Ipv6 Business Analysis

Great Essays
Business value of IPv6
The business value of IPv6 cannot be ignored. Cost effectiveness is always the factor that enterprise cares about. With the adoption of IPv6, companies can reduce the expenditure of network administration. However, enterprise should think further to establish the groundbreaking business strategy through the advantages of IPv6. This section discusses the Business value of IPv6 on cost aspect and practical aspect as suggestion for company to refer.
• IPv6 product life cycle
IPv6 had been designated as the next generation of Internet protocol. The feature of IPv6 allows the device to be used for a long period. That means enterprise does not need to frequently replace the IPv6 infrastructure and system. Since saving the cost
…show more content…
Each business unit requires a different size of the IP address. Network administers need to make sure those business units obtains the proper number of IP address and the scalability for future extension. Furthermore, Ensuring each segment interact appropriately with different area requires setting particular network policy in IPv4 environment. In IPv6 environment, those issues are eliminated and the IP addressing is simplified. (Das, A Beginner 's Look into IPv6 2008)
• Extension IP header
IPv6 increases the optional extension header that allows the protocol to be upgraded and modified for the future need without change the foundational structure. (S. Krishnan, J. Woodyatt, E. Kline, J. Hoagland, M. Bhatia 2012)
• Security
In order to secure the transition on the Internet, the Internet Protocol Security (IPSec) requests to be executed in IPv4 networks. Nevertheless, the IPv6 has integrated and mandatory practiced this security
…show more content…
The operation of IPSec has two main steps: first, the transmission node and the destination node must use IKE (Internet Key Exchange) to establish a secure connection (Security Associations); second, the packet will be encrypted by symmetric key encryption algorithms. IPSec has two implementation modes: AH (Authentication Header) and ESP (Encapsulating Security Payload), AH packet is used to confirm the integrity and non-repudiation, ESP packet is used for authentication and encryption. (Cisco Systems 2012

Related Documents

  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    ABC Company has a few diverse equipment and software needs to meet the prerequisites of their network. We've investigated the different pieces of equipment and software to suit the needs of the company. We've looked into what every building will require with respect to what benefit every site gives and decided their needs based on those results. Servers…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    This specifies the general interface between the network layer (IP etc.) and the Data Link layer (Ethernet, Token Ring etc.) It’s the standard for the upper Data Link layer sublayer, also known as the Logical Link Control layer. It’s responsible for flow and error control. The Data Link layer wants to send some data over the network, 802.2 LLC helps make this possible. b. 802.3 – Ethernet 802.3 is the standard which Ethernet operates by.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    Configuring DirectAccess Understanding How DirectAccess Works The following steps, taken from the Microsoft white papers, shows how DirectAccess operates. 1) The Windows 7 DirectAccess client determines whether the machine is connected to a network or to the Internet. 2) The Windows 7 DirectAccess computer tries to connect to the web server specified during the DirectAccess setup configuration. 3) The Windows 7 DirectAccess client computer connects to the Windows Server 2008 R2 DirectAccess server using IPv6 and IPsec. 4)…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 5 Paper

    • 415 Words
    • 2 Pages

    " This information security challenge is why Gartner predicted that micro-segmentation technologies will be one of the must-haves for enterprise security in 2016. The research firm explained that by cryptographically isolating workloads and encrypting network traffic end-to-end, organizations can prevent lateral "east/west" hacker movement, contain breaches and better secure…

    • 415 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment

    • 867 Words
    • 4 Pages

    The web pages, the content and the web servers, this is the technology that helps the World Wide Web and helps store and manage the internet and the web content. D1: Role of TCP/IP protocol, linking with Application Layer protocol: TCP/IP stands for (Transmission Control Protocol/Internet Protocol); this is part of the Internet Protocol Suite. The role of TCP/IP is to make sure the data that it is receiving is been delivered to the right address, they are a combination of instructions that outline packages of information sent to the user. The TCP/IP contains different protocols HTTP , FTP , SMTP , DNS , RIP and SNMP .…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    With this, a compromised node running malicious code disguised as a legitimate node continuously seeks to find ways to disrupt communication and paralyze the network. However, node compromise attack is severe when the base node is compromised. Therefore, different activities like stealing secrets from the encrypted data, reporting wrong and misleading information to the network, reporting other legitimate nodes as compromised nodes, launching different routing attacks takes place. The best way to counter node compromise is to utilize code testing schemes which employ an optimal program verification process to verify the memory of a sensor node by calculating the hash values of randomly selected memory regions.…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    1. Computer hardware: include computer machines, hard-drive or equipment on which data can be stored and recorded. It also consists a variety of other devices such as servers that help the IS do their tasks efficiently. 2. Operating system platforms: this is what runs the hardware devices, the software is used to act as an interface for the user and manage the incoming date and output.…

    • 266 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Lanway Case Study

    • 3244 Words
    • 13 Pages

    Therefore in order to effectively use these resources, they must be managed in a way that best allows them to be accessed. Paper All brochure documents received are to be immediately filed in new filing cabinets situated on the sales floor – simply because space exists there for them. Each publication is to be filed in alphabetical order under the company heading, with a "post it note" stapled onto it, giving details of the date it was first entered and which employee was responsible for it.…

    • 3244 Words
    • 13 Pages
    Improved Essays
  • Improved Essays

    The individuals and companies that oppose the FCC’s actions want a free and open internet (Coldewey, 2017). They argue that ISPs should be classified as Title II and during the growth phase (1996-2005) all ISPs were regulated as Title II and the internet was fine. Investments into internet technologies have increased dramatically over the past 15 years. Every argument made by Chairman Pai and the ISPs have been proven to be…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Name Muhammad Shahzad (73537) Who are Agero constituents? Broadly speaking Agero has four different types of constituents which are mentioned below • Drivers • Service provider • OEM • Insurance Companies…

    • 1277 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    It was made to cater to administrative supplies to IP and reception of IP. Line of Business groups were also made which characterized and executed operational and business sector techniques. They were also responsible to answer to objective clients. Following is the hierarchy…

    • 1197 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The internet backbone and globalization Introduction The world revolves around communication which is the main driver in business and international relations. Though there are many methods in which people can communicate, the world has an insatiable need for effective and timely communication. It is this need that has seen many developments in a bid to improve communication such as the telegraph and the telephone. However, the discovery of the internet took communication to a highly different level that has seen the world become smaller with the effectiveness of that communication, globalization.…

    • 862 Words
    • 4 Pages
    Improved Essays