Tuesday, May 5, 2020

Network Routing and Switching Cloud Computing

Question: Discuss about thr Network Routing and Switching for Cloud Computing. Answer: 1: A routing table contains the information about the neighbor nodes and it checks that a data packet, which needs to transmit from source to destination node, use the routing table. Now according to the given scenario the routing information in showing below. Subnet Mask IP address Next-hop address Interface 255.255.0.0 150.3.0.0 150.3.0.3 Loopback 255.255.0.0 150.3.0.3 200.10.50.1 Switch 255.255.0.0 150.3.0.3 210.10.40.1 Switch 255.255.0.0 200.10.50.1 200.10.50.2 Ethernet 255.255.0.0 200.10.40.1 200.10.40.2 Ethernet 2.A Block One Contains 120 addresses Starting Address Last Address Net Mask Wildcard Mask 172.154.60.0 172.154.60.121 255.255.255.0 0.0.0.255 Block two Contains 60 addresses Starting Address Last Address Net Mask Wildcard Mask 172.154.60.123 172.154.60.183 255.255.255.0 0.0.0.255 Block three Contains 30 addresses Starting Address Last Address Net Mask Wildcard Mask 172.154.60.185 172.154.60.215 255.255.255.0 0.0.0.255 Block four Contains 12 address Starting Address Last Address Net Mask Wildcard Mask 172.154.60.217 172.154.60.229 255.255.255.0 0.0.0.255 2.B The given subnet is 172.154.60.0/24, which includes 255 usable host address. After allocating, the host address of four subnets the remaining host addresses are 34. 3.A The provided UDP header dump is BB400045003AFF10, where BB40 or 47936 is the source port number. 3.B The provided UDP header dump is BB400045003AFF10, where destination port number is (0045) or 69. 3.C The provided UDP header dump is BB40 0045 003A FF10, where the third four alphanumeric value 003A, which is the size of the data packet. Now calculate the size from this value 003A or 58, (58-8) = 50 bytes. 3.D In that case, if the destination port is smaller than the source port then it may come from client to server. Here the destination port number is 69, which is very well known Trivial File Transfer Protocol (TFTP) port. Therefore, the researcher can assume that it is a request from a client to sever. 3.E Here the client process is a Trivial File Transfer Protocol (TFTP). 4. Introduction This report provides an overview of the Cloud-managed wireless network system. Cloud-managed wireless networking is the application of the wireless networking over cloud for providing a fast, secure and reliable wireless access (Babaoglu 2012). It uses AP or access points and the virtual controllers present in the cloud. Thus, the requirement of any hardware controller is eliminated. The cloud-managed wireless network increases the scaling of the wireless implementation of the networking. Architecture of Cloud-managed wireless network Figure1: Sample cloud network structure (Source: Aerohivewireless.ca 2016) The Cloud-managed wireless network creates a wireless network for accessing the server. A reliable with high-performance feature wireless APs, security appliance and switches are used for the configuration of the wireless network. The AP autonomously switches the packets and it is dependant on the authentication, encryption, and application for accessing the control. The cloud service is connected to the wireless network using SaaS or software as a service configuration. The failure in the cloud structure does not affect the data transmission because the data transmission controls is done over the AP or access points (Erl et al. 2013). Advantages and Disadvantages of Cloud-managed wireless network Figure2: Advantages and disadvantages of Cloud-managed wireless network (Source: Alzahrani et al. 2014) Advantages: The cloud-managed wireless network provides the function of mobility and connection for the devices. The design is cost effective in its initial phase of implementation. The user can be benefitted with different ways for the data transfer and sharing with ease (Alzahrani et al. 2014). Disadvantages: The cloud-managed wireless network has certain disadvantages like insecurity of data stored over the cloud network, post implementation high costing factor, and lack of physical protection. The system is based on the virtual concept of the cloud network so there are chances that cybercriminals can hack and leak the data from the network (Hamlen et al. 2012). Key service providers of Cloud-managed wireless network Air-Watch: VMware acquired this cloud service providing company recently in 2014 and their clients are IBM and Mobile-Iron. ATT is another cloud wireless network provider that provides LTE service to its customers. Broadcom (sort of) is the wireless network system that is widely used all over the world. Cisco is the leading brand for the wireless network company that provides cloud function. Types of Cloud Services Figure3: 3types of Cloud Services (Source: Bitshead.com 2016) Cloud services are available on three types by the type of services, SaaS, IaaS and PaaS. Each of the services has a key feature that classifies the cloud type. SaaS is based on Software for service providing; IaaS is based on Information for service providing and PaaS is based on the platform for service providing (Moreno-Vozmediano et al. 2012). Conclusion The Cloud-managed wireless network system is the latest technology that enables the cloud computing to the network system. It helps in creating an access point for the network access to the users. The system uses AP or access points and the virtual controllers to eliminate the requirement of any hardware controller. The Cloud-managed wireless network system has provided the mobility to the data access but it lacks the security of the data. The data security can be gained by the utilisation of the authentication and encryption process at the access point (Biham and Shamir 2012). 5.A The provided IPv6 address FDEC:: CF:0:FFFF. Where the zero values may change with two colons one after another like this (::). therefore the full address is FDEC: 0000:0000:0000:0000:00CF:0000: FFFF. 5.B Here the given IPv6 address is 2001: A100: FC1:: A4B8: AE12:3217: FCBA, where the type is GLOBAL-UNICAST and the prefix length, is 64. 5.C here the provided IPv6 address is 0:: FFFF:194.42.12.7, which is an IPv4MAP and its prefix length is 64. Bibliography Alzahrani, A., Alwan, N. and Sarrab, M., 2014, April. Mobile cloud computing: advantage, disadvantage and open challenge. In Proceedings of the 7th Euro American Conference on Telematics and Information Systems(p. 21). ACM. Babaoglu, O., Marzolla, M. and Tamburini, M., 2012, March. Design and implementation of a P2P Cloud system. InProceedings of the 27th Annual ACM Symposium on Applied Computing(pp. 412-417). ACM. Babaoglu, O., Marzolla, M. and Tamburini, M., 2012, March. Design and implementation of a P2P Cloud system. InProceedings of the 27th Annual ACM Symposium on Applied Computing(pp. 412-417). ACM. Bernardos, C., 2015. Proxy mobile IPv6 extensions to support flow mobility. Bernardos, C., La Oliva, A., Serrano, P., Banchs, A., Contreras, L.M., Jin, H. and Ziga, J.C., 2014. An architecture for software defined wireless networking.Wireless Communications, IEEE,21(3), pp.52-61. Biham, E. and Shamir, A., 2012.Differential cryptanalysis of the data encryption standard. Springer Science Business Media. Cheng, B.N., Wheeler, J., Hung, B., Moore, S. and Sukumar, P., 2013, December. A comparison of IP header compression schemes in MANETs. InPerformance Computing and Communications Conference (IPCCC), 2013 IEEE 32nd International(pp. 1-9). IEEE. Cooper, A., Tschofenig, H., Aboba, B., Peterson, J., Morris, J., Hansen, M. and Smith, R., 2013. Privacy considerations for internet protocols.Internet Architecture Board. Dannewitz, C., Kutscher, D., Ohlman, B., Farrell, S., Ahlgren, B. and Karl, H., 2013. Network of Information (NetInf)An information-centric networking architecture.Computer Communications,36(7), pp.721-735. Davies, J., 2012.Understanding ipv6. Pearson Education. Duan, J., Faker, P., Fesak, A. and Stuart, T., 2013. Benefits and drawbacks of cloud-based versus traditional ERP systems.Proceedings of the 2012-13 Course on Advanced Resource Planning. Erl, T., Puttini, R. and Mahmood, Z., 2013.Cloud computing: concepts, technology, architecture. Pearson Education. Hamlen, K., Kantarcioglu, M., Khan, L. and Thuraisingham, B., 2012. Security issues for cloud computing.Optimizing Information Security and Advancing Privacy Assurance: New Technologies: New Technologies,150. Lahlou, M.K. and Grimault, J.L., Orange, 2015.Methods and devices for routing data packets between IPv4 and IPv6 networks. U.S. Patent 9,019,965. Mahajan, M.A.N. and Shaikh, I.R., 2015. Detecting Covert Channels in TCP/IP Header with the Use of Naive Bayes Classifier. Masud, M.A.H. and Huang, X., 2012. An e-learning system architecture based on cloud computing.system,10(11). Moreno-Vozmediano, R., Montero, R.S. and Llorente, I.M., 2012. IaaS cloud architecture: From virtualized datacenters to federated cloud infrastructures.Computer, (12), pp.65-72. Mur, D.C. and Costa, X.P., Nec Europe Ltd., 2015.Method for operating a wireless terminal as an access point and wireless terminal. U.S. Patent 9,100,977. Oki, E., Rojas-Cessa, R., Tatipamula, M. and Vogt, C., 2012.Advanced internet protocols, services, and applications. John Wiley Sons. Oran, D. and Stapp, M., Cisco Technology, Inc., 2015.Caching data in an information centric networking architecture. U.S. Patent Application 14/733,849.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.