Internet Security Paper

4431 WordsFeb 12, 201318 Pages
Abstract Although, IPv.6 was released in the early 1990’s, very few infrastructures, large or small have implemented this new protocol into their network usage. According to Hogg’s, Internet Security, “Most manufacturers of network infrastructure devices have been supporting IPv6 for several years, as have most server and client operating systems.” (Hogg, 2009) If implemented properly, IPv.6 can open users to a new world of security resources, and increased efficiency for businesses of all sizes. The key to realizing these new and improved benefits lies in proper preparation, planning and knowledge building for employing this network protocol. This essay, will explore critical issues for the user when planning for a successful transition from IPv.4 to IPv.6; it will introduce IPv.6, detailing its background and importance to the security world; it will describe the current state of IPv.6 in the world, as we know it, and it will explore the weaknesses and vulnerabilities of both IPv4 and IPv6 and the possible solutions for these problems. Introduction According to Deering’s, Internet protocol, version 6 (IPv6) specification, “IP” is the Internet Protocol, or the set of digital communication codes that underlies the Internet infrastructure. IP allows the flow of packets of data between any pair of points on the network, providing the basic service upon which the entire Internet is built. Without IP, the Internet as we know it would not exist.” (Deering, 1998) In most of my findings IPv.6 is know as the “next generation” of IP. By implementing IPv.6 the Internet will be able to grow at faster rate, more people will have access to it, and more devices will be able to connect to it. With IPv.4 the use of multiple multimedia devices such as smart-phone, computers, gaming systems, etc, have placed a tremendous amount of strain on the outdated system. With IPv.6 this

More about Internet Security Paper

Open Document