• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  • Level: GCSE
  • Subject: ICT
  • Word count: 5134

Internet Protocol V6

Extracts from this document...

Introduction

Internet Protocol V6 Page 2 Introduction. 3 Internet Communication. 5 Ipv4 Addressing and its Limitations. 8 Ipv6 In Detail. Ipv6 datagram Format. The Ipv6 Address Structure. 11 The Move to Ipv6. 13 Other Advantages of Ipv6. Security Issues. Autoconfiguration. 14 Conclusion. 16 Bibliography. Introduction In the early 1970s the U.S. Department of Defence challenged and sponsored the Advanced Research Projects Agency (ARPA) to create an indestructible network. ARPA rose to the challenge and produced a network that became known as the ARPAnet. The network was designed to share resources, send and receive information to/from anywhere, and operate without any central control, so that if any portion of the network should fail, the remaining portions would be unaffected. The ARPAnet has grown into what we now know as the ' Internet'. The word 'Internet' stands for: 'network of networks', and it is precisely that: a network that comprises of thousands of smaller regional networks which are scattered world-wide. Initially, the Internet was confined to academy, research and the government, but eventually the government decided to allow access to the Internet for commercial purposes. The business world soon came to realise that the Internet offered opportunities never before thought possible. They could offer a better service to their customers, improve operational efficiency, and perhaps more exciting was that their wares could be offered world-wide on what would be largely a virtual shop front. Since the mid 1990s, the Internet has seen a phenomenal growth rate. This is largely due to an increasing interest in the world wide web (WWW), the dramatic rise of modem speeds, and the decreasing cost of getting onto the Internet. As a result most schools, colleges and many homes and businesses now have connection to the Internet, and this growth is expected to increase with the introduction of Internet phones, Internet television, and other future potential products which may emerge with Internet interfaces. ...read more.

Middle

However, they are currently fighting a losing battle as routing tables are increasing in size faster than the routers can map, and if the growth of these routing tables is allowed to continue it could result in parts of the Internet becoming unreachable. As these problems started to become critical, an attempt to alleviate them came in the form of an alternative type of routing, called Classless Inter-Domain Routing (CIDR). The main aim of CIDR was to make efficient use of the remaining network address space, and to minimise the growth of the Internets routing tables. CIDR makes efficient use of the many remaining class C addresses, by eliminating the traditional method of the class A, B, and C address spaces. This was achieved by abandoning the fixed netid/hostid boundary, and employing a variable boundary that is dependent on the number of hosts attached to a network. Thus if a network manager requests addresses for a network that will have 1000 hosts, then a contiguous block of 1024 (210) class C addresses can be allocated. The variable boundary is achieved by the use of an address mask. The address mask is used to identify the division between the netid and hostid part of the address. Each gateway contains a copy of the address masks for each of the networks and uses this to route the packets to their destination, this allows for a single routing table entry to specify the routes to many individual networks. Although CIDR has been effective in stemming the depletion of address spaces, and the growth of the Internet's routing tables, it is clear that it cannot prevent the eventual exhaustion of the 32-bit Ipv4 address space. The solution to this problem comes in the form of a new version of the Internet; Ipv6. Ipv6 In Detail Ipv6 is effectively a new protocol, and although it has been designed mainly to provide a solution to the limited address space problem, it also includes many other features, which take care of other deficiencies associated with Ipv4. ...read more.

Conclusion

The facility will also be able to configure temporary addresses for users of mobile computing, such as laptops. Conclusion Ipv6 has many features and benefits over and above those provided by IPv4. Network Administrators are looking to provide robust, scalable, secure, high performance networks. This is proving difficult to achieve due to the continual requirement to update routers performance and routing tables, most of which is manually done. The issue of gaining a suitable IP address for sufficient users is not as easy now due to the depletion of available IP addresses. Subsequently when this is not possible the technological 'workaround' such as that provided by CIDR or NAT's means not all of your network is visible to the larger Internet and potentially bottlenecked, as all traffic has to pass through the translator before it can get onto a router. The ability of Ipv6 to allow auto configuration of routers and host Ipv6 addresses significantly reduces maintenance times and effort. Ipv6 is more efficient in terms of network traffic loads due to its ability to Unicast and Multicast along defined hierarchical routes. Ipv6's bit size and format allows for future development and with almost unlimited scalability and security should serve well as a standard for the foreseeable future The very fact that Ipv4 is insecure and open to misuse should be reasons enough to cause a conversion as soon, as is economically viable. The only major downside is the requirement to providing Dual stack Routers to enable the migration of data between IP versions whilst the two protocols remain in operation. Ultimately all networks will have to convert to Ipv6 because demand for IP addresses will continue to rise as more devices and technologies place demands on a finite resource. On a final note, it was found that Network protocols and their functionality is a major issue for businesses whose primary function is data transfer. For them to remain competitive they have to have efficient, secure and reliable communication methods. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    It allows for partial transmission of objects. ? Security: HTTP/1.1 comprises further mechanisms to check message integrity and to authenticate clients, proxies, and servers. 2. Why HTTP/HTML is not suitable for mobile applications and devices? Describe some approaches that might help wireless access and some system supports for mobile www.

  2. ICT Systems in Everyday Life: Your Local Community

    a plastic smartcard with a chip, which contains a unique card number and some security information, such as an expiration date or CVC (CVV). Security is provided by the customer entering a personal identification number (PIN). Using an ATM. Customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances)

  1. OCR GCSE Business & Communication Task 7 Report

    I have to also ensure I am not passing on client's information without permission to other companies, associations or business's. To ensure I stayed within these guidelines I made sure I was treating clients information fairly by keeping it safe and not miss-using it for fraud, blackmail or theft.

  2. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    * Identify customer's behavior SK-II mainly focuses on adult women with medium to high class segment. The buying behavior of this class is looking for high quality and well-known products with excellent after sales service. So the targeted affiliate should be portals, community sites, and niche Web sites related to women, fashion and beauty features.

  1. Information Security.

    It is impossible to make a widespread network physically secure, therefore security measures depend on information Techniques such as cryptography. No data can be made secure without physical protection of some sort, of the equipment The effect of good design is to concentrate the need for physical security not to circumvent it entirely.

  2. Impact of E-Commerce.

    [A.Navarro & T.Khan 1996] Effective visual presentation plays a big part in attracting customers to the site. They also mentioned; - Creating Balance - Producing a focal point - And offering valuable content Are also important qualities to have for a Web site to be effective.

  1. This report gives the clear idea about current statistical situation in e-learning trends.Task 2 ...

    * The University will face more competition for students from an increasing number and diversity of providers of educational services. The university will have to more carefully focus its recruitment efforts to be successful. * Public concerns related to safety, crime, and alcohol issues have heightened awareness of personal risk issues on college campuses.

  2. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    ''Capital radio listeners for example can get a copy of the music playlist by text. The users of SMS will be able to send text messages from their TV or mobile and get the replies back to their TV. (Guardian online, October 17th 2002, pp.4-5)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work