Explain potential issue and concern with ipv-six

Assignment Help Computer Network Security
Reference no: EM131486506

Assignment

You are a well-known expert in the design and security of corporate network infrastructures. As such, Z Corporation, Inc. (ZCorp) has contacted you and is requesting a proposal for a network infrastructure integration design.

ZCorp is a global financial institution that intends to add Internet Protocol version 6 (IPv6) to its existing network. The headquarters of ZCorp is in Denver, CO and it also has main offices in Sydney, Australia, Vienna, Austria, Tokyo, Japan, and Rio de Janeiro, Brazil. Local routers are providing network services such as Dynamic Host Configuration Protocol (DHCP), network address translation (NAT), and Domain Name System (DNS). It is using Enhanced Interior Gateway Routing Protocol (EIGRP) as its interior gateway protocol and Exterior Gateway Protocol (EGP) as its exterior gateway protocol. Its wide area network (WAN) involves multiple T3 connections and the use of Asynchronous Transfer Mode (ATM). It is unclear to the ZCorp information technology (IT) staff whether they should replace Internet Protocol version 4 (IPv4) with IPv6 or use both versions of IP (dual-stack operation).

Your mission is to prepare a proposal document that makes a recommendation for either replacing IPv4 with IPv6 or using both version of IP. This recommendation must be supported and explained in detail. Research IPv4 and IPv6 to understand differences, benefits, and challenges. Seek information regarding LANs implementing dual protocol stacks. Make a recommendation for a) replacing IPv4 with IPv6; b) using IPv4 and IPv6 together (dual-stack operation). Support your recommendation.

Your proposal should specify a phased approach for your recommendation. You should include the following considerations in your document:

• Benefits of implementing IPv6, especially in the area of security
• Potential issues and concerns with IPv6
• Whether or not to continue the use of network services with IPv6
• Necessary changes to existing hardware with IPv6
• Other resource factors
• High level set of steps to implement your recommendation including IP addressing scheme

Your proposal should be a Word document of 3-5 body pages that includes a title page and an abstract. Citations and references list must be in APA style. Refer to the APA style guide found in the Library for further information.

Reference no: EM131486506

Questions Cloud

Profit maximization rule with examples and graphs : Critically evaluate the profit maximization rule with examples and graphs.
Accountability be affected by or related to social marketing : In what way might each type of accountability be affected by or related to social marketing?
Estimate your total insurance needs using the dink method : You and your spouse are in good health and have reasonably secure careers. Each of you makes about $40,000 annually. You own a home with an $80,000 mortgage.
Principle behind hiring decision of different : 1. Explain the principle behind hiring decision of different factors by firms with examples.
Explain potential issue and concern with ipv-six : Explain Potential issue and concern with IPv6, Whether or not to continue use of network service with IPv6 and Necessary change to existing hardware with IPv6.
Compare the costs and provisions of the given policies : Obtain premium rates for $50,000 whole life, universal life, and term life policies from local insurance agents. Compare the costs and provisions.
Waging a price bidding war for your clients business : As the new sales manager for a medium-sized manufacturer, How can you avoid waging a price bidding war for your client's business?
Find the average number of additional years : Use Exhibit to find the average number of additional years a 25-year-old male and female are expected to live, based on the statistics gathered by the U.S.
Equilibrium under perfect competition : Explain elaborately the principle of long run equilibrium under perfect competition.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Create and describe a comprehensive security policy

Create and describe a comprehensive security policy for this data-collection and analysis company that will: Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA i..

  Explain encryption concepts in understandable terminology

Imagine that you are an IT security manager charged with explaining encryption to senior management. Create a PowerPoint presentation of at least seven slides that explains encryption concepts in understandable terminology.

  Explain the general purpose of the firewall

Explain the general purpose of the firewall above. Your explanation should include a description of the networks the gateway machine is connected to and how it is connected

  Organization security plan

Organization Security Plan

  Explaining level of cyberphobia in workplace

After completing the Unit reading on the subject, give your sense of the level of cyberphobia in the workplace and your suggestions on dealing with it as an IT manager.

  Attributes of company organizational culture

Some attributes of a corporation's organizational culture are so obvious that even an independent observer can feel them. Provide an example of such an observation and describe what cultural phenomenon it defines.

  How a risk-based audit may address these concerns

What is your understanding of how a risk-based audit may address these concerns and explain how you would describe to the management team the difference between a compliance and a substantive audit.

  Chance to break a cryptosystem

Your task is to show that breaking the scheme is roughly as difficult as a brute-force attack against single DES. Suppose you have a few pairs of plaintext

  Evaluate and select a security tool for recommendation

The purpose of project is to write an executive proposal for a fictitious company called Advanced Research Corporation. Evaluate and select a security tool for recommendation from the provided list of tools.

  How the user master record in sap plays an important role

Discuss how the user master record in SAP plays an important role in ensuring assignment of appropriate rights, activity groups / roles and authorisations for individual users.

  Define ethical issues related to information technology

Locate a news article based on a recent event on ethical issues related to information technology. For example, Wikileaks, Snowden, etc.

  Define cybercrimes and computer security

Evaluate how teamwork and leadership are effective tools for financial forensic investigations. Provide support for your evaluation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd