Internet protocol (ipv6), Computer Network Security

SUCCESS OF IP:

 IP has accommodated dramatic modification since real design. But basic rules are still appropriate today. There are many new kinds of hardware.

SCALING:

 Scale is also dramatically modification. Size from a few tens to a few tens of millions of devices has been revolutionized. Data Speed has increased from 56Kbps to 1Gbps. Also there is an increased message size in system hardware.

MOTIVATION FOR CHANGE:

 One of the parameters, which motivated IP for modification is address space. The 32- bit address space gives for over a various networks. But most networks are class C and too small for several companies. 214 class B network addresses already almost terminated. The second parameter is kind of service, the IP gives. Different applications have different needs for delivery reliability and speed. Current IP has type of function that is not often implemented. Another factor for the motivation for modification is multicast.

NAME AND VERSION NUMBER:

 Preliminary versions of IP was known IP- Next Generation (IPng). There were various proposals and all known IPng. One name was chosen and it used next available version number i.e. 6. The result is IPV6.

NEW FEATURES:

 The new features of IPV6 are as given:

  • IPV6 addresses are 128 bits.
  • Header format is totally different.
  • Additional information is saved in optional extension headers, followed by message.
  • Flow quality and label of service allows video and audio applications to create appropriate connections.
  • New features can be included more easily.

 

Posted Date: 8/1/2012 9:18:42 AM | Location : United States







Related Discussions:- Internet protocol (ipv6), Assignment Help, Ask Question on Internet protocol (ipv6), Get Answer, Expert's Help, Internet protocol (ipv6) Discussions

Write discussion on Internet protocol (ipv6)
Your posts are moderated
Related Questions
QUESTION (a) Mention two attitudes of a carer towards an inspector that could lead to negative outcomes (b) Give two performance indicators of Early Childhood Education that

Question: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume the following: the signal level for the previous bit for NRZI was a 1

An injunction to 'think ethically' about a situation is not helpful. Perhaps if one has a background in moral philosophy this would work, but usually both students and IT professio

(a) Cost allocation mechanisms are important when it comes to establishing other aspects of inter-firm compensations and how these are transferred to the users. There are two pri

Packet Filtering Firewall Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interco

Question (a) Estimate the average throughput between two hosts given that the RTT for a 100 bytes ICMP request-reply is 1 millisecond and that for a 1500 bytes is 2 millisecon

Divide the user data into 6 equal sets. Use the first set for the enrollment phase of your system, and the rest for the verification phase. Use the following formula to calculate t

ACCESS CONTROL DEVICES Successful access control system includes number of components, which depends on system’s requirements for authentication and authorization. Powerful auth

Hypothetical reliable data transfer protocol: A jumping window based Go-back-N  ARQ protocol for file transfer using UDP as the transport protocol: In this protocol, a window o

Q. Attacks on wireless network WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distrib