages

    IIS though is supported by Microsoft, and works with other programs that they offer such as, Windows GUI, active directory, MS SQL Server, and windows security services.…

    • 392 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Internet Protocol (IP) sits in the middle of the five-layer TCP/IP model. IT provides service to the layers above it and receives services from the layers below it. Almost every computing device on the planet communicates in some way, and most of those use IP. IP exists as an Internet standard protocol, also called ipv4, although it is mostly just referred to as IP. IP was created in the 1970s, but did not reach standard status as the IPv4 RFC until the 1980s.…

    • 360 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Dear Itunes

    • 885 Words
    • 4 Pages

    You also need to be ready that you can face with the problems contains with the security, your web site need to be well secured and represent this, the reason for this you need make customer sure that their personal details and credit card data is save and no one will get access to them except the owner…

    • 885 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    H.248

    • 1286 Words
    • 6 Pages

    Bearer control protocols are used for the communication between Media Gateway Controller (MGC) and Media Gateway (MG). As the control-layer supports equipment, two bearer…

    • 1286 Words
    • 6 Pages
    Powerful Essays