Ipv6 addressing, Computer Network Security


IPv6 has 128-bit addresses. A 128-bit address adds network prefix and host suffix. An benefit of IPv6 addressing is that there is address classes i.e. prefix/suffix boundary may fall anywhere.


 Following are special kinds of addresses, IPv6 provides:


Unicast: It is used for single receiver computer.

Multicast: It is used for multiple receivers; possibly not at similar site.

Cluster: This kind of address is used for collection of devices with same prefix, datagram is send to one out of cluster.



128-bit addresses unwidely in dotted decimal; needs 16 numbers:


Groups of 16-bit numbers in hex differentiate by colons - colon hexadecimal.


69DC: 8864:FFFF: FFFF: 0:1280:8C0A:FFFF


Zero-compression - series of zeroes shown by two colons


FF0C: 0:0:0:0:0:0:B1



IPv6 address with 96 leading zeros is stopped to hold an IPv4 address.



Posted Date: 8/1/2012 9:28:40 AM | Location : United States

Related Discussions:- Ipv6 addressing, Assignment Help, Ask Question on Ipv6 addressing, Get Answer, Expert's Help, Ipv6 addressing Discussions

Write discussion on Ipv6 addressing
Your posts are moderated
Related Questions
a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI

QUESTION a) Explain the terms traffic engineering, class-based queuing, shaping and grooming in an MPLS network. b) Using an example topology, illustrate the label swi

Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t

Question: (a) A string of ciphertext was enciphered using an a±ne transformation of single letters in a 28-letter alphabet consisting of A to Z, a blank and a?, where A to Z ha

The world has to deal with newly released vulnerabilities on a daily basis.  These vulnerabilities eventually lead to active exploits of systems, and it is our job as cyber securit

Public Key Infrastructure (PKI) It is integrated system of software, encryption methodologies, protocols, legal agreements, and 3rd-party services enabling users to communicate

Dynamic Packet Filtering Dynamic Packet Filtering is also referred to as stateful firewalling. Here the firewall maintains the status of connections as well. When a connection

QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look

Explain in DES Data Encryption Standard : DES stands for Data Encryption Standard and is explained as follows: DES is at present the most widely used key cryptographic systems

BALANCING SECURITY AND ACCESS Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should