This website uses cookies to ensure you have the best experience. Learn more

I Pv6 Transition Strategies Security Threats Essay

3232 words - 13 pages

Introduction
Internet Protocol version 6 (IPv6) is the next protocol version that it is used for communications on Internet. The Internet based on IPv4 protocol has made countless success in the past 20 years. Yet it has some limitations that were not estimated when it was first created, the IPv4 protocol cannot content the requirements of the Internet expanding. It is reported that all unallocated addresses for IPv4 will be used up within 5 to 6 years. IPv6 protocol suite was presented in IETF (Internet Engineer Task Force) on 1994. This suite is using 128-bit address instead of 32-bit IPv4 address. The United States, Europe, and East Asia were the first to recognize the significance of ...view middle of the document...

IPv6 security weaknesses currently exist, and as the popularity of the IPv6 protocol increases, so the number of threats do.

IPv6 Transition Strategies
IPv6 transition is the process of replacing IPv4 gradually with IPv6 in the Internet. During the transition of IPv6, the infrastructures of the network and the hosts should be upgraded to support IPv6, the applications of the network should also be migrated to be running in IPv6. Thus the process of transition to IPv6 will last for a long period. On one side, the IPv4-based Internet is so diffused which makes it impossible to change the whole Internet over a night, on the other side, the deployment of the NAT technology lessens the urgent need of global IPv4 addresses, this could delay the deployment of IPv6. However a serious research on the transition process had been done. The research on IPv6 transition can be classified in to three fields
(1) Research on the basic IPv6 transition mechanisms. Different mechanisms for transition (e.g NAT-PT, 6to4, Tunnel Broker) have been offered for varied transition requirements. These mechanisms provide tools for the all transition process
(2) Research on the analyzing of the typical scenarios for transition and how to provide pertinent transition schemes. As there are many different scenarios during IPv6 transition, the best scenarios need to be emphasized about IPv6 deployment and applying appropriate transition mechanisms.
(3) Research on the security issues during the IPv6 transition. Some security problems are specified as a mechanism once, and others are coming from the coexistence of IPv4 and IPv6 in the same network.
1) Basic IPv6 transition mechanisms
Generally there are three strategies:
Dual-stack
Devices such as PCs and routers run both IPv4 and IPv6, nodes supporting IPv6 and IPv4 protocols. IPv6 protocol is used to communicate with IPv6 nodes, and IPv4 protocol is used to communicate with IPv4 nodes. When it comes to the network itself, thus network devices need to support both versions, such that same or similar services are provided with IPv6 as with IPv4. This infers some network devices will need to be replaced or upgraded to support IPv6 protocol. DNS plays a crucial role in this transition technology as it is providing the vital linkage between end-user naming and the destination IP address. When the end users attempt to access a dual-stack device host, it will type in the host name, and their application will query DNS. If the application can be configured by administrators to support both an IPv4 and IPv6 address query, it may receive the destinations of both IPv4 and IPv6 addresses. But if the application does not natively support a dual-query lookup, translation techniques such as “bump in the stack” and “bump in the API” will be the solution to support this feature.
It is expected for Dual-stack to be very common, the basic method of it can be extended further than a physical LAN to a multi-hop network where the...

Other Essays Like IPv6 Transition Strategies Security Threats

Network Design Project Essay

4945 words - 20 pages Cables / Switches / Routers /Controllers High Speed Internet / Transmission Control Protocol/Internet Protocol (TCP/IP) IEEE 802.11 wireless networking standards  Four-wire digital circuits Electronic and Physical Threats It is expected that networks should maintain a level of security, and to be more inclined to be in the defensive mode in today’s increase of cybercrimes, the irony, the more difficult and secure the more tenacious the

The History, Function, Governance, and Value of the Tcp/Ip Standard

2113 words - 9 pages and authentication mechanisms below the application layer. An updated version of IP (IPv6) is a next-generation protocol to replace the current version (IPv4) (RFC 2460, 1998) intended to fix a number of problems, improve routing and auto-configuration, and allow for an increased number of IP address. Although IPv6 can co-exist with IPv4, there is little impetus for carriers to transition from the current IPv4 standard to a dual protocol

Research Paper

1057 words - 5 pages USA from foreign threats and lack of safety. In response to this threat under the public law department of homeland security was established under homeland security act. The main goal of this act was safety of USA and its people from foreign threats for securing the country by enhancing preparedness and response efforts and to integrate these efforts with prevention work (Wiki, 2002). The Department of homeland security

Understand and Coping with Change

1708 words - 7 pages and extensive travel.  For the most part, the employee embraces change for reasons of self-interest since it increases their level of power, money, prestige, and job security, as well as the personal conveniences that accompany the new appointment. In an organization, a person’s attitude plays a key role to how a transition pans out.  The pace of change can make an individual feel disoriented and with an uncertain helpless sensation.  People

Computerized Accounting System Threats in Malaysian Public Services

3723 words - 15 pages services department to evaluate their computerized accounting system security, and begin to properly pursue effective strategies to improve quality and lower the risk of incidents. Keywords Computerised accounting system, system threats, Jabatan Akauntan Negara [pic] 1. Introduction The revolution of accounting systems used in Malaysian Public sector begins in early 1969, namely Program Performance Budgeting System (PPBS) for budgeting

It-109 Final Review

4608 words - 19 pages following IPv6/IPv4 transition technologies takes the form of a hardware device? NAT-PT 16) What is the main advantage of using Direct Access over VPN connections? User's don't have to Manually connection to remote network and Direct access used IPv4 reather than IPv6 17) Which of the following is not a prerequisite for a Direct Access server? Nat connection 18) Which of the following tools can you use to import and export

Terrorist Event Response Paper

2375 words - 10 pages history, there have been many threats to the security of nations. These threats have brought about large-scale losses of life, the destruction of property, economic stress and losses, and the displacement of large numbers of people” (Homeland Security, 2012). Terrorism has always been a systematic use of violence to create a general climate of fear in a population which often had a particular political objective undertone behind the terrorist act

E-Business

4184 words - 17 pages Steps for Strategy Development • Undertake a SWOT analysis. – Evaluate the Strengths, Weaknesses, Opportunities, and Threats facing a business. • Determining distinctive competencies. – Analyze a business’s value chain to help identify internal strengths and weaknesses that can help determine how a business can compete. Bhawani Nandan Prasad 4 Steps for Strategy Development • Determining the competitive arena. – Determine the

It Security Policy Framework

1345 words - 6 pages not exclusive to one organization, but all who develop a security policy framework. It is up to the organization to be able to overcome these issues with the proper strategies. IT Security Framework for the Insurance Company An ideal security framework the insurance company should abide by is the International Organization for Standardization (ISO) 27001. This standard explains the requirements for companies to meet their Information

Information Security

3489 words - 14 pages unauthorized uses include malicious acts such as theft or destruction of intellectual property, insider abuse and unauthorized access to information that results in a loss of data integrity and confidentiality, as well as malware threats such as viruses, spyware, worms, and Trojans (Johnston and Hale, 2009, p. 126). To better understand how planning and enhancing security can increase the value in security programs; a survey was conducted of security

Border Security

1327 words - 6 pages miles of land border with Canada and Mexico as well as numerous lakes, rivers, and coastal waters. These areas are the entry and exit to our nation and an economic gateway for the world. In today’s world, extremist organizations such as the Islamic State of Iraq and Syria (ISIS) pose many challenges to the security of our country. Not only do these organizations pose challenges but an innumerable amount of threats face our country. It all

Related Papers

The Seven Domains Of A Typical It Infrastructure

638 words - 3 pages still carries the vast majority of Internet traffic as of 2013” (IPv6, 2013). The Internet has experienced an astonishing increase of devices accessing the Internet. Because of this increase, IPv4 addresses are running out. The solution is for IPv6 to accommodate this increased demand by providing a much larger address space, along with improved traffic routing and better security. There are several advantages and disadvantages with IPv6. Some

Networking Essay

1053 words - 5 pages pools are likely to be depleted in approximately one year. The U.S. likely has less than a year left before *all* new networks will have to use IPv6 address space. Ahead of that date, the Internet Society and many global IT organizations are encouraging adoption of IPv6 and sponsoring World IPv6 Day (Links to an external site.) in order to ready the industry for this necessary transition. The key difference between the versions of the protocol is

Advance Networking Essay

3080 words - 13 pages . ] Table of Contents IT305-1503A-01 Network Upgrade Project Plan Executive Summary 1 Table of Contents 2 Section 1: Implementing IPv6 4 Section 2: Network Infrastructure Design 5 Section 3: Linux Networking 6 Section 4: Analyzing Network Traffic 7 Section 5: Network Security 9 References 12 Section 1: Implementing IPv6 Honeywell International It has been decided that as our presence grows on the global market we

Intrusion Prevention Systems Forecast, Share And Size – Jsb Market Research

1737 words - 7 pages Attacks (DDoS) and Advanced Persistent Threats (APT). According to TechSci Research report of “Global Intrusion Detection Systems / Intrusion Prevention Systems Market Forecast & Opportunities, 2020”, the Intrusion Detection Systems / Intrusion Prevention Systems Market across the globe is forecast to grow at over 9% through 2020. Increasing government focus on stringent security and regulatory compliance is boosting the global Intrusion