Define briefly the advantage of using ipv-six over ipv-four

Assignment Help Computer Networking
Reference no: EM131528962

Assignment

Part1

Question 1

Suppose you are given a new computer and asked to do the following tasks. Briefly explain in your own words how you can accomplish the following tasks:

(a) Install Windows 7, 64 bit Enterprise Edition in the new system.

(b) Minimum requirements you need to create virtual machine. Which software you are going to use to create virtual machine and explain why you have chosen that software?

(c) Write down the command to assign static IP to the virtual machines and to check the assigned IP address of the machine.

Question 2

(a) How the compatibility issues of IPv4 to IPv6 is resolved. Explain any one of the process involved in conversion of IPv4 to IPv6.

(b) What is "guid"? Which type of base or number system is used to represent "guid"? What is the purpose of using "Bitlocker Drive Encryption?"

Question 3

(a) What is the use of Windows Easy Transfer and define any one of the methods which you can use to perform data migration using Windows Easy Transfer.

(b) Explain in detail any one of the scheduling technique that can be used for process scheduling.

Question 4

(a) Explain in detail how subnet mask is used to identify the network ID in a complete IPv4 address.

(B) Define the following components:

• Switch and Router
• NAT

Question 5

(a) Define briefly how the OS manage process from inactive state to final state. What is the difference between process "deadlock" and "starvation"?

(b) Explain with example how you can prevent deadlock and starvation of multiple processes.

Question 6

(a) What to the difference between unicast and multicast IPv6 address types?

(b) Define briefly the advantage of using IPv6 over IPv4.

Question 7

(a) What type of rules can you configure to allow or block applications? What is the difference between the Windows Installer Rules and the Publisher Rules in AppLocker?

(b) Define the process you need to follow when configuring a client far Direct Access. Define the most secure VPN protocol supported by Windows 7.

Question 8

(a) Explain briefly the importance of:

• DNS
• DHCP

(b) Explain how EUI and Boot Time Filtering are effective in providing security to the computer. Mention two important criteria which can be used to restrict network access using NAP.

Part 2

Question 1

You work m a network administrator for a company with 100 employees. Your company need all the employees should have a separate computer and connected to the network.

(a) What is the smallest size address block that can support the all the 100 computers servers and routers in your perimeter network? (Express the network size in slash notation and dotted-decimal notation.)

(b) You have decided to deploy three new servers in the perimeter network and assign them each a public 11) address. If your provider sells addresses in blocks only, what size block sho20 you request to enable you to host all of your public servers on a single sublet?

(c) Are the IPv4 address 192.158.1.14 and 192.158.1.127 on the same subnet? Both have a subnet mask of 255.255.255.0

Question 2

(a) Generate IPv6 Extended Unique Identifier (EUI) Interface ID using the MAC address: D6-BB-FF-14-25-3C

(b) Write down the simplified version of the following INS address. 21cd:0053:0000:0000:03ad:003F:af37:8d62

Question 3

You work in m international IT company which is named ABC. As a network administrator you are asked M build a network of 48 computers with 4 equal subnets. You are allowed to use Private IP.

(a) Write down the four sublet addresses with slash notation and define the host rouge for each sublet.

 

ADDRESS

FIRST HOST IP

LAST HOST IP

SUBNET A

 

 

 

SUBNET B

 

 

 

SUBNET C

 

 

 

SUBNET D

 

 

 

(b) In Subnet A you need to deploy a printer. Write down the IPv4 address and the sublet mask that you win assign to the printer.

IPv4 address:
Subset Mask:

(c) Define briefly the process that you will follow in connecting computers in sublet A to the sublet B. You should specify any address that you will use for making connections between Subset A and Sublet B computers.

Reference no: EM131528962

Questions Cloud

What is a relational diagram : What is connectivity? (Use a Crow's Foot ERD to illustrate connectivity.)
Analysis of harley-davidson to date and its merger : Based on your analysis of Harley-Davidson to date, Find ways to achieve economies of scope by leveraging assets and capabilities across business units
Recommend a strategy that you might use to mitigate : Recommend a strategy that you might use to mitigate these types of concerns during the initial implementation of the AD RMS.
What is an erdm : What is a relationship, and what three types of relationships exist?
Define briefly the advantage of using ipv-six over ipv-four : What to the difference between unicast and multicast IPv6 address types? Define briefly the advantage of using IPv6 over IPv4.
Discuss the entity relationship model : Consider the scenario described by the statement "A customer can make many payments, but each payment is made by only one customer."
What are the main points and arguments of the author : Your task is to offer a detailed critique of a peer-reviewed article, What are the main points and arguments of the author(s)
Investments to achieve positive operating ratio : What must be the minimum yield on investments to achieve a positive operating ratio?
Describing the history of physical security : Create a 6- to 8-slide presentation of a timeline describing the history of physical security starting with English Common Law

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd