StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Advanced Routing in the Computer Networking Environment - Assignment Example

Cite this document
Summary
In this network task paper "Advanced Routing in the Computer Networking Environment",  several factors will be considered where two different protocols exist in two different network segments and especially when there is an interest to upgrade the network system from the current IPv4 to IPv6. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful

Extract of sample "Advanced Routing in the Computer Networking Environment"

Advanced Routing Subject Professor Date Advanced routing Abstract In this network task assignment, several factors will be considered where two different protocols exist in two different network segments and especially when there is an interest to upgrade the network system from the current IPv4 to IPv6. Just like most of the other systems some of these factors include the availability of the new system, the mode of addressing to be used types of connectivity, routing strategy, quality of service, scalability and performance, reliability, accessibility, security, fault tolerance and some other minor factor making up the bigger network. Introduction In the computer networking environment, there is a transition from the older IPv4 to the latest IPv6 versions. For it to be deployed, the current arrangement is mostly preferred to be left just as it is together with its protocols and hence a new protocol, which is compatible with the existing system, is therefore installed into the system. Since it is preferred to maintain the structure of the existing system, with the Dual Stack Model is used to serve in the implementation of the network structure. The Dual Stack involves the configuration of specific sections of the network. These include the VLAN, routing or HA in the network topology. Since most of these configurations such as the VLANs and the physical inter still are configured in the IPv4 version, therefore, the VLAN configurations are also the same. Therefore, this type of configuration happen normally in the same layers of the two networks combined. Network Routing This is the network topology of the two networks when joined and already upgraded to IPv6. The routing strategies for his model embraced is the EIGRP for the cause of IPv4 as it is the case with the OSPFv3. This OSPFv2 is o protocol that helps in authentication privileges. When dealing with the routing Access configurations, the implementation of the two networks to be merged is first assessed for compatibility with the model. This routed access design has an access layer that performs routing where the former design is one of its layers- the access layer being a component of layer 2 and that the premier layer 3 component is found in the distribution layer. This is attractively designed according to the network designer because of its failover performance which has been improved. However, taking to account the fact that the spanning tree is not much needed, accounting for its popularity is necessary. This extension of the DSM to be routed access design was an easy task. The move to select the DSN model in the transition of the network from IPv4 to IPv6 is as a result of careful consideration that was made by having security, optimal performance, and high availability at the top priority in the network design. The primary advantage of this routing model is that it does not need any tunneling within its borders. This method has got two protocols running which are called ‘ships-in-the-night’ which means, IPv4 and IPv6 work alongside one another. Except that these two protocols share the same data point, there is no other dependency on one another as protocols. These two network versions; IPv4 and IPv6 have independent routing strategies. They exhibit a high level of availability and QoS, also together with security and multicast policies. Being an EIGRP, this is the property that enables it to work comfortably with the other protocols. As the clock tickles, the technology in our times is also expanding. This is in reference to the way activities have been done. Better and better way is discovered, and life is made easier day after another. The IPv4 is a model that has stayed for quite some time since the discovery of the internet. Due to the ever growing population of the human race and the subsequent increase in demand connectivity thus the link to the internet, this model has been found wanting. Its place is replaced by a more vibrant model known as the IPv6. In short, the prime reason that led to the replacement was that the addresses had run out in the IPv4. Due to this, the IPv6 came in place with extra functionality and capabilities. The advantages that the new system had over, the older systems were quite a number. They include the assigning of the IP addresses done automatic and dynamically by the client side. Initially, in the earlier system, the trend has been that there was a DHCP server which was assigned the duty of assigning domain names. This implies that one can plug a device, say a laptop in one of the local networks and any router will give it an address pre-fix. Basing on the hardware, the process of finding a router and generation of IP carries on by itself. With time, this can only mean that routers are going to be simpler in terms of overhead meant to manage the IP attribution and their overheads are going to be less as compared to the current ones. Also, it means that even when the configuration requirements are less, the assigning of DHCPv6 addresses is still possible. Another factor was the ability of this model to carry a number of addresses of the network which are assigned to the same device. This means that it has the ability to connect to a number of networks at a go. This is one of the points that show the flexibility of the model. When an application is launched from the client side, it chooses the network with which access is permitted. This in essence means that no one has to select the network anymore as it happens automatically. IPv6 is also a protocol that has greatly invested in the security of the data to be handled. This is made possible because of the encryption that every data it handled is encrypted before it is sent. For the receiver to read the data, decryption has to be done first so that it is possible to understand the original message that was sent. Doing a comparison on the technical sides, the IPv6 has a way of doing away with the process of verifying the checksum. This is because of the way it is structured in how it carries out the process of verification. After the setting up of the network is done, the other task remaining is to make sure the network is operating. This involves determining the interoperability of the network together with the other devices found in the network. This is called the determination of the interoperability failure. As of now, most of the internet servers lack a good communication with their clients simply because data transfer in a public IPv6 is not possible. Till the time the changes in the network are addressed, the client will suffer loss of connections with their service providers. There is a need to test every server by ensuring that it can communicate with the clients before the clients are allowed to inhabit a recently upgraded network system in an organization. The cost for a public address is apparently low as compared to the cost of their counterparts IPv4 addresses. Though at the moment the IPv6 is practically useless, this is estimated not to last for long before the world embraces the whole idea behind the IPv6 structure. Therefore, the whole crew in the company must be taught to appreciate the goodness package that comes with the IPv6 protocol. In configuring the computers to talk to the addresses found in IPv6, this involves teaching every server found in the internet to start communicating with outer clients. One of the teaching processes, the public address IPv4 address is reflected in the IP packet. These are the packets that have been sent through the network. Among others, they include the TCP and UDP packets. Therefore, an extension of the format of IP packet is made to allow the 16-yte address, also, the operating system is exchange too. When the public address appears in the configuration files of “my own address” found in the operating systems. In addition, this is found in the corresponding parts in the inner sides of the memory. In this scenario, we have to extend the formats of memory and file. This helps in allowing a 16-byte address. Also, to have a successful interrelation, the operating system of the network also has to be changed. In the routing configuration files, we get the public IPv4 addresses, in the other corresponding parts in the operating systems; public IPv4 addresses too were found to exist. These are further extended; both the memory and the file format so that they can take in 16-byte addresses. Also, we have to change the operating system so that a compatible one is installed. The address records in the servers also have the public IPv4 addresses; these recorded appear I DNS packets or even in DNS software files. Here, the extension of the address-record format that is found in the DNS configuration files. The challenge for the entire DNS software is initialized accordingly. The public IPv4 addresses that are found inside the memories of the client’s application have a function in the operating systems. Therefore, an extension of the memory formats so that a 16-byte address can be allowed. Also, the client and the operating system are changed just as it is fit for the network. Conclusion The public IPv4 addresses belonging to the client are seen through the “authorized client” configuration file that is found in the servers. These are found in the memory locations that are situated in the server programs, and the “who is linked” functions. Her, we extend only the file together with the memory formats hence an allowance hat can pass the 16-byte address is formed. The server and the operating systems are also change in accordance with the 14 compatibility requirement. Hence, once these software adjustments have been made practically on the computers, the magic moment is at last here with us. The IPv6 addresses now become reliable. The IP addresses of the IPv6 are now considered to be a replacement of the public IPv4 addresses. Reference Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Advanced Routing Assignment Example | Topics and Well Written Essays - 1500 words, n.d.)
Advanced Routing Assignment Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/logic-programming/2049877-advanced-network-routing
(Advanced Routing Assignment Example | Topics and Well Written Essays - 1500 Words)
Advanced Routing Assignment Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/logic-programming/2049877-advanced-network-routing.
“Advanced Routing Assignment Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/logic-programming/2049877-advanced-network-routing.
  • Cited: 0 times

CHECK THESE SAMPLES OF Advanced Routing in the Computer Networking Environment

Role of IT in today's business

As a result, they can focus on their resources on providing worth to the business and quick reaction to today's environment of swiftly varying business conditions (TechNet; Turban, Leidner and McLean).... Seeing that a lot of companies at the present significantly rely on computer machines and software that are valuable for them to provide precise information for their business, to mange them properly....
5 Pages (1250 words) Term Paper

System Issues

Full Paper Title Name University Dynamic Host Configuration Protocol In a competitive era of information technology, current trends associated with computer networking require implementation and management of advanced hardware and software.... However, organization has two options to consider for assigning IP addresses in a corporate wired LAN environment i.... However, port forwarding enables the option of accessing a private IP address via a global IP address, consequently making network environment more complex and time consuming....
3 Pages (750 words) Research Paper

Wingtip Toys

For any network administrator, SWOT analysis of a new hardware or software acts as the focal point to determining the capability of the new feature to meet the expected network security standards in an organization and as per the globally accepted characteristic of a safe networking environment (Dulaney, 2011).... In essence the ever changing computer networking configurations have been leading to several other advancements in the field of Information Technology (Stanek, 2010)....
9 Pages (2250 words) Assignment

LAN for Small Businesses

The business office will have a neater environment because there is no need for the many cables that are required for wired cables.... If they implement a LAN, John and his wife can be able to share software and printers.... Jane will not have to depend on the printer in her office in her office....
4 Pages (1000 words) Coursework

Networking: The Maximum Un-Simplified Cable Lengths Multi-Mode Fiber

As a result, your personal computer can work out for itself that the packet is not intended for the local network.... As a substitute, your computer will employ the of the default gateway of the MAC address.... Essentially, the length is restricted by the fact that the shortest conceivable frame size (64 bytes) can be directed out on the wire and if a collision happens, the sending node will still be transferring that frame when it detects the collision because of a jam signal or advanced than ordinary amplitude....
6 Pages (1500 words) Term Paper

How to Get a Job in Information Technology

IT jobs are basically task-oriented jobs in which more focus on a person is on the completion of assigned tasks within time than on the job environment.... In such an environment, people may distract their attention from some essential professional work skills, such as professional communication skills, time management skills, dressing attitudes, and teamwork skills....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us