Ipv6 addressing, Computer Network Security

IPv6 ADDRESSING

IPv6 has 128-bit addresses. A 128-bit address adds network prefix and host suffix. An benefit of IPv6 addressing is that there is address classes i.e. prefix/suffix boundary may fall anywhere.

 

 Following are special kinds of addresses, IPv6 provides:

 

Unicast: It is used for single receiver computer.

Multicast: It is used for multiple receivers; possibly not at similar site.

Cluster: This kind of address is used for collection of devices with same prefix, datagram is send to one out of cluster.

 

IPv6 ADDRESS NOTATION:

128-bit addresses unwidely in dotted decimal; needs 16 numbers:

 

105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255

 

Groups of 16-bit numbers in hex differentiate by colons - colon hexadecimal.

 

69DC: 8864:FFFF: FFFF: 0:1280:8C0A:FFFF

 

Zero-compression - series of zeroes shown by two colons

 

FF0C: 0:0:0:0:0:0:B1

FF0C::B1

 

IPv6 address with 96 leading zeros is stopped to hold an IPv4 address.

 

 

Posted Date: 8/1/2012 9:28:40 AM | Location : United States







Related Discussions:- Ipv6 addressing, Assignment Help, Ask Question on Ipv6 addressing, Get Answer, Expert's Help, Ipv6 addressing Discussions

Write discussion on Ipv6 addressing
Your posts are moderated
Related Questions
Stateless Packet Filtering Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the addres

Australian government sites were mandated to conform to at least single 'A' level of the World Wide Web Consortium (W3C) Web Accessibility Initiative (WAI) standards, by the end of

Address resolution algorithms may be grouped into three basic types: Table lookup Closed-form computation Message Exchange 1. TABLE LOOKUP: In Table Loo

Question: (a) African governments are slowly shifting to more transparent ICT regulations. However, but limited spectrum availability remains a key barrier to sustaining lon

ARP MESSAGE FORMAT Although the ARP data packet format is sufficiently general to allow hardware addresses and arbitrary protocol. ARP is almost usually used to bind a 32-bit

QUESTION: (a) Suppose the graph below, use the Flow Decomposition method to list the cycles and paths produced. (b) Describe how Lower Bounds on Arc Flows are eliminated

The Cost Benefit Analysis (CBA) Formula CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily ca

TRANSPORT PROTOCOLS: Give application-to-application communication. Require extended addressing mechanisms to check applications. Are known end-to-end communicatio

Network-Based IDS (NIDS) A NIDS resides on computer or appliance connected to segment of an organization’s network and looks for signs of attacks. While examining packets, a NID

Ask question #Minimum.. 100 words accepted#