SlideShare uma empresa Scribd logo
1 de 20
Moving From IPv4 to IPv6




  Your Text here                                                                            Your Text here




                                                                       Shahar Geiger Maor
                                                                       VP & Senior Analyst
                                                                               shahar@stki.info



           Source: http://www.caida.org/research/topology/as_core_network/2007/
       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   1
Internet Protocol Version 6 (IPv6)


What is it?
 Internet Protocol Version 6 is the next generation protocol for
  the Internet
 IPv6 support 2^128 unique IP addresses
 quality of service for several new applications such as IPTel,
  video/audio,here interactive games or ecommerce Text here
         Your Text                             Your

 Less data loss, latency (jitter) or bandwidth
 Better mobility support, Multi-homing and Security




            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   2
IPv4 address that has been mapped
into IPv6 address space




   Your Text here                                                              Your Text here




                                                                                                3
   All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 7907000 www.stki.info
IPv6 and the Enterprise
Why should I care?
An escalating demand for IP addresses acted as the
 driving force behind the development of IPv6
significantly larger address space allows a provision for
 permanent unique addresses
        Your Text here                     Your Text here



Assessment of the existing infrastructure hardware for up
 grading to IPv6
Specifying IPv6 compliance in the RFPs


           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   4
IP Infrastructure (Internet)
IPv4 is an extraordinary success story
IP infrastructure or the “Internet/Intranets” have
 become a strategic resources
Communication lines/exchanges …. Leveraged to
 provide data connectivity
       Your Text here                 Your Text here
Countries have been leveraging off the existing
 infrastructure
Technological advances such as DSL technology have
 resulted in significant improvements



           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   5
IP Infrastructure




   Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   6
Addressing
Addressing appears to be another story
This is where the biggest arguments are taking place:



        Your Text here                                                                            Your Text here




             Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   7
Common Sense View
“All over IP” world is the main, cross-sectors, motivator
 for the integration of IPv6
Regardless of whether the address space will run out in 5
 years or 10 years, all evidence seem to point to the fact
 that we willhereneed a bigger address spaceYour Text here
       Your Text



Lack of a common view though is the greatest barrier to
 deployment




           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   8
What do CIOs want?




  Your Text here                                                                            Your Text here




       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   9
IPv6 is the solution
1. To increase IP addressing space.
2. Incorporates improvements based on the lessons
   learned from operating IPv4:
      stateless autoconfiguration
  •
      more efficient mobility management
  •
        Your Text here                                                                          Your Text here
      integrated IPsec
  •

  These are the fundamental aspects of IP version 6 (IPv6)
  So why not use it?


          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   10
What’s Holding it?
A very successful industry cannot be changed
 overnight
Deployment can only happen incrementally
Authorities need to ensure that there is no
 detrimental impact on IPv4 traffic in any way
       Your Text here                  Your Text here
Under these conditions the two key questions that
 need to be answered are:
  • Is it possible to justify investments in an IP upgrade ?
  • Can one ensure then the up-grade will not have adverse
    impacts ?


          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   11
Direct costs of IPv6 adoption
    EXPECTED COST BREAKDOWN OVER TYPE OF BUSINESS




  Your Text here                                                                            Your Text here




                                   Source: http://www.ipv6council.de/fileadmin/documents/IPv6_vertical_markets.pdf


      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   12
How to “Sell” IPv6 “Right”?




  Your Text here                                                                            Your Text here




                                                                                      Source: IPv6 Promotion Council of Japan
      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic        13
How to Remove Barriers
 There are two primary obstacles to this phased deployment:
   • People “don’t know how to implement it,”
   • “still feel uncertain about its stability and quality,”
 Removal of the first barrier
   • Can be done by preparing deployment manuals for each user entity
   • Clarifying the deployment processes and security models
   • Establishinghere
          Your Text a metric for deployment          Your Text here
 Removal of the second barrier
   • Verifying the reliability of IPv6
   • Identifying design and operation bugs through demonstration
     experiments and evaluations

ISOC position in market education



             Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   14
IPv6: Impacts and Opportunities
 Economic impacts
 Social impacts:
   • Promoting end-to-end communication and by enhancing
     innovation
   • New citizen-centric services and e-government
   • Freedom of speech and the content creation Your Text here
         Your Text here
   • Improve crime control
   • Education Over IP – Improve educational system
 Environmental impacts:
   • Energy management in buildings
   • Road traffic management
   • Risk detection and prevention

            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   15
IPv6: Impacts and Opportunities




   Your Text here                                                                            Your Text here




       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   16
IPv6: Impacts and Opportunities




   Your Text here                                                                            Your Text here




       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   17
IPv6: Impacts and Opportunities




   Your Text here                                                                            Your Text here




       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   18
IPv6: Impacts and Opportunities




   Your Text here                                                                            Your Text here




       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   19
Thank You!
Your Text here                                                                            Your Text here




    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   20

Mais conteúdo relacionado

Semelhante a IPv6

Semelhante a IPv6 (20)

Considering Bare Metal
Considering Bare MetalConsidering Bare Metal
Considering Bare Metal
 
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
 
Edge 2016 IPv6 is here: the future is now
Edge 2016 IPv6 is here: the future is nowEdge 2016 IPv6 is here: the future is now
Edge 2016 IPv6 is here: the future is now
 
IPv6 Adoption --- Acceleration
IPv6 Adoption --- AccelerationIPv6 Adoption --- Acceleration
IPv6 Adoption --- Acceleration
 
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trendsSTKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
 
UKOUG - Implementing Enterprise API Management in the Oracle Cloud
UKOUG - Implementing Enterprise API Management in the Oracle CloudUKOUG - Implementing Enterprise API Management in the Oracle Cloud
UKOUG - Implementing Enterprise API Management in the Oracle Cloud
 
IPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdfIPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdf
 
237 06 12 12 The Critical Path To I Pv6 V5
237 06 12 12 The Critical Path To I Pv6 V5237 06 12 12 The Critical Path To I Pv6 V5
237 06 12 12 The Critical Path To I Pv6 V5
 
IPv6 Transition
IPv6 TransitionIPv6 Transition
IPv6 Transition
 
Things I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I startedThings I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I started
 
Oracle NoSQL
Oracle NoSQLOracle NoSQL
Oracle NoSQL
 
Building a Streaming Microservices Architecture - Data + AI Summit EU 2020
Building a Streaming Microservices Architecture - Data + AI Summit EU 2020Building a Streaming Microservices Architecture - Data + AI Summit EU 2020
Building a Streaming Microservices Architecture - Data + AI Summit EU 2020
 
Ppt on i pv6
Ppt on i pv6Ppt on i pv6
Ppt on i pv6
 
Keep the door open when transforming from Sitecore XM to composable DXP using...
Keep the door open when transforming from Sitecore XM to composable DXP using...Keep the door open when transforming from Sitecore XM to composable DXP using...
Keep the door open when transforming from Sitecore XM to composable DXP using...
 
Slides from Introduction to IPv6
Slides from Introduction to IPv6Slides from Introduction to IPv6
Slides from Introduction to IPv6
 
Oracle: Building Cloud Native Applications
Oracle: Building Cloud Native ApplicationsOracle: Building Cloud Native Applications
Oracle: Building Cloud Native Applications
 
IPv6 on the Cisco Campus
IPv6 on the Cisco CampusIPv6 on the Cisco Campus
IPv6 on the Cisco Campus
 
“Quantum” Performance Effects: beyond the Core
“Quantum” Performance Effects: beyond the Core“Quantum” Performance Effects: beyond the Core
“Quantum” Performance Effects: beyond the Core
 
Contact Center infrastructure 2014
Contact Center infrastructure 2014Contact Center infrastructure 2014
Contact Center infrastructure 2014
 
Adding IPv6 to the application layer
Adding IPv6 to the application layerAdding IPv6 to the application layer
Adding IPv6 to the application layer
 

Mais de Shahar Geiger Maor

Cyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of CybercrimeCyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of Cybercrime
Shahar Geiger Maor
 
Networking stki summit 2012 -shahar geiger maor
Networking  stki summit 2012 -shahar geiger maorNetworking  stki summit 2012 -shahar geiger maor
Networking stki summit 2012 -shahar geiger maor
Shahar Geiger Maor
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maor
Shahar Geiger Maor
 
Endpoints stki summit 2012-shahar geiger maor
Endpoints  stki summit 2012-shahar geiger maorEndpoints  stki summit 2012-shahar geiger maor
Endpoints stki summit 2012-shahar geiger maor
Shahar Geiger Maor
 
Risk, regulation and data protection
Risk, regulation and data protectionRisk, regulation and data protection
Risk, regulation and data protection
Shahar Geiger Maor
 
Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010
Shahar Geiger Maor
 

Mais de Shahar Geiger Maor (20)

Cyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of CybercrimeCyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of Cybercrime
 
From creeper to stuxnet
From creeper to stuxnetFrom creeper to stuxnet
From creeper to stuxnet
 
Mobile payment v3
Mobile payment v3Mobile payment v3
Mobile payment v3
 
Networking stki summit 2012 -shahar geiger maor
Networking  stki summit 2012 -shahar geiger maorNetworking  stki summit 2012 -shahar geiger maor
Networking stki summit 2012 -shahar geiger maor
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maor
 
Endpoints stki summit 2012-shahar geiger maor
Endpoints  stki summit 2012-shahar geiger maorEndpoints  stki summit 2012-shahar geiger maor
Endpoints stki summit 2012-shahar geiger maor
 
Risk, regulation and data protection
Risk, regulation and data protectionRisk, regulation and data protection
Risk, regulation and data protection
 
STKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelSTKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM Panel
 
Social Sec infosec -pptx
Social Sec  infosec -pptxSocial Sec  infosec -pptx
Social Sec infosec -pptx
 
Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2
 
Summit 2011 trends in information security
Summit 2011  trends in information securitySummit 2011  trends in information security
Summit 2011 trends in information security
 
Summit 2011 trends in infrastructure services
Summit 2011  trends in infrastructure servicesSummit 2011  trends in infrastructure services
Summit 2011 trends in infrastructure services
 
DLP Trends -Dec 2010
DLP Trends -Dec 2010DLP Trends -Dec 2010
DLP Trends -Dec 2010
 
כנס אבטחת מידע מוטו תקשורת V2
כנס אבטחת מידע  מוטו תקשורת V2כנס אבטחת מידע  מוטו תקשורת V2
כנס אבטחת מידע מוטו תקשורת V2
 
Cloud security v2
Cloud security v2Cloud security v2
Cloud security v2
 
PCI Challenges
PCI ChallengesPCI Challenges
PCI Challenges
 
Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010
 
Security Summit July 2009
Security Summit  July 2009Security Summit  July 2009
Security Summit July 2009
 
Green Security
Green SecurityGreen Security
Green Security
 
STKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services TrendsSTKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services Trends
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

IPv6

  • 1. Moving From IPv4 to IPv6 Your Text here Your Text here Shahar Geiger Maor VP & Senior Analyst shahar@stki.info Source: http://www.caida.org/research/topology/as_core_network/2007/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 1
  • 2. Internet Protocol Version 6 (IPv6) What is it?  Internet Protocol Version 6 is the next generation protocol for the Internet  IPv6 support 2^128 unique IP addresses  quality of service for several new applications such as IPTel, video/audio,here interactive games or ecommerce Text here Your Text Your  Less data loss, latency (jitter) or bandwidth  Better mobility support, Multi-homing and Security Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
  • 3. IPv4 address that has been mapped into IPv6 address space Your Text here Your Text here 3 All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 7907000 www.stki.info
  • 4. IPv6 and the Enterprise Why should I care? An escalating demand for IP addresses acted as the driving force behind the development of IPv6 significantly larger address space allows a provision for permanent unique addresses Your Text here Your Text here Assessment of the existing infrastructure hardware for up grading to IPv6 Specifying IPv6 compliance in the RFPs Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
  • 5. IP Infrastructure (Internet) IPv4 is an extraordinary success story IP infrastructure or the “Internet/Intranets” have become a strategic resources Communication lines/exchanges …. Leveraged to provide data connectivity Your Text here Your Text here Countries have been leveraging off the existing infrastructure Technological advances such as DSL technology have resulted in significant improvements Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
  • 6. IP Infrastructure Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
  • 7. Addressing Addressing appears to be another story This is where the biggest arguments are taking place: Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
  • 8. Common Sense View “All over IP” world is the main, cross-sectors, motivator for the integration of IPv6 Regardless of whether the address space will run out in 5 years or 10 years, all evidence seem to point to the fact that we willhereneed a bigger address spaceYour Text here Your Text Lack of a common view though is the greatest barrier to deployment Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
  • 9. What do CIOs want? Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
  • 10. IPv6 is the solution 1. To increase IP addressing space. 2. Incorporates improvements based on the lessons learned from operating IPv4: stateless autoconfiguration • more efficient mobility management • Your Text here Your Text here integrated IPsec • These are the fundamental aspects of IP version 6 (IPv6) So why not use it? Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
  • 11. What’s Holding it? A very successful industry cannot be changed overnight Deployment can only happen incrementally Authorities need to ensure that there is no detrimental impact on IPv4 traffic in any way Your Text here Your Text here Under these conditions the two key questions that need to be answered are: • Is it possible to justify investments in an IP upgrade ? • Can one ensure then the up-grade will not have adverse impacts ? Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
  • 12. Direct costs of IPv6 adoption EXPECTED COST BREAKDOWN OVER TYPE OF BUSINESS Your Text here Your Text here Source: http://www.ipv6council.de/fileadmin/documents/IPv6_vertical_markets.pdf Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
  • 13. How to “Sell” IPv6 “Right”? Your Text here Your Text here Source: IPv6 Promotion Council of Japan Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
  • 14. How to Remove Barriers  There are two primary obstacles to this phased deployment: • People “don’t know how to implement it,” • “still feel uncertain about its stability and quality,”  Removal of the first barrier • Can be done by preparing deployment manuals for each user entity • Clarifying the deployment processes and security models • Establishinghere Your Text a metric for deployment Your Text here  Removal of the second barrier • Verifying the reliability of IPv6 • Identifying design and operation bugs through demonstration experiments and evaluations ISOC position in market education Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
  • 15. IPv6: Impacts and Opportunities  Economic impacts  Social impacts: • Promoting end-to-end communication and by enhancing innovation • New citizen-centric services and e-government • Freedom of speech and the content creation Your Text here Your Text here • Improve crime control • Education Over IP – Improve educational system  Environmental impacts: • Energy management in buildings • Road traffic management • Risk detection and prevention Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
  • 16. IPv6: Impacts and Opportunities Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
  • 17. IPv6: Impacts and Opportunities Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
  • 18. IPv6: Impacts and Opportunities Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 18
  • 19. IPv6: Impacts and Opportunities Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
  • 20. Thank You! Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 20