Ipv6 Business Analysis

Great Essays
Business value of IPv6
The business value of IPv6 cannot be ignored. Cost effectiveness is always the factor that enterprise cares about. With the adoption of IPv6, companies can reduce the expenditure of network administration. However, enterprise should think further to establish the groundbreaking business strategy through the advantages of IPv6. This section discusses the Business value of IPv6 on cost aspect and practical aspect as suggestion for company to refer.
• IPv6 product life cycle
IPv6 had been designated as the next generation of Internet protocol. The feature of IPv6 allows the device to be used for a long period. That means enterprise does not need to frequently replace the IPv6 infrastructure and system. Since saving the cost
…show more content…
Each business unit requires a different size of the IP address. Network administers need to make sure those business units obtains the proper number of IP address and the scalability for future extension. Furthermore, Ensuring each segment interact appropriately with different area requires setting particular network policy in IPv4 environment. In IPv6 environment, those issues are eliminated and the IP addressing is simplified. (Das, A Beginner 's Look into IPv6 2008)
• Extension IP header
IPv6 increases the optional extension header that allows the protocol to be upgraded and modified for the future need without change the foundational structure. (S. Krishnan, J. Woodyatt, E. Kline, J. Hoagland, M. Bhatia 2012)
• Security
In order to secure the transition on the Internet, the Internet Protocol Security (IPSec) requests to be executed in IPv4 networks. Nevertheless, the IPv6 has integrated and mandatory practiced this security
…show more content…
The operation of IPSec has two main steps: first, the transmission node and the destination node must use IKE (Internet Key Exchange) to establish a secure connection (Security Associations); second, the packet will be encrypted by symmetric key encryption algorithms. IPSec has two implementation modes: AH (Authentication Header) and ESP (Encapsulating Security Payload), AH packet is used to confirm the integrity and non-repudiation, ESP packet is used for authentication and encryption. (Cisco Systems 2012

Related Documents

  • Great Essays

    Name Muhammad Shahzad (73537) Who are Agero constituents? Broadly speaking Agero has four different types of constituents which are mentioned below • Drivers • Service provider • OEM • Insurance Companies…

    • 1277 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Nt1330 Unit 1 Assignment

    • 1292 Words
    • 6 Pages

    TCP/IP Transmission control Protocol/Internet protocol used to connect host computers on internet. First internet ARPANET was developed when US Department of research projects agency (ARPA) in the end of 1970s needed a system to share the resources of their big mainframe systems. In start ARPANET used Network Control Protocol but in 1974 TCP protocol was introduced and all pervious protocols were replaced with TCP Protocol. TCP/IP was the leader in protocols used as a communication protocol on the internet. TCP/IP is still being used as a communication protocol in network operating systems (Abbate, 1994).…

    • 1292 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The purpose of the internet layer is to organise or handle the movement of data on network. The meaning of movement of data is routing of data over the network. The main protocol used in the internet layer is IP (internet protocol), however ICMP (Internet control message protocol) and IGMP (Internet group management protocol) are also used in the internet…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Since IPv4 VPN puts the remote host on a private network, the natural choice for the IPv6 tunnel is the ISATAP (Intra-Site Automatic Tunnel Addressing Protocol), which is suitable for communication within a location. However, in practice, we can use any type of IPv6 tunnel as long as it is supported by the host and while the gateway is set up within the private network for it. Configurations for IPv4 access to VPN and IPv6 tunnel are completely independent. From the host's perspective, the tunnel configuration depends on the operating system used.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    IPv6: Internet Protocol version 6 (IPv6) is the latest version of the Internet Protocol (IP), which provides an identification and location system for computers on networks and routes traffic across the Internet. It is in the initial implementation stages, thus it is not extensively used worldwide. If it is implemented, then we can use many IP addresses in the IPv6 as it has 128 bits for reference, which is higher than the 32 bits of IPv4. Thus it will be future secure.…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    CHALLENGE: Reigning in security management and reducing complexities at remote sites. SOLUTION: Palo Alto Networks PA-3020 and PA500’s, simplifies security at Data Center and advanced security policy deployment for the remote offices RESULTS: Simplify network security with powerful security controls, ease of use and powerful reporting. Visibility into the specific identity of each application helps enforce appropriate usage policies.…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 3 Case Study

    • 305 Words
    • 2 Pages

    Answer 3:- A:- When it is very expensive and slow to access the external network then we use Forwarding name server . What is does keep the records of frequently visited sites in local DNS cache. This improves the efficiency . B:- Round Robin mechanism is used for load balancing . DNS hold maximum record of entry.…

    • 305 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Final Exam Paper

    • 1307 Words
    • 6 Pages

    How many bits are used in Each? In the IPV 4 the address space use 32 bits and in the IPV 6 totally 128 address bits are Used . but the IPV4 is the most Commonly used version because in the IPV4 it is relevant and faster processing and Compered to IPV 6 is less in cost . • IPv4 - 32 bits • IPv6 - 128 bits A.…

    • 1307 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Nt1310 Unit 9

    • 1390 Words
    • 6 Pages

    TCP Headers: 32bits Source and Destination Ports – Each 16bit number. Indicate which application is using the communicating stream. Used by most common services – FTP(21), SSH(22), SMTP(25), HTTP(80), DNS(53), POP(110). Sequence and Acknowledgment- Keep segments in order and data is delivered.…

    • 1390 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    1. Computer hardware: include computer machines, hard-drive or equipment on which data can be stored and recorded. It also consists a variety of other devices such as servers that help the IS do their tasks efficiently. 2. Operating system platforms: this is what runs the hardware devices, the software is used to act as an interface for the user and manage the incoming date and output.…

    • 266 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The individuals and companies that oppose the FCC’s actions want a free and open internet (Coldewey, 2017). They argue that ISPs should be classified as Title II and during the growth phase (1996-2005) all ISPs were regulated as Title II and the internet was fine. Investments into internet technologies have increased dramatically over the past 15 years. Every argument made by Chairman Pai and the ISPs have been proven to be…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Lanway Case Study

    • 3244 Words
    • 13 Pages

    Therefore in order to effectively use these resources, they must be managed in a way that best allows them to be accessed. Paper All brochure documents received are to be immediately filed in new filing cabinets situated on the sales floor – simply because space exists there for them. Each publication is to be filed in alphabetical order under the company heading, with a "post it note" stapled onto it, giving details of the date it was first entered and which employee was responsible for it.…

    • 3244 Words
    • 13 Pages
    Improved Essays
  • Improved Essays

    The internet backbone and globalization Introduction The world revolves around communication which is the main driver in business and international relations. Though there are many methods in which people can communicate, the world has an insatiable need for effective and timely communication. It is this need that has seen many developments in a bid to improve communication such as the telegraph and the telephone. However, the discovery of the internet took communication to a highly different level that has seen the world become smaller with the effectiveness of that communication, globalization.…

    • 862 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays