Define briefly the advantage of using ipv-six over ipv-four

Assignment Help Computer Networking
Reference no: EM131528962

Assignment

Part1

Question 1

Suppose you are given a new computer and asked to do the following tasks. Briefly explain in your own words how you can accomplish the following tasks:

(a) Install Windows 7, 64 bit Enterprise Edition in the new system.

(b) Minimum requirements you need to create virtual machine. Which software you are going to use to create virtual machine and explain why you have chosen that software?

(c) Write down the command to assign static IP to the virtual machines and to check the assigned IP address of the machine.

Question 2

(a) How the compatibility issues of IPv4 to IPv6 is resolved. Explain any one of the process involved in conversion of IPv4 to IPv6.

(b) What is "guid"? Which type of base or number system is used to represent "guid"? What is the purpose of using "Bitlocker Drive Encryption?"

Question 3

(a) What is the use of Windows Easy Transfer and define any one of the methods which you can use to perform data migration using Windows Easy Transfer.

(b) Explain in detail any one of the scheduling technique that can be used for process scheduling.

Question 4

(a) Explain in detail how subnet mask is used to identify the network ID in a complete IPv4 address.

(B) Define the following components:

• Switch and Router
• NAT

Question 5

(a) Define briefly how the OS manage process from inactive state to final state. What is the difference between process "deadlock" and "starvation"?

(b) Explain with example how you can prevent deadlock and starvation of multiple processes.

Question 6

(a) What to the difference between unicast and multicast IPv6 address types?

(b) Define briefly the advantage of using IPv6 over IPv4.

Question 7

(a) What type of rules can you configure to allow or block applications? What is the difference between the Windows Installer Rules and the Publisher Rules in AppLocker?

(b) Define the process you need to follow when configuring a client far Direct Access. Define the most secure VPN protocol supported by Windows 7.

Question 8

(a) Explain briefly the importance of:

• DNS
• DHCP

(b) Explain how EUI and Boot Time Filtering are effective in providing security to the computer. Mention two important criteria which can be used to restrict network access using NAP.

Part 2

Question 1

You work m a network administrator for a company with 100 employees. Your company need all the employees should have a separate computer and connected to the network.

(a) What is the smallest size address block that can support the all the 100 computers servers and routers in your perimeter network? (Express the network size in slash notation and dotted-decimal notation.)

(b) You have decided to deploy three new servers in the perimeter network and assign them each a public 11) address. If your provider sells addresses in blocks only, what size block sho20 you request to enable you to host all of your public servers on a single sublet?

(c) Are the IPv4 address 192.158.1.14 and 192.158.1.127 on the same subnet? Both have a subnet mask of 255.255.255.0

Question 2

(a) Generate IPv6 Extended Unique Identifier (EUI) Interface ID using the MAC address: D6-BB-FF-14-25-3C

(b) Write down the simplified version of the following INS address. 21cd:0053:0000:0000:03ad:003F:af37:8d62

Question 3

You work in m international IT company which is named ABC. As a network administrator you are asked M build a network of 48 computers with 4 equal subnets. You are allowed to use Private IP.

(a) Write down the four sublet addresses with slash notation and define the host rouge for each sublet.

 

ADDRESS

FIRST HOST IP

LAST HOST IP

SUBNET A

 

 

 

SUBNET B

 

 

 

SUBNET C

 

 

 

SUBNET D

 

 

 

(b) In Subnet A you need to deploy a printer. Write down the IPv4 address and the sublet mask that you win assign to the printer.

IPv4 address:
Subset Mask:

(c) Define briefly the process that you will follow in connecting computers in sublet A to the sublet B. You should specify any address that you will use for making connections between Subset A and Sublet B computers.

Reference no: EM131528962

Questions Cloud

What is a relational diagram : What is connectivity? (Use a Crow's Foot ERD to illustrate connectivity.)
Analysis of harley-davidson to date and its merger : Based on your analysis of Harley-Davidson to date, Find ways to achieve economies of scope by leveraging assets and capabilities across business units
Recommend a strategy that you might use to mitigate : Recommend a strategy that you might use to mitigate these types of concerns during the initial implementation of the AD RMS.
What is an erdm : What is a relationship, and what three types of relationships exist?
Define briefly the advantage of using ipv-six over ipv-four : What to the difference between unicast and multicast IPv6 address types? Define briefly the advantage of using IPv6 over IPv4.
Discuss the entity relationship model : Consider the scenario described by the statement "A customer can make many payments, but each payment is made by only one customer."
What are the main points and arguments of the author : Your task is to offer a detailed critique of a peer-reviewed article, What are the main points and arguments of the author(s)
Investments to achieve positive operating ratio : What must be the minimum yield on investments to achieve a positive operating ratio?
Describing the history of physical security : Create a 6- to 8-slide presentation of a timeline describing the history of physical security starting with English Common Law

Reviews

Write a Review

Computer Networking Questions & Answers

  What is the purpose of an arp reply

What is the purpose of an ARP request? What important networking-troubleshooting tool is part of ICMP, and how does it test a network connection?

  Describe mckinnon in the context of the frameworks

Describe McKinnon in the context of the frameworks and theories of cyber-crime and cyber criminals discussed in the classroom

  Read and prints highest valued legal scrabble word

You are to write a program that will read a file of scrambled 7-letter strings, and then prints out the highest valued legal Scrabble word(s). Before reading the file, your program will store a list of words read from the file words.txt.

  Evaluate two siem and two network management solutions

Research and evaluate two SIEM and two Network Management Solutions. Students are to research and evaluate two SIEM and two Network management solutions.

  Explain graphic files were transmitted by a e-mail

Several graphic files were transmitted by a e-mail from the unknown source to suspect in the ongoing investigation. Lead investigator provides you these graphics files and tells you that at least four messages must  be embedded in them.

  Determine whether you would use static or dynamic routing

Determine whether you would use static or dynamic routing to connect the routers. Justify your response with the key benefits that your choice provides.

  What are the advantages of networked computers

What are the disadvantages and the characteristics between the internet and a group of networked computers.

  Search for policy examples on the internet

Outsourcing generally, and offshore outsourcing in particular, continues to be a key part of many companies' supply and cost management strategy. The strategy has proven to be effective but brings with it significant risks that must be recognized ..

  Create users in linux with the new users command

Creating Users in Linux with the new users Command Time Required: 30 minutes Objective: Create users in Linux with the new users command.

  Threat, risk and vulnerability

Threat, Risk and Vulnerability are related to Cybersecurity. Describe these three terms and provide a business case example.

  Describe difference between serial and parallel transmission

Transmission Modes, Describe the difference between serial and parallel transmission. What is the chief characteristic of asynchronous transmission

  What do you meant by the network access layer vs the

q1. ipv6 vs. ipv4. what key new features came with the introduction of ipv6 compared to what we had with ipv4? how can

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd