Changes

Jump to: navigation, search

Talk:Main Page

176 bytes removed, 19:41, 14 April 2015
no edit summary
'''The Internet of Things'''
The internet of things is a scenario which objects or devices connect each other without any human interaction. This scenario was issued in 1991 by implementing internet. In 20th century by developing nanotechnology and computer science, experts start focusing more about internet of things. Many famous companies in IT change their business plane to develop their research in internet of things. They also have huge progress in it. By using internet of things scenario IT companies have main effect in developing in other industries like the medical and healthcare systems, energy management, building and home automation.
Many famous IT companies like Microsoft, CISCO and IBM. They create many solutions based on Internet of thing, For illustration, Microsoft Company engineers believe that Internet of Things is flexible and it helps converged between devices, it also consider: reducing hardware costs, more machine are talking to each other, Software is more advanced than ever, The economic benefits are huge.
Although experts in IT solve many problems by using internet of things scenario, but there is a serious problem, how we can manage this huge network. By using IPv4 topology scientists found out they will face the lack of IP amount problem. Therefore they create new version of IP topology which is IPv6 topology. By using IPv6 topology we can administer it reliably, efficiently and securely.
'''Definition of IPv6'''
IPv6 (Internet Protocol Version 6) is the latest level of the Internet Protocol (IP) and is now included as part of IP support in many products including the major computer operating systems. IPv6 (Internet Protocol version 6) is a set of specifications from the Internet Engineering Task Force (IETF) that's essentially an upgrade of IP version 4 (IPv4). The basics of IPv6 are similar to those of IPv4 -- devices can use IPv6 as source and destination addresses to pass packets over a network, and tools like ping work for network testing as they do in IPv4, with some slight variations. The most obvious improvement in IPv6 over IPv4 is that IP addresses are lengthened from 32 bits to 128 bits. This extension anticipates considerable future growth of the Internet and provides relief for what was perceived as an impending shortage of network addresses. IPv6 also supports auto-configuration to help correct most of the shortcomings in version 4, and it has integrated security and mobility features.
'''IPv6 features include:'''
Supports source and destination addresses that are 128 bits (16 bytes) long.
Requires IPSec support.
'''The next header consists of three categories''':
IPv6 Header
1. IPv6 HeaderUpper Layer Protocol
2. Upper Layer Protocol 3. Extension Headers
IPv6 and extension Headers are two new features in IPv6.
'''IPv6 Addressing'''
 
IPv6 address is 128 bits or 16 bytes long which is four times longer than IPv4. IPv6 addresses are represented in hexadecimal separated with colon.
In IPv6 there are three types of addresses:
1) Unicast
2) Multicast
3) Anycast
Anycast is a new feature in IPv6. It classifies multiple interfaces and sends the packets to a single and the nearest of the several services in a group. Overall, it is a ccommunication that occurs between a single sender and the nearest of a group of receivers.
'''End-to-end IPv6 Packet Delivery Process'''
1. Sending host process
2. Sending host process Router forwarding process
3. Receiving host process
'''IPv6 Routing'''
The next-hope interface: It is used to identify the physical interface and it forwards the packets to destination or to the next router.
Defination Definition of IP (internet protocol) - The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams data grams across network boundaries
Defination Definition of IPV6 – it is the latest version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet.
Definition of IPV4 – it is the fourth version in the development of the Internet Protocol (IP) Internet, and routes most traffic on the Internet.
How efficient is IPv6 network
IPv6 reduces the size of routing tables and makes routing more efficient and hierarchical. IPv6 allows ISPs to aggregate the prefixes of their customers' networks into a single prefix and announce this one prefix to the IPv6 Internet. In addition, in IPv6 networks, fragmentation is handled by the source device, rather than the router, using a protocol for discovery of the path's maximum transmission unit (MTU)
Privacy
IPv6 supports globally unique IP addresses by which the network activity of each device can potentially be tracked.The design of IPv6 intended to re-emphasize the end-to-end principle of network design that was originally conceived during the establishment of the early Internet. In this approach each device on the network has a unique address globally reachable directly from any other location on the Internet
How secure is IPv6 ?
Is it secure enough to use in our daily lives? Yes it can be used and it is one of the most widely used networks. A widely assumed benefit of ipv6 is IPSEC support as ipv6 supports I0SEC for transport encryption which makes it secure. Another security feature is discovery of secure neighbour which makes it more and more secure.
Support in major o.s.
All major operating system have ipv6 .not only all os have ipv6 but their support is on default. This means that for most people ipv6 is possible to use with any operating system.
Examples of OS which support ipv6
1.)Microsoft windows since windows vista and server 2008
2.)apple os x since 10.2 jaguar
3.) linux sice kernel 2.6.12
All in all ipv6 network is a reliable and efficient as ipv6 is supported by most of the operating system available in market, however there are some limitations in security, like it does not support IPsec (internet protocol security) properly, which is an important security feature .Basically it cannot prevent attacks on layers above the network layer in the network protocol stack.

Navigation menu