Tuesday, December 10, 2019
Internet Technologies Network Structure or Topology
Question: Discuss about the Internet Technologies for Network Structure or Topology. Answer: 1: Topology Advantages Disadvantages Star Topology Example: Router In this type of topology, all the computers are connected to the central hub and therefore it is very much easy to troubleshoot the network (Bernardos, 2016). In star topology, all the nodes are independent. They are not connected to each other and therefore, any specific issue in a particular node does not hamper the working of other nodes. The most important disadvantage is that the working of the entire topology is dependent on the central hub. If any one of the node uses most part of the central hubs processing capability then it will raise some issue for other nodes (Czyz et al., 2015). Mesh Topology Example: The topology is impractical as well as costly. Data transmission do not disrupt if a node is broken inside the mesh network (Haddad, 2013). High amount of network traffic is handled by the mesh topology as each additional device is considered as a node. Mesh networks requires supervision due to redundancy. A network administrator faces a lot of problem while handling the mesh topology. The mesh topology requires huge amount of investment as the design for this topology requires number of devices (Koshy et al., 2014). Bus Topology Example: Bus topology is very much efficient in fixing different problems as everything is connected together. The bus topology is considered as the most cost effective way to set up networks in laptops and computers because the cable length that is required is very much small (Lee et al., 2015). If any problem arises in a particular cable then all the other cables get affected, as all the cables are associated with each other (Osman, 2015). Security breaches arise as the network of the bus topology is very much simple. 2: The OSI model is better as compared to TCP/IP model as it have some different features or characteristics. Reliable technology for data transferring procedure is used by the OSI model where as the TCP/IP model is used for solving end-to-end issues. The OSI model have seven layers and all the layers have ability to detect errors but in the TCP/IP model only the control layer helps in detecting the errors (Pandya, 2013). The TCP/IP models engage in networking topologies but on the other hand, the OSI model is used for managing all the operations that are related with the network. The protocols of OSI model are very much secured as compared to the TCP/IP model. The OSI models are capable of providing number of options and therefore a large number of network additions are probable. The OSI models are largely used as reference points but it is not used in real life experience. The applications as well as presentations are handled by the application layer. They help in enabling the users that their data are largely secured by using proper model of encryption and authentication (Wan et al., 2015).The TCP/IP layers are largely used in order to identify the functions that are related with the OSI session layer. The framework or network design of OSI model is very much difficult as compared to TCP/IP model. Therefore, users can handle the model of TCP/IP without having any management related issues (Weil et al., 2012). The OSI model operates the protocol stack, which is very much inappropriate, but they can be innovative which is considered as a benefit. Manufacturers are innovating different network models for solving the problems that are related with the cost management. These are some of the reasons, which help in preferring TCP/IP model over the OSI model. 3: The formula for channel capacity is: C=B log2 (1+SNR) C=3.5*106*7.066 C=24.73Mbps. Therefore, the bit-rate is 24.73 Mbps. Signal level C = 2* Bw *log2 L log2 L=C/(2*BW) log2 L=24/ (2*3.5)=3.4285 L=10.767 4: Features Ipv6 Ipv4 Addresses The addresses of the Ipv6 are 16 byte long and out of which 64 bits are allocated for the network. Based on the subnet prefix, the Ipv6 process a very complex architecture and therefore address mask is not used in Ipv6 (Winter Thubert, 2012). This is a 32-byte long and therefore different addresses classes such as A, B, C, D, E are present in Ipv4. The addresses are held by the network classes. The allocations for the network do not maintain the theories that are related with Equity. Address mask are required for allocating different types of network. In order to find out the addresses from various source addresses (Wu et al., 2013). Trace of Communication It is used for gathering information about the datagram of TCP/IP. Similar type of instrument is required in Ipv6. Configuration Use of auto configuration interference is very much required in Ipv6 (Zhang Papachristodoulou, 2013). The IP addresses and routers are essential in order to assign so that the clients can converse efficiently. DNS Socket API supports Ipv4 but some of the functions, which are present there, help in choosing the addresses from the DNS (Bernardos, 2016). Accepting the host is considered as the most important step but the DNS are utilized for collecting an IP address. The functions that are required includes: gethostbyname(), gethostbyadder(). File Transfer Protocol Ipv6 is not supported by the i5/OS. The protocols are used in order to transfer the files from one destination to another. Fragmentation With the help of the host source, the fragmentation is created in the case of Ipv6. The datagrams size is large and therefore the whole information is fragmented or divided by the sender (Czyz et al. 2015). Packet Filtering Packet filtering is impossible in Ipv6 (Haddad, 2013). By utilizing the various functions of the firewall, packet filtering is useful in Ipv4. Ports The working functions of different ports are very much similar. Various types of ports spaces are used in TCP and UDP. The ranges of both the ports are from 1 to 65535 (Koshy et al., 2014). Ipv4 Addresses ranges and relative sizes: Range of the addresses Name of the classes 192.168.255.255 A (20 bits) 172.16.0.0-172.31.255.255 B (16 bits) 10.0.0.-10.255.255.255 C (20 bits) Ipv6 address ranges and relative sizes: /128 Addresses of Ipv6 Interface of the network /64 Ipv6 subnet masking Ipv6 address is 18,445,773.074 /56 256 LAN segments Prefix /48 LAN segment 65,536 Prefix /32 LAN subscriber 65,536 Minimum /24 16,7777,216 site It is much larger than the allocation of the normal Ipv6. In mutual or public system, similar IP addresses are owed for various locality, which never create conflict as the IPA of the hosts are strictly protected and therefore it cannot be simply reclaimed by any of the connected host (Osman, 2015).Therefore, for various devices the host IP addresses are different which based on the IP. 5: According to RFC1939, various stages of POP3 are drawn below: Figure 1: Various stages of POP3 (Source: Created by Author) 6: Distributed hash tables are distributive in nature and thus its functionality matches with the Hash Table. Large number of participants can add as well as fetch data from the information table as large numerous nodes are associated with it (Winter Thubert, 2012).For developing the hash table, DHT algorithm is used in case of distributive application. DHT algorithms are used in peer networking and it can be operated without controlling or maintaining the network efficiently. The network can be used efficiently due to huge traffic of nodes (Pandya, 2013). Dynamic change may occur in the system very frequently as the load is very much balanced. It can be useful in searching a single data from the huge amount of data set. In case of data storage, huge amount of responsibility is on the P2P network. In order to analyze DHT algorithm in peer networking, certain factors needs to be considered. Some of the DHT uses UDP protocols for various types of functions. Hast Tables helps in fetching data whereas the peer IP addresses helps in storing stored by using the BitTorrent procedure.(Osman, 2015). If a user wants to know about the data storage then a request will be send to the source as information. After then a loop is generated in order to search the data from the hash tables. Once a user has utilized the DHT algorithm then they are able to collect data by using the procedure of data fetching. References Bernardos, C. J. (2016).Proxy mobile IPv6 extensions to support flow mobility(No. RFC 7864). Czyz, J., Allman, M., Zhang, J., Iekel-Johnson, S., Osterweil, E., Bailey, M. (2015). Measuring ipv6 adoption.ACM SIGCOMM Computer Communication Review,44(4), 87-98. Haddad, W. (2013).U.S. Patent No. 8,504,722. Washington, DC: U.S. Patent and Trademark Office. Koshy, P., Koshy, D., McDaniel, P. (2014, March). An analysis of anonymity in bitcoin using p2p network traffic. InInternational Conference on Financial Cryptography and Data Security(pp. 469-485). Springer Berlin Heidelberg. Lee, S. R., Back, J. S., Oh, J. S., Jeong, M. A. (2015, July). A mesh topology formation scheme for IEEE 802.15. 4 based wireless sensor networks. In2015 Seventh International Conference on Ubiquitous and Future Networks(pp. 150-152). IEEE. Osman, Z. A. (2015).Real time monitoring for tank level based on isa 100.11 a using star topology(Doctoral dissertation, Universiti Tun Hussein Onn Malaysia). Pandya, K. (2013). Network Structure or Topology.International Journal of Advance Research in Computer Science and Management Studies,1(2). Wan, Y. L., Duan, D. G., Han, Z. M. (2015, January). Allocating channel automatically of IEEE 1394 based on normalized topology. InControl Engineering and Information Systems: Proceedings of the 2014 International Conference on Control Engineering and Information Systems (ICCEIS 2014, Yueyang, Hunan, China, 20-22 June 2014).(p. 465). CRC Press. Weil, J., Kuarsingh, V., Donley, C., Liljenstolpe, C., Azinger, M. (2012).IANA-reserved IPv4 prefix for shared address space(No. RFC 6598). Winter, T., Thubert, P. (2012).The ROLL Team: RPL. IPv6 Routing Protocol for Low power and Lossy Networks. Internet Draft draft-ietf-roll-rpl-06 (work in progress). Wu, P., Cui, Y., Wu, J., Liu, J., Metz, C. (2013). Transition from IPv4 to IPv6: A state-of-the-art survey.IEEE Communications Surveys Tutorials,15(3), 1407-1424. Zhang, X., Papachristodoulou, A. (2013, June). A real-time control framework for smart power networks with star topology. In2013 American Control Conference(pp. 5062-5067). IEEE.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.