Ipv6 Business Analysis

Great Essays
Business value of IPv6
The business value of IPv6 cannot be ignored. Cost effectiveness is always the factor that enterprise cares about. With the adoption of IPv6, companies can reduce the expenditure of network administration. However, enterprise should think further to establish the groundbreaking business strategy through the advantages of IPv6. This section discusses the Business value of IPv6 on cost aspect and practical aspect as suggestion for company to refer.
• IPv6 product life cycle
IPv6 had been designated as the next generation of Internet protocol. The feature of IPv6 allows the device to be used for a long period. That means enterprise does not need to frequently replace the IPv6 infrastructure and system. Since saving the cost
…show more content…
Each business unit requires a different size of the IP address. Network administers need to make sure those business units obtains the proper number of IP address and the scalability for future extension. Furthermore, Ensuring each segment interact appropriately with different area requires setting particular network policy in IPv4 environment. In IPv6 environment, those issues are eliminated and the IP addressing is simplified. (Das, A Beginner 's Look into IPv6 2008)
• Extension IP header
IPv6 increases the optional extension header that allows the protocol to be upgraded and modified for the future need without change the foundational structure. (S. Krishnan, J. Woodyatt, E. Kline, J. Hoagland, M. Bhatia 2012)
• Security
In order to secure the transition on the Internet, the Internet Protocol Security (IPSec) requests to be executed in IPv4 networks. Nevertheless, the IPv6 has integrated and mandatory practiced this security
…show more content…
The operation of IPSec has two main steps: first, the transmission node and the destination node must use IKE (Internet Key Exchange) to establish a secure connection (Security Associations); second, the packet will be encrypted by symmetric key encryption algorithms. IPSec has two implementation modes: AH (Authentication Header) and ESP (Encapsulating Security Payload), AH packet is used to confirm the integrity and non-repudiation, ESP packet is used for authentication and encryption. (Cisco Systems 2012

Related Documents

  • Improved Essays

    Cisco Swot Analysis Essay

    • 1103 Words
    • 5 Pages

    The strengths included customer focus, the sales and distribution capability of the company, the company’s acquisition process and also, the company’s strategic use of IT and the Internet. These four key strengths required to be maintained and kept stable so as to contribute to the company’s growth. As the company kept growing, the management felt that it was important to carry out an in-house evaluation and determine whether Cisco can achieve further success. Chambers and Solvik believed that the internet would eventually have an effect on every job in the future. An evaluation on whether the internet transformed how business was being carried out by the senior executives was carried out.…

    • 1103 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Fedex Case Analysis

    • 2381 Words
    • 10 Pages

    3. E-STRATEGY This means architecting an e-business, redesigning it to meet the functionality of our organization, thus it is far more than the reengineering of our business processes. In the net-enhanced e-business strategy, we talk about net-enhanced yield management, net-enhanced life cycle value management, net-enhanced asset leverage and net-enhanced service. For yield management to be most effective, FedEx people need to be able to communicate their offers to customer in real time. 4.…

    • 2381 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    Ntc300 Unit 1

    • 1895 Words
    • 8 Pages

    Each interface must have a unique IP address that identifies that interface. In our earlier conversations we examined MAC addressing and how layer two capable devices we able to utilize the MAC address to route packets to the desired destination. MAC address switching used layer…

    • 1895 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    How DHCP works:- Dynamic IP address will be generated and assigned from pool of network. It assigns that IP address which are expired. This is done using DHCP server. The high level working of DHCP has mentioned below: a) The network which is connected to your machine, request for IP address to DHCP server. b) On request, DHCP server allocates an IP address to machine.…

    • 1622 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    IPv6 IPsec can be used for protection and control levels and data levels between two routers. Cisco IOS software also offers a mechanism for protecting transmitted data between two routers using a new tunnel type that uses IPv6 IPsec. IKEv1 is used to manage the key. Figure 5.3 shows the topology in which this option is used between two routers A and…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Bryant Home Case

    • 912 Words
    • 4 Pages

    Opportunities: Bryant has been prepared to introduce the latest technologies in order to develop its product, promote the brand and improve its levels of customer service. Threats: Use of the Internet has become widespread From my own point of view I see that Bryant Homes is a worldwide company that should keep up this success so that to make it I think that they should care about the internet technology and to be up to date with it, also it should make offers on their services and try to make low prices as much as they can also by keeping the service with a perfect…

    • 912 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Effective marketing requires an integrated marketing communication strategy balanced with a differentiated advertising campaign that accommodates Global’s different products. Using traditional marketing and incorporating social media marketing will attain this balance. Traditional and social media marketing cannot be used exclusive on one another. Both are needed to achieve Global Tech marketing goals and to ensure the success of the company and its brands (Manternach, 2011). By following the recommendations made in this paper, Global Tech Computers will reach high global brand awareness, strength, and loyalty, reach more consumers, achieve message stability, and build a reputation for being beneficial to consumers and to their lives.…

    • 1262 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Most Ipv4 networks are running IPv4 because this you will need to have your network security team confirm that your NAT will not create problems, or determine if you are going to turn off NAT and use IPv6 over the entire network. IPv6 has a Feature called Unique Local Addresses or ULA which can replace NAT. If you plan to do away with NAT all together it is important that before you make the switch you create a good addressing plan. An addressing plan is a network map that will determine what and where your IPv6 address will be allocated. In order to create a good addressing plan you need to know how many IPv6 address that you will need.…

    • 1524 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    I realize that understanding access control system in computer is significantly important. Access control mechanism in operating system apply to ensure proper privilege, data integrity and availability. Transferred message over network is essential to put security which means encryption at sending point and decryption in receiving point. Basic idea of Cryptography is to convert original message to encrypted message. Converting can either make the encryption process hidden, so that an intruder remain unknow it Or, can use a known technique and use a hidden key.…

    • 1242 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Diffie And Hellman

    • 1622 Words
    • 7 Pages

    This connection guarantees that all data exchanged between webservers and browsers are private and integral. The server owns a certificate with a DH public key in it. “https:” in the URL specifies that the encryption is taking place (‘s’ stands for secure) SSL was renamed TLS (Transport Layer Security) by the Internet Engineering Task Force (IETP) in 1999. The SSL/TLS consists of two layers. The lower layer referred to as the Record Protocol manages symmetric cryptography to ensure that communication remains private and reliable.…

    • 1622 Words
    • 7 Pages
    Superior Essays