Wednesday, May 6, 2020

Internet Technologies

Question: Discuss about the Internet Technologies. Answer: Advantages of IPv6 over IPv4 Internet Protocol which is commonly abbreviated as IP is a set of rules that apply on the data and packets that are exchanged over the network that is Internet. The most recent version of IP is the Internet Protocol Version 6 (IPv6) which is an upgrade on its predecessor which was Internet Protocol Version 4 (IPv4). Ipv6 offers a number of advantages over IPv4 which are as listed below. The number of possible addresses under IPv6 is huge in comparison to the ones that were offered under IPv4. It was required to manually configure addresses under IPv4; however, IPv6 offers the capability of automatic configurations. Such a capability makes the management of addresses easier. There are a number of security threats and attacks that are observed in the current times with the growth of Internet. IP Security (IPSEC) comes built-in under IPv6 which was not present under IPv4. IPv6 allows direct addressing as it is composed of a wider address space in comparison to IPv4. The efficiency of the router in terms of packet processing is superior in IPv6 in comparison with IPv6 (Reddy, 2012). IPv4 to IPv6 Transition Strategies Dual Stack Routers Dual Stack Router is a migration strategy for the transition from IPv4 to IPv6 as it is a router that has the capability to communicate with both the IP versions without any change or modification required in the respective versions. Dual Stack Routing For Example, the diagram above shows two different networking clouds present under IPv4 and IPv6 respectively. They are both connected to the dual stack router in between which is further connected to the server. The router allows the traffic from both the clouds to pass through and get transmitted without any necessity to change the versions of the same (Gilligan, 2015). Tunneling There are manual and automatic tunneling mechanisms available which allow the transition from IPv4 to IPv6 in order to allow the migration of the addresses from the former to the latter. In case of manual tunneling, it is necessary to have the dual stack routers present. The technique of encapsulation is used in this process wherein the packets that are configured as per IPv6 are tunneled in the data packets that are configured as per IPv4 addressing scheme. There is also automatic or dynamic tunneling available which allows the automatic migration of IPv4 to IPv6 with the aid of IPv4 backbone. In this case, every single locality is applied with an IPv6 prefix which eliminates the need of retrieving addressing information associated with IPv6 from the address registries (Narayanan, 2012). IPv4 to IPv6 Migration Tunneling For instance, the diagram above shows the migration of IPv4 to IPv6 in which the data stack routers are placed on the network and the packets pass through the tunnel. NAT Protocol Translation This is another technique or method which is used for the transition of IPv4 to IPv6. Network Address Protocol (NAT) is a protocol which is used in this technique with the aid of a NAT enabled device. This is the device that does the actual migration from the lower version to a higher version during the communication process (Cisco, 2011). NAT Protocol Transition For example, in the case above, the host places a request on an IPv6 server that is not aware of the addressing scheme followed as per the receiving packet. This is where the NAT enabled device comes in to the picture and aids in the communication process. When the request is sent from the host, this device forwards the same to the IPv6 server after the removal of IPv4 header from the same and adds the header of a higher version in its place. The packets are then forwarded to the server. In case of the response, the same technique is applied (Sellers, 2009). File Transfer Protocol (FTP) File Transfer Protocol (FTP) is one of the most significant protocols that is used in the world of Internet and Computer Systems. Working of FTP FTP is a protocol which is used for the transfer of files from client to server which is known as uploading and vice versa which is termed as downloading of files. There are two modes in which the FTP connection works. The first mode is the active mode in which the connection is made by the server and the client connects to the port automatically. It is the reverse in case of the passive mode. The ports that are used by FTP are port 20 for connection and port 21 for data. Port number 21 is utilized by the client in order to initiate a control TCP connection which requires valid set of credentials for the authenticity check. There are commands that are sent for the transferring of files from the side of the client. Once these commands are received, server initiates the TCP data connection over the port 20. The file is then transmitted over this data connection and the control session remains open during the transfer process (Harjunen, 2008). Working of FTP Difference between FTP and SCP FTP SCP FTP is a File Transfer Protocol which is used for transferring of files and can also perform directory listings on its own SCP is a Secure Copy Protocol which has been created for secure transfer of files and cannot perform operations associated with directory listings Support associated with resuming the file transfers is provided in case of FTP Support associated with resuming the file transfers is not provided in case of SCH Speed of file transfers is lesser as compared to SCP Speed of file transfers is higher as compared to FTP The ports that are used by FTP are 20 and 21 The port used by SCP is port 22 The security features associated by FTP are limited which are expanded with Secure FTP that is SFTP SCP is more secure as compared to FTP Security Considerations in FTP There are a number of security considerations that are required to be taken in case of FTP with increase in the number of security risks and attacks such as Bounce Attacks, Denial of Service Attacks, Data Breaches and many others. There are some of the specific file extensions that are commonly used by the attackers to transfer to the server that contain a malicious code such as .exe, .bat, .scr and many others which shall be restricted. Use of firewalls is a basic mechanism that shall be considered to maintain the server security (Gupta, 2017). Multi-step authentication is another consideration which shall be incorporated to make sure that the attacker does not gain access to the process. There are advanced security considerations such as use of encryption techniques to prevent the security attacks (Allman, 2011). References Allman, M. (2011). RFC 2577 - FTP Security Considerations. Tools.ietf.org. Retrieved 16 January 2017, from https://tools.ietf.org/html/rfc2577 Cisco,. (2011). Introduction to Network Address Translation. Retrieved 16 January 2017, from https://www.cisco.com/networkers/nw00/pres/2211.pdf Gilligan, R. (2015). RFC 4213 - Basic Transition Mechanisms for IPv6 Hosts and Routers. Tools.ietf.org. Retrieved 16 January 2017, from https://tools.ietf.org/html/rfc4213 Gupta, U. (2017). Survey on security issues in file management in cloud computing environment. Retrieved 16 January 2017, from https://arxiv.org/ftp/arxiv/papers/1505/1505.00729.pdf Harjunen, T. (2008). Classic TCP/IP applications: TELNET, FTP, SMTP, NNTP and SNMP. Retrieved 16 January 2017, from https://www.netlab.tkk.fi/opetus/s38130/s98/tcpapp/TCP_appl.pdf Narayanan, A. (2012). IPv6 Tunneling Over IPV4. Retrieved 16 January 2017, from https://pdfs.semanticscholar.org/6bc7/0f52b82cb4dcbb1503f48f196101cc48b5d6.pdf Reddy, P. (2012). Importance and Benefits of IPV6 over IPV4: A Study. Retrieved 16 January 2017, from https://www.ijsrp.org/research-paper-1212/ijsrp-p1288.pdf Sellers, C. (2009). IPv6 Transition Mechanisms and Strategies. Retrieved 16 January 2017, from https://www.rmv6tf.org/wp-content/uploads/2012/11/Chuck-Sellers-090421-IPv6-Transition-Mechanisms-Sellers1.pdf

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.