Internet protocol (ipv6), Computer Network Security


 IP has accommodated dramatic modification since real design. But basic rules are still appropriate today. There are many new kinds of hardware.


 Scale is also dramatically modification. Size from a few tens to a few tens of millions of devices has been revolutionized. Data Speed has increased from 56Kbps to 1Gbps. Also there is an increased message size in system hardware.


 One of the parameters, which motivated IP for modification is address space. The 32- bit address space gives for over a various networks. But most networks are class C and too small for several companies. 214 class B network addresses already almost terminated. The second parameter is kind of service, the IP gives. Different applications have different needs for delivery reliability and speed. Current IP has type of function that is not often implemented. Another factor for the motivation for modification is multicast.


 Preliminary versions of IP was known IP- Next Generation (IPng). There were various proposals and all known IPng. One name was chosen and it used next available version number i.e. 6. The result is IPV6.


 The new features of IPV6 are as given:

  • IPV6 addresses are 128 bits.
  • Header format is totally different.
  • Additional information is saved in optional extension headers, followed by message.
  • Flow quality and label of service allows video and audio applications to create appropriate connections.
  • New features can be included more easily.


Posted Date: 8/1/2012 9:18:42 AM | Location : United States

Related Discussions:- Internet protocol (ipv6), Assignment Help, Ask Question on Internet protocol (ipv6), Get Answer, Expert's Help, Internet protocol (ipv6) Discussions

Write discussion on Internet protocol (ipv6)
Your posts are moderated
Related Questions
QUESTION: (a) Explain, with the aid of a diagram, a Star topology of a network of your choice. (b) Illustrate on the use of a MAN and give an example of one. (c) Describe

BUSINESS NEEDS Information security performs four main functions for an organization. 1. Protects the ability of organization to function. 2. Enables safe operation of applicat

STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal

Network diagram for a mediacal care

Ask question #Minimum 100 words are there non parasitic viruses

Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG

Websphere Administrator: Working as Websphere Administrator in the department called DART (Database Architecture Re-Engineering and Tuning). The major responsibilities are t

UDP ENCAPSULATION As given in the figure below, UDP packet is included in IP datagram and the IP datagram is then attached in the Frame.

For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi