Ipv6 addressing, Computer Network Security

IPv6 ADDRESSING

IPv6 has 128-bit addresses. A 128-bit address adds network prefix and host suffix. An benefit of IPv6 addressing is that there is address classes i.e. prefix/suffix boundary may fall anywhere.

 

 Following are special kinds of addresses, IPv6 provides:

 

Unicast: It is used for single receiver computer.

Multicast: It is used for multiple receivers; possibly not at similar site.

Cluster: This kind of address is used for collection of devices with same prefix, datagram is send to one out of cluster.

 

IPv6 ADDRESS NOTATION:

128-bit addresses unwidely in dotted decimal; needs 16 numbers:

 

105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255

 

Groups of 16-bit numbers in hex differentiate by colons - colon hexadecimal.

 

69DC: 8864:FFFF: FFFF: 0:1280:8C0A:FFFF

 

Zero-compression - series of zeroes shown by two colons

 

FF0C: 0:0:0:0:0:0:B1

FF0C::B1

 

IPv6 address with 96 leading zeros is stopped to hold an IPv4 address.

 

 

Posted Date: 8/1/2012 9:28:40 AM | Location : United States







Related Discussions:- Ipv6 addressing, Assignment Help, Ask Question on Ipv6 addressing, Get Answer, Expert's Help, Ipv6 addressing Discussions

Write discussion on Ipv6 addressing
Your posts are moderated
Related Questions
Q. What is Triple Key Management Scheme? The triple key management mechanism provides optimum security by enabling the use of two pre-deployed keys for each of the WS nodes, an

Routers They transfer packets among multiple interconnected network machines (i.e. LANs of different kind). They perform in the data link, physical and network layers. They ha

Describe the salient features of the multimedia. Also explain the applications of it. Multimedia can be understood as follows: Multimedia is on the whole a media which makes

ERROR REPORTING MECHANISM (ICMP) INTRODUCTION:  IP gives best-effort delivery. Delivery causes can be ignored; datagrams may be 'dropped on the ground'. Internet Control Me

Wireless Networks The origin of wireless networks and their ubiquity in the technological environment poses a new type of exposure and vulnerability for network security. Cont

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

Question: Quality management standards are seen as a major pillar supporting the drive for continuous quality improvement through TQM. (a) What do you meant by the term ‘Qua

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t


QUESTION An analog sensor is used to monitor the temperature of sea water at different depth. The sensor is fitted to a buoy and incorporates a wireless transmitter that send