Question

Why does the world need IPv6, and how does IPv6 address the current issues with IPv4?...

Why does the world need IPv6, and how does IPv6 address the current issues with IPv4?

Pick a number from 0 to 255 and write it in binary, then write a number from 00000000 to11111111 and convert it to decimal. For each of those numbers, convert them to hexadecimal.

Compare and contrast different protocols at the same or nearby layers, such as TCP/UDP,IPv4/IPv6, IMAP/POP/SMTP, or TCP and IP

Combine the concepts from the different layers to explain how a message such as an image or text document gets transmitted from one computer to another.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

a Need Ilu6! Every computer on the network reeds logical address celled as IP ( Internet Protowl) Address communicate over thPick a number from oto 255 and convert it into binary. say we choose (30)lo or 2130 2 15 0 7 i 3 Q lo - Equivalent Binary (11Now conuert (43), to hexadecimal 16143 16 As B=11 in hexadecine 2 B - D ०४ (43)10 (2B)16 CS Scanned with CamScanner

TCP UDP
It stands for Transmission Control Protocol

It stands for User Datagram Protocol

It is a connection-oriented protocol. It is a connectionless protocol.
TCP reads data as streams of bytes, and the message is transmitted to segment boundaries. UDP messages contain packets that were sent one by one. It also checks for integrity at the arrival time.
TCP rearranges data packets in the specific order. UDP protocol has no fixed order because all packets are independent of each other.
The speed for TCP is slower. UDP is faster as error recovery is not attempted.
TCP does error checking and also makes error recovery. UDP performs error checking, but it discards erroneous packets.
Using handshake protocol like SYN, SYN-ACK, ACK No handshake (so connectionless protocol)
TCP is reliable as it guarantees delivery of data to the destination router. The delivery of data to the destination can't be guaranteed in UDP.
IPv4 IPv6
IPv4 is a 32-Bit IP Address. IPv6 is 128 Bit IP Address.
IPv4 is a numeric address, and its binary bits are separated by a dot (.) IPv6 is an alphanumeric address whose binary bits are separated by a colon (:). It also contains hexadecimal.
Has checksum fields Does not have checksum fields
it has total 232 addresses It has total 2128 possible addresses
With IPv4 one can Unicast, broadcast, and multicast. Wit IPv6 one can Unicast, multicast, and anycast.
IPv4 support VLSM (Virtual Length Subnet Mask). IPv6 does not offer support for VLSM.
Fragmentation is done by sending and forwarding routes. Fragmentation is done by the sender.

SMTP (Simple Mail Transfer Protocol), this protocol allows applications to transmit email messages over the Internet. SMTP handles our outgoing mail. Your email application connects to your mail server via SMTP and sends the messages.

IMAP abbreviation stands for Internet Message Access Protocol and is one of the two most popular protocols for receiving email messages from the Internet (the other is POP3). The main benefit of the IMAP protocol is that you can receive your email on more than one computer because once the message is received it remains on the email server.

POP3 stands for Post Office Protocol revision 3. This protocol handles the receiving of email messages from your mail server. It is important to know that if you access your email account via POP3, once your messages are download to your local computer, they are removed from the server. This makes it impractical if you would like to read your email on more than one place/computer.

*******************************************************************************************************************************

TCP/IP is technically a Protocol Suite.

TCP works at the Transport Layer or Layer 4. This Layer is responsible for mainly guaranteed end to end delivery and error correction. Before they can do this though, they need to know where to go.

IP works at the Network Layer or Layer 3. This Layer is responsible for mainly determining the best path to get from Host A to Host B and detecting and rerouting traffic around any failures.

*******************************************************************************************************************************

How a meesage is transmitted over network from one computer to another.

The following depicts what occurs in the OSI model's layers when an email is sent from Device A to Device B:

1. An application, such as an email program or file transfer program, creates data that will be sent by an end user, such as an email message. The Application layer places a header field that contains information such as screen size and fonts, and passes the data to the Presentation layer (layer 6).

2. The Presentation layer places header information. For example, the text in the message might be converted to ASCII. The Presentation layer will then pass the new data to the Session layer (layer 5).

3. The Session layer follows the same process by adding layer 5 header information, such as information that the Session layer will manage the data flow, and passes this data to the Transport layer (layer 4).

4. The Transport layer places layer 4 information, such as an acknowledgment that the segment was received in the header, and passes it to the Network layer (layer 3).

5. The Network layer places layer 3 header information, such as the source and destination address so the Network layer can determine the best

delivery path for the packets, and passes this data to the Data Link layer (layer 2).

6. The Data Link layer places layer 2 header and trailer information, such as a Frame Check Sequence (FCS) to ensure that the information is not corrupt, and passes this new data to the Physical layer (layer 1) for transmission across the media.

7. The bit stream is then transmitted as ones and zeros on the Physical layer. It is at this point that the Physical layer ensures bit synchronization. Bit synchronization will ensure the end user data is assembled in the correct order it was sent.

Data Device A (Sending Device) Device B (Receiving Device) Application Application header (AH) AH Data Application Presentati

Please give me lie. Thanks and regards

Add a comment
Know the answer?
Add Answer to:
Why does the world need IPv6, and how does IPv6 address the current issues with IPv4?...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • ND-OF-CHAPTER QUESTIONS Thought Questions 1. How do you think TCP would handle the problem if an ...

    ND-OF-CHAPTER QUESTIONS Thought Questions 1. How do you think TCP would handle the problem if an acknowledgment were lost, so that the sender retrans- mitted the unacknowledged TCP seg- ment, therefore causing the receiving transport process to receive the same segment twice? 2-2. a) Compute the minimum number of TCP segments required to open a con- nection, send an HTTP request and response message, and close the con- nection. Justify this number by creating a table showing each message and...

  • PART A 21 MARKS SHORT ANSWER QUESTIONS Answer ALL questions from this part. Write your answers...

    PART A 21 MARKS SHORT ANSWER QUESTIONS Answer ALL questions from this part. Write your answers in the Examination Answer Booklet. Each question is worth 1.5 marks (14 x 1.5 = 21 marks). Question 1 An organisation has been granted a block of addresses with the mask /22. If the organisation creates 8 equal-sized subnets, how many addresses (including the special addresses) are available in each subnet? Show your calculations. Question 2 Give an example of a valid classful address...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
Active Questions
ADVERTISEMENT