Tuesday, May 5, 2020

An Overview of the File Transfer Protocol

Questions: 1.The address depletion of IPv4 and other shortcomings of this protocol prompted a new version of IP known as IPv6. Explain the advantages of this new IPv6 when compared to IPv4? 2. Migrating from IPv4 to IPv6 is known as the transition from version 4 to version 6 and requires formal strategies to handle this transition. Explain each of the strategies for this migration process using appropriate examples? 3.Calculate the approximate bit rate and signal level(s) for a 4.2 MHz bandwidth system with a signal to noise ratio of 170?) 4.In a peer-to-peer (P2P) network, Internet users that are ready to share their resources become peers and form a network. Describe the differences between centralised and decentralised P2P networks? Discuss the advantages and disadvantages of both networks? 5.What is the total delay (latency) for a frame of size 5 million bits that is being sent on a link with 12 routers each having a queuing time of 4 s and a processing time of 2 s. The length of the link is 2600 km, the speed of light inside the link is 2.2 x 108m/s, the link has a bandwidth of 6 Mbps. Which component(s) of the total delay is/are dominant? Which one(s) is/are negligible? 6.Briefly explain the working of FTP with a flow diagram. How does it differ from SCP? What are the security considerations in FTP? Answers: 1. IPv6 gives efficient Routing then IPv4: IPv6 lower the measure of directing tables and get to makes routing more productive and various levelled. In IPv6 networks, discontinuity is taken care of by the source device, as opposed to the router, utilizing a protocol for revelation of the path's maximum transmission unit (MTU). IPv6 is Efficient than IPv4 Packet Processing The IPv6s packet headers much efficient in handling of package than IPv4.It does not contain any IP-level checksum as IPv4. So the checksum is not calculated at each hopping of the router. As most link layer contain checksum and error capabilities, the IP level in IPv6 get rid if it. Most transport layer also have checksum that start the error detection. The Data Flows rate of IPv6 is direct IPv6 supports multicast instead of communicate. Multicast grants data transfer capacity escalated parcel streams (like media streams) to be sent to various goal in the meantime, saving framework transmission transfer speed. The IPv6 header has another new field, named Flow Label, that can perceive parcels having a place with a comparative stream. IPv6 network config is simpler Address auto-design is characteristic to IPv6. A switch will send the prefix of the neighbourhood interface in its switch advertisements. A host can make its own particular IP address by tending to its connection layer (MAC) address, changed over into Extended Universal Identifier (EUI) 64-bit arrangement, to the 64 bits of the connection prefix. Security IPSec, gives privacy, verification and data integrity, that is prepared in IPv6. In view of their capability the convey of error, IPv4 ICMP bundles are frequently blocked by corporate firewalls, yet in ICMPv6, the usage of the ICM(Internet Control Message) Protocol for IPv6, may allow on the grounds that IPSec can be applied to the ICMPv6 packets. 2. There are mainly three strategies followed to migrate from IPV4 to IPV6.: Dual Stack Approach: As we realize that the data link layer closet room to Internet layer, on which IP protocol goes on. These link layers give access to the services to higher and lower layers. Along these lines, coordination between different layer are mandatory. Along these lines, migration should not influence the transport layer and upper higher layers. Along these lines, in this way one block is taken for IPV4 and another block is taken for IPV6. These block support coordination between each other after relocation. Transition of IPV6 and IPV4: IPV6 incorporates the support of interpretation of packet heads from IPV4 - IPV6. Those are completed by mapping IPV4 IP address to an exceptional subset of IPV6 IP address known as IPV4 translated address. These techniques evade the overheads that are given by double stack strategy. Tunnelling: On the reach of relocation of the data for IPV6 packets, destination address is encapsulated for the IPV4 packet. The network administrator takes different methods to tunnel, for example, arranged tunnelling, automatic tunnelling. In orchestrated tunnelling encapsulating packet consist of information for the recipient address of IPV6 bundles and in programmed burrowing the last goal address is managed by using an IPV4 good address of the IPV6 bundles. 3. To calculate the approximate bit rate and signal level: Given, Band width (B) = 4.2 MHz Sound to Noise ratio (SNR) = 170 Signal Level (C) = B log (1+SNR) 2 =4.2 * 10^6 log (1+170) =31.08 Mbps By Shannon Formulae, gives 31 Mbps For better performance, we choose 30 Mbps, then using Nyquist formulae, Bit Rate = 2*B*Log (C)2 =2*4.2*Log (30)2 =41.2 Mbps 4. Centralized P2P network, means hybrid network system. The Meta information about information and companions are secured on many "concentrated" server substances. These information sets may fuse parameters like the report availability, transfer speed, IP-addresses, inertia esteem, wt terrace. The data transmit is still dealt with in a decentralized strategy, direct from shared. In Decentralized shared p2p system, the data trade of these meta information must be administered without such especially described server framework. Like this manner, every communication handshaking is prepared in the peer that includes a data exchange for those meta data. By completing the handshaking process, every peer knows about its next peer. Centralized peer-to-peer network, way hybrid systems, and the Meta data of data/ information and the peers are placed on every centralized values of server. These information may issued parameters like the report accessibility, bandwidth, IP-addresses, inactiveness value, and so forth. In Decentralized peer-to-peer network, the statistics trade of those meta facts ought to be overseen without such very lots characterised server system. In like manner, every conversation handshake put together among the peer consists of a information alternate these meta data. by way of finishing the handshake system, every peer knows about its "neighbourhood". Advantages of centralized and decentralized peer to peer network are: Easy to set-up and keep up, Inexpensive and bring down cost, No additional speculation for server-software and hardware required. It will keep on operating regardless of the possibility that one of the workstation or resources are negative. Disadvantage of centralized and decentralized peer to peer network are: Security in the peer to peer is bad other than setting passwords for records that are not needed for individuals to get access to. If the links are not connected with the PCs then there can be issues getting to specific records for data. It does not run efficiently and effectively on number of PCs; it is best to utilized 2 to 8 number of PCs for peering. 5. We know, Latency = processing time + queue time + transmiting time + propagation time = 10 x 1 = 10 (s) = 10 x 10^-6 (s) Queuing time = 10 x 2 s = 20 s = 20 x 10^-6 (s) Transmiting time = 5,000,000 / 5 (Mbps) = 1 s Propagating time = 2000 (Km) / 2 x 108 (m/s) = 0.01 s Latency = 0.000010 + 0.000020 + 1 + 0.01 = 1.010030 s The ideal opportunity for transmission is predominant here as the parcel size is colossal, and preparing time and lining time are unimportant. 6. FTP is used in TCP for controlling and data connection. TCP mainly control connection for opening and closing of any on-going FTP session and for retrieving data from client to server. Each FTP uses many different data connection. Steps for FTP process: To open the control connection The Client opens a control connection with the server (TCP). This control connection is utilized for FTP commanding and FTP answering. The Data transfer then order the client to starts a file transfer. Then Data connection is used for exchanging another information connection is made for the exchange of those records. After the end of document transfer, the sender shuts down the information that TCP is associated with, when the record is totally transferred. At last when the transfer is complete, at the end of the FTP session, the control connection is closed, the control connection then shut down by the client. The differences of FTP to SCP are: SCP stands for Secure Copy Protocol whereas FTP stands for file transfer protocol. Both of this is used for file transferring but SCP is secure encrypted while FTP is plain text. SCP uses any port that is specified, whereas FTP mainly uses port 21 that help to sends the id/password in the format of plain text. SCP duplicate records to or from any associated remote servers utilizing a SSH channel. Other than SSH get to it runs a solitary duplicate charge FTP manages the records on a remote server, however it's security is to establish the security are not so strong, and thus permits access to the FTP root directory for login client account. The security considerations in FTP:- The following security risk must be undergoing while allowing FTP clients to access the system: Your object authority scheme would not give itemized enough security when the permit of FTP is followed on the framework. USE power to a document permits the client to download the record. CHANGE authority to a record permits the client to transfer the document. FTP checks the logon endeavours for every client profile the length of the QMAXSGNACN framework esteem is set to 2 or 3. This alternative debilitates the profile on the off chance that it achieves the greatest sign on number. Three is the default setting. In any case, the hacker utilizes this to mount a "denial of service" attack by means of FTP. A hacker can utilize FTP to impair client profiles on the system by over and again endeavouring to sign on with an incorrect password. This will happen until the client profile is incapacitated. Flow Chart example for a FTP transfer Reference: Definition of PEER. (2016). Merriam-webster.com. Retrieved 15 December 2016, from https://www.merriam-webster.com/dictionary/peer Gleason, M. (2001). An Overview of the File Transfer Protocol. Ncftp.com. Retrieved 15 December 2016, from https://www.ncftp.com/libncftp/doc/ftp_overview.html WhatIs.com. SearchEnterpriseWAN. Retrieved 15 December 2016, from https://searchenterprisewan.techtarget.com/definition/Network-Address-Translation Rouse, M. Burke, J. (2015). What is Network Address Translation (NAT)? - Definition from Transition From IPv4 to IPv6. (2016). www.tutorialspoint.com. Retrieved 15 December 2016, from https://www.tutorialspoint.com/ipv6/ipv6_ipv4_to_ipv6.htm Villanueva, J. (2015). SCP vs SFTP - 5 Key Comparisons. Jscape.com. Retrieved 15 December 2016, from https://www.jscape.com/blog/scp-vs-sftp Hagen, S. (2014). IPv6 essentials (1st ed.). Sebastopol, CA: O'Reilly Media. IPv4 to IPv6 Transition (1st ed.). Retrieved from https://training.apnic.net/docs/eIP603_Transition.pdf

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.