Is configured between individual hosts and an isatap router

Assignment Help Management Information Sys
Reference no: EM131223301

TCP and UDP

• Describe TCP and UDP, and how they differ. Why do both protocols exist?

Address Types

• In your own words, briefly describe each of the address types mentioned in LabSim (Global-Unicast Addresses, Unique-Local Addresses, Link-Local Addresses, Multicast Addresses), and provide a scenario when each is useful for an organization. In particular, differentiate link-local, unique local and global addresses.

ISATAP vs. 6to4 vs. Teredo

• LabSim describes the ISATAP, 6to4 and Teredo transition technologies for IPv6. In your own words, define one (in a way that differentiates it from the others). Then, do one of the following:

o Describe a realistic scenario (with some details) for using the technology you chose
o Locate a case study or other online article (of that technology or IPv6 transition in general) and provide your thoughts on it
o If your organization is undergoing (or underwent) an IPv6 transition, discuss some of the details.

A Global-Unicast address is an address on the Internet.
Unique-Local, previously referred to as Site-Local, indicates a private IP Address.
Link-Local indicates that the IP address was configured by default.
Multicast indicates that the packet is addressed to a number of hosts on the network, but not all hosts.

ISATAP: The Intra-site Automatic Tunnel Addressing Protocol (ISATAP) is a tunneling method for use within a site to provide IPv6 communication over a private IPv4 network. ISATAP tunneling:

• Is configured between individual hosts and an ISATAP router.

• Requires an IPv6 router to perform tunneling, and dual layer or IPv6-only clients. Routers and hosts perform tunneling when communicating on the IPv4 network.

• Does not work through NAT.

• Automatically generates link-local addresses that includes the IPv4 address of each host:

o The prefix is the well-known link-local prefix: FE80::/16.

o The remaining prefix values are set to 0.

o The first two quartets of the interface ID are set to 0000:5EFE.

o The remaining two quartets use the IPv4 address, written in either dotted-decimal or hexadecimal notation.

A host with an IPv4 address of 192.168.12.155 would have the following IPv6 address when using ISATAP: FE80::5EFE:C0A8:0C9B (also designated as FE80::5EFE:192.168.12.155).

Use ISATAP to begin a transition to IPv6 within a site.

• You can start by adding a single ISATAP router and configuring each host as an ISATAP client.

• Vista clients will use ISATAP automatically if they can find the ISATAP router.

Vista clients query the DNS server for a router named ISATAP. When using ISATAP, be sure to use this name for the server, or create an A or CNAME record in DNS using ISATAP as the name and pointing to the ISATAP router.

6-to-4 tunneling: With 6-to-4 tunneling, tunneling endpoints are configured automatically between devices. 6-to-4 tunneling:

• Is configured between routers at different sites.

• Requires routers that provide dual layer support as the tunnel endpoints. Hosts can be IPv6-only hosts.

• Works through NAT.

• Uses a dynamic association of an IPv6 site prefix to the IPv4 address of the destination tunnel endpoint.

• Automatically generates an IPv6 address for the site using the 2002::/16 prefix followed by the public IPv4 address of the tunnel endpoint router. For example, a router with the IPv4 address of 207.142.131.202 would serve the site with the following prefix: 2002:CF8E:83CA::/48 (CF8E:83CA is the hexadecimal equivalent of 207.142.131.202).

Use 6-to-4 tunneling to dynamically connect multiple sites through the IPv4 Internet. Because of its dynamic configuration, 6-to-4 tunneling is easier to administer than manual tunneling

Teredo: Teredo (also known as NAT traversal or NAT-T) establishes the tunnel between individual IPv6 hosts so they can communicate through a private or public IPv4 network. Teredo is a last resort technology in that it is used only when there is no native IPv6, ISATAP, or 6-to-4 connectivity present between hosts. Teredo tunneling:

• Is configured between individual hosts.

• Has dual layer hosts that perform tunneling of IPv6 to send on the IPv4 network.

• Works through NAT.

• Uses a 2001::/32 prefix followed by the IPv4 public address converted to hexadecimal. For example, the IPv4 public address of 207.142.131.202 would provide clients with a prefix of 2001:0:CF8E:83CA::/64.

For Windows Vista and Windows 7, the Teredo component is enabled but inactive by default. In Windows Server 2012, Teredo is enabled by default only on non-domain networks (it is disabled by default on Windows Server 2008 and 2003 SP1). To use Teredo, a user must either install an application that needs to use Teredo, or configure the advanced settings on a Windows Firewall exception to use edge traversal.

Teredo behavior differs when machines are members of a domain. Teredo is disabled on XP and Server 2003 machines that belong to a domain. Teredo is enabled on Vista and 2008 machines that belong to a domain. Teredo is disabled by default on Windows 8 and Windows Server 2012 machines that are part of a domain.

Reference no: EM131223301

Questions Cloud

Innovations in financial markets and output volatility : After examining given Figure, explain the potential link between innovations in financial markets and output volatility since the 1980s.
Examine how soa helps make reuse more economical : Discuss the most optimized sequence of services to deploy in an SOA roadmap, given metrics, revenue, and cost projections. Examine how SOA helps make reuse more economical.
Deploying microsoft direct access : Write an email to your boss discussing the pros (or cons) of deploying Microsoft's DirectAccess instead of keeping the legacy VPN solution. Explain what you'll need to get the solution in place and what benefits it'll provide to the remote staff.
What are the benefits of using nap : Describe a scenario where an organization will need to use NAP? What are the benefits of using NAP?
Is configured between individual hosts and an isatap router : Is configured between individual hosts and an ISATAP router. Requires an IPv6 router to perform tunneling, and dual layer or IPv6-only clients. Routers and hosts perform tunneling when communicating on the IPv4 network.
Appropriate active directory replication topology : How do you choose the appropriate Active Directory replication topology for your company? What kinds of problems do you want to prevent? Give examples. Please explain in approximately in two paragraphs.
Designing an active directory infrastructure : What are some factors or requirements when designing an Active Directory Infrastructure? How do you gather the requirements for the design? Please explain in approximately in two paragraphs.
How long will it take the ball to reach that height : tina threw a ball to a height of a flagpole 25 meter high. how long will it take the ball to reach that height and dropped back on the ground if the ball accelerates at 0.5m/s2
Display the same type of intelligence : Which science attempts to produce machines that display the same type of intelligence that humans do?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain the advantages of the medium

Common Transmission Mediums - The Twisted Pair - Explain the advantages of the medium, and identify at least one application that would not be able to use it?

  Assess the role of technology in project management

Assess the role of technology in project management

  Explain how social media is different

Based on what you have learned about using social media in today's enterprises, prepare a 5-slide presentation to a department head or the CEO of a company to convince the audience that this would benefit their business.

  Discuss what it will take to build a web architecture move

the new company has hired you to manage a project that will move the old website from an externally hosted solution to

  What type of organizational culture inhibit whistle blowing

If you have worked for an organization that had internal auditors, IGs, or inspectors, were they effective? Were they welcome? What, in your experience, was done well and what was done poorly with such internal auditors and inspectors?

  Suggest potential tasks that each resource will performing

Determine the functional resource group to which each individual belongs. Suggest potential tasks that each resource will be performing

  Select a major hmo that owns and operates its own

select a major hmo that owns and operates its own outpatient clinics staff model and complete the followinghow does a

  What methodologies have been used for data breaches

What methodologies have been used for data breaches? Different types of attacks ? comparision on attacks how did they happen and how did attackers entered into the system? what are the different companies that have been attacked by these attacks

  Find a case study or article about a business

Find a case study or article about a business that has been benefited from using big data to generate more profit or customer base. What kinds of data is collected, and what strategies are applied to connect and make sense of the information?

  Description of the status of the plan

Description of the status of the plan. Description of the strengths and weaknesses of the existing plan. Justify your answers. Recommended modifications to improve the current plan.

  What do you prefer a cloud -based or an on premise solution

After thinking about your project and the aforementioned questions, do you prefer an off-the-shelf system, or a custom-built solution in your organization and what about for this current (scenario project)? Which option and why or do you have no ..

  Discuss cloud computing and cloud storage

Discuss cloud computing and cloud storage, Describe mass storage devices, including enterprise storage systems, file servers, network attached storage, RAID systems, organizational cloud storage, and storage area network systems.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd