Free Essay

Nt2670

In:

Submitted By Aross
Words 1027
Pages 5
Abstract--- This document provides an analysis and comparison of IPv4 and IPv6 under various circumstances. It is well understood that IPv6 has been designed to replace IPv4. We have done a feature-by-feature comparison and contrast of IPv6 versus
IPv4 and found that IPv6 offers many unique opportunities for increasing a network architectures efficiency and agility. In some sense, there is a competition going on between these protocols, as they are not directly compatible, and network providers and users are being forced to determine whether to support one or both protocols for various network services. The new version of IP,(i.e.
IPv6), constitutes an effort to overcome the inborn limitations of
IPv4, in order for the new protocol be able to respond to the new needs as they shape today in the Internet. This paper is aimed to discuss about various comparison issues when porting an IPv4 application to IPv6 with focus on issues that an application developer would face rather than a complete API reference.IPv4 is the incumbent and currently has the most widespread usage for conventional Internet applications.IPv6 is a large-scale re-design and re-engineering of IPv4, based on many lessons learned as the
IPv4-based Internet grew and was used in unforeseen ways.
Keywords-- IPv4, IPv6, Multicast, Quality of service (QOS),
Routing.
I. INTRODUCTION
HE primary motivation for change arises from the limited address space. When IPV6 deployed on a large scale it has solved many current networking problems.
When IP was defined , only a few computer networks has existed Then the designers decided to use 32 bits for an IP address because doing so allowed the Internet to include over a million networks. However, the global Internet is growing exponentially, with the size doubling in less than a year. Currently, two versions of the Internet Protocol (IP) are in use on the Internet. In some sense, there is a competition going on between these protocols, as they are not directly compatible, and network providers and users are being forced to determine whether to support one or both protocols for various network services. IP version 4
(IPv4) is the incumbent and currently has the most widespread usage for conventional Internet applications. IP version 6 (IPv6) is a large-scale re-design and reengineering of IPv4, based on many lessons learned as the
IPv4-based Internet grew and was used in unforeseen ways.
Hanumanthappa .J., Dos in Computer Science, University of
Mysore, Manasagangothri, Mysore, Karnataka .INDIA ( phone: +091-
821-2419552; fax: +091-0821-2510789,Email: hanums_j@yahoo.com )
Dr.Manjaiah.D.H., Reader, Mangalore University,
Mangalagangothri , Mangalore, Karnataka, INDIA. (phone: +091 - 0824 -
2287670; fax: +091 - 0824 - 2287424 Email: ylm321@yahoo.co.in )
Although it would seem obvious that IPv6 is a superior and valuable protocol to deploy, there is often considerable resistance to enabling IPv6 because Decision-makers have difficulty in seeing a business case for IPv6, unsure of how it can be less costly, more efficient, more productive, etc than the IPv4 status quo. Also, some analysts have propagated significant amounts of misinformation about
IPv6 over the last several years. The primary motivation for the defining a new version of IP arises from the address space limitation- larger addresses are necessary to accommodate continued growth of Internet. The secondary motivation for the changes in IP has arisen from the new
Internet applications. For example, an applications that deliver audio and video need to deliver data at regular intervals. In this paper we have also contrasted the various features of IPv4 and IPv6.
A. The serious problems of IPv4 are as follows
1. Insufficient number of unique “valid” addresses.
2. Routing tables at core are becoming unmanageably large. 3. Fixed length headers are not flexible enough for new functionality. 4. Packet size (and Practice of fragmentation) is inefficient. B. The next–generation IPv6 has some advantages over
IPv4 that can be summarized as follows
(i). Larger address space: An IPv6 address is 128 bits long.
Compared with the 32-bit address of IPv4, this is a huge
(296) increase in the address space.
(ii). IPv6 addressing: An IPv6 address consists of 16 bytes
(octets).It is 128 bits long.
To make address more readable, IPv6 specifies hexadecimal colon notation. In notation 128 bits are divided into eight sections, each 2 bytes in length. Two bytes in hexadecimal notation require four hexadecimal digits.
Therefore address consists of 32 hexadecimal digits with
T
every four digits separated by a colon. Although the IP address, even in hexadecimal format, is very long, many of the digits are zeros. In this we can abbreviate the address.
The leading zeros of a section can be omitted .Only the leading zeros can be dropped, not the trailing zeros. The below figure shows abbreviated IPv6 address.
C.Better header format: IPv6 uses a new header format in which options are separated from the base header and inserted, when needed, between the base header and the upper –layer data. This simplifies and speeds up the routing process because most of the options do not need to be checked by routers.
D. New options: Changes in the way IP header options are encoded allows for more efficient forwarding, less stringent limits on the length of options, and greater flexibility for introducing new options in the future.
E. Allowance for resource allocation: IPv6 is designed to allow the extension of the protocol if required by new technologies or applications.
F. Support for resource allocation: In IPv6, the type –of service field has been removed, but a mechanism called flow label has been added to enable the source to request special handling of the packet. This mechanism can be used to support traffic such as real-time audio and video.6.IPv6 enables addressing architectures that scale well in terms of the number of nodes and sub networks, the size of subnet works, and the degree of change within subnet works this includes typically-encountered cases where IPv4 becomes difficult to use robustly. Global routing tables in IPv6 are potentially much simpler than their IPv4 counterparts, and thus require lower memory and computational resources. In resource-constrained environments, IPv6 requir

Similar Documents

Free Essay

Nt2670

...NT2670 U2A1: Identifying HTML Tags Tag | Usage | <html> </html> | Tells the (Web) that this is an HTML document. Tags are to mark sections of the text and for most, an opening and closing tags are required | <body> </body> | the document's body everything visible on the page content has all the contents of HTML documents such as: links, images, etc. | <b> </b> | makes the enclosed text into bold text | <p> </p> | makes enclosed text a paragraph, with lines skipped at the top and bottom | <i> </i> | the default tag for italics | <br> | stops the current line and goes on to the next | <body bgcolor=> | defines the background color of the page | <h1> </h1> | describes a heading; h1 being the largest | <h6> </h6> | smallest heading | <img src="name"> | Adds an image | <a href="URL"> </a> | href attribute specify the URL(web address) for a link | <a href="URL"> <img src="URL"> <a> | creates an imagelink src attributes specifies the URBL for an image | <p align=> | the alignment of the text within a paragraph or image left is the default alignment | 1. <b> <i> Hello World </b> </i> 2. <body bgcolor=”#000000”> or <body bgcolor=”black”> 3. <p align=center> Hello World</p> 4. <img src=”\Images\MyImage.jpg” alt=”hiking” style=”width:80px;height:60px”> ...

Words: 329 - Pages: 2

Free Essay

Nt2670 Final Review

...Software environment emulating- Virtual Server Website to publish files located anywhere on the network- Virtual Directory Traditional challenge/response authentication- Windows Authentication Default website on the server to use- Default app pool Use the prefix_____ in its URL- HTTPS Access email, voice mail, and fax messages- UM IMAP uses TCP port 110- 143 NOT a server role available in Exchange Server 2007- Anti Spam ADAM to periodically obtain AD- EdgeSync Connect to your Exchange Servers- RPC over HTTP Roles enables users working at another computer on the company network or on the internet- Terminal Services Root directory of the default Web- C:\inetpub\wwwroot IIS7 generates a 404 error- detailed; custom Web applications use a three-tiered architecture- Database Server To relay email within your organization- Connectors The two forest-wide FSMO roles- Schema Master Database of all object names in the forest – Global catalog Test connectivity to SMTP,POP3, and IMAP4- Telnet Two basic types of computers- Clients and Servers Isolate Web applications in separate address spaces called- Application Pools The process of confirming a users identity- Authentication Original default filename for the Web- index.html What is an MMC- Server Manager Stripped down version of windows 2008- Windows Server Core Servers that hose the _____role- Edge Single Public folder database by default- Public Folder Referrals Assign them to ____rather than to individual users-...

Words: 468 - Pages: 2

Free Essay

Nt2670 Week 3 Analysis

...The fire wall ports that you must have open are HTTP and RSTP, so that is port 80 and 554 respectfully. HTTP is used often as protocols on the web. The reason you should open both is because it uses a thing called Protocol rollover. Protocol rollover is used to negotiate the most efficient protocol they have in common. It’s possible to specify which protocol the administrator wants to use with URL prefixes. It is very effective to enable both protocols to add an overall better user experience. SSL is the recommended security method for running the Windows Media Administration site. Secure Socket Layer provides the highest level of security by encrypting data before it’s sent over the network according to Microsoft’s web site. It still has to be used with another authentication method as well. Personally, I feel like basic authentication offers some advantages. One of those advantages is that the users have to have a username and password to access the website. The administrators manage the usernames and passwords as well. Basic authentication also works with most browsers, easy to manage and easy to use. One downfall is that the credentials are not encrypted. That one downfall is a huge security risk that most wouldn’t be willing to take. As a network admin you want the risk to be as low as possible. Confidentiality, integrity and availability are the most important keys when running a network. The three protocols used by Windows Media Services to administer the server are Real...

Words: 402 - Pages: 2

Premium Essay

Nt2670 Exam Study Guide

...NT2670 EXAM Study Guide Jeopardy style study guide 1. What is Mail User Agent (MUA)? E-mail is typically created and sent using an e-mail client program, such as Microsoft Outlook or Eudora, called a __________. 2. What is Schema Master? The two forest-wide FSMO roles that must be present on a single DC in the forest are the Domain Naming Master and the __________. 3. What is Mailbox? Unlike other Exchange servers within your Exchange Organization, servers that host the ______ role cannot communicate directly with Active Directory. 4. What is Connectors? To relay e-mail within your organization and across the Internet, your Hub and Edge role servers must have __________ that specify how to send and receive e-mail. 5. What is POP3? __________ protocol is designed to download e-mail from an e-mail server to a client for viewing 6. What is Servers and Clients? Two basic types of computers that can be on an enterprise network are: 7. What is Site? GPOs are applied to user and computer objects based on the link in the following order: ________> Domain> Parent OUs> Child OUs. 8. What is x64? Is a required platform for a production Exchange Server 2007 environment. 9. What is EdgeSync? Edge role servers must use ADAM to periodically obtain AD and Exchange information using the _______________ protocol from a server that hosts the Hub role. 10. What is 143? POP3 uses TCP port 110 while IMAP uses TCP port ____ by default. 11. What is...

Words: 591 - Pages: 3

Free Essay

Nt2670 Mid Term Study

...NT2670 Midterm Study Two basic types of computers that can be on an enterprise network are ____________. Which of the following roles enables users working at another computer on the company network or on the Internet to establish a connection to a server and open an application or desktop session there? Terminal Services By using the Server Core installation option of Windows Server 2008, you get a stripped-down version of the operating system that shows a single window with a command prompt. The ServerManagerCmd.exe utility provides a command prompt alternative to Server Manager and can be used to install roles and features from scripts or batch files. You must activate Windows Server 2008 computers within 30 days of installing them. The Add Roles Wizard provides roles that fall into three basic categories: Directory services, Application services, and Infrastructure services. Which of the following correctly identifies the HTTP binding options available? IP address, Port Number, Host Header What is the original default filename for the Web? Index.html FTP7 can use SSL to encrypt its authentication traffic before transmission. IIS7 uses a generic request pipeline that is modular in nature. The component that manages the request pipeline, the server’s application pools, and the worker processes is called WPAS-Windows Process Activation Service. Which feature of IIS7 enables you to publish content found on different drives or different computers on a network, without...

Words: 868 - Pages: 4

Premium Essay

Nt2670 Lab 2

...Unit 1 Lab 2 Preparing an Application Server LAB 1-2-1 1. Which computer is hosting the Administrator account that you specified in this authentication? . This question confuses me. The administrator account I am logging into is on the VM, but my laptop is the actual host LAB 1-2-2 2. Why is the system prompting you to initialize Disk 1 at this time? Because it was not initialized when it was created 3. What happens to the Disk 1 type and status when the initialization process is complete? The type changes to basic and the status changes to online 4. Now that Disk 1 has been initialized, why doesn’t it appear in the volume list pane at the top of the console? Because it hasn’t been formatted LAB 1-2-2 Task 5 Based on the information displayed in the Disk Management snap-in, fill out the information in Table 1-2-1 on your lab worksheet. | Disk 0 | Disk 1 | Disk type (basic or dynamic) | basic | basic | Total disk size | 80GB | 16GB | Number and type of partitions | 1 Primary | 0 | Amount of unallocated space | 40GB | 16GB | 5. What volume sizing options are available in the context menu? It gives me the minimum possible, the maximum possible, and a field to input what I want the size to be 6. Why are you unable to extend the Data2 volume to Disk 1? I was able to extend Data2 to Disk 1. 7. Why is it necessary to convert both of the disks? Because a basic disk does not support a spanned volume 8. Why are you unable...

Words: 721 - Pages: 3

Premium Essay

Nt2670 Final Exam

...Study Guide | | | | | | | Source | Page Number(s) | 1 | | What is Terminal Services? | Microsoft® Official Academic Course 70-643: Windows Server® 2008 Applications Infrastructure Configuration | 10 | 2 | | What is Server core? | Microsoft® Official Academic Course 70-643: Windows Server® 2008 Applications Infrastructure Configuration | 19 | 3 | | what are the terminal services resources? | Microsoft® Official Academic Course 70-643: Windows Server® 2008 Applications Infrastructure Configuration | 17 | 4 | | What is a virtual server? | Microsoft® Official Academic Course 70-643: Windows Server® 2008 Applications Infrastructure Configuration | 21 | 5 | | What is Server manager? | Microsoft® Official Academic Course 70-643: Windows Server® 2008 Applications Infrastructure Configuration | 36 | 6 | | What are infrastructure services? | Microsoft® Official Academic Course 70-643: Windows Server® 2008 Applications Infrastructure Configuration | 3 | 7 | | what are virtual directories? | Microsoft® Official Academic Course 70-643: Windows Server® 2008 Applications Infrastructure Configuration | 193 | 8 | | what are the available http binding options? | Microsoft® Official Academic Course 70-643: Windows Server® 2008 Applications Infrastructure Configuration | 194-195 | 9 | | the original default filename for the web is index.html. true or false? | Microsoft® Official Academic Course 70-643: Windows Server® 2008 Applications Infrastructure Configuration...

Words: 1026 - Pages: 5

Premium Essay

Nt2670 Project Part 1 Develop a Drp

...Matthew Klutts NT2670 2/21/2016 Project part 1 I do this IIS or Internet Information Services is the best choice for an application server. This is because it is a windows system. It provides a secure, easy to manage, modular and extensible platform for hosting websites, services and applications. With IIS you can maximize web security with a reduced server foot print and automatic application isolation. IIS 7.0 and up have a modular architecture. Modules, also called extensions, can be added or removed individually so that only modules that are required for specific functions are installed. IIS in my opinion will be the best choice for this server, because of all the information that I provided above, and the fact that I’m more comfortable with windows based systems. The ports that need to be open to host ftp, http, https, and streaming media are listed below. 1. FTP a. The default port range is 1024-5000, but the upper range can be changed. 2. HTTP b. Port 80 or port 8530 3. HTTPS c. Port 443 or port 8531 4. Streaming media d. Windows Media server uses TCP in ports to accept an incoming HTTP connection (80), RTSP connection (554), MMS connection (443). e. Windows Media Server uses UDP out ports 1024-5000 and 5004. Due to the design of IIS and its security features I don’t see many security concerns with having all these ports open on the same server. Although there is no way for any system to be completely safe...

Words: 769 - Pages: 4

Free Essay

Nt2670 – Unit 1 Assignment

...After careful consideration, it was decided by the corporate IT team that in order to increase security and lower your attack surface, Windows 2008 Server Core would be installed on a group of your servers. However, a few roles need to be installed on the server, and your Senior Administrator is not familiar with installing roles on a Server Core machine. Use notepad to create a batch file to install the following roles: DHCP, DNS, Print Services and Hyper-V. Questions: 1. What does the /w switch do? Why is it used? The /W switch specifies the warning level of the MIDL compiler, and the level indicates what type of security warning level is present. The security levels range from 0-4. Zero meaning no warning and four being the highest level. 2. What switch is used to remove a role? /remove will remove all the roles specified on the computer. 3. What is the command to start the DHCP Server service? The netsh command will start the DHCP server. 4. What command is used to configure a DNS zone? The dnscmd command-line tool will be used to configure a new DNS zone. Lessons 1- fill in the blank 1. iSCS 2. Streaming Media Services and Windows Server Virtualization 3. Infrastructure 4. UDDI Services 5. Windows SharePoint Services 6. Multipath I/O 7. Single Instance Store 8. Web Server (IIS) 9. Desktop Experience 10. Key Management Service Lesson 1 – Multiple choices 1. B. Applications 2. D. LPD service role service 3...

Words: 352 - Pages: 2

Free Essay

Nt2670 - Installation and Configuration of Ms

...After viewing this video for at least 5 times plus watching another to come to the conclusion listing the steps to get sound understanding since I couldn’t complete the final two labs. Pre-Installation Checklist Make sure you have all of the following steps in place before you setup Exchange Server 2010 on Windows Server 2008 R2 64 Bit and this is for a small office for both the Active Directory and the Exchange Server. But if you have a larger office you may want to consider separating the Active Directory machine and the Exchange 2010 Server. Install Windows Server 2008 R2 64 bit version Exchange 2010 is a 64 bit application and requires 64 bit versions of Windows Server 2008; therefore only a computer capable of running the 64 bit version of 2008. Once that is done named the server (mailitsupport.com), set the clock and it’s configured to be a stand alone with default settings. Configure Your Static IP Address The default installation of Windows 2008 sets your IP v4 and IP v6 addresses to use DHCP.  Since we will be configuring this computer to be a domain controller, you must change the IP address of the computer to be a static IP address which should be done via View Network Connections" in the Server Manager screen.  This will display the list of active network interfaces. a. Double click on your network adaptor to display the adaptors status. b. Press the Properties button. c. Highlight "Internet Protocol Version 4 (TCP/IPv4)" and then press the Properties...

Words: 2240 - Pages: 9

Premium Essay

Nt2670 Unit 3 Assignment 1

...Apparently many designers and developers believe secure passwords have to look complicated, even these days. The most secure ones seem to be „ #sK8/a_C%eD8)“. This looks like hell and is a mess to create. How would you explain your user, the password has to have a length of at least 8 characters, 2 characters have to be uppercase, 2 have to be special characters and of course numbers are a must? Would you like to create such a password? I wouldn’t. Instead I would probably risk it to write down this password on a note or use the same password several times. Maybe I would use a password manager. Nothing is a really great idea. Such complex requirements for passwords are a huge problem for privacy and IT security. But we need these passwords! At least this is, what passwordsgenerater.net wants to tell us. NO! We don’t need overly complicated passwords. This claim is idiocy. I don’t have any idea who invented this legend, but this person has to hate us. So much websites, apps and whatever demand us to use such passwords without any logical reason. If the safety of passwords relied on the number of different characters, how can our iPhone be safely protected by a 6-figure passcode? This is just 1,000,000 possible combinations. They did something, at least theoretically, pretty easy. The „Secure Enclave Processor“ (a pretty cool piece of hardware) restrict how often you can enter a wrong passcode. Furthermore they do one more thing: they set a hardware delay between the inputs...

Words: 1203 - Pages: 5

Free Essay

Nt2580

...Unit 7 Assignment 1 – Designing an Exchange Server (Portfolio) The first lesson that was given in this course NT2670 the more roles the server has the greater the physical it requires. The fact that a server is already using roles such with email server would require a lot. Especially over 1000 clients would require a lot of power with no minimum cut-off of system requirements. At least at the very least it should have 2 cores, but 4 cores is becoming standard, and I would choose 4 cores, it is also cost effective. Also building an Exchange Server 2007 I would pick a server with mid level capabilities in which it can handle at least 17 roles. However there will need to be at least 7-8 roles that need to be installed in Exchange Server 2007. To increase speed in the network I would choose the Thecus N5550 Enterprise Tower NAS server – Intel Atom Processor, 2 GB DDR3, RAID 0/1/5/6/10, 2x RJ-45, 1x USB 3.0, 1x HDMI, No OS. The cost for two of these severs are $419 2x which come to around $900 plus tax, to have the capabilities a business needs to be running with room to expand. Given that the minimum requirement for Windows Server 2008 requires 2 cores and 4 gigabytes of ram this is more than enough for Exchange 2007. The network requires 1000 emails to be managed, CAS, Hub Transport, and UM roles. This will only require RAID 5 setup because of the Client Access Server, all exchange server need to fast transfer rates and fault tolerance and the Thecus N5550 is more than up...

Words: 344 - Pages: 2

Premium Essay

Student

...Lopayi Wani 06/23/15 NT2670 Email and Web Services Unit 1 Assignment 1: Installing Server Roles with a Batch File Assignment: After careful consideration, it was decided by the corporate IT team that in order to increase security and lower your attack surface, Windows 2008 Server Core would be installed on a group of your servers. However, a few roles need to be installed on the server and your Senior Administrator is not familiar with installing roles on a Server Core machine. Using Internet research and use notepad to create a batch file to install the following roles: DHCP, DNS, Print Services and Hyper-V. Students will complete a notepad file that will successfully install all of the roles mentioned. Save the file using the name Roles.bat. 1. DHCP: start /w ocsetup dhcpservercore. 2. DNS: start /w ocsetup DNS-Server-Core-Role 3. PRINT: start /ocsetup Printing_ServerCore-Role. 4. SERVICES: start /w ocsetup MediaServer, 5. HYPER- Start /ocsetup Microsoft-Hyper-V. Questions 1. What does the /w switch do? Why is it used? Specifies the warning level, an integer in the range 0 through 4. There is no space between the /W switch and the digit indicating the warning-level value. 2. What switch is used to remove a role? To remove a role you would need to commas to separate command names. 3. What is the command to start the DHCP Server service? To open DHCP, click Start, click Settings, click Control Panel, double-click Administrative...

Words: 267 - Pages: 2

Premium Essay

Rqnt2670

...NT2670 Unit 7 Quiz 5 Scope This quiz tests over the objectives covered in Units 6 and 7. 1. The _________ DNS record is used to indicate the e-mail server for a particular domain to which email should be forwarded. a. STAT b. NS c. PTR d. MX 2. By default, __________ downloads and erases the email from the mailbox on the email server, whereas ___________ allows you to view email while leaving a copy in the mailbox on the email server. a. IMAP4; POP3 b. POP3; IMAP4 c. POP3; SMTP d. SMTP; IMAP4 3. A ____________ is an email server that receives inbound email and simply forwards it to another email server within the organization. a. Smart Host b. Intrusion Prevention System c. Relay Host d. Email Relay 4. If the priority numbers are the same on all MX records, DNS will rotate the list of MX records each time an MTA sends an MX record query. This feature of DNS is called ______________. a. server farm b. clustering c. round robin d. load balancing 5. __________ can be used to automatically configure the software, security settings, and user interface on computers within an AD domain based on the location of the user or computer within the AD database. a. Group Policy b. Security Policy c. LDAP d. Permissions 6. _____________ is a protocol based on HTTP and XML that can be used by some browser-enabled cellular telephones (called smart phones) to access emails from a Microsoft Exchange server. a. OWA b. MicrosoftSync...

Words: 394 - Pages: 2

Free Essay

Tlsvsssl

...Nick McCoy Email and Web Services NT2670 5 August 2014 TLS VS SSL As some know TLS (transport Layer Security) and SSL (Secure Socket Layer) are protocols that encrypt data and authenticate applications and servers. But some people don’t know what the difference is between these two. Well, I’m going to shed some light on that and make it easier to understand. A lot of people think that TLS and SSL are used interchangeably or are in conjunction with each other they are right but not fully correct, and the reason is one is not like the other it is a predecessor of the other and here is why. SSL served as a basis for TLS now with that being said some refer to it as SSL 3.1 So the difference would be that SSL is by port and TLS is by protocol, so that’s the difference. SSL and TLS are not compatible for instance if you have a program that can only speak SSL and not TLS, but want to connect to the service that only supports TLS you just cannot simply do it the reason is the program you are using wants to talk security first, but when it is received on the TLS end it wants to talk business first they don’t mix you cannot do it, so they are not compatible with each other. It’s like trying to fit a square in a triangle block in a square hole cannot do it. Is TLS or SSL more Secure? Let’s find out. TLS is the winner no matter what version and the reason are TLS v1.0 is more reliable than SSL v3.0 which is TLS predecessor, but however Versions 1.1 and 1.2 of TLS are far more secure...

Words: 369 - Pages: 2