SlideShare uma empresa Scribd logo
1 de 51
An Introduction to IPv6Slides from May 2011 webcast
2 View the recorded webcast on SlideShare at…  http://www.slideshare.net/Commtouch/an-introduction-to-ipv6 on
Topics Covered Review of IPv4 What is IPv6  Impact of IPv6 Issues you need to understand Insights on the opportunities IPv6 will offer
Speakers Limor SchafmanPresident, KeystoneTech Group Expertise in mobile & wireless, video games, digital media, advertising, hardware development & software systems Frequent conference speaker & moderator Co-founder and Chair Emeritus of the IPv6 Forum Israel Chapter Former host of thought leadership web shows including DigIn! Radio and Crash Course Dale GeeseyCOO, Auspex Technologies Security, networking and IT professional focused on IPv6 and Cyber Security Specializes in the introduction of advanced and next gen technologies 20 years working with the US federal government, DoD & telecom carriers Supporting government IPv6 Transition activities since 2004  Frequent speaker at Internet and technology events www.diginblog.com www.auspextech.com
Have a question?  Send questions to: IPv6@commtouch.com Responses posted: http://blog.commtouch.com
Session: An Introduction to IPv6 Limor Schafman Dale Geesey Speakers:
What is IPv6 IPv6 – Internet Protocol version 6 Exists many years Gaining increased public knowledge
The History of Internet Protocol
The History of Internet Protocol Packet switching developed in the 50’s & 60’s First versions of IP introduced in the 70’s for US Department of Defense programs Highly survivable communications system Production use in the 80’s on US DARPANET and then the Internet 90s saw the explosion of IP use on the Internet Easier more economical than other networks
The History of Internet Protocol Too few addresses initially selected Didn’t realize how big Internet would get Arbitrarily selected 232  About 4.3 Billion addresses Internet initially an experiment
The History of Internet Protocol Nobody imagined what the Internet would become Did not envision the number and types of devices that would connect to the Internet 2014 – 50 Billion individual elements on the Internet
The History of Internet Protocol With IPv4 didn’t know where Internet was going IPv4
The History of Internet Protocol With IPv4 didn’t know where Internet was going Today similar questions of where Internet will go in the future IPv4 IPv6
The History of Internet Protocol With IPv4 didn’t know where Internet was going Today similar questions of where Internet will go in the future Exponentialgrowth IPv6 IPv4 IPv6
The end of IPv4?
ICANN IPv4 Addresses  4.3 Billion IPv4 addresses  are running out
The end of IPv4? Africa United States, Canada, parts of theCaribbean Asia Pacific Latin America, parts of theCaribbean Europe, Middle East, Central Asia ISPs, companies, etc.
The end of IPv4? February 2011 Africa United States, Canada, parts of theCaribbean Asia Pacific Latin America, parts of theCaribbean Europe, Middle East, Central Asia ISPs, companies, etc.
The end of IPv4? February 2011 6 month supply or less ISPs, companies, etc.
The end of IPv4? Grey market has emerged to trade and sell IPv4 addresses ISPs Companies OtherBodies ,[object Object]
Increases cost of business,[object Object]
Connecting to Internet NAT – Network Address Translation NAT Public IP Address
Connecting to Internet NAT – Network Address Translation NAT Public IP Address
Connecting to Internet Today often have 10s of thousands of people using one IP address With fewer IP addresses, this will become harder, resulting in  Potential for breakages – won’t be able to connect More layered devices to allow more to connect, at a cost of lower quality for services Won’t see a collapse of Internet access, but will affect value added services
What is IPv6
What is IPv6 Developed in early 90s First version out in mid-to-late 90s Continues to be developed Designed to overcome limitations in IPv4
What is IPv6 First issue was to deal with addressing Went from 232 to 2128 IPv4 Addresses IPv6 Addresses 4.3 Billion (4.3×109) 340 Undecillion (3.4×1038) 4,300,000,000 340,000,000,000,000,000,000,000,000,000,000,000,000
What is IPv6 Security another major issue to deal with IPsec was retrofitted to IPv4, but built in to IPv6 from the start On the technical side… Introduced fixed headers to enable new capabilities not possible with IPv4 Extension Headers to enable a new stream of innovations
Impacts of IPv6
Impacts of IPv6 Ability to develop networks that provide less gatekeepers in the way IPv6 global addressing enables you to… Minimize devices  Minimize delay Simplify development Headers allow development of new quality and streaming services
IPv6 Myths & Concerns
Myths & Concerns Concern – it’s new Less experience deploying New code to develop Don’t have same time to understand and work out bugs Concern – Training and understanding There are differences – lack of IPv6 expertise Concern – Idea of using globally routed addresses Uncomfortable for some security professionals
Myths & Concerns Most networks already have IPv6 Need to be aware of this
IPv6 Deployment
IPv6 Deployment Deployed since late 90s early 2000s Large deployment last 4-5 years Most major carriers offer IPv6 Most operating systems, many applications support IPv6 A number of service and content providers offer IPv6 services Examples: Google, Netflix, Facebook
Impact on Service Providers
Impact on Service Providers  Need to be looking at IPv6 if you’re not yet Demand from IPv6 will come from government agencies and organizations Eventually demand from businesses and consumer users If you’re a service provider need to look at How to fit IPv6 into your infrastructure Strategically, what new services will IPv6 enable you to offer
Impact on Service Providers  IPv6 offers a product and market opportunity Will impact on a product, strategic and business development basis Types of services to offer  Types of customers to seek out to take advantage of new opportunities Your infrastructure needs to support end-user demand  Video streaming, voice, and other new capabilities
Opportunities for Security Vendors
Opportunities for Security Vendors Tremendous room for growth Will help governments, businesses, service providers to implement policies Some of the pieces will be the same as IPv4, such as firewalls Some of the ways we do security will change, such as spam filtering Greater move to host-based security
Opportunities for Security Vendors IPv6 is the perfect protocol for implementing cloud-based solutions Security will be an essential part of this
Transitioning to IPv6
Transitioning to IPv6 Many resources available, such as Regional Internet Registries ARIN: http://www.getipv6.info/index.php/Main_Page APNIC: http://www.apnic.net/community/ipv6-program RIPE: http://www.ripe.net/lir-services/resource-management/ipv6 AfriNIC: http://www.afrinic.net/IPv6/index.htm LACNIC: http://portalipv6.lacnic.net/en
Transitioning to IPv6 You need an IPv6 transition plan Map out what you have today, what you need to do and how you need to do it TRANSITION IPV6 IPV4
Transitioning to IPv6 You need an IPv6 transition plan Map out what you have today, what you need to do and how you need to do it Short term:  Get interoperable with IPv6 very quickly, even if you don’t support new features Long term:  Plan for how you’re going to do things in the future Simplify, cut costs and improve performance
Final Thoughts
Final Thoughts If you haven’t started implementing IPv6, then its critical that you start Implement something to gain experience and understand IPv6 Make sure all equipment you buy today is IPv6 enabled Does it have capabilities that you need Plan Try Buy Correctly
Thank you to Limor Schafman www.diginblog.com Dale Geeseywww.auspextech.com
49 View the recorded webcast on SlideShare at…  http://www.slideshare.net/Commtouch/an-introduction-to-ipv6 on
Send questions to: IPv6@commtouch.com Responses posted: http://blog.commtouch.com
Look for our next IPv6 webcast: IPv6 Spam, Malware and Web Threats

Mais conteúdo relacionado

Mais procurados

Addressing IPv6
Addressing IPv6Addressing IPv6
Addressing IPv6Fastly
 
IPv6 Deployment: Why and Why not?
IPv6 Deployment: Why and Why not?IPv6 Deployment: Why and Why not?
IPv6 Deployment: Why and Why not?apnic_slides
 
Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6Private
 
CBN IPv6 Deployment
CBN IPv6 DeploymentCBN IPv6 Deployment
CBN IPv6 DeploymentAPNIC
 
IPv6 Progress and Challenges in Japan
IPv6 Progress and Challenges in JapanIPv6 Progress and Challenges in Japan
IPv6 Progress and Challenges in JapanAPNIC
 
464XLAT Tutorial
464XLAT Tutorial464XLAT Tutorial
464XLAT TutorialAPNIC
 
Applying IPv6 to LTE Networks
Applying IPv6 to LTE NetworksApplying IPv6 to LTE Networks
Applying IPv6 to LTE NetworksAPNIC
 
Content over IPv6: no excuses
Content over IPv6: no excusesContent over IPv6: no excuses
Content over IPv6: no excusesIvan Pepelnjak
 
IPv6 in Mobile Networks
IPv6 in Mobile NetworksIPv6 in Mobile Networks
IPv6 in Mobile NetworksAPNIC
 
Jan zorz procurement-ripe-501
Jan zorz procurement-ripe-501Jan zorz procurement-ripe-501
Jan zorz procurement-ripe-501IPv6no
 
CommunicAsia 2017: IPv6 deployment architecture for IoT
CommunicAsia 2017: IPv6 deployment architecture for IoTCommunicAsia 2017: IPv6 deployment architecture for IoT
CommunicAsia 2017: IPv6 deployment architecture for IoTAPNIC
 
Hands-on Experience with IPv6 Routing and Services
Hands-on Experience with IPv6 Routing and ServicesHands-on Experience with IPv6 Routing and Services
Hands-on Experience with IPv6 Routing and ServicesCisco Canada
 
Upcoming internet challenges
Upcoming internet challengesUpcoming internet challenges
Upcoming internet challengesIvan Pepelnjak
 
Ipv6 presentation
Ipv6 presentation Ipv6 presentation
Ipv6 presentation Alee Hassan
 
IPv6 Deployment Architecture for Broadband Access Networks
IPv6 Deployment Architecture for Broadband Access NetworksIPv6 Deployment Architecture for Broadband Access Networks
IPv6 Deployment Architecture for Broadband Access NetworksAPNIC
 
The Use of IPv6 in IoT
The Use of IPv6 in IoTThe Use of IPv6 in IoT
The Use of IPv6 in IoTOliver Müller
 

Mais procurados (20)

Addressing IPv6
Addressing IPv6Addressing IPv6
Addressing IPv6
 
IPv6 Deployment: Why and Why not?
IPv6 Deployment: Why and Why not?IPv6 Deployment: Why and Why not?
IPv6 Deployment: Why and Why not?
 
Introduction of ipv6
Introduction of ipv6Introduction of ipv6
Introduction of ipv6
 
ION Sri Lanka - IPv6 Deployment at IIJ (IPv6 Panel)
ION Sri Lanka - IPv6 Deployment at IIJ (IPv6 Panel)ION Sri Lanka - IPv6 Deployment at IIJ (IPv6 Panel)
ION Sri Lanka - IPv6 Deployment at IIJ (IPv6 Panel)
 
Ipv6
Ipv6Ipv6
Ipv6
 
Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6
 
CBN IPv6 Deployment
CBN IPv6 DeploymentCBN IPv6 Deployment
CBN IPv6 Deployment
 
IPv6 Progress and Challenges in Japan
IPv6 Progress and Challenges in JapanIPv6 Progress and Challenges in Japan
IPv6 Progress and Challenges in Japan
 
464XLAT Tutorial
464XLAT Tutorial464XLAT Tutorial
464XLAT Tutorial
 
Applying IPv6 to LTE Networks
Applying IPv6 to LTE NetworksApplying IPv6 to LTE Networks
Applying IPv6 to LTE Networks
 
IPv6 Transition
IPv6 TransitionIPv6 Transition
IPv6 Transition
 
Content over IPv6: no excuses
Content over IPv6: no excusesContent over IPv6: no excuses
Content over IPv6: no excuses
 
IPv6 in Mobile Networks
IPv6 in Mobile NetworksIPv6 in Mobile Networks
IPv6 in Mobile Networks
 
Jan zorz procurement-ripe-501
Jan zorz procurement-ripe-501Jan zorz procurement-ripe-501
Jan zorz procurement-ripe-501
 
CommunicAsia 2017: IPv6 deployment architecture for IoT
CommunicAsia 2017: IPv6 deployment architecture for IoTCommunicAsia 2017: IPv6 deployment architecture for IoT
CommunicAsia 2017: IPv6 deployment architecture for IoT
 
Hands-on Experience with IPv6 Routing and Services
Hands-on Experience with IPv6 Routing and ServicesHands-on Experience with IPv6 Routing and Services
Hands-on Experience with IPv6 Routing and Services
 
Upcoming internet challenges
Upcoming internet challengesUpcoming internet challenges
Upcoming internet challenges
 
Ipv6 presentation
Ipv6 presentation Ipv6 presentation
Ipv6 presentation
 
IPv6 Deployment Architecture for Broadband Access Networks
IPv6 Deployment Architecture for Broadband Access NetworksIPv6 Deployment Architecture for Broadband Access Networks
IPv6 Deployment Architecture for Broadband Access Networks
 
The Use of IPv6 in IoT
The Use of IPv6 in IoTThe Use of IPv6 in IoT
The Use of IPv6 in IoT
 

Destaque

C:\documents and settings\pc\my documents\การบ้านเฮีย\template\1 powerpoint t...
C:\documents and settings\pc\my documents\การบ้านเฮีย\template\1 powerpoint t...C:\documents and settings\pc\my documents\การบ้านเฮีย\template\1 powerpoint t...
C:\documents and settings\pc\my documents\การบ้านเฮีย\template\1 powerpoint t...sad
 
IPV6 Hands on Lab
IPV6 Hands on Lab IPV6 Hands on Lab
IPV6 Hands on Lab Cisco Canada
 
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...Iftikhar Wazir
 
Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Karunakant Rai
 
Java ring
Java ringJava ring
Java ringEtty94
 
Deepsi ppt on international buisness
Deepsi ppt on international buisnessDeepsi ppt on international buisness
Deepsi ppt on international buisnessDeepsi Khandelwal
 
Business studies project
Business studies projectBusiness studies project
Business studies projectDisha Sehgal
 
NEW LAUNCH IPv6 in the Cloud: Virtual Private Cloud Deep Dive
NEW LAUNCH IPv6 in the Cloud: Virtual Private Cloud Deep DiveNEW LAUNCH IPv6 in the Cloud: Virtual Private Cloud Deep Dive
NEW LAUNCH IPv6 in the Cloud: Virtual Private Cloud Deep DiveAmazon Web Services
 
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service Overview
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service OverviewNEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service Overview
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service OverviewAmazon Web Services
 
Business studies for 11th class CBSE
Business studies for 11th class CBSEBusiness studies for 11th class CBSE
Business studies for 11th class CBSEMax Monu
 
Free Download Powerpoint Slides
Free Download Powerpoint SlidesFree Download Powerpoint Slides
Free Download Powerpoint SlidesGeorge
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentationelliehood
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

Destaque (19)

10.1.1.29.5089
10.1.1.29.508910.1.1.29.5089
10.1.1.29.5089
 
C:\documents and settings\pc\my documents\การบ้านเฮีย\template\1 powerpoint t...
C:\documents and settings\pc\my documents\การบ้านเฮีย\template\1 powerpoint t...C:\documents and settings\pc\my documents\การบ้านเฮีย\template\1 powerpoint t...
C:\documents and settings\pc\my documents\การบ้านเฮีย\template\1 powerpoint t...
 
IPV6 Hands on Lab
IPV6 Hands on Lab IPV6 Hands on Lab
IPV6 Hands on Lab
 
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...
 
Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Introduction to ipv6 v1.3
Introduction to ipv6 v1.3
 
Java ring
Java ringJava ring
Java ring
 
java-ring
 java-ring java-ring
java-ring
 
IPv6
IPv6IPv6
IPv6
 
Java ring
Java ringJava ring
Java ring
 
Deepsi ppt on international buisness
Deepsi ppt on international buisnessDeepsi ppt on international buisness
Deepsi ppt on international buisness
 
Business studies project
Business studies projectBusiness studies project
Business studies project
 
NEW LAUNCH IPv6 in the Cloud: Virtual Private Cloud Deep Dive
NEW LAUNCH IPv6 in the Cloud: Virtual Private Cloud Deep DiveNEW LAUNCH IPv6 in the Cloud: Virtual Private Cloud Deep Dive
NEW LAUNCH IPv6 in the Cloud: Virtual Private Cloud Deep Dive
 
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service Overview
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service OverviewNEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service Overview
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service Overview
 
Business studies for 11th class CBSE
Business studies for 11th class CBSEBusiness studies for 11th class CBSE
Business studies for 11th class CBSE
 
Java Ring
Java RingJava Ring
Java Ring
 
Free Download Powerpoint Slides
Free Download Powerpoint SlidesFree Download Powerpoint Slides
Free Download Powerpoint Slides
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentation
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Semelhante a Slides from Introduction to IPv6

IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the EnterpriseJohn Rhoton
 
NAv6TF I Pv6 State Of Union Jan 2008
NAv6TF  I Pv6  State Of  Union  Jan 2008NAv6TF  I Pv6  State Of  Union  Jan 2008
NAv6TF I Pv6 State Of Union Jan 2008digitaldivide
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6John Rhoton
 
ARIN's IPv4-IPv6 Community Slide Deck
ARIN's IPv4-IPv6 Community Slide DeckARIN's IPv4-IPv6 Community Slide Deck
ARIN's IPv4-IPv6 Community Slide DeckARIN
 
SCaLE Talk - John Curran
SCaLE Talk - John CurranSCaLE Talk - John Curran
SCaLE Talk - John CurranARIN
 
SD-WAN & Hybrid-WAN Solutions for CSPs
SD-WAN & Hybrid-WAN Solutions for CSPsSD-WAN & Hybrid-WAN Solutions for CSPs
SD-WAN & Hybrid-WAN Solutions for CSPsRicky Pierson
 
IPv6 Design Guide with Alcatel-Lucent Enterprise Networking Products
IPv6 Design Guide with Alcatel-Lucent Enterprise Networking ProductsIPv6 Design Guide with Alcatel-Lucent Enterprise Networking Products
IPv6 Design Guide with Alcatel-Lucent Enterprise Networking Productsacheikhrouhou
 
IETF Activities Update
IETF Activities UpdateIETF Activities Update
IETF Activities UpdateARIN
 
Ipv6 tutorial
Ipv6 tutorialIpv6 tutorial
Ipv6 tutorialsaryu2011
 
Slides from IPv6 Threats
Slides from IPv6 ThreatsSlides from IPv6 Threats
Slides from IPv6 ThreatsCyren, Inc
 
TheServerHost offering IPV6 Philippines VPS and Dedicated Server
TheServerHost offering IPV6 Philippines VPS and Dedicated ServerTheServerHost offering IPV6 Philippines VPS and Dedicated Server
TheServerHost offering IPV6 Philippines VPS and Dedicated ServerTheServerHost
 
New Network ProtocolRunning Head New Network Protocol Pap.docx
New Network ProtocolRunning Head New Network Protocol Pap.docxNew Network ProtocolRunning Head New Network Protocol Pap.docx
New Network ProtocolRunning Head New Network Protocol Pap.docxcurwenmichaela
 
Ipv6 Advantages And Disadvantages
Ipv6 Advantages And DisadvantagesIpv6 Advantages And Disadvantages
Ipv6 Advantages And DisadvantagesJacqueline Thomas
 
IPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdfIPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdfCPUHogg
 
IPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesIPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesAPNIC
 

Semelhante a Slides from Introduction to IPv6 (20)

IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
NAv6TF I Pv6 State Of Union Jan 2008
NAv6TF  I Pv6  State Of  Union  Jan 2008NAv6TF  I Pv6  State Of  Union  Jan 2008
NAv6TF I Pv6 State Of Union Jan 2008
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6
 
Adressing IPv6 strategy
Adressing IPv6 strategyAdressing IPv6 strategy
Adressing IPv6 strategy
 
ARIN's IPv4-IPv6 Community Slide Deck
ARIN's IPv4-IPv6 Community Slide DeckARIN's IPv4-IPv6 Community Slide Deck
ARIN's IPv4-IPv6 Community Slide Deck
 
SCaLE Talk - John Curran
SCaLE Talk - John CurranSCaLE Talk - John Curran
SCaLE Talk - John Curran
 
SD-WAN & Hybrid-WAN Solutions for CSPs
SD-WAN & Hybrid-WAN Solutions for CSPsSD-WAN & Hybrid-WAN Solutions for CSPs
SD-WAN & Hybrid-WAN Solutions for CSPs
 
IPv6 Design Guide with Alcatel-Lucent Enterprise Networking Products
IPv6 Design Guide with Alcatel-Lucent Enterprise Networking ProductsIPv6 Design Guide with Alcatel-Lucent Enterprise Networking Products
IPv6 Design Guide with Alcatel-Lucent Enterprise Networking Products
 
IETF Activities Update
IETF Activities UpdateIETF Activities Update
IETF Activities Update
 
Ipv6 tutorial
Ipv6 tutorialIpv6 tutorial
Ipv6 tutorial
 
Ipv6 tutorial
Ipv6 tutorialIpv6 tutorial
Ipv6 tutorial
 
Slides from IPv6 Threats
Slides from IPv6 ThreatsSlides from IPv6 Threats
Slides from IPv6 Threats
 
TheServerHost offering IPV6 Philippines VPS and Dedicated Server
TheServerHost offering IPV6 Philippines VPS and Dedicated ServerTheServerHost offering IPV6 Philippines VPS and Dedicated Server
TheServerHost offering IPV6 Philippines VPS and Dedicated Server
 
IPv6: the what, why and how
IPv6: the what, why and howIPv6: the what, why and how
IPv6: the what, why and how
 
New Network ProtocolRunning Head New Network Protocol Pap.docx
New Network ProtocolRunning Head New Network Protocol Pap.docxNew Network ProtocolRunning Head New Network Protocol Pap.docx
New Network ProtocolRunning Head New Network Protocol Pap.docx
 
IPv6: Early Mover Advantage?
IPv6: Early Mover Advantage?IPv6: Early Mover Advantage?
IPv6: Early Mover Advantage?
 
Ipv6 Advantages And Disadvantages
Ipv6 Advantages And DisadvantagesIpv6 Advantages And Disadvantages
Ipv6 Advantages And Disadvantages
 
IPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdfIPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdf
 
IPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesIPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for Mobiles
 
IPv6: Forecasts and Trends
IPv6: Forecasts and TrendsIPv6: Forecasts and Trends
IPv6: Forecasts and Trends
 

Mais de Cyren, Inc

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowCyren, Inc
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportCyren, Inc
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareCyren, Inc
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksCyren, Inc
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingCyren, Inc
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyCyren, Inc
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatCyren, Inc
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeCyren, Inc
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteCyren, Inc
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksCyren, Inc
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportCyren, Inc
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportCyren, Inc
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareCyren, Inc
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportCyren, Inc
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 PresentationCyren, Inc
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookCyren, Inc
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 

Mais de Cyren, Inc (20)

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to know
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomware
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array works
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking survey
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threat
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrime
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsolete
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 

Último

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

Slides from Introduction to IPv6

  • 1. An Introduction to IPv6Slides from May 2011 webcast
  • 2. 2 View the recorded webcast on SlideShare at… http://www.slideshare.net/Commtouch/an-introduction-to-ipv6 on
  • 3. Topics Covered Review of IPv4 What is IPv6 Impact of IPv6 Issues you need to understand Insights on the opportunities IPv6 will offer
  • 4. Speakers Limor SchafmanPresident, KeystoneTech Group Expertise in mobile & wireless, video games, digital media, advertising, hardware development & software systems Frequent conference speaker & moderator Co-founder and Chair Emeritus of the IPv6 Forum Israel Chapter Former host of thought leadership web shows including DigIn! Radio and Crash Course Dale GeeseyCOO, Auspex Technologies Security, networking and IT professional focused on IPv6 and Cyber Security Specializes in the introduction of advanced and next gen technologies 20 years working with the US federal government, DoD & telecom carriers Supporting government IPv6 Transition activities since 2004 Frequent speaker at Internet and technology events www.diginblog.com www.auspextech.com
  • 5. Have a question? Send questions to: IPv6@commtouch.com Responses posted: http://blog.commtouch.com
  • 6. Session: An Introduction to IPv6 Limor Schafman Dale Geesey Speakers:
  • 7. What is IPv6 IPv6 – Internet Protocol version 6 Exists many years Gaining increased public knowledge
  • 8. The History of Internet Protocol
  • 9. The History of Internet Protocol Packet switching developed in the 50’s & 60’s First versions of IP introduced in the 70’s for US Department of Defense programs Highly survivable communications system Production use in the 80’s on US DARPANET and then the Internet 90s saw the explosion of IP use on the Internet Easier more economical than other networks
  • 10. The History of Internet Protocol Too few addresses initially selected Didn’t realize how big Internet would get Arbitrarily selected 232 About 4.3 Billion addresses Internet initially an experiment
  • 11. The History of Internet Protocol Nobody imagined what the Internet would become Did not envision the number and types of devices that would connect to the Internet 2014 – 50 Billion individual elements on the Internet
  • 12. The History of Internet Protocol With IPv4 didn’t know where Internet was going IPv4
  • 13. The History of Internet Protocol With IPv4 didn’t know where Internet was going Today similar questions of where Internet will go in the future IPv4 IPv6
  • 14. The History of Internet Protocol With IPv4 didn’t know where Internet was going Today similar questions of where Internet will go in the future Exponentialgrowth IPv6 IPv4 IPv6
  • 15. The end of IPv4?
  • 16. ICANN IPv4 Addresses 4.3 Billion IPv4 addresses are running out
  • 17. The end of IPv4? Africa United States, Canada, parts of theCaribbean Asia Pacific Latin America, parts of theCaribbean Europe, Middle East, Central Asia ISPs, companies, etc.
  • 18. The end of IPv4? February 2011 Africa United States, Canada, parts of theCaribbean Asia Pacific Latin America, parts of theCaribbean Europe, Middle East, Central Asia ISPs, companies, etc.
  • 19. The end of IPv4? February 2011 6 month supply or less ISPs, companies, etc.
  • 20.
  • 21.
  • 22. Connecting to Internet NAT – Network Address Translation NAT Public IP Address
  • 23. Connecting to Internet NAT – Network Address Translation NAT Public IP Address
  • 24. Connecting to Internet Today often have 10s of thousands of people using one IP address With fewer IP addresses, this will become harder, resulting in Potential for breakages – won’t be able to connect More layered devices to allow more to connect, at a cost of lower quality for services Won’t see a collapse of Internet access, but will affect value added services
  • 26. What is IPv6 Developed in early 90s First version out in mid-to-late 90s Continues to be developed Designed to overcome limitations in IPv4
  • 27. What is IPv6 First issue was to deal with addressing Went from 232 to 2128 IPv4 Addresses IPv6 Addresses 4.3 Billion (4.3×109) 340 Undecillion (3.4×1038) 4,300,000,000 340,000,000,000,000,000,000,000,000,000,000,000,000
  • 28. What is IPv6 Security another major issue to deal with IPsec was retrofitted to IPv4, but built in to IPv6 from the start On the technical side… Introduced fixed headers to enable new capabilities not possible with IPv4 Extension Headers to enable a new stream of innovations
  • 30. Impacts of IPv6 Ability to develop networks that provide less gatekeepers in the way IPv6 global addressing enables you to… Minimize devices Minimize delay Simplify development Headers allow development of new quality and streaming services
  • 31. IPv6 Myths & Concerns
  • 32. Myths & Concerns Concern – it’s new Less experience deploying New code to develop Don’t have same time to understand and work out bugs Concern – Training and understanding There are differences – lack of IPv6 expertise Concern – Idea of using globally routed addresses Uncomfortable for some security professionals
  • 33. Myths & Concerns Most networks already have IPv6 Need to be aware of this
  • 35. IPv6 Deployment Deployed since late 90s early 2000s Large deployment last 4-5 years Most major carriers offer IPv6 Most operating systems, many applications support IPv6 A number of service and content providers offer IPv6 services Examples: Google, Netflix, Facebook
  • 36. Impact on Service Providers
  • 37. Impact on Service Providers Need to be looking at IPv6 if you’re not yet Demand from IPv6 will come from government agencies and organizations Eventually demand from businesses and consumer users If you’re a service provider need to look at How to fit IPv6 into your infrastructure Strategically, what new services will IPv6 enable you to offer
  • 38. Impact on Service Providers IPv6 offers a product and market opportunity Will impact on a product, strategic and business development basis Types of services to offer Types of customers to seek out to take advantage of new opportunities Your infrastructure needs to support end-user demand Video streaming, voice, and other new capabilities
  • 40. Opportunities for Security Vendors Tremendous room for growth Will help governments, businesses, service providers to implement policies Some of the pieces will be the same as IPv4, such as firewalls Some of the ways we do security will change, such as spam filtering Greater move to host-based security
  • 41. Opportunities for Security Vendors IPv6 is the perfect protocol for implementing cloud-based solutions Security will be an essential part of this
  • 43. Transitioning to IPv6 Many resources available, such as Regional Internet Registries ARIN: http://www.getipv6.info/index.php/Main_Page APNIC: http://www.apnic.net/community/ipv6-program RIPE: http://www.ripe.net/lir-services/resource-management/ipv6 AfriNIC: http://www.afrinic.net/IPv6/index.htm LACNIC: http://portalipv6.lacnic.net/en
  • 44. Transitioning to IPv6 You need an IPv6 transition plan Map out what you have today, what you need to do and how you need to do it TRANSITION IPV6 IPV4
  • 45. Transitioning to IPv6 You need an IPv6 transition plan Map out what you have today, what you need to do and how you need to do it Short term: Get interoperable with IPv6 very quickly, even if you don’t support new features Long term: Plan for how you’re going to do things in the future Simplify, cut costs and improve performance
  • 47. Final Thoughts If you haven’t started implementing IPv6, then its critical that you start Implement something to gain experience and understand IPv6 Make sure all equipment you buy today is IPv6 enabled Does it have capabilities that you need Plan Try Buy Correctly
  • 48. Thank you to Limor Schafman www.diginblog.com Dale Geeseywww.auspextech.com
  • 49. 49 View the recorded webcast on SlideShare at… http://www.slideshare.net/Commtouch/an-introduction-to-ipv6 on
  • 50. Send questions to: IPv6@commtouch.com Responses posted: http://blog.commtouch.com
  • 51. Look for our next IPv6 webcast: IPv6 Spam, Malware and Web Threats