Tuesday, May 5, 2020
Internet Technologies CryptographyBased Scheme
Question: Describe about the Internet Technologies for Hybrid Wireless Mesh Protocol . Answer: In Ipv4 TCP/IP protocol is used or sending and receiving packets of data and the IPv6 is the future of the IP addressing. It have advantage over IPv4 and the IPv4 framework is changed to develop the IPv6 by the Internet Engineering Task Force. The advantages of the IPv6 over IPv4 are described as follows: It has a huge range of IP address- IPv6 contains 128 bit address but when compared with the IPv4 it have 32 bit address and thus it results in availability of IP address and accommodate more number of users. End to End Connection- The need of NAT is eliminated with the implementation of IPv6 and better peer to peer connection is created (Matousek, Skacan Korenek, 2013) Built-in Security- The interoperability improves with the implementation of IPv6. In IPv4 the IP address is separated in 8 bit boundaries but in IPv6 the address is separated using 16 bit boundary and the representation is called colon hexadecimal. IP Version Address size IPv4 32 bit and it allows 232 and 4294967296 number of possible address (Wu et al., 2013) IPv6 128 bits that allows 2128 and 340282366920938463374607431768211456(3.4*1038) number of possible address The transition of IPv4 to IPv6 required formal strategies and each of the strategies are described in the below table. Method of Transition Description Dual stacking method Most of the network devices such as the PC and the routers runs on IPv4 and IPv6 and thus two set of address can be used for the transition. Manual IPv4 to IPv6 (4-6) tunneling IPv4 packets can be tunneled in the IPv6 network and vice versa by encapsulating them in the necessary packets (Matousek, Skacan Korenek, 2013). The requirement for these techniques is that the routers in the network should be configured with dual stack method. Dynamic 6 4 tunneling This method allows IPv6 locality to connect to IPv6 using IPv4 network as a backbone. In this method, a unique IPv6 prefix is added locally and retrieval of the address information is eliminated. Intra site automatic tunnel addressing protocol (ISATAP) tunneling VPN can be used for connecting IPv6 with the IPv4 network automatically. The boundary routers are required to be configured using dual stack method. Teredo Tunneling With the implementation of Tedro tunnel, the use of routers to tunnel the packets of data can be eliminated (Wu et al., 2013). The host server is required to be configured with dual stack method and the packet of data can thus move using the IPv4 address translation device. NAT proxying and translation (NAT-PT) It uses a address translation device for translating the Ipv4 and IPv6 address. The bit rate of the for the 4.2 MHZ bandwidth system can be calculated using the following formula. C= B log2 (1+SNR) (Ji et al., 2014) = 4.2 * 106 log2 (1+170) = 2.23Mbps The upper limit is 2.23 Mbps The Shannon formula gives 2.23 Mbps, the upper limit and thus for better performance something lower is chosen and the nyquist formula is applied for finding the levels of signal. 2Mbps= 2 * 4.2 MHz * log2 2 L= 2.52 The difference between the centralized and decentralized peer-to-peer network are discussed as follows: Centralized system In this system the server maintains the directories that are stored in the peer of the computer. The central server directs the connection between the peers and thus for establishing the connection between the peers the central server is necessary. Decentralized system In decentralized system, the peer connects between himself and herself directly without being directed by a server (Wu et al., 2013). These are large network, the connection is repeated, and a number of layers of computers are there for passing the message to the client. Advantage: It is easy to install and configure the network connections All the contents and the resources are shared by the peers in the decentralized system but the centralized system only shares the contents and the resources. Peer to peer connection in decentralized system is more because there is no central dependency. Failure of one of the peer does not affect the other peer (Bryan et al., 2016). In case of the centralized model if the central goes down the whole network is affected. The need of full time system administrator is eliminated the users of the network can control the resources. The cost of maintaining the network and addition of nodes is comparatively less. Disadvantage: In decentralized system the system administrator faces difficulty in administrating the network because the determination of the accessibility of the system is difficult. The system is less secure because virus, spyware and Trojan can be implemented from any source. Backup and data recovery is difficult because data is decentralized and the data are required to be backed up in the own systems Latency = processing time + queuing time + transmission time + propagation time Processing time = 12 2 s = 24 s = 0.000024 s Queuing time = 12 4 s = 48 s = 0.000048 s Transmission time = 5,000,000 / (5 Mbps) = 1 s Propagation time = (2600 Km) / (2.2108 m/s) = 0.01 s Latency = 0.000024 + 0.000048 + 1 + 0.01 = 1.010072 s The transmission time is dominant here because the packet size is huge, and processing time and queuing time are negligible. FTP (File Transfer protocol) is used for transferring files between one computer to another in a same network. The below figure demonstrate the working of FTP where FTP works with an active internet connection. One command is used for sending and receiving data and the other command is used for establishing a secure connection (Sharma Nandal, 2014). A standard PORT is used for communicating with the Internet Protocol and the PORT number is 21. Figure 1: FTP work flow diagram (Source: Sharma Nandal, 2014) SCP (Secure copy protocol) differs from FTP (File Transfer Protocol) because it helps to send file a file to the server and retrieve file from the server. The security is more in the FTP because it SSH protocol for authentication. The files transmission speed in SCP is much faster when compared with FTP (Ben?Othman Saavedra Benitez, 2013). Directory listings can be implemented for accessing the source file and the destination folder. It also supports larger file for transfers and it can also resume the transfer of files. For establishing a FTP connection an FTP client is required to be installed on the client PC and information about the FTP server is required like server address, username, password, etc. A connection is established using the server address and the user name password and the files can be uploaded or downloaded using the FTP file manager. References Ben?Othman, J., Saavedra Benitez, Y. I. (2013). IBC?HWMP: a novel secure identity?based cryptography?based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11 s.Concurrency and Computation: Practice and Experience,25(5), 686-700. Bryan, D., Matthews, P., Shim, E., Dawkins, S., Willis, D. (2016). Concepts and terminology for peer to peer sip. Ji, R., Duan, L. Y., Chen, J., Huang, T., Gao, W. (2014). Mining compact bag-of-patterns for low bit rate mobile visual search.IEEE Transactions on Image Processing,23(7), 3099-3113. Matousek, J., Skacan, M., Korenek, J. (2013, April). Towards hardware architecture for memory efficient IPv4/IPv6 Lookup in 100 Gbps networks. InDesign and Diagnostics of Electronic Circuits Systems (DDECS), 2013 IEEE 16th International Symposium on(pp. 108-111). IEEE. Sharma, S., Nandal, V. (2014). FTP Server Hacking: Brute Force Algorithm. Wu, P., Cui, Y., Wu, J., Liu, J., Metz, C. (2013). Transition from IPv4 to IPv6: A state-of-the-art survey.IEEE Communications Surveys Tutorials,15(3), 1407-1424. Wu, X., Tavildar, S., Shakkottai, S., Richardson, T., Li, J., Laroia, R., Jovicic, A. (2013). FlashLinQ: A synchronous distributed scheduler for peer-to-peer ad hoc networks.IEEE/ACM Transactions on Networking (TON),21(4), 1215-1228.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.