1. IPv6 does no longer offer any awesome benefits over IPv4, it only offers extra address
area. This method adopting IPv6 does not provide any "bang for the dollar" and monetary
motivation for migrating to IPv6 can be driven with the aid of scarcity of IPv4 area, no longer
via benefits of
IPv6.
2. Network Address Translation (NAT) has been effective at increasing the IP area, specially
in in residential sectors. This method it's miles nonetheless possible to retain the use of IPv4
with out extreme
results for a huge number of customers of the Internet, no matter the truth they have got
many
devices worrying get entry to.
Three. Group mentality - Many corporations are waiting for adoption charges to growth
before
migrating to IPv6, ensuing in a waiting sport. - ANS-Why has deployment of IPv6 been
sluggish to advantage momentum despite the exhaustion of
IPv4 address area?
1. Replication exists in any respect ranges of the hierarchy, consisting of the thirteen root
servers, and the requirement to have at least 2 authoritative servers for each area. This
means that
facts continue to be handy despite the fact that N-1 of the N replicas cross down.
2. Partitioning affords fate sharing. If a domain's authoritative servers go down, the facts for
different domain names can nevertheless be accessed. Also, if the TLD server of one TLD
goes down, the opposite TLDs' facts are nevertheless handy.
Three. Caching within the local server (and in some cases, at the stop host) can maintain
cached data
available although the authoritative server is down. - ANS-Explain the methods in which
DNS (the Domain Name System) achieves fault-tolerance,
i.E., such that maximum or all domain names can be resolved to IP addresses even
supposing some
(but no longer all) DNS servers crash.
A router at the Internet at minimal ought to:
a. Receive packets
b. Determine vacation spot of the packet
c. Create and hold a packet forwarding desk
d. Modify the packet as wanted
e. Forward the packet. - ANS-Describe the basic functions any router on the Internet need to
be capable of perform for you to direction site visitors.
, ASes make Internet routing extra scalable via introducing a level of hierarchy above
individual
networks. Thus intra-AS routing protocols don't should scale to the dimensions of the whole
Internet,
and BGP (the inter-AS protocol) would not both as it routes at the entire-AS granularity.
Another reason is that it gives agencies administrative manage over their very own networks
(i.E., the networks within the AS that they very own). This permits them no handiest to pick
whichever intra-AS routing protocol they prefer, but also to set and implementing routing
regulations for their AS. - ANS-List two motives for the use of Autonomous Systems (AS) in
the Internet.
Assume ends are sender/receiver of e-mail. Even if both use encrypted connections to
speak to Gmail's servers, the e-mail is seen to Google itself. If the e-mail had been
encrypted with keys known only to sender/receiver, then it might be cease-to-end encrypted.
- ANS-Bonus question: Gmail uses HTTPS to relaxed communication between your browser
and the Gmail servers. Is this encryption "stop-to-quit"?
BGP handiest transmits its whole routing table whilst associates make preliminary touch.
Afterward, handiest
adjustments to this facts are exchanged among associates. Therefore the routing tables are
maintained through incremental updates. - ANS-Why is BGP considered an incremental
protocol?
Encryption might be carried out each step, however intermediate routers will see the site
visitors, as it's miles sent encrypted over one hyperlink to the router, decrypted, then
re-encrypted for the following hyperlink.
Must agree with router, however this isn't beneficial due to distributed mgmt of internet.
Neither sender or receiver can assure which routers (and therefore different groups) their
visitors will or will no longer traverse.
Man inside the center attacks feasible with the aid of posing as a valid router or other give
up. Cleartext visible of all supposedly-encrypted visitors. Possible to hack a legitimate router
and scouse borrow cleartext.
If one cease does no longer become aware of themselves, you can understand you have got
a relaxed connection however do not recognize in case you are talking to who you need to. -
ANS-Why is it crucial for encryption to be give up-to-cease?
In different words, what are the results if we carry out encryption, however not in an
end-to-cease manner?
Fate-sharing protects towards some of intermediate failures, due to the fact intermediate
packet
switching nodes between the give up-factors of communication do not comprise kingdom
information.
Consider two hosts in network -- any intermediate nodes might also fail, as long as the
failures do no longer result in partitioning of the network, the two hosts can retain to speak in
the context of the same kingdom.