Preview

Transmission Control Protocol and Windows Media Services

Satisfactory Essays
Open Document
Open Document
317 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Transmission Control Protocol and Windows Media Services
Unit 5 Assignment1: Securing Windows Media Services
1. Stream type: Multicast Protocol used: UDP multicast Ports used: 1-65000 Special notes: Multicast streams are broadcast on IPs specified by the Windows Media Administrator within the following range: 224.0.0.1 to 239.255.255.255. The UDP port used for multicast streams is specified by the Windows Media Administrator and falls within the following range: 1 - 65000. Stream type: UDP unicast stream Protocols used: UDP and TCP Ports used: TCP-1755 and a UDP port within the following range: 1024 - 5000 Special notes: When using UDP streams, the client first makes a connection to the Windows Media server using TCP port 1755. After this connection is established, the client and the server choose the UDP port that will be used by the server to stream the Windows Media content down to the client.

2. By using Windows Media Services Administrator for the Web, you can access the local Windows Media server (the server on which the Windows Media Administration Web site is located) and other Windows Media servers on your network. To enable this level of control, configuration and authentication data is sent over the network between the remote computer and the local Windows Media server computer. As the data is sent, it is vulnerable to unauthorized access.

You can add the IIS security measures to your site to provide different levels of protection. Most of the configuration is performed by changing the security settings in the Windows Media Administration site properties in IIS. Secure Sockets Layer (SSL) also requires that you obtain a certificate from a certification authority or create a certificate yourself by using Microsoft Certificate Services.

3. Basic authentication is widely used on networks for collecting user credential information. The advantage of basic authentication is that it is simple to use and works with most browsers, proxy servers, and firewalls.

4. Windows Media Services supports

You May Also Find These Documents Helpful

  • Satisfactory Essays

    - SSL and HTTPS will applied to online transactions. Enabling encrypted connection through user login to encrypted pages until sign out. (System/ Application Domain & LAN Domain & Remote Access Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2670 Lab 5

    • 88 Words
    • 1 Page

    2. No you need to configure the URL and path for the media you want to show.…

    • 88 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    • Authentication – the process for “trust” connection establishing between the server and the applier;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Router Simulation

    • 331 Words
    • 2 Pages

    9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Use strong password policies, do not store credentials in insecure manner, use authentication mechanisms, encrypt communication channels, use secure HTTP(HTTPS) only with Forms authentication cookies…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Powerful Essays

    Which of the following is a GPO on a Vista computer (Choose all that apply)…

    • 1935 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1210 Final Exam Review

    • 726 Words
    • 3 Pages

    Truth Table 0 AND 0 = False (0) / 1 AND 0 False (0) / 1 AND 1 True (1)…

    • 726 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Authentication in definition is simply proof that something is real or what it is meant to be. Public networks as well as private networks to include the internet use passwords as authentication to authorize logins. Data is required and is filtered through the password database if an effort to ensure that the user is authentic. Also, before anyone is allowed to access an organization’s intranet they must first be registered by someone that has the appropriate credentials to authorize them to gain access. There are plenty of businesses and alternative in the need of additional authentication methods and one method worthy of mentioning is the utilization of digital certificates issued and verified by a Certificate Authority or as commonly used the acronym CA.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Securing Windows Media

    • 481 Words
    • 2 Pages

    | The Windows Media distribution server uses a port within this UDP In port range to receive data packets from the origin server.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    2. What two access controls can be set up for Windows Server 2003 folder and authentication?…

    • 368 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The Internet Protocol (IP) sits in the middle of the five-layer TCP/IP model. IT provides service to the layers above it and receives services from the layers below it. Almost every computing device on the planet communicates in some way, and most of those use IP. IP exists as an Internet standard protocol, also called ipv4, although it is mostly just referred to as IP. IP was created in the 1970s, but did not reach standard status as the IPv4 RFC until the 1980s.…

    • 360 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Dear Itunes

    • 885 Words
    • 4 Pages

    You also need to be ready that you can face with the problems contains with the security, your web site need to be well secured and represent this, the reason for this you need make customer sure that their personal details and credit card data is save and no one will get access to them except the owner…

    • 885 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    H.248

    • 1286 Words
    • 6 Pages

    Bearer control protocols are used for the communication between Media Gateway Controller (MGC) and Media Gateway (MG). As the control-layer supports equipment, two bearer…

    • 1286 Words
    • 6 Pages
    Powerful Essays