Transitioning From IPv4 to IPv6
The proposed migration from IPv4 to IPv6 is on in some organizations though some organizations have not put in place measures to ensure the transition. The transition has been initiated since IPv6 offers increased addressing capacity, quality of service provisioning as well as improved routing efficiency. However, shifting from the current platform, IPv4 is not easy given the incompatibility of these two internet protocols. In addition, network specialists have created several technologies and address types to help in the proposed migration. Therefore, this paper describes the IPv6 transition technologies and constraints likely to impede the migration from IPv4 to IPv6 platforms.
Introduction
The proposed protocol transition from IPv4 to IPv6 is quite challenging just like other former transitions in the Internet domain. Protocol transitions involve the installation and configuration of new protocols on all existing nodes within the network and ascertaining that all the nodes and router operations work efficiently. For small and medium organizations, this transition is possible but for large firms, the challenge of making a rapid protocol transition is difficult. Moreover, due to the Internet's magnitude, rapid transitioning from IPv4 to IPv6 may prove to be a tall order (Cheswick & Bellovin, 1994). Proponents of IPv6 are aware the transition from the current IPv4 is likely to take several years and some organizations will continue using IPv4 indefinitely; thus, while the shift is a long-term goal, consideration should be given to co-existence between IPv4 and IPv6 nodes. The only hope to successful migration lies on the compatibility of IPv4 hosts and routers with their successors. In line with this, specialists have initiated several methods to ensure compatibility of IPv4 host and routers with IPv6 host and routers. These approaches range from Dual Stack, Tunneling and Translation among others. Dual Stack involves provision of both IP versions by a single host while Tunneling provides ways of carrying IPv6 packets over unmodified IPv4 routers. According to network specialists, these approaches are vital for the transition and may be implemented based on an organization's preferences. This paper therefore gives a detailed explanation of these methods, the constraints, as well as various techniques and standards necessary for the migration; however, they are a sample of tools required for transition and interoperability between IPv4 and IPv6.
Methodology
In this section, three approaches necessary for the transition from IPv4 to IPv6 will be discussed. In this part, the selected approaches are critically evaluated and compared as well as constraints likely to hinder compatibility between IPv4 and IPv6(Bi et al., 2007). Tunneling is a mechanism whereby IPv6 hosts without a path between them consisting entirely of IPv6-capable routers may be able to communicate by encapsulating IPv6 datagrams within IPv4. For Dual Stack, routers and hosts are configured with both IPv4 and IPv6 implementations to allow them communicate with both types of hosts. Finally, Translation involves configuration of Dual Stack routers and hosts to accept requests from IPv6 hosts, convert them to IPv4 datagrams, send the datagrams to the IPv4 destination and then process the return datagrams similarly.
Dual Stack Approach
Dual Stack provides several methods of assigning temporary IPv4 addresses to IPv6 nodes by using dynamic tunnels within IPv6 hosts to carry IPv4 traffic. In this approach, each node is given both IPv4 and IPv6 addresses to help in relaying data with other IPv4 and IPv6 hosts and routers (Park et al., 2004). Additionally, the nodes are able to send and receive both IPv4 and IPv6 packets and besides, they directly interoperate with IPv4 nodes using IPv4 packets, and as well with IPv6 nodes using IPv6 packets. However, the implementation of Dual Stack is possible for a short period for testing IPv6 applications and initial network deployment, but does not give a solution to lack of IPv4 addresses once IPv6 begins production operations.
Additionally, this approach assists in assigning IPv4 addresses to IPv6 hosts thus allowing IPv6 hosts to interconnect with IPv4-only hosts; besides, other IPv4-only applications are able to run without altering IPv6 hosts. This sharing out process is augmented by dynamic tunneling IPv4 packets inside IPv6 packets to restrict exposure of IPv4 native packets in some sections of the IPv6 network. This makes easy network management of IPv6 deployment because routers require only IPv6 routing tables to move IPv4 packets across an IPv6 network. Data Stack is essential in ensuring the interoperability of newly deployed IPv6 networks with existing IPv4 networks; thus, seeks to minimize chances of delaying IPv6 usage...
Private IP Address The use of a private IP address on a business computer network has a number of advantages, one being an improved network security as well as a corporate social responsibility of conserving public addressing space. These IP addresses are commonly used on local networks and are good for businesses that share data as well as voice information. The company's computer network will not connect to the internet with this
Kris Corporation's parent domain (kris.local) and child domain (corp.kris.local) for the organization's AD infrastructure are running on Server 2008. The following are concerns related to AD: (1) Kris Corporation is concerned about running multiple domains, and (2) automobile manufacturers are asking Kris Corporation to use a single identity to procure orders in real time. The company has five locations in Atlanta (GA), Baltimore (MD), Chicago (IL), Seattle (WA) and San
TCP/IP Protocol Suite For the average computer user, TCP/IP probably doesn't mean a whole lot, except maybe when it comes to "configuring" their computer so they can get online, but without the TCP/IP protocol, the activity experienced on the Internet up until this point would not be possible. This paper will examine some of the components of the TCP/IP protocol and explore their uses as they apply to relevant parts
Grandmaster and Gong Er: Wong Kar Wai's Ip Man and the Women of Kung Fu Wong Kar Wai's Grandmaster begins with a stylish kung fu action sequence set in the rain. Ip Man battles a dozen or so no-names before doing a one-on-one show with another combatant who appears to be at equal skill and strength. Ip Man handily defeats him and walks away unscathed. Thanks to fight choreography by Chinese
Voice over IP (VoIP) Security Voice over Internet Protocol or VoIP refers to making use of telephone services over that of the computer networks. During the first part of the process, the VoIP makes an analog signal which is evolved from the speaker's voice. It is then transferred to a digital signal and further transfers over that of an IP network and this is well inclusive of the Internet. Voice over
China IP China's intellectual property rights protections have come a long way since 1978, but there remains room for improvement. While the de jure situation with respect to protecting intellectual property rights approaches Western standards, the enforcement or de facto situation is less encouraging. Western companies have a difficult time enforcing the patchwork of laws and often fail to win judgments significantly large to serve as a deterrent to IP thieves. There
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now