DOC PREVIEW
DePaul TDC 375 - Layer 3

This preview shows page 1-2 out of 5 pages.

Save
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Network Protocols Layer 3 or peculiarities about common wisdom TDC375 Spring 2009 10 John Kristoff DePaul University 1 What could have been different Addressing Larger Automatic derivation Central coordination rent versus own Elimination of certain fields Call the TTL a hop count Getting rid of the version field Fragmentation strategies TDC375 Spring 2009 10 John Kristoff DePaul University 2 Hop count TTL Is it better to count up or down Does it matter where you start How do you use it as a security knob kind of Think anti spoofing and hop limiting TDC375 Spring 2009 10 John Kristoff DePaul University 3 Privacy How do or don t you have it IPX was better in some ways but less privacy IPv6 can construe hardware based node address How do you get source address anonymity How do you prevent source address anonymity TDC375 Spring 2009 10 John Kristoff DePaul University 4 Some things to be familiar with Default free Ships in night Traffic engineering Whois Netflow traceroute TDC375 Spring 2009 10 John Kristoff DePaul University 5


View Full Document

DePaul TDC 375 - Layer 3

Download Layer 3
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Layer 3 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Layer 3 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?