Case studythe ip version we are all using nowadays in our

Assignment Help Computer Networking
Reference no: EM13349390

CASE STUDY

The IP Version we are all using nowadays, in our corporate networks and in the Internet, is IP Version 4, short IPv4. It has been expanded in the early seventies by a number of pioneers who wanted to unite some educational and government networks in the United States. At the time when they started development, a network like our Internet nowadays was beyond imagination and consequently to meet such a condition wasn't part of their design goals. All the more fascinating it is, that they managed to create a networking protocol, which is still - 30 years later - competent of running today's Internet! But now it has reached it's age and can't be pushed any further. Instance for the next generation to take over!
When the Internet was switched overnight to use TCP/IP instead of the formerly used NCP in 1983, IPv4 was not precisely the protocol we know today. It was, in the core. But many of the additional rooms and additions that we use today have been developed much later. The essentials of IPv4 were defined in RFC (Request for Comment) 791 in 1981. Path MTU Discovery was defined in RFC 1191 in 1990, Super netting, which was designed to help ease the issue with loaded routing tables, was defined in RFC 1338 in 1992, DHCP, which was designed to help manage the addresses in a larger IP network, was classified in RFC 1531 in 1993 and Private Addresses which we use to build our NATs (Network Address Translation) today were labelled in RFC 1597 in 1994.
The motive I am mentioning this, is not to bore you with numbers of papers that you never want to read. What I would like to point out is that when IPv4 was first introduced, it was not the mature protocol we know today. Many of the extensions to IPv4 that help us manage and uphold our IPv4 networks were introduced later, when the requirement arose. Based on the need, the extensions were defined in the international working clusters and defined as RFCs.
So when individuals argue these days, that IPv6 is not mature and cannot do what IPv4 can, this is only partially true and above all, not a reason to not use IPv6. Development for IPv6 started in 1991. The core of IPv6 was standardized in 1995 and updated in RFC 2460 in 1998. Pedestal on that standard we have many implementations around since many years. Most hardware and router vendors have implementations since the late nineties and have tested them intensely. 6to4, a main transition mechanism, that makes co-existence and migration much easier, has been homogenized in 2001. DHCP Version 6 has been harmonized in summer 2003. Mobile IPv6, which is going to be one of the technologies that make you choose IPv6 over IPv4, is in the process of being standardized in early 2004. The same is true for ISATAP, another instance for a transition mechanism.
IPv6 has been expanded based on the rich experience we have with IPv4. IPv6 is an evolution of IPv4, it is mature in the core, it has been implemented and tested powerfully up to the network layer. The developers created a protocol, which takes the whole thing that was great about IPv4 and added flexibility to extend it, to make it the network protocol of the future. IPv6 is competent of handling the Internet growth rate and to hold up the new types of services, especially in the area of mobility that we have to wait for in the coming years.
There are obsessions that we are missing in IPv6 today that is true. But you do not need to switch today and all these additions will be defined in the coming years, just as it occurred with IPv4. But you ought to become aware of how IPv6 will impact your business and your network. If you plan early, you will save money and headaches. You will be ready when it is time for you and more importantly, you will be capable to determine the right instant for not extending your IPv4 infrastructure anymore, but putting your investments into the future technology.
Source : www.sunny.ch Author : Silvia Hagen Company: Sunny Connection AG, Staubergasse 9, 8124 Maur / Switzerland

QUESTION 1

a) A lot of practical problems have arise with the implementation of applications in IPV4 protocol. hardly any of them are:

i. Deploying Voice over IP

ii. Remote Management of Applications and Servers

iii. VPN between Same Address Space

iv. Address Plans and Secondary Addresses

Put in plain words the above with the necessary diagram where applicable

b) "All the more fascinating it is, that they managed to create a networking protocol, which is still - 30 years later - capable of running today's Internet! But now it has reached it's age and can't be pushed any further. Time for the next age band to take over!".

What are the two main motives for the above statement?

c) 10.1.0.3 is my IPV4 ip address.

i. Can you fit in this lecture to in an IPV6 address format?

ii. How will it appear like after embedding the above V4 address?

iii. What is the utmost bits a group of four decimal values hold in an IPV6 address? You are required to show your computation

QUESTION 2

a) i. You are employed as a safety network analyst in SAI Ltd. In SAI Ltd many of the network assets are not secured at all. After an audit in the company you noticed that the subsequent were in secure:
- Internet connections
- Public servers and e-commerce servers
- Remote access networks and VPNs
- Securing User Services
How would you secure the above?

ii. "Can you please correct the figure below, if you believe there is an error in the safekeeping design", instructed the network manager of SAI LTD.

2023_DMZ.png
QUESTION 3

According to the layered-safekeeping approach there are safekeeping measures and modus operandi at five different levels within your IT environment.

I. Name the five dissimilar levels

II. Describe the primary three levels in detail.

QUESTION 4

HANGZHOU, April 19 (Xinhua) -- Chinese e-commerce giant Alibaba Group proclaimed Monday that one of its websites was hacked on Friday and Saturday and the police force were investigating.
Servers of Alibaba's foreign wholesale market, Aliexpress, in Hangzhou, east China's Zhejiang Province, and in the United States were hacked constantly on April 16 and 17, said Wu Hao, head of public relations at Alibaba Group.
The website, still in the checking phase, hosted the sale of Chinese goods in bulk to American buyers, said Wu.
"Our clients' information was not revealed or stolen. But some users could not access our website at some point," said Wu.
The company did not say where the attacks originated, but Wu told Xinhua that they considered the hackers might come from overseas trade protectionist groups or Alibaba's rivals.
Wu said Aliexpress, which had been in the test period since Aug. 6, 2009, would officially begin operations, although no timetable had been set.
A orator for the Municipal Public Safekeeping Bureau of Hangzhou, where Alibaba is based, said police would examine the incident.

Alibaba Group is an online business company, engaging in business-to-business global trade and retail sales. It was founded in 1999.
(Source: https://news.xinhuanet.com/english2010/sci/2010-04/19/c_13258636.htm)

a) From the above it is understandable to say that web applications do suffer loads of attacks. This can lead the association to suffer loss and more importantly clients can sue the company if their personal has been hacked.
The OWASP (Open Web Application Safekeeping Project) has published 10 risks that web applications are experiencing.

i. You are needed to name the top 10 risk to avoid hacking of your web application

ii. Elucidate in detail all the steps listed in OWASP as to how to avoid the first three attacks to happen.

b) Defense-in-depth is a dramatic departure from the transparent data corridor of the LAN. By pushing safekeeping into the network itself, the LAN changes from a public-access highway to a high safekeeping network of roads, serving gated communities.

Give the key attributes of secure networking when considering and implementing safekeeping into the LAN.

c) Defence-in-depth is not a product, like a outer limits of a firewall. In its place, it is a safekeeping architecture that calls for the network to be aware and self-protective. In studying the problem of adding defence-in-depth, there are keys strategies that safekeeping architects can use to change significantly the safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs).

Name them in their particular order.

Reference no: EM13349390

Questions Cloud

Partquestion 1a explain the non-monetary costs that : partquestion 1a explain the non-monetary costs that tourists may experience when purchasing a serviceproductb elaborate
Question 1a what is cyber terrorism amp information warfare : question 1a what is cyber terrorism amp information warfare in relation to?b what can be made on the subject of cyber
Case studysource wwwsunnych author silvia hagen company : case studysource www.sunny.ch author silvia hagen company sunny connection ag staubergasse 9 8124 maur switzerland
Part aquestion 1 service quality focuses on satisfying : part aquestion 1 service quality focuses on satisfying customers needs in the moments of truth during service
Case studythe ip version we are all using nowadays in our : case studythe ip version we are all using nowadays in our corporate networks and in the internet is ip version 4 short
Question 1marriott isla verde beach resort located on : question 1marriott isla verde beach resort located on beautiful isla verde beach proud recipient of the blue flag beach
Part bquestion 1case study holiday innholiday inn claims to : part bquestion 1case study holiday innholiday inn claims to be the worlds most global hotel company and has created
Question 1a company needs to consider its marketing mix in : question 1a company needs to consider its marketing mix in order to meet its customers needs effectively. explain the
Question 1a describe the term digital evidenceb when : question 1a describe the term digital evidence.b when thinking about the many sources of digital evidence it is often

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd