The Features Of Packet Traffic

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

The authors are affiliated with Kayseri vocational college, Erciyes University and are well respected in their field. They conclude by stating Ipv6 packet traffic exhibits greater self-similarity degree than Ipv4 therefore Ipv6 protocol traffic would cause more performance degradations in computer networks.

I found the research article very informative in explaining TCP/Ipv4 and relevant to my research.

Topal C; Akinlar C (2009)- "Enabling peer-to-peer communication for hosts in private address realms using IPv4 LSRR option "Vol. 3 Issue 4, p512-519, Retrieved Dec 10th, 2012, From http://web.ebscohost.com

This research article focuses on enabling peer-to-peer communication for hosts in private address realms using IPv4 LSRR option and is aimed to an audience of Information Technology undergraduates. It explains how P2P applications can benefit from a framework that is based on the use of IPv4þ4 addresses and the standard IPv4 Loose Source Record Route (LSRR) option and requires no changes whatsoever to end-host protocol stacks and Internet routers. The only requirement is a simple upgrade of border routers with a new LSRR-based packet-forwarding algorithm for the P2P traffic. The implementation of a Linux-based border router that runs the proposed forwarding algorithm is also provided in detailed. The research article is straight forward in arguing its facts however elaboration on certain points would have been better.

The authors are affiliated with Anadolu University and have published many similar related research articles.

They conclude by stating they have shown that an LSRR-based Internet using IPv4þ4 addresses seamlessly enables P2P communication. So, they believe that an LSRR-based Internet using IPv4þ4 addresses is the way to go in the evolution to the next-generation Internet until IPv6 is fully deployed.

Aflaki J (2009)- "A COMPLETE SOLUTION TO IPV4 ADDRESSING" Vol. 12 Issue 2, p1-4, Retrieved Dec 10th, 2012, From http://web.ebscohost.com

This research article focuses on developing a computer program called IPv4 Addressing Solutions to allow students to design a TCP/IP network with appropriate network address, subnet mask, and range of IP addresses for each subnet. IPv4 Addressing Solutions can provide appropriate addresses for networks using Classful and Classless Inter-Domain Routing (CIDR) IPv4 addresses. It covers a thorough understanding of IPv4 addressing and subnettinghwdgh concepts which is vital for students majoring in networking. The article acts more like a guideline in overcoming Ipv4 limitations and has a lot of useful tips. Although if instructional steps were provided the task would be much simpler.

The author is affiliated with Christian Brothers University and is well respected in his field.

He concludes by stating IPv4 Addressing Solutions can provide appropriate addresses for networks using Classful and Classless Inter-Domain Routing (CIDR) IPv4 addresses. The preliminarily results and comments from students who have used this tool have been very positive and encouraging and it has helped them gain a thorough understanding of the concepts involved and facilitated their network design projects.

Savitz E; Liu C (2012)-"The End Of IPv4 Is Near",Vol. 1 Issue 1,  p54-54, Retrieved Dec 10th, 2012, From http://web.ebscohost.com

This research article focuses on the end of Ipv4 and the transition over to Ipv6 protocols. It is aimed to an audience of Information Technology undergraduates. It covers the question of what we should do during this transition, and how to take maximum advantage of it. Also Internet service providers will face the choice of connecting them using network address translation infrastructure that hides large user populations behind a small number of IPv4 addresses at the cost of expensive networking equipment, increased latency and diminished performance or of connecting them using IPv6, the next-generation Internet protocol, with a nearly limitless supply of addresses. This article clearly explains the difference between Ipv4 and Ipv6 and the need to change from Ipv4 to Ipv6.

The authors are member of the Forbes Staff who are an international company that deals with internet protocol. They conclude by stating the transition technologies that provide access to IPv4-speaking resources from IPv6-speaking clients are clever, but all of them add latency and a performance bottleneck to Internet transactions. And delay, poor performance and compromised reliability are deadly to websites.

TCP/Ipv6

Thomas B (2012)- "IPv6 and deep packet inspection", Vol. 3, p1-6, Retrieved Dec 10th, 2012, From http://web.ebscohost.com

This research article focuses on the introduction of IPv6 which has 128-bit (16-byte) source and hidden IPv6 traffic running across an organization’s network that can wreak havoc, allow malware to enter the network, and be the basis for a denial of service attack. The only defense against such attacks is deep packet inspection (DPI). It targets an audience of academic scholars and covers:

THE IMPENDING WORLD OF IPV6

MIGRATION STRATEGIES FROM IPV4 TO IPV6

WHY CAN IPV6 BE DANGEROUS?

WHAT ACTIONS CAN BE TAKEN TO REDUCE THE THREAT OF INVISIBLE

IPV6 TRAFFIC?

DEEP PACKET INSPECTION – FRIEND OR FOE?

LEGAL, SOCIAL, AND SECURITY IMPLICATIONS

ENCRYPTION AND IPV6

The author is affiliated with Holy family University and is well respected in his field. He concludes by stating the transition period between IPv4 and IPv6 is full of future unknowns. Unanticipated security vulnerabilities are certain. Legal issues on the rights to privacy, surveillance, and Internet neutrality will all come into play. It will be an interesting next stage in the growth of the Internet. The threats caused by the advent of IPv6 must not be ignored by an organization. It is imperative to begin guarding against a major catastrophe caused by inattention to the forthcoming world of IPv6.

Batiha K; Amer A (2011)- "THE NEED FOR IPv6", Vol. 3 Issue 3, p431-448, Retrieved Dec 10th, 2012, From http://web.ebscohost.com

This research article explains the need for a new protocol that has larger address space and improvement features. IPv6 is a solution for these problems by showing how this protocol will offers a huge address space which will be more than enough. And also by showing how it will provide improvement and new features in compare with IPv4. It is targeted to an audience of academic scholars and covers new topics related to IPv6 such which are very important to make dealing with IPv6 in the internet more efficient and easier even with existing of IPv4 infrastructure. And also what makes dealing with IPv6 easier that it’s supported in the most operating system.

The authors are affiliated Faculty of Information Technology, Philadelphia and have published many similar articles. They conclude by stating solutions for IPv6 limitations like Tunneling of IPv6 over IPv4 and Dual stack system that contains both IPv4 and IPv6 stack, and we have shown that there is no huge change in security from IPv4 to IPv6 because mainly both use IPsec with main exception that it's mandatory in IPv6.

Gelogo Y E; Caytiles R D-(2011), "Threats and Security Analysis for Enhanced Secure Neighbour Discovery Protocol (SEND) of IPv6 NDP Security", Vol. 4 Issue 4, p179-184, Retrieved Dec 10th, 2012, From http://web.ebscohost.com

This research article explains that IPv6 nodes use the Neighbour Discovery Protocol (NDP) to discover other nodes on the link, to determine their link-layer addresses to find routers, and to maintain reachability information about the paths to active neighbours. Secure Neighbour Discovery Protocol (SEND Protocol) is a security extension of Neighbour Discovery. The SEND protocol is designed to counter the threats to NDP. It presents the threats and security analysis for SEND and all the possible security options for more secure IPv6 Neighbour Discovery Protocol and is targeted to an audience of academic scholars.

The authors are affiliated Hannam University and are well respected in their fields. They have written and published many similar articles and conclude by stating IPv6 Neighbor Discovery Protocol is vulnerable to attacks. Secure Neighbor Discovery Protocol (SEND Protocol) is a security extension of NDP. It introduces different kind of security options in order to secure the connection while moving from one node to another node. It is better to understand what are the security options and the possible attacks that can be launched. There have been a lot of proposed security to secure IPv6 in different aspect but there is no concrete solution.

Turiel A-(2011)," IPv6: new technology, new threats", Vol. 2011 Issue 8, p13-15, Retrieved Dec 10th, 2012, From http://web.ebscohost.com

This research article explains that many organizations have begun to more seriously consider their roadmaps to IPv6, the successor to IPv4. As the global implementation of IPv6 becomes a reality, the associated security concerns must be considered. However, the newer technology does pose some problems. For example, since this is new technology, there are bound to be incorrect configurations of network devices, which will open up vulnerabilities; in order to provide IPv6 connectivity some organizations will use tunneling of IPv6, which may result in some of the communications being hidden from traditional protection systems; and the vast number of addresses it makes possible presents challenges for reputation systems. It is targeted to an audience Business Information technology specialists because of its detailed analysis of the new threats faced.

The author is affiliated with Commtouch, a multination IT organization and she concludes by stating because of this impending IPv4 address exhaustion, many organizations have begun to more seriously consider their roadmaps to IPv6, the successor to IPv4. As the global implementation of IPv6 becomes a reality, the associated security concerns must be considered. I found this article very helpful and informative, also it was relevant to my research.

IPX/SPX

Jeff S (2012)-"NETWARE 5.0 MERGES IPX WITH IP", Vol. 20, Issue 6, Retrieved Dec 10th, 2012, From http://web.ebscohost.com

This research article explains that in this version, Novell has included a couple of features that will allow administrators to more smoothly migrate from IPX/SPX-based NetWare environments to native TCP/IP, while maintaining compatibility with applications that rely on IPX/SPX. It is targeted to an audience of network undergraduates. It covers

Features the beta release of Novell NetWare 5.0 operating system,

Refinement of NetWare 5.0's support for native TCP/IP;

Inclusion of features that will allow administrators to smoothly migrate from IPX/SPX-based NetWare environments to native TCP/IP;

Optional GUI-based installation;

Limited driver support for storage devices.

The author is well respected in his field and has published many similar related articles. He concludes by stating the two new features in NetWare 5.0 that help ease this migration are IPX Compatibility Mode and the Migration Agent. Compatibility Mode uses special drivers on both TCP/IP-based clients and servers. These drivers were loaded by default, so enabling this feature did not require any extra work on my part. Compatibility Mode provides IPX/SPX-based applications with a virtual IPX network, which is available via TCP/IP. This means that administrators can migrate to an IP-only environment without sacrificing compatibility for applications that require IPX.

Matiasko K (2011)-"HIGH PERFORMANCE COMPUTING ON NETWORKS OF PERSONAL COMPUTERS (IPX/SPX)", Issue 1, p5-10, Retrieved Dec 10th, 2012, From http://web.ebscohost.com

This research article explains the recent trend, in high performance computing (HPC), is to use networks of workstations (NOW) as a cheaper alternative to massively parallel multiprocessors or supercomputers. In such parallel systems (NOW's) individual workstations, in our home conditions on the base of powerful personal computers, are connected through widely used communication standard networks and co-operate to solve one large problem. Each workstation typically runs the full operating systems and communicates with others using standard communication protocols (TCP/IP, IPX/SPX, NetBEUI etc. It is targeted to an audience of information technology academics.

The author is well respected in his field of research and concludes by saying the way of a decomposition belongs to a most important step in developing an effective parallel algorithm because it directly influence a parallel algorithm's complexity. On the practical example he illustrates analyzing a complexity in a simulation way. He would also like to contribute in future using NOW, as a modern non deterministic parallel system, to the solution of numerous existed intractable problems or to this time not solved tasks which are classified in the literature as NP (Non polynomial). I found this research article difficult to comprehend without the well-illustrated diagrams.

Joseph W (2010)-"The right time for IPX", Vol. 21 Issue 8, p16-20, Retrieved Dec 10th, 2012, From http://web.ebscohost.com

This research article focuses on the implementation of the IP Exchange (IPX) model for telephone operators by the GSM Association (GSMA), an association of telephone operators in Asia. The arguments of some telephone operators relative to IPX due to lack of Internet protocol (IP) infrastructure and high-bandwidth applications. Also their hesitation in the adoption of the new model will be a great challenge to IPX providers. This research article is targeted to an audience of academics. I found it useful in providing more in-depth understanding of the implementation of IPX. However diagrammatical representation would have been simpler to understand.

The author is well respected in his field and has published many similar articles on protocols. He concludes by stating Some IPX providers might be seeking to capture an- on-net community with attractive pricing, and might not be interested to peer with other IPX providers, ensuring fair competition/open connectivity. In this case, an operator might then have to interconnect with other IPX providers to reach other on-net community, hence the benefit of consolidating all local loops of different services onto a single IPX plug will go away.

Protocol suites

John Y-(2012), "AppleTalk over ISDN: This is no spoof!", Vol. 27 Issue 8, p21, Retrieved Dec 10th, 2012, From http://web.ebscohost.com

This research article focuses on the use of the AppleTalk local area network (LAN) in a wide area network (WAN) and ;

Popularity of AppleTalk as a network protocol in publishing;

Plug-and-play operation of AppleTalk;

JPY Ltd.'s development of a router called ISDNShare that allows AppleTalk to be used in a WAN.

AppleTalk is designed to be a plug-and-play operation. Features giving some degree of plug-and-play utility to TCP/IP (such as DHCP) have been in AppleTalk for years. You can configure an AppleTalk network without knowing anything about node numbers and addresses. The familiar Chooser provides an extremely easy way to connect to devices on the network. Yet this ease of use is at the cost of a lot of network traffic--and network traffic is the dirge of ISDN because "traffic is money." This is targeted to an audience of networking undergraduates.

The author is well respected I his field and has published many similar networking articles. He concludes by stating the intrinsic capability of 3Com OfficeConnect Remote to support TCP/IP has been an important factor in the success of ISDNShare. Often the router is used to share access to the local Internet service provider via ISDN. It also means that as Apple slowly migrates to IP protocols, the customer's investment is protected.

Sammy C (2011)-"A data link control protocol for broadband wireless networks with adaptive coding rate", Vol. 19 Issue 8, p845-860, Retrieved Dec 10th, 2012, From http://web.ebscohost.com

In this research article, one of the challenges of broadband wireless multimedia networks is to design a wireless data link control (W-DLC) protocol which provides reliable data delivery over the noisy wireless link in an efficient manner. This research article presents their proposal of such a W-DLC protocol, based on a new coding scheme called multi-dimensional concatenated zigzag code. Both real-time and non-real-time traffic can be efficiently supported by adopting different error control mechanisms. A distinct feature of the protocol is that the coding rate can be adapted to a wide range of channel conditions. Hence, their protocol utilizes the scarce wireless channel resources more efficiently.

The author is affiliated with Curtin University of Technology and is well respected in his field. He concludes by stating most of the proposed error control schemes for broadband wireless networks adopt ARQ at the data link layer and FEC at the physical channel to maintain the acceptable QoS. The drawbacks of this method are inflexibility and low efficiency. He has presented a new WDLC protocol. For real-time traffic, only FEC is adopted. For non-real-time traffic, hybrid ARQ is used for error recovery. Moreover, the parameters of different error control mechanisms can automatically adapt to the time-varying channel conditions in order to optimize the resource utilization while maintaining an acceptable QoS level.

Bill M (2008) - "Simple security for Windows 95 networks (NetBEUI)", Vol. 15 Issue 19, p65, Retrieved Dec 10th, 2012, From http://web.ebscohost.com

This research article discusses security for Windows 95-based computer networks. Such as

Problems which occur because of peer-to-peer networking and the file and print sharing functions;

Using a non-routable protocol like NetBEUI on non-Internet connected machines

Unbinding TCP/IP from File and Printer Sharing

The use of non-routable IP addresses;

Removing the NetBEUI protocol from the dial-up adapter.

It is targeted to an audience of academic scholars and covers how to overcome these problems with explanation of NetBEUI protocol. The author is well respected in his field and has published many similar articles.

He concludes by stating hackers or intruder can override any control panel settings for these old Operating systems and remove NetBEUI and IPX protocols. Take nothing for granted. I found his research article useful and relevant to my research.

Andrew A C (2009) - "Network News Transport Protocol (NNTP)", p151-151, 1/5p, Retrieved Dec 10th, 2012, From http://web.ebscohost.com

An acronym NNTP is presented, which means Network News Transport Protocol. NNTP is employed to manage traffic on UseNet newsgroups. Most Internet Service Providers (ISPs) run a NNTP server, which communicates with others like it to gather and filter the global collection of newsgroups. It is the replacement for the UNIX UUCP (Unix-to-Unix Copy Protocol) found on older networks. This article is targeted to an audience of networking undergraduates and it covers that the Network News Transfer Protocol (NNTP) is an application protocol used for transporting Usenet news articles (Netnews) between news servers and for reading and posting articles by end user client applications.

The author is affiliated with North Westburg University and is well respected in his field. He concludes by stating the well-known TCP port 119 is reserved for NNTP and when clients connect to a news server with Transport Layer Security (TLS), TCP port 563 is used, this is sometimes referred to as NNTPS.

* FINAL VERSION UPLOADED 21/12/12*



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now