Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

TCP and UDP

• Describe TCP and UDP, and how they differ. Why do both protocols exist?

Address Types

• In your own words, briefly describe each of the address types mentioned in LabSim (Global-Unicast Addresses, Unique-Local Addresses, Link-Local Addresses, Multicast Addresses), and provide a scenario when each is useful for an organization. In particular, differentiate link-local, unique local and global addresses.

ISATAP vs. 6to4 vs. Teredo

• LabSim describes the ISATAP, 6to4 and Teredo transition technologies for IPv6. In your own words, define one (in a way that differentiates it from the others). Then, do one of the following:

o Describe a realistic scenario (with some details) for using the technology you chose
o Locate a case study or other online article (of that technology or IPv6 transition in general) and provide your thoughts on it
o If your organization is undergoing (or underwent) an IPv6 transition, discuss some of the details.

A Global-Unicast address is an address on the Internet.
Unique-Local, previously referred to as Site-Local, indicates a private IP Address.
Link-Local indicates that the IP address was configured by default.
Multicast indicates that the packet is addressed to a number of hosts on the network, but not all hosts.

ISATAP: The Intra-site Automatic Tunnel Addressing Protocol (ISATAP) is a tunneling method for use within a site to provide IPv6 communication over a private IPv4 network. ISATAP tunneling:

• Is configured between individual hosts and an ISATAP router.

• Requires an IPv6 router to perform tunneling, and dual layer or IPv6-only clients. Routers and hosts perform tunneling when communicating on the IPv4 network.

• Does not work through NAT.

• Automatically generates link-local addresses that includes the IPv4 address of each host:

o The prefix is the well-known link-local prefix: FE80::/16.

o The remaining prefix values are set to 0.

o The first two quartets of the interface ID are set to 0000:5EFE.

o The remaining two quartets use the IPv4 address, written in either dotted-decimal or hexadecimal notation.

A host with an IPv4 address of 192.168.12.155 would have the following IPv6 address when using ISATAP: FE80::5EFE:C0A8:0C9B (also designated as FE80::5EFE:192.168.12.155).

Use ISATAP to begin a transition to IPv6 within a site.

• You can start by adding a single ISATAP router and configuring each host as an ISATAP client.

• Vista clients will use ISATAP automatically if they can find the ISATAP router.

Vista clients query the DNS server for a router named ISATAP. When using ISATAP, be sure to use this name for the server, or create an A or CNAME record in DNS using ISATAP as the name and pointing to the ISATAP router.

6-to-4 tunneling: With 6-to-4 tunneling, tunneling endpoints are configured automatically between devices. 6-to-4 tunneling:

• Is configured between routers at different sites.

• Requires routers that provide dual layer support as the tunnel endpoints. Hosts can be IPv6-only hosts.

• Works through NAT.

• Uses a dynamic association of an IPv6 site prefix to the IPv4 address of the destination tunnel endpoint.

• Automatically generates an IPv6 address for the site using the 2002::/16 prefix followed by the public IPv4 address of the tunnel endpoint router. For example, a router with the IPv4 address of 207.142.131.202 would serve the site with the following prefix: 2002:CF8E:83CA::/48 (CF8E:83CA is the hexadecimal equivalent of 207.142.131.202).

Use 6-to-4 tunneling to dynamically connect multiple sites through the IPv4 Internet. Because of its dynamic configuration, 6-to-4 tunneling is easier to administer than manual tunneling

Teredo: Teredo (also known as NAT traversal or NAT-T) establishes the tunnel between individual IPv6 hosts so they can communicate through a private or public IPv4 network. Teredo is a last resort technology in that it is used only when there is no native IPv6, ISATAP, or 6-to-4 connectivity present between hosts. Teredo tunneling:

• Is configured between individual hosts.

• Has dual layer hosts that perform tunneling of IPv6 to send on the IPv4 network.

• Works through NAT.

• Uses a 2001::/32 prefix followed by the IPv4 public address converted to hexadecimal. For example, the IPv4 public address of 207.142.131.202 would provide clients with a prefix of 2001:0:CF8E:83CA::/64.

For Windows Vista and Windows 7, the Teredo component is enabled but inactive by default. In Windows Server 2012, Teredo is enabled by default only on non-domain networks (it is disabled by default on Windows Server 2008 and 2003 SP1). To use Teredo, a user must either install an application that needs to use Teredo, or configure the advanced settings on a Windows Firewall exception to use edge traversal.

Teredo behavior differs when machines are members of a domain. Teredo is disabled on XP and Server 2003 machines that belong to a domain. Teredo is enabled on Vista and 2008 machines that belong to a domain. Teredo is disabled by default on Windows 8 and Windows Server 2012 machines that are part of a domain.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91979227

Have any Question?


Related Questions in Management Information System

Assignment risk managementit is an accepted truth that

Assignment : Risk Management It is an accepted truth that without risk there can be no gain. Every individual and organization who wants to succeed must take some risks. Risk management is not about not taking risks, but ...

Discussion 11using expected value is it economically better

Discussion 1 1) Using expected value, is it economically better to make or buy the component? A lot of factors play an important role when it comes to planning and implementing. All these factors play a key role in proje ...

Project 6 policy review and recommendations

Project #6 Policy Review and Recommendations Presentation Instructions This is the final phase of the case study assignments. The primary purpose of this project is for you to demonstrate your understanding of the princi ...

In a three-page well-written page answer the following

In a three-page, well-written page answer the following question: You all work in or know of people who work in enterprise IT environments Maintaining the enterprise security posture, legal risk, and security is constant ...

Answer the following question what are the basic reasons

Answer the following Question : What are the basic reasons that people resist change? How can this resistance be overcome? Write 300 Words. Include in-text citations and references in APA style formatting. Must have two ...

Question suppose that you are employed as a data-mining

Question : Suppose that you are employed as a data-mining consultant for an internet search engine company. Describe how data mining can help the company by giving a specific example of how techniques such as clustering, ...

In several chapters we have emphasized the importance of

In several chapters, we have emphasized the importance of efficient change management as a key component of the ability to cost-effectively maintain an application. Discuss the various types of changes one should anticip ...

Functional vs nonfunctional requirements please respond to

"Functional vs. Nonfunctional Requirements" Please respond to the following: Explain why both functional and nonfunctional requirements are important in IT development. Include at least two (2) examples to support your a ...

Assignmentyou are still the project manager for the

Assignment You are still the project manager for the computer upgrades. Briefly describe the four 4 risks you identified in Unit 2's Individual Project. Using the risk assessment techniques, describe your assessment deci ...

Topic we all had the unfortunate experience of seeing how

Topic: We all had the unfortunate experience of seeing how computers can, at times, make life's journey abit more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly i ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As