Chapter 3 - 4
Chapter 3 - 4
- You can also configure Mac OS X Snow - A VPN connection requires the use of a
Leopard and Lion for multiple accounts using remote access protocol to carry packets
the Accounts utility in System Preferences. over a WAN connection. The most common
When using Mac OS X in a home, public protocol for VPN security is IP security
controls are useful features that can be the network layer of the OSI model.
configured. Types of accounts that can be - Some VPN networks use the Layer Two
created: Tunneling Protocol (L2TP) running inside
• Administrator: used to manage the IPsec for extra security. L2TP is using an
IP as a Connectionless Protocol
SUMMARY
• Multicast, means that the server is able to • Network number cannot be assigned to any
treat all five clients as a group and send one device.
packet per transmission that reaches all five • Highest number on a network cannot be
clients. Multicast can be used to assigned.
significantly reduce network traffic when
transmitting multimedia applications.
example:1042:0071:0000:0000:07ac:0522:2
10c:425b.
the network ID and which is for the host
ID, example, and a subnet mask for a Class A
network is all binary ones in the first octet
and all binary 0s in the remaining octets:
11111111.00000000.00000000.00000000
(255.0.0.0).
Figure 4-5 Decimal Equivalents of 8-bit
Decimal Conversion Creating Subnetworks
11111111.11111111.11111111.00000000
(255.255.255.0).
Features of IPv6
- Note that using a subnet mask to divide a
• 128-bit address capability.
network into a series of smaller networks
• Single address associated with multiple enables Layer 3 device effectively ignore
interfaces. traditional address class designations, and
• Address auto configuration and CIDR therefore, creates more options for
addressing. segmenting networks through multiple
subnets ad additional network addresses. A
• 40-byte header instead of IPv4’s 20-byte newer way to ignore address class
header. designation is using Classless Interdomain
• New IP extension headers for special Routing (CIDR) addressing, which puts a
needs. slash (/) after the dotted decimal notation.
For example, 165.100.18.44/18, meaning 18
• Includes more routing and security options.
bits needed for network ID, 14 for host ID
• Use of IP security (IPsec). (32 -18).