Internet protocol (ipv6), Computer Network Security

SUCCESS OF IP:

 IP has accommodated dramatic modification since real design. But basic rules are still appropriate today. There are many new kinds of hardware.

SCALING:

 Scale is also dramatically modification. Size from a few tens to a few tens of millions of devices has been revolutionized. Data Speed has increased from 56Kbps to 1Gbps. Also there is an increased message size in system hardware.

MOTIVATION FOR CHANGE:

 One of the parameters, which motivated IP for modification is address space. The 32- bit address space gives for over a various networks. But most networks are class C and too small for several companies. 214 class B network addresses already almost terminated. The second parameter is kind of service, the IP gives. Different applications have different needs for delivery reliability and speed. Current IP has type of function that is not often implemented. Another factor for the motivation for modification is multicast.

NAME AND VERSION NUMBER:

 Preliminary versions of IP was known IP- Next Generation (IPng). There were various proposals and all known IPng. One name was chosen and it used next available version number i.e. 6. The result is IPV6.

NEW FEATURES:

 The new features of IPV6 are as given:

  • IPV6 addresses are 128 bits.
  • Header format is totally different.
  • Additional information is saved in optional extension headers, followed by message.
  • Flow quality and label of service allows video and audio applications to create appropriate connections.
  • New features can be included more easily.

 

Posted Date: 8/1/2012 9:18:42 AM | Location : United States







Related Discussions:- Internet protocol (ipv6), Assignment Help, Ask Question on Internet protocol (ipv6), Get Answer, Expert's Help, Internet protocol (ipv6) Discussions

Write discussion on Internet protocol (ipv6)
Your posts are moderated
Related Questions
Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c

BALANCING SECURITY AND ACCESS Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should

VULNERABILITY SCANNERS Active vulnerability scanners scan networks for detailed information, it initiate traffic to determine security holes. This scanner identifies usernames a

QUESTION: a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length


Problem: (a) Assume that a new application layer protocol is developed for video conferencing application. Which transport layer protocol, between TCP and UDP, will you u

A Network is described as a system for connecting computers using a single transmission technology. The computers can interact with each other in a network. They can receive an

Access Controls Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control

ARP MESSAGE FORMAT Although the ARP data packet format is sufficiently general to allow hardware addresses and arbitrary protocol. ARP is almost usually used to bind a 32-bit

Question : (a) Distinguish between authorization and authentication. (b) SSO (Single Sign On) implies a user logs in once and can access resources for a defined period of