Internet protocol (ipv6), Computer Network Security

SUCCESS OF IP:

 IP has accommodated dramatic modification since real design. But basic rules are still appropriate today. There are many new kinds of hardware.

SCALING:

 Scale is also dramatically modification. Size from a few tens to a few tens of millions of devices has been revolutionized. Data Speed has increased from 56Kbps to 1Gbps. Also there is an increased message size in system hardware.

MOTIVATION FOR CHANGE:

 One of the parameters, which motivated IP for modification is address space. The 32- bit address space gives for over a various networks. But most networks are class C and too small for several companies. 214 class B network addresses already almost terminated. The second parameter is kind of service, the IP gives. Different applications have different needs for delivery reliability and speed. Current IP has type of function that is not often implemented. Another factor for the motivation for modification is multicast.

NAME AND VERSION NUMBER:

 Preliminary versions of IP was known IP- Next Generation (IPng). There were various proposals and all known IPng. One name was chosen and it used next available version number i.e. 6. The result is IPV6.

NEW FEATURES:

 The new features of IPV6 are as given:

  • IPV6 addresses are 128 bits.
  • Header format is totally different.
  • Additional information is saved in optional extension headers, followed by message.
  • Flow quality and label of service allows video and audio applications to create appropriate connections.
  • New features can be included more easily.

 

Posted Date: 8/1/2012 9:18:42 AM | Location : United States







Related Discussions:- Internet protocol (ipv6), Assignment Help, Ask Question on Internet protocol (ipv6), Get Answer, Expert's Help, Internet protocol (ipv6) Discussions

Write discussion on Internet protocol (ipv6)
Your posts are moderated
Related Questions
Problem: (a) What is a firewall and which are its most important tasks? (b) What is the difference between default deny and default permit? Which advantages and disadvanta

QUESTION (a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design. (b) Describe on the three ways of improving the performan

Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection:

Q. Analysis of the Problem of cyber attack? According to the case, The EZ Company is a prominent organization specialized in information integration and visualization technolog

Q. Develop a completely secure WSN based on the triple key? Wireless network is the most vulnerable type of network to security attack. Unauthorized access to wireless network

How does the POP functions? What are the advantages/benefits of IMAP over POP? POP stands for Post Office Protocol, version 3 (POP3) is one of the easiest message access protoc

Proof that the sender forwards the message. It also prohibits the author of the code from falsely denying that he forward the message. This is achieved by record using the exact ti

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

Benchmarking An alternative approach to risk management is Benchmarking. It is process of seeking out and studying practices in other organizations which one’s own organization de

In this assignment, you are required to emulate the operation of a link layer and network layer protocols in a small computer network. Your program should behave like a single node