Verified Document

Internet Protocol Version 6 IPV6 Technology Essay

¶ … Internet Protocol Version 6 (IPv6) technology, one of the technologies listed on Gartner's 2004 Hype Cycle that has high visibility today because new IPv4 addresses are nearly exhausted. On the 2012 Hype Cycle, IPv6 is now listed in the "Trough of Disillusionment," yet the U.S. government is still directing that transition to this protocol continue: Name at least three advantages that government organizations will gain by transitioning to IPv6 technology today, in 2013. Explain why.

The government may actually do well by transitioning to IPv6 technology. There are3 various reasons for its doing so. Three of the reasons are the following:

More Efficient Routing

Given that government networking and cloud computing can be 'stuffed' with heavy traffic, it is essential that the government archives as effective a routing process as possible. This is particularly so since it is essential for the government to have instant and faultless communication with its many recipients and nodes. IPv6 technology can help the government achieve this efficient routing by IPv6 technology reducing the size of routing tables and making the routing more hierarchical.

The...

Parts of this document are hidden

View Full Document
svg-one

The benefit of to IPv6 technology is that aggregates each of these prefixes into one single one and announces this prefix to the IPv6 technology Internet.
Additionally, routing is also made more efficient by fragmentation being handled by the source device instead of by the router as is done by other devices.

2. Security

The government deals with a great amount of data and it is essential that it protects this data specifically since here and there hackers have managed to get through and make news by hijacking government sites.

IPv6 technology is beneficial for the government in that it provides optimum security, authentication and data integrity. IPv4 ICMP packets have the potential to carry malware and are therefore blocked by firewalls, but the government (and others) can use ICMPv6, which is the implementation of the Internet Control Message Protocol for IPv6 since IPSec can be applied to the ICMPv6 packets.

3. Directed Data Flows

The government often has to reach numerous destinations simultaneously. This makes it a perfect…

Sources used in this document:
Sources

Tech Republic Consider the pros and cons of IPv6 http://www.techrepublic.com/article/consider-the-pros-and-cons-of-ipv6/5429361

Network Computing Six Benefits of IPv6

http://www.networkcomputing.com/ipv6/six-benefits-of-ipv6/230500009
Cite this Document:
Copy Bibliography Citation

Related Documents

Internet Protocols the Internet Is More Than
Words: 631 Length: 2 Document Type: Essay

Internet Protocols The internet is more than what it appears to many of its users. The World Wide Web is the standard and most popular method or protocol of acquiring information off the interconnectivity that the internet provides. The purpose of this essay is to define an internet protocols and give examples of several different types and the advantages and disadvantages they provide for myself and other users of this technology. HTTP

Voice Over Internet Protocol -Voip
Words: 1593 Length: 4 Document Type: Term Paper

Fundamentally, proxy servers get SIP messages and redirect them to the next SIP server in the network. Proxy servers are able to provide operations like authentication, authorization, network access control, routing, reliable request transmission, and security. (ii) Redirect server: Gives the client with information regarding the nest hop or hops which the message must take and subsequently the client contacts the next hop server and UAS directly. (iii) Registrar

Personal Statement an Internet Protocol
Words: 818 Length: 3 Document Type: Term Paper

The address classes are the defined as a, B, C, D or E.This is however dependent on the initial bits. The total of number of addresses in IPv4 are 4 294-967-296. As for IPv6, the address is made up of 128 bit long pieces which are 16 bytes. The fundamental structure of IPv6 is 64 bits (network number) and 64 bits (host number). In most case the host portion

Voip Voice Over Internet Protocol
Words: 1391 Length: 5 Document Type: Term Paper

This system was problematic because of the number of students in the district and the time that it took to engage in this type of communication. In an effort to find a solution for the problem an Information Systems Manager was called in to assist the district (Milner, 2005). After abandoning an idea that called for the expansion of the traditional telephone system by placing new jacks in classrooms because

Voice Over Internet Protocol Report
Words: 3916 Length: 10 Document Type: Term Paper

With the growth of VoIP, new requirements are brought forwarded, such as providing communication between a PC-based soft phone and a phone on PSTN. Such requirements strengthen the need for a standard for IP telephony. Same as other technologies, there are various standards proposed to be accepted by the industry. Two major standard bodies which govern the multimedia transmission over IP network are: International Telecommunications Union (ITU) Internet Engineering Task Force

Internet Security, Risks Internet Security Presents Field
Words: 4724 Length: 15 Document Type: Essay

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now