Tuesday, May 5, 2020

Internet Technologies for Service Industries - myassignmenthelp

Question: Discuss about theInternet Technologies for Service Industries Journal. Answer: IPV6 additional to providing large address space, it has many advantages over the IPV4 these are as follows; IPV6 protocols usually have an in built support for the multicast 1 transmission whereas the IPV4 this characteristic is just optional (Chadwick, 2006). The IPV6 devices has an allocated locally accessible and the IPV6 addresses which are valid for the clients who are connected hence allowing communication to be possible between the endpoints to the same sub-network despite the presence of the router (Chadwick, 2006). When it comes to IPV4 they have the data packages that have an upper size limit of 64Kilobytes whereas when it comes to IPV6 they are extended up to 4 GB which increases on the transmission rates. Reason why the transition taking so long. The reason as to why the transition of IPV6 they are taking long due to these aspects; They are very expensive: Replacing or upgrading of the routers and switches to be compatible to the IPV6 could take a lot of time and cost is high. Compatibility issues: During the designing of the IPV6 protocol the backward compatibility was not considered in the requirement list. The strategies for the transition from IPV4 to IPV6. Dual stack Routers. The router can be installed with both the IPV4 as well as the IPV6 addresses which are configured to its interface to be able to point to the network for the relevant IP scheme. The Dual Stack Router has the ability to communicating with each of the coverage as it provides medium for the hosts to manage to access the server without changing on the respective IP variations. NAT protocol transmission. This strategy uses the NAT-PT enabled devices. When using this products the host with the IPV4 address have the ability to send request to the IPv6 permitted servers to the internet which would not recognize the IPV4 address. The NAT-PAT helps in the connection between these types of protocols (Jap Mohr, 2002). Tunneling. When it comes to the numerous IP variations which occur the intermediate way or maybe the transit networks, the utilization of tunnelling could offer a much better solution where the data of the users pass via the non-supported IP version. The Centralized P2P approach it means the hybrid system to where there are several Meta information in regards to the data as well as the peers are stored to the multiple and centralized or a well-known entities of a server (Hanna, 2012). The information set could include the parameters such as the file availability, the bandwidth, as well as the latency value. The transmission of the data is organized in the processes that are decentralized. When it comes to the pure decentralized approach, the exchange of the information of the Meta information needs to be conducted without distinct server systems (Hanna, 2012). Depending on each of the communication handshake process between the peers consists of the data substitute these Meta data. Advantage They are ease and simple in setting up as they require hub or even a switch to be able to connect to all the computers together. It is more reliable as the central dependency which is limited. The overall cost for building as well as maintaining it is less. Disadvantage The security is not good as it entails only to set up of password for the files which you do not need individuals to access. The data recovery or even the backup is very difficult. The circulated hash table is the class of the decentralized distributed program that provides a lookup service that is similar to the hash table (Comer, 2008). The responsibility for the maintenance of the mapping from the recommendations for the values is circulated among the nodes, in a manner wherein an alteration of the groupof the participant could cause minimal amount of the disruption (Lowe, Murray, Lindsay Liu, 2009). The properties of the DHTs emphasize on the following; Autonomy along with the decentralization that is the mutual form of the nodes without the central coordination. Scalability: the program will be able to operate effectively despite millions of the nodes. Fault tolerance: This involves that the program must be dependable despite the nodes joining, or faltering. The technique that is used in achieving on these goals is any nodes needs to coordinate with few other nodes which are in the system. Some DHT design seeks in securing against the malicious Participants as well as allowing on the participants in remaining anonymous. This is much less common than in many of the P2P systems. Sometimes a computational entity could have something which another does needs. In the computational world, the server usually offers a given service to the other computers which are connected to a network (Comer, 2008). It is common for the organization to have lot of the disks on which the information of the members is stored, as well as have a single machine which is responsible for offering access to the storage space (Hanna, 2012). The machine is regarded as the disk server. Additionally, another machine in the business could control on the public html access for the firm World Wide Web pages. In these cases, the service is regarded as what is provided. It is also important to characterize on how the service is offered (Comer, 2008). A server could offer a variety of the services. Some of the service specialization does not fit under the same abstraction. A server can offer transmission and deliver on these services of which some may not be related. The host usually laces the valuation on the timeout parameter which the web host might permit an idle connection to stay significantly open before it actually closed. A connection is significantly idle in the event there is absolutely no data that is dispatched and even obtained by the host. The max parameter usually indicates the maximum number of the request which the clients usually make or the server which allow to be made to the persistent connection (Shamdasani, Mukherjee Malhotra, 2008). Once the various number of the requests as well as the response have been sent, the host which include the parameter might close the connectivity. Furthermore, the server is free of charge to close the connection after an arbitrary precious time or even the number of the requests. Depending on how this is implemented solely depends on the HTTP server. References Chadwick, A. (2006). Internet politics: States, citizens, and new communication technologies. New York, NY. Comer, D. E. (2008). Computer networks and internets. Prentice Hall Press. Hanna, P. (2012). Using internet technologies (such as Skype) as a research medium: A research note. Qualitative Research, 12(2), 239-242. Jap, S. D., Mohr, J. J. (2002). Leveraging Internet technologies in B2B relationships. California Management Review, 44(4), 24-38. Lowe, D., Murray, S., Lindsay, E., Liu, D. (2009). Evolving remote laboratory architectures to leverage emerging internet technologies. IEEE Transactions on learning technologies,2(4), 289-294. Shamdasani, P., Mukherjee, A., Malhotra, N. (2008). Antecedents and consequences of service quality in consumer evaluation of self-service internet technologies. The Service ndustries Journal, 28(1), 117-138.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.