More Subjects
IT
Jason
School or Institution Name (University at Place or Town, State)
Answer 1:
Network address translation (NAT) provides many benefits. It saves the IPv4 addresses because a single public IP address can be used to represent a whole network. In this way, the source and destination IP addresses will be hidden. NAT provides an added layer of security and usability. For example, NAT will be useful in an organization that has a number of hosts represented by a single NAT IP address that is routable publicly. In this way, the organization will not need to change the internal addressing of the hosts if they are going to change their service provider in the future ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"5ppJeD5b","properties":{"formattedCitation":"(Passmore, 2004)","plainCitation":"(Passmore, 2004)","noteIndex":0},"citationItems":[{"id":14,"uris":["http://zotero.org/users/local/B1350FEi/items/CRZT3VYB"],"uri":["http://zotero.org/users/local/B1350FEi/items/CRZT3VYB"],"itemData":{"id":14,"type":"article-journal","title":"The NAT Traversal Problem","container-title":"Business Communications Review; Hinsdale","page":"12-13","volume":"34","issue":"12","source":"ProQuest","abstract":"Despite proliferation of network address translation (NAT) routers and firewalls, the networking industry has been late to recognize that anything should be done to standardize NAT behavior. The predictable consequence of this lack of standards has been wide variation in the way NAT implementations operate, with developers forced to guess what features or functions should be included in their routers or firewalls. This has made it nearly impossible for developers of products like IP phones, videoconferencing systems, collaboration software or network games to implement consistent techniques, or even bags of tricks to achieve NAT traversal. The problem is that many peer-to-peer applications fail to communicate in the presence of NAT. Peer-to-peer communications is often difficult to establish if one or both peers are located behind NAT routers because of the following: 1. Each peer behind a NAT router is only aware of its private IP address. 2. Many peer-to-peer protocols like the Session Initiation Protocol require embedding of IP address or TCP/UDP port numbers in signaling and control packets. 3. Peer-to-peer applications may require unsolicited session establishment from the public side of the NAT router.","ISSN":"01623885","language":"English","author":[{"family":"Passmore","given":"David"}],"issued":{"date-parts":[["2004",12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Passmore, 2004). On the other hand, because the requests will be made from a single address for all connected hosts a remote server configured to limit the number of requests for a single host may block the NAT IP address. In this way, the internet service may deteriorate for organizations or individuals using NAT routers.
Answer 2:
Different methods of packet switching are being used in network switches. In the store and forward method, the bytes received are stored in the memory of the switch. The switch continues to store the fragments of the frame until the complete frame is received at the switch. While the fragments are being received and stored in memory a cyclic redundancy check is performed. If there are no errors found, then the packet is transmitted to the appropriate port. In fragment free method, the switch reads only the 64 bytes of the IP packet to know about the destination media access control (MAC) address ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"HEUOcqUW","properties":{"formattedCitation":"(De Zan, 1994)","plainCitation":"(De Zan, 1994)","noteIndex":0},"citationItems":[{"id":16,"uris":["http://zotero.org/users/local/B1350FEi/items/T4MKALLR"],"uri":["http://zotero.org/users/local/B1350FEi/items/T4MKALLR"],"itemData":{"id":16,"type":"article-journal","title":"Store-and-forward switching hubs strategic choice","container-title":"Computer Technology Review; Los Angeles","page":"12","volume":"14","issue":"8","source":"ProQuest","abstract":"The central argument in favor of cut-through switching is that it introduces lower latency into a network than a store-and-forward device. However, most modern file-transport protocols ensure that latency remains an insignificant performance factor regardless of the length of a given transfer. What really matters when evaluating network prformance is throughput. In independently conducted public tests of switch performance, both cut-through and store-and-forward devices have been delivering performance at or very near the throughput limit for years. A more important difference between the 2 architectures becomes clear when examining the way modern high performance networks are being built. Cut-through Ethernet switches will never be able to directly connect to higher speed backbone technologies. On the other hand, store-and-forward switches provide Ethernet to FDDI and Ethernet to 100 Mbyte per second Ethernet translation today, and will soon provide connections to even higher speed Asynchronous Transfer Mode backbones.","ISSN":"02789647","language":"English","author":[{"family":"De Zan","given":"Paul"}],"issued":{"date-parts":[["1994",8]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (De Zan, 1994). After knowing the destination Mac address a switching decision is made. In this way, runt ethernet frames that are smaller than the size of 64 bytes are not forwarded. Any network is considered to have a broadcast storm when it is flooded with broadcast or multicast packets.
References
Passmore, D. (2004). The NAT traversal problem. Business Communications Review, 34(12),
12-13. Retrieved from https://search.proquest.com/docview/224979390?accountid=41759
De Zan, P. (1994). Store-and-forward switching hubs strategic choice. Computer Technology
Review, 14(8), 12. Retrieved from
https://search.proquest.com/docview/220600035?accountid=41759
More Subjects
Join our mailing list
© All Rights Reserved 2024