Preview

NETW320 WEEK1 PAPER

Good Essays
Open Document
Open Document
624 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NETW320 WEEK1 PAPER
Explanation of the RFC and the Internet Draft
Converged Networks with Lab

Explanation of the RFC and the Internet Draft In this paper, my purpose is to educate the reader and by the end of this paper, you will be more informed on these following concepts; what the RFC is what an Internet Draft is, as well as the organization that produces the documents and lastly, the process that allows the documents to be produced. This paper will briefly tour the history behind these concepts and show how they are affecting our Internet usage. The RFC stands for Request for Comments and it was created by a man named Steve Crocker. Currently the RFC is a publication stemming from the Internet Society and the Internet Engineering Task Force (IETF). Standards are usually set by these governing bodies over The Internet. Shortly before they were created, Steve was working with a group of staff and graduate students at U.C.L.A. At that time he had just graduated and was working on a project funded by the Government. The project dealt with communication over a network that connected the four research centers together. Teams from all the research centers collaborated on the project. Once Steve and others a part of the team begin to inform people, receive input, and form new ideas, “we’d put together a few temporary, informal memos on network protocols, the rules by which computers exchange information, I offered to organize our early notes.” (CROCKER). After Steve started organizing and making informal memos, he wanted to avoid sounding as if he was making official decisions on the protocols of The Internet, so he created the Request For Comments. This was a process for implementing standards and once more input came into, “choosing standards eventually became more formal, unnamed meetings grew larger and organized into the Network Working Group. The Working Group is also known as ARPA, which is the Advanced Research Projects Agency. In



Cited: CROCKER, S. (n.d.). Retrieved from http://www.nytimes.com/2009/04/07/opinion/07crocker.html?_r=2&em& IETF. (n.d.). Retrieved from http://www.ietf.org/id-info/

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 9 Exam Paper

    • 486 Words
    • 2 Pages

    For QAM, each carrier is ASK modulated. The two independent signals are simultaneously transmitted and at the receiver, the two signals are demodulated, and the results combined to produce the original binary input.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The CMOS, or Complementary Metal Oxide Semiconductor, is the chip in a computer that holds the most basic of settings for a computer. These settings include the date, time, and system setup parameters. The most common way to access the CMOS to change these parameters is hitting a specific key during the computer’s initial startup (CMOS, 2013). Since the inception there have been many changes made to the CMOS. The CMOS memory has been changed from analog to digital and the speed at which it is accessed has been increased (CMOS, 2013).…

    • 244 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    1 Which statements are true concerning the shared memory buffering used by an Ethernet switch? (Choose two.)…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Designing a fault-tolerant system can be done at different levels of the software stack. We call general purpose the approaches that detect and correct the failures at a given level of that stack, masking them entirely to the higher levels (and ultimately to the end-user, who eventually see a correct result, despite the occurrence of failures). General-purpose approaches can target specific types of failures (e.g. message loss, or message corruption), and let other types of failures hit higher levels of the software stack. In this section, we discuss a set of well-known and recently developed protocols to provide general-purpose fault tolerance for a large set of failure types, at different levels of the software stack, but always below the…

    • 1211 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    1 - A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization.…

    • 1464 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Term Paper

    • 453 Words
    • 2 Pages

    * Not “having all eggs in one basket”, risk is being diversified when suppliers or vendors are not able meet expectations…

    • 453 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Using the data from your class, create a class histogram based off of who won for each person/group.…

    • 357 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It is major to see that private broadband speed ask for has an immensely fluctuating character. Families move stunningly in their centrality of usage, the kind of occupations they use their relationship for and the measure of progress these applications make. In this consider, we address this respectable mix by constraining between different groupings of customers, and our general outcomes are midpoints over these outlines. While the advance of the intensity for exchange speed is related to that of download speeds, their improvements are not by any associate of the creative vitality poorly characterized. Despite phenomenal things, download speeds are from time to time more desperate to customers as they are dependably holding up to use substance or use an application, while they are normally less squashed while exchanging data.…

    • 626 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    With admirable foresight, the Internet Engineering Task Force (IETF) initiated as early as in 1994, the design and development of a suite of protocols and standards now known as Internet Protocol Version 6 (IPv6), as a worthy tool to phase out and supplant IPv4 over the coming years. There is an explosion of sorts in the number and range of IP capable devices that are being released in the market and the usage of these by an increasingly tech savvy global population. The new protocol aims to effectively support the ever-expanding Internet usage and functionality, and also address security concerns.…

    • 981 Words
    • 4 Pages
    Powerful Essays
  • Best Essays

    Because of this they are looking into a new found technology which is virtualization. Virtualization is not a new concept. It has been around since the main frame computer systems. What is virtualization? It is defined as “the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources” (Rouse, Virtualization, 2010). Virtualization falls into three main categories: Operating System, Storage, and Applications. Because of this virtualization can be applied to almost any part of an IT infrastructure. According to Rackspace after conducting a survey found that 57 percent of companies use virtualization with their internal infrastructures (Connor, 2007). Along with that Gartner.com states that “Virtualization will continue as the highest-impact issue challenging infrastructure and operations through 2015, changing how you manage, how and what you buy, how you deploy, how you plan and how you charge” (Press Release, 2010). In this paper we will discuss server…

    • 2369 Words
    • 10 Pages
    Best Essays
  • Good Essays

    NETW204week1labreport

    • 436 Words
    • 3 Pages

    In your own words, summarize what you have learned about Configuring Static and Default Routes.…

    • 436 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Published: October 22, 2009 Updated: July 8, 2010 Applies To: Windows 7 Note This content applies to Windows 7. For Windows 8 content, see Windows Deployment with the Windows ADK. The System Preparation tool, Sysprep.exe, is used to prepare an installation of Windows® for imaging or delivery to a customer. This topic includes: Sysprep Executable Sysprep Process Using Answer Files with Sysprep Resetting Windows Activation Booting to Audit Mode or Windows Welcome Detecting the State of a Windows Image Sysprep Log Files…

    • 2287 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    1.2 Reading Informational Text - Students read, understand, and respond to informational text—with an emphasis on comprehension, vocabulary acquisition, andmaking connections among ideas and between texts with a focus on textual evidence…

    • 1452 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Netw206 W1 Assignment 1

    • 1047 Words
    • 5 Pages

    There are so many events going on in the world today. There is a housing market issue, health care reform issue, and companies fighting for paid sick leave from their jobs. There are many more this is just to name a few. The housing market is going to start booming again for a short time. The health care reform created by Obama will continue to be an issue for a long time, and companies are fighting to get paid sick leave when they are ill. There are so many things that have changed in the world, and it sure is not what it used to be.…

    • 1047 Words
    • 5 Pages
    Better Essays
  • Better Essays

    So what's next on the wireless horizon? A new standard, known as Very High Throughput (VHT), will feature data rates of between 4Gbps and 7Gbps, nearly five times the rate of 802.11n, and will operate on the 60GHz frequency band. As such, the new standard will likely have limited range and will be best suited to peer-to-peer applications such as streaming video from one device to another or moving very large chunks of data in a matter of seconds.…

    • 820 Words
    • 4 Pages
    Better Essays