IPv6, Introduction
The high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete.
IPv6, Primary Benefits
Two primary advantages of IPv6 are the support for stateless address auto configuration and the address space that is much larger. Other benefits of the new IPv6 are that the security is natively defined in the protocol, the simple Plug and Play (thanks to stateless auto configuration), the IP mobility is optimized.
Network Security and IPv6
First, we need to understand the meaning of "network security", in order to understand it's relationship with IPv6. On the internet the concept of security has usually focused on data security, authentification and data privacy. In the latest years the network security has been expanded.
Avoiding single points of failure while building the networks helps making them reliable when problems occur in a localized section. This way the network security has expanded and it now makes the Internet able to resist in the face of natural disasters or physical attacks.
Allowing a much simpler emergency response networks deployment, IPv6 offers great benefits in both areas. With superior data security, IPv6 allows us to to have more robust networks.
Data Security
The Internet Protocol security(IPsec) provides support for data encryption, user authentificaton and data integrity. IPv6 has support for IPsec and is expected that this way Internet Protocol security will be much widely available on the IPv6 end-nodes.
Conclusion
With the support for IPsec, IPv6 should create wider availability of end-node implementations. IPv6 will make the deployment and implementation of emergency networks easier with the included stateless address auto configuration. In short, IPv6 will make out lives safer an more secure.
The fastest and easiest "what is my ip" service to find out your IPv6 or IPv4 address, http://www.whatismyipv6.net
![]() |
|
![]() |
|
![]() |
|
![]() |
Is your data secure? Think again. Securing data is unlike... Read More
They're out there. Individuals trying to make a quick buck... Read More
Whether we like it or not, we are all living... Read More
If you know what is the 'Fishing' then it's very... Read More
You can detect spyware online using free spyware cleaners and... Read More
Paypal is a great site and is used by many... Read More
There are several basic concepts to keep in mind when... Read More
Spyware is software that runs on a personal computer without... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
If you are wondering how to fight spyware for safe... Read More
Phishing is a relatively new form of online fraud that... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
Huge number of spyware software applications are available in the... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Security leaks can be a big problem for any site... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Spyware is software or hardware installed on a computer without... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
The trash folder in my main inbox hit 4000 today.... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
If you are a parent, as am I, I think... Read More
Before we start, I want to make it clear that... Read More
At this point, if you've got the whole "turning the... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
You'd better learn news from media, not from emails, security... Read More
Fishing on the Internet has come a long way. However,... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Before you enter your name, address or any other data... Read More
While clicking from site to site on the internet you... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
File sharing on p2p is soaring despite the music and... Read More
If you are a parent, as am I, I think... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Afraid that someone is monitoring your PC or installed a... Read More
In recent days, I was one of the unfortunate persons... Read More
To blog or not to blog? Well, why not? Lots... Read More
There has not been a time in the history of... Read More
First off I should explain what phishing is. Phishing is... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
Over the past few years as the internet has become... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
This is the second in a series of articles highlighting... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
There is nothing more important that password security in world... Read More
Viruses are, however, not the only malicious software programs out... Read More
First the basic definition of Spyware: It is a type... Read More
This is not some new fangled techno-speak, it is a... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
If you know what is the 'Fishing' then it's very... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Have you ever got an email asking you to confirm... Read More
History and BackgroundThe virus was one of the first ever... Read More
Only the top spyware removers are successful at detecting and... Read More
Paypal is a great site and is used by many... Read More
Threats we ordinary Web users face online leave us no... Read More
If spyware were a person and he set himself up... Read More
Spyware and adware are becoming major problems for online surfers... Read More
As more people are logging onto the Internet everyday, Network... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Internet Security |