Internet Technologies Assignment: IPV6, P2P, Server, and Protocols

Verified

Added on  2020/03/23

|7
|1402
|53
Homework Assignment
AI Summary
This assignment delves into various aspects of internet technologies. It begins by comparing IPV6 and IPV4, highlighting IPV6's advantages like multicast support and larger address spaces, while also discussing the reasons behind the slow transition. The assignment then explores strategies for migrating from IPV4 to IPV6, including dual stack routers, NAT protocol translation, and tunneling. It further examines centralized and decentralized P2P approaches, outlining their advantages and disadvantages. The concept of Distributed Hash Tables (DHTs) and their properties, such as autonomy, scalability, and fault tolerance, are explained. The assignment concludes by discussing the role of servers in providing computational services and the parameters influencing HTTP connection timeouts, such as idle connection duration and the maximum number of requests allowed.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INTERNET TECHNOLOGIES 1
Internet technologies
Name:
Institution Affiliation:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INTERNET TECHNOLOGIES 2
Question 1:
IPV6 additional to providing large address space, it has many advantages over the IPV4 these are
as follows;
IPV6 protocols usually have an in built support for the multicast 1 transmission whereas the
IPV4 this characteristic is just optional (Chadwick, 2006).
The IPV6 devices has an allocated locally accessible and the IPV6 addresses which are valid for
the clients who are connected hence allowing communication to be possible between the
endpoints to the same sub-network despite the presence of the router (Chadwick, 2006).
When it comes to IPV4 they have the data packages that have an upper size limit of 64Kilobytes
whereas when it comes to IPV6 they are extended up to 4 GB which increases on the
transmission rates.
Reason why the transition taking so long.
The reason as to why the transition of IPV6 they are taking long due to these aspects;
1. They are very expensive: Replacing or upgrading of the routers and switches to be
compatible to the IPV6 could take a lot of time and cost is high.
2. Compatibility issues: During the designing of the IPV6 protocol the backward
compatibility was not considered in the requirement list.
Question 2:
The strategies for the transition from IPV4 to IPV6.
Dual stack Routers. The router can be installed with both the IPV4 as well as the IPV6
addresses which are configured to its interface to be able to point to the network for the relevant
Document Page
INTERNET TECHNOLOGIES 3
IP scheme. The Dual Stack Router has the ability to communicating with each of the coverage
as it provides medium for the hosts to manage to access the server without changing on the
respective IP variations.
NAT protocol transmission. This strategy uses the NAT-PT enabled devices. When using this
products’ the host with the IPV4 address have the ability to send request to the IPv6 permitted
servers to the internet which would not recognize the IPV4 address. The NAT-PAT helps in the
connection between these types of protocols (Jap & Mohr, 2002).
Tunneling. When it comes to the numerous IP variations which occur the intermediate way or
maybe the transit networks, the utilization of tunnelling could offer a much better solution where
the data of the users pass via the non-supported IP version.
Question 3:
The Centralized P2P approach it means the hybrid system to where there are several Meta
information in regards to the data as well as the peers are stored to the multiple and centralized or
a well-known entities of a server (Hanna, 2012). The information set could include the
parameters such as the file availability, the bandwidth, as well as the latency value. The
transmission of the data is organized in the processes that are decentralized.
When it comes to the pure decentralized approach, the exchange of the information of the Meta
information needs to be conducted without distinct server systems (Hanna, 2012). Depending on
each of the communication handshake process between the peers consists of the data substitute
these Meta data.
Advantage
Document Page
INTERNET TECHNOLOGIES 4
They are ease and simple in setting up as they require hub or even a switch to be able to
connect to all the computers together.
It is more reliable as the central dependency which is limited.
The overall cost for building as well as maintaining it is less.
Disadvantage
The security is not good as it entails only to set up of password for the files which you do
not need individuals to access.
The data recovery or even the backup is very difficult.
Question 4:
The circulated hash table is the class of the decentralized distributed program that provides a
lookup service that is similar to the hash table (Comer, 2008). The responsibility for the
maintenance of the mapping from the recommendations for the values is circulated among the
nodes, in a manner wherein an alteration of the groupof the participant could cause minimal
amount of the disruption (Lowe, Murray, Lindsay & Liu, 2009). The properties of the DHTs
emphasize on the following;
Autonomy along with the decentralization that is the mutual form of the nodes without the
central coordination.
Scalability: the program will be able to operate effectively despite millions of the nodes.
Fault tolerance: This involves that the program must be dependable despite the nodes joining,
or faltering.
The technique that is used in achieving on these goals is any nodes needs to coordinate with few
other nodes which are in the system. Some DHT design seeks in securing against the malicious
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INTERNET TECHNOLOGIES 5
Participants as well as allowing on the participants in remaining anonymous. This is much less
common than in many of the P2P systems.
Question 5:
Sometimes a computational entity could have something which another does needs. In the
computational world, the server usually offers a given service to the other computers which are
connected to a network (Comer, 2008). It is common for the organization to have lot of the disks
on which the information of the members is stored, as well as have a single machine which is
responsible for offering access to the storage space (Hanna, 2012). The machine is regarded as
the disk server. Additionally, another machine in the business could control on the public html
access for the firm World Wide Web pages. In these cases, the service is regarded as what is
provided. It is also important to characterize on how the service is offered (Comer, 2008). A
server could offer a variety of the services. Some of the service specialization does not fit under
the same abstraction. A server can offer transmission and deliver on these services of which
some may not be related.
Question 6:
The host usually laces the valuation on the timeout parameter which the web host might permit
an idle connection to stay significantly open before it actually closed. A connection is
significantly idle in the event there is absolutely no data that is dispatched and even obtained by
the host.
The max parameter usually indicates the maximum number of the request which the clients
usually make or the server which allow to be made to the persistent connection (Shamdasani,
Mukherjee & Malhotra, 2008). Once the various number of the requests as well as the response
Document Page
INTERNET TECHNOLOGIES 6
have been sent, the host which include the parameter might close the connectivity. Furthermore,
the server is free of charge to close the connection after an arbitrary precious time or even the
number of the requests. Depending on how this is implemented solely depends on the HTTP
server.
Document Page
INTERNET TECHNOLOGIES 7
References
Chadwick, A. (2006). Internet politics: States, citizens, and new communication technologies.
New York, NY.
Comer, D. E. (2008). Computer networks and internets. Prentice Hall Press.
Hanna, P. (2012). Using internet technologies (such as Skype) as a research medium: A research
note. Qualitative Research, 12(2), 239-242.
Jap, S. D., & Mohr, J. J. (2002). Leveraging Internet technologies in B2B relationships.
California Management Review, 44(4), 24-38.
Lowe, D., Murray, S., Lindsay, E., & Liu, D. (2009). Evolving remote laboratory architectures to
leverage emerging internet technologies. IEEE Transactions on learning technologies,
2(4), 289-294.
Shamdasani, P., Mukherjee, A., & Malhotra, N. (2008). Antecedents and consequences of
service quality in consumer evaluation of self-service internet technologies. The Service
Industries Journal, 28(1), 117-138.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]