Internet protocol (ipv6), Computer Network Security


 IP has accommodated dramatic modification since real design. But basic rules are still appropriate today. There are many new kinds of hardware.


 Scale is also dramatically modification. Size from a few tens to a few tens of millions of devices has been revolutionized. Data Speed has increased from 56Kbps to 1Gbps. Also there is an increased message size in system hardware.


 One of the parameters, which motivated IP for modification is address space. The 32- bit address space gives for over a various networks. But most networks are class C and too small for several companies. 214 class B network addresses already almost terminated. The second parameter is kind of service, the IP gives. Different applications have different needs for delivery reliability and speed. Current IP has type of function that is not often implemented. Another factor for the motivation for modification is multicast.


 Preliminary versions of IP was known IP- Next Generation (IPng). There were various proposals and all known IPng. One name was chosen and it used next available version number i.e. 6. The result is IPV6.


 The new features of IPV6 are as given:

  • IPV6 addresses are 128 bits.
  • Header format is totally different.
  • Additional information is saved in optional extension headers, followed by message.
  • Flow quality and label of service allows video and audio applications to create appropriate connections.
  • New features can be included more easily.


Posted Date: 8/1/2012 9:18:42 AM | Location : United States

Related Discussions:- Internet protocol (ipv6), Assignment Help, Ask Question on Internet protocol (ipv6), Get Answer, Expert's Help, Internet protocol (ipv6) Discussions

Write discussion on Internet protocol (ipv6)
Your posts are moderated
Related Questions
ACCESS CONTROL DEVICES Successful access control system includes number of components, which depends on system’s requirements for authentication and authorization. Powerful auth

Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items: A de

A  half-duplex (HDX) system gives communication in both directions, but only one direction at a time. Hardly, once a party stats receiving a signal, it must need for the transmi

what is relation ship between computer security goals?

Problem 1 Solve the following Caesar cipher by showing your working: EM KIUM EM AIE EM KWVYCMZML Problem 2 Compare and contrast between block and stream ciphers, listin

Divide the user data into 6 equal sets. Use the first set for the enrollment phase of your system, and the rest for the verification phase. Use the following formula to calculate t

(a) Describe how CSMA/CD operates and explain how Ethernet deals with collisions. (b) Describe how the subsequent protocols work: i. ARP ii. DHCP iii. DNS iv. SMTP (c) The

In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose,

Question: (a) Explain and illustrate with a drawing the three-layer feedforward multilayer perceptron neural network. (b) Summarize the standard backpropagation algorithm in

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr