Sunday, June 16, 2019
Network Infrastructure and Design Term Paper Example | Topics and Well Written Essays - 4500 words
Network Infrastructure and Design - Term Paper ExampleThus, the choice has been made for the purpose of eliminating future challenges during the upgrading (Kurose & Ross, 2005). Devices in the profit arrangement leave alone be assigned unique numbers so that they can communicate with the rest of the devices with effectiveness. Devices in the arrangement include mobile gadgets as well as computers. Since this organization is expected to see new devices all the time, the implementation of IPv4 was found to be inappropriate since IPv6 can only accommodate a limited number of devices. The IPv6 will be using addresses of 128-bits, and this will facilitate 2128 addresses, and this number is al put up exceeding the IPv4 with over 7.9*1028times. This is because the IPv4 utilizes a 32-address bit arrangement which, therefore, provides for bonnie 4,294,967,296 addresses all over the world (Kurose & Ross, 2008). There has been an accelerating deployment of IPv6 since its global launch took p lace in June 2012. As it has been aforementioned, its main advantage is the enlarged address space. Its addresses are indicated in eight groups that consist of 4-hexadecimal digits. The digits are separated via colons. Since not every network support the dual-stack, the idea behind tunneling will be applied in situations where IPv6 lead to communicate with IPv4. This is because of the fact that cable network operators go for tunneling until the foundational equipment is able to support the native dual-stack (Kurose & Ross, 2008). Since not every network has the capacity to support dual-stack, the idea tunneling will be employed if it will be necessary for the IPv4 to communicate with IPv6 and vice versa. The implementation will be accomplished with the realization that most of the current users of the lucre infrastructure lack the IPv6 support for dual-stack. This means that it cannot reach the sites using the IPv6 directly. Since the IPv4 infrastructure has to be used to carry th e IPv6 packets, tunneling technique must be employed. This technique capsulises the IPv6 packets in a manner that allows for their transformation via the IPv4 infrastructure. Using that infrastructure will, therefore, necessitate the use of IPv4 as it acts as the link layer that connects to IPv6 (Kurose & Ross, 2008). The IP protocol 41 that indicates that IPv4 packets encapsulate the IPv6 data grams, there will be the need to avoid using routers and other network transmission devices that could block the protocol 41. In situations where the IPv6 data grams have to pass through the inhibiting structures, there will be an implementation of the UDP packets for the purpose of encapsulating them. Other encapsulation strategies, such as Generic Routing Encapsulation and AYIYA will also be employed. The IPv4s compatibility with the IPv6 is usually a firmware or software issue. In that case, there could be a necessity to replace the older hardware/software since they whitethorn not be upg raded. Another reason for opting to implement the IPv6 is the suggestion by the American Registry for the Internet Numbers that every server be ready to serve those clients with IPv6. Dynamic Host Configuration Protocol Options The Dynamic Host Configuration Protocol as a network protocol will be utilized in configuring the network devices in a manner that enables them to communicate on the IP network. The Dynamic Host
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.