SlideShare ist ein Scribd-Unternehmen logo
1 von 51
An Introduction to IPv6Slides from May 2011 webcast
2 View the recorded webcast on SlideShare at…  http://www.slideshare.net/Commtouch/an-introduction-to-ipv6 on
Topics Covered Review of IPv4 What is IPv6  Impact of IPv6 Issues you need to understand Insights on the opportunities IPv6 will offer
Speakers Limor SchafmanPresident, KeystoneTech Group Expertise in mobile & wireless, video games, digital media, advertising, hardware development & software systems Frequent conference speaker & moderator Co-founder and Chair Emeritus of the IPv6 Forum Israel Chapter Former host of thought leadership web shows including DigIn! Radio and Crash Course Dale GeeseyCOO, Auspex Technologies Security, networking and IT professional focused on IPv6 and Cyber Security Specializes in the introduction of advanced and next gen technologies 20 years working with the US federal government, DoD & telecom carriers Supporting government IPv6 Transition activities since 2004  Frequent speaker at Internet and technology events www.diginblog.com www.auspextech.com
Have a question?  Send questions to: IPv6@commtouch.com Responses posted: http://blog.commtouch.com
Session: An Introduction to IPv6 Limor Schafman Dale Geesey Speakers:
What is IPv6 IPv6 – Internet Protocol version 6 Exists many years Gaining increased public knowledge
The History of Internet Protocol
The History of Internet Protocol Packet switching developed in the 50’s & 60’s First versions of IP introduced in the 70’s for US Department of Defense programs Highly survivable communications system Production use in the 80’s on US DARPANET and then the Internet 90s saw the explosion of IP use on the Internet Easier more economical than other networks
The History of Internet Protocol Too few addresses initially selected Didn’t realize how big Internet would get Arbitrarily selected 232  About 4.3 Billion addresses Internet initially an experiment
The History of Internet Protocol Nobody imagined what the Internet would become Did not envision the number and types of devices that would connect to the Internet 2014 – 50 Billion individual elements on the Internet
The History of Internet Protocol With IPv4 didn’t know where Internet was going IPv4
The History of Internet Protocol With IPv4 didn’t know where Internet was going Today similar questions of where Internet will go in the future IPv4 IPv6
The History of Internet Protocol With IPv4 didn’t know where Internet was going Today similar questions of where Internet will go in the future Exponentialgrowth IPv6 IPv4 IPv6
The end of IPv4?
ICANN IPv4 Addresses  4.3 Billion IPv4 addresses  are running out
The end of IPv4? Africa United States, Canada, parts of theCaribbean Asia Pacific Latin America, parts of theCaribbean Europe, Middle East, Central Asia ISPs, companies, etc.
The end of IPv4? February 2011 Africa United States, Canada, parts of theCaribbean Asia Pacific Latin America, parts of theCaribbean Europe, Middle East, Central Asia ISPs, companies, etc.
The end of IPv4? February 2011 6 month supply or less ISPs, companies, etc.
The end of IPv4? Grey market has emerged to trade and sell IPv4 addresses ISPs Companies OtherBodies ,[object Object]
Increases cost of business,[object Object]
Connecting to Internet NAT – Network Address Translation NAT Public IP Address
Connecting to Internet NAT – Network Address Translation NAT Public IP Address
Connecting to Internet Today often have 10s of thousands of people using one IP address With fewer IP addresses, this will become harder, resulting in  Potential for breakages – won’t be able to connect More layered devices to allow more to connect, at a cost of lower quality for services Won’t see a collapse of Internet access, but will affect value added services
What is IPv6
What is IPv6 Developed in early 90s First version out in mid-to-late 90s Continues to be developed Designed to overcome limitations in IPv4
What is IPv6 First issue was to deal with addressing Went from 232 to 2128 IPv4 Addresses IPv6 Addresses 4.3 Billion (4.3×109) 340 Undecillion (3.4×1038) 4,300,000,000 340,000,000,000,000,000,000,000,000,000,000,000,000
What is IPv6 Security another major issue to deal with IPsec was retrofitted to IPv4, but built in to IPv6 from the start On the technical side… Introduced fixed headers to enable new capabilities not possible with IPv4 Extension Headers to enable a new stream of innovations
Impacts of IPv6
Impacts of IPv6 Ability to develop networks that provide less gatekeepers in the way IPv6 global addressing enables you to… Minimize devices  Minimize delay Simplify development Headers allow development of new quality and streaming services
IPv6 Myths & Concerns
Myths & Concerns Concern – it’s new Less experience deploying New code to develop Don’t have same time to understand and work out bugs Concern – Training and understanding There are differences – lack of IPv6 expertise Concern – Idea of using globally routed addresses Uncomfortable for some security professionals
Myths & Concerns Most networks already have IPv6 Need to be aware of this
IPv6 Deployment
IPv6 Deployment Deployed since late 90s early 2000s Large deployment last 4-5 years Most major carriers offer IPv6 Most operating systems, many applications support IPv6 A number of service and content providers offer IPv6 services Examples: Google, Netflix, Facebook
Impact on Service Providers
Impact on Service Providers  Need to be looking at IPv6 if you’re not yet Demand from IPv6 will come from government agencies and organizations Eventually demand from businesses and consumer users If you’re a service provider need to look at How to fit IPv6 into your infrastructure Strategically, what new services will IPv6 enable you to offer
Impact on Service Providers  IPv6 offers a product and market opportunity Will impact on a product, strategic and business development basis Types of services to offer  Types of customers to seek out to take advantage of new opportunities Your infrastructure needs to support end-user demand  Video streaming, voice, and other new capabilities
Opportunities for Security Vendors
Opportunities for Security Vendors Tremendous room for growth Will help governments, businesses, service providers to implement policies Some of the pieces will be the same as IPv4, such as firewalls Some of the ways we do security will change, such as spam filtering Greater move to host-based security
Opportunities for Security Vendors IPv6 is the perfect protocol for implementing cloud-based solutions Security will be an essential part of this
Transitioning to IPv6
Transitioning to IPv6 Many resources available, such as Regional Internet Registries ARIN: http://www.getipv6.info/index.php/Main_Page APNIC: http://www.apnic.net/community/ipv6-program RIPE: http://www.ripe.net/lir-services/resource-management/ipv6 AfriNIC: http://www.afrinic.net/IPv6/index.htm LACNIC: http://portalipv6.lacnic.net/en
Transitioning to IPv6 You need an IPv6 transition plan Map out what you have today, what you need to do and how you need to do it TRANSITION IPV6 IPV4
Transitioning to IPv6 You need an IPv6 transition plan Map out what you have today, what you need to do and how you need to do it Short term:  Get interoperable with IPv6 very quickly, even if you don’t support new features Long term:  Plan for how you’re going to do things in the future Simplify, cut costs and improve performance
Final Thoughts
Final Thoughts If you haven’t started implementing IPv6, then its critical that you start Implement something to gain experience and understand IPv6 Make sure all equipment you buy today is IPv6 enabled Does it have capabilities that you need Plan Try Buy Correctly
Thank you to Limor Schafman www.diginblog.com Dale Geeseywww.auspextech.com
49 View the recorded webcast on SlideShare at…  http://www.slideshare.net/Commtouch/an-introduction-to-ipv6 on
Send questions to: IPv6@commtouch.com Responses posted: http://blog.commtouch.com
Look for our next IPv6 webcast: IPv6 Spam, Malware and Web Threats

Weitere ähnliche Inhalte

Was ist angesagt?

Addressing IPv6
Addressing IPv6Addressing IPv6
Addressing IPv6Fastly
 
IPv6 Deployment: Why and Why not?
IPv6 Deployment: Why and Why not?IPv6 Deployment: Why and Why not?
IPv6 Deployment: Why and Why not?apnic_slides
 
Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6Private
 
CBN IPv6 Deployment
CBN IPv6 DeploymentCBN IPv6 Deployment
CBN IPv6 DeploymentAPNIC
 
IPv6 Progress and Challenges in Japan
IPv6 Progress and Challenges in JapanIPv6 Progress and Challenges in Japan
IPv6 Progress and Challenges in JapanAPNIC
 
464XLAT Tutorial
464XLAT Tutorial464XLAT Tutorial
464XLAT TutorialAPNIC
 
Applying IPv6 to LTE Networks
Applying IPv6 to LTE NetworksApplying IPv6 to LTE Networks
Applying IPv6 to LTE NetworksAPNIC
 
Content over IPv6: no excuses
Content over IPv6: no excusesContent over IPv6: no excuses
Content over IPv6: no excusesIvan Pepelnjak
 
IPv6 in Mobile Networks
IPv6 in Mobile NetworksIPv6 in Mobile Networks
IPv6 in Mobile NetworksAPNIC
 
Jan zorz procurement-ripe-501
Jan zorz procurement-ripe-501Jan zorz procurement-ripe-501
Jan zorz procurement-ripe-501IPv6no
 
CommunicAsia 2017: IPv6 deployment architecture for IoT
CommunicAsia 2017: IPv6 deployment architecture for IoTCommunicAsia 2017: IPv6 deployment architecture for IoT
CommunicAsia 2017: IPv6 deployment architecture for IoTAPNIC
 
Hands-on Experience with IPv6 Routing and Services
Hands-on Experience with IPv6 Routing and ServicesHands-on Experience with IPv6 Routing and Services
Hands-on Experience with IPv6 Routing and ServicesCisco Canada
 
Upcoming internet challenges
Upcoming internet challengesUpcoming internet challenges
Upcoming internet challengesIvan Pepelnjak
 
Ipv6 presentation
Ipv6 presentation Ipv6 presentation
Ipv6 presentation Alee Hassan
 
IPv6 Deployment Architecture for Broadband Access Networks
IPv6 Deployment Architecture for Broadband Access NetworksIPv6 Deployment Architecture for Broadband Access Networks
IPv6 Deployment Architecture for Broadband Access NetworksAPNIC
 
The Use of IPv6 in IoT
The Use of IPv6 in IoTThe Use of IPv6 in IoT
The Use of IPv6 in IoTOliver Müller
 

Was ist angesagt? (20)

Addressing IPv6
Addressing IPv6Addressing IPv6
Addressing IPv6
 
IPv6 Deployment: Why and Why not?
IPv6 Deployment: Why and Why not?IPv6 Deployment: Why and Why not?
IPv6 Deployment: Why and Why not?
 
Introduction of ipv6
Introduction of ipv6Introduction of ipv6
Introduction of ipv6
 
ION Sri Lanka - IPv6 Deployment at IIJ (IPv6 Panel)
ION Sri Lanka - IPv6 Deployment at IIJ (IPv6 Panel)ION Sri Lanka - IPv6 Deployment at IIJ (IPv6 Panel)
ION Sri Lanka - IPv6 Deployment at IIJ (IPv6 Panel)
 
Ipv6
Ipv6Ipv6
Ipv6
 
Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6
 
CBN IPv6 Deployment
CBN IPv6 DeploymentCBN IPv6 Deployment
CBN IPv6 Deployment
 
IPv6 Progress and Challenges in Japan
IPv6 Progress and Challenges in JapanIPv6 Progress and Challenges in Japan
IPv6 Progress and Challenges in Japan
 
464XLAT Tutorial
464XLAT Tutorial464XLAT Tutorial
464XLAT Tutorial
 
Applying IPv6 to LTE Networks
Applying IPv6 to LTE NetworksApplying IPv6 to LTE Networks
Applying IPv6 to LTE Networks
 
IPv6 Transition
IPv6 TransitionIPv6 Transition
IPv6 Transition
 
Content over IPv6: no excuses
Content over IPv6: no excusesContent over IPv6: no excuses
Content over IPv6: no excuses
 
IPv6 in Mobile Networks
IPv6 in Mobile NetworksIPv6 in Mobile Networks
IPv6 in Mobile Networks
 
Jan zorz procurement-ripe-501
Jan zorz procurement-ripe-501Jan zorz procurement-ripe-501
Jan zorz procurement-ripe-501
 
CommunicAsia 2017: IPv6 deployment architecture for IoT
CommunicAsia 2017: IPv6 deployment architecture for IoTCommunicAsia 2017: IPv6 deployment architecture for IoT
CommunicAsia 2017: IPv6 deployment architecture for IoT
 
Hands-on Experience with IPv6 Routing and Services
Hands-on Experience with IPv6 Routing and ServicesHands-on Experience with IPv6 Routing and Services
Hands-on Experience with IPv6 Routing and Services
 
Upcoming internet challenges
Upcoming internet challengesUpcoming internet challenges
Upcoming internet challenges
 
Ipv6 presentation
Ipv6 presentation Ipv6 presentation
Ipv6 presentation
 
IPv6 Deployment Architecture for Broadband Access Networks
IPv6 Deployment Architecture for Broadband Access NetworksIPv6 Deployment Architecture for Broadband Access Networks
IPv6 Deployment Architecture for Broadband Access Networks
 
The Use of IPv6 in IoT
The Use of IPv6 in IoTThe Use of IPv6 in IoT
The Use of IPv6 in IoT
 

Andere mochten auch

C:\documents and settings\pc\my documents\การบ้านเฮีย\template\1 powerpoint t...
C:\documents and settings\pc\my documents\การบ้านเฮีย\template\1 powerpoint t...C:\documents and settings\pc\my documents\การบ้านเฮีย\template\1 powerpoint t...
C:\documents and settings\pc\my documents\การบ้านเฮีย\template\1 powerpoint t...sad
 
IPV6 Hands on Lab
IPV6 Hands on Lab IPV6 Hands on Lab
IPV6 Hands on Lab Cisco Canada
 
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...Iftikhar Wazir
 
Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Karunakant Rai
 
Java ring
Java ringJava ring
Java ringEtty94
 
Deepsi ppt on international buisness
Deepsi ppt on international buisnessDeepsi ppt on international buisness
Deepsi ppt on international buisnessDeepsi Khandelwal
 
Business studies project
Business studies projectBusiness studies project
Business studies projectDisha Sehgal
 
NEW LAUNCH IPv6 in the Cloud: Virtual Private Cloud Deep Dive
NEW LAUNCH IPv6 in the Cloud: Virtual Private Cloud Deep DiveNEW LAUNCH IPv6 in the Cloud: Virtual Private Cloud Deep Dive
NEW LAUNCH IPv6 in the Cloud: Virtual Private Cloud Deep DiveAmazon Web Services
 
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service Overview
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service OverviewNEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service Overview
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service OverviewAmazon Web Services
 
Business studies for 11th class CBSE
Business studies for 11th class CBSEBusiness studies for 11th class CBSE
Business studies for 11th class CBSEMax Monu
 
Free Download Powerpoint Slides
Free Download Powerpoint SlidesFree Download Powerpoint Slides
Free Download Powerpoint SlidesGeorge
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentationelliehood
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

Andere mochten auch (19)

10.1.1.29.5089
10.1.1.29.508910.1.1.29.5089
10.1.1.29.5089
 
C:\documents and settings\pc\my documents\การบ้านเฮีย\template\1 powerpoint t...
C:\documents and settings\pc\my documents\การบ้านเฮีย\template\1 powerpoint t...C:\documents and settings\pc\my documents\การบ้านเฮีย\template\1 powerpoint t...
C:\documents and settings\pc\my documents\การบ้านเฮีย\template\1 powerpoint t...
 
IPV6 Hands on Lab
IPV6 Hands on Lab IPV6 Hands on Lab
IPV6 Hands on Lab
 
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...
 
Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Introduction to ipv6 v1.3
Introduction to ipv6 v1.3
 
Java ring
Java ringJava ring
Java ring
 
java-ring
 java-ring java-ring
java-ring
 
IPv6
IPv6IPv6
IPv6
 
Java ring
Java ringJava ring
Java ring
 
Deepsi ppt on international buisness
Deepsi ppt on international buisnessDeepsi ppt on international buisness
Deepsi ppt on international buisness
 
Business studies project
Business studies projectBusiness studies project
Business studies project
 
NEW LAUNCH IPv6 in the Cloud: Virtual Private Cloud Deep Dive
NEW LAUNCH IPv6 in the Cloud: Virtual Private Cloud Deep DiveNEW LAUNCH IPv6 in the Cloud: Virtual Private Cloud Deep Dive
NEW LAUNCH IPv6 in the Cloud: Virtual Private Cloud Deep Dive
 
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service Overview
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service OverviewNEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service Overview
NEW LAUNCH IPv6 in the Cloud: Protocol and AWS Service Overview
 
Business studies for 11th class CBSE
Business studies for 11th class CBSEBusiness studies for 11th class CBSE
Business studies for 11th class CBSE
 
Java Ring
Java RingJava Ring
Java Ring
 
Free Download Powerpoint Slides
Free Download Powerpoint SlidesFree Download Powerpoint Slides
Free Download Powerpoint Slides
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentation
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Ähnlich wie Slides from Introduction to IPv6

IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the EnterpriseJohn Rhoton
 
NAv6TF I Pv6 State Of Union Jan 2008
NAv6TF  I Pv6  State Of  Union  Jan 2008NAv6TF  I Pv6  State Of  Union  Jan 2008
NAv6TF I Pv6 State Of Union Jan 2008digitaldivide
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6John Rhoton
 
ARIN's IPv4-IPv6 Community Slide Deck
ARIN's IPv4-IPv6 Community Slide DeckARIN's IPv4-IPv6 Community Slide Deck
ARIN's IPv4-IPv6 Community Slide DeckARIN
 
SCaLE Talk - John Curran
SCaLE Talk - John CurranSCaLE Talk - John Curran
SCaLE Talk - John CurranARIN
 
SD-WAN & Hybrid-WAN Solutions for CSPs
SD-WAN & Hybrid-WAN Solutions for CSPsSD-WAN & Hybrid-WAN Solutions for CSPs
SD-WAN & Hybrid-WAN Solutions for CSPsRicky Pierson
 
IPv6 Design Guide with Alcatel-Lucent Enterprise Networking Products
IPv6 Design Guide with Alcatel-Lucent Enterprise Networking ProductsIPv6 Design Guide with Alcatel-Lucent Enterprise Networking Products
IPv6 Design Guide with Alcatel-Lucent Enterprise Networking Productsacheikhrouhou
 
IETF Activities Update
IETF Activities UpdateIETF Activities Update
IETF Activities UpdateARIN
 
Ipv6 tutorial
Ipv6 tutorialIpv6 tutorial
Ipv6 tutorialsaryu2011
 
Slides from IPv6 Threats
Slides from IPv6 ThreatsSlides from IPv6 Threats
Slides from IPv6 ThreatsCyren, Inc
 
TheServerHost offering IPV6 Philippines VPS and Dedicated Server
TheServerHost offering IPV6 Philippines VPS and Dedicated ServerTheServerHost offering IPV6 Philippines VPS and Dedicated Server
TheServerHost offering IPV6 Philippines VPS and Dedicated ServerTheServerHost
 
New Network ProtocolRunning Head New Network Protocol Pap.docx
New Network ProtocolRunning Head New Network Protocol Pap.docxNew Network ProtocolRunning Head New Network Protocol Pap.docx
New Network ProtocolRunning Head New Network Protocol Pap.docxcurwenmichaela
 
Ipv6 Advantages And Disadvantages
Ipv6 Advantages And DisadvantagesIpv6 Advantages And Disadvantages
Ipv6 Advantages And DisadvantagesJacqueline Thomas
 
IPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdfIPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdfCPUHogg
 
IPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesIPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesAPNIC
 

Ähnlich wie Slides from Introduction to IPv6 (20)

IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
NAv6TF I Pv6 State Of Union Jan 2008
NAv6TF  I Pv6  State Of  Union  Jan 2008NAv6TF  I Pv6  State Of  Union  Jan 2008
NAv6TF I Pv6 State Of Union Jan 2008
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6
 
Adressing IPv6 strategy
Adressing IPv6 strategyAdressing IPv6 strategy
Adressing IPv6 strategy
 
ARIN's IPv4-IPv6 Community Slide Deck
ARIN's IPv4-IPv6 Community Slide DeckARIN's IPv4-IPv6 Community Slide Deck
ARIN's IPv4-IPv6 Community Slide Deck
 
SCaLE Talk - John Curran
SCaLE Talk - John CurranSCaLE Talk - John Curran
SCaLE Talk - John Curran
 
SD-WAN & Hybrid-WAN Solutions for CSPs
SD-WAN & Hybrid-WAN Solutions for CSPsSD-WAN & Hybrid-WAN Solutions for CSPs
SD-WAN & Hybrid-WAN Solutions for CSPs
 
IPv6 Design Guide with Alcatel-Lucent Enterprise Networking Products
IPv6 Design Guide with Alcatel-Lucent Enterprise Networking ProductsIPv6 Design Guide with Alcatel-Lucent Enterprise Networking Products
IPv6 Design Guide with Alcatel-Lucent Enterprise Networking Products
 
IETF Activities Update
IETF Activities UpdateIETF Activities Update
IETF Activities Update
 
Ipv6 tutorial
Ipv6 tutorialIpv6 tutorial
Ipv6 tutorial
 
Ipv6 tutorial
Ipv6 tutorialIpv6 tutorial
Ipv6 tutorial
 
Slides from IPv6 Threats
Slides from IPv6 ThreatsSlides from IPv6 Threats
Slides from IPv6 Threats
 
TheServerHost offering IPV6 Philippines VPS and Dedicated Server
TheServerHost offering IPV6 Philippines VPS and Dedicated ServerTheServerHost offering IPV6 Philippines VPS and Dedicated Server
TheServerHost offering IPV6 Philippines VPS and Dedicated Server
 
IPv6: the what, why and how
IPv6: the what, why and howIPv6: the what, why and how
IPv6: the what, why and how
 
New Network ProtocolRunning Head New Network Protocol Pap.docx
New Network ProtocolRunning Head New Network Protocol Pap.docxNew Network ProtocolRunning Head New Network Protocol Pap.docx
New Network ProtocolRunning Head New Network Protocol Pap.docx
 
IPv6: Early Mover Advantage?
IPv6: Early Mover Advantage?IPv6: Early Mover Advantage?
IPv6: Early Mover Advantage?
 
Ipv6 Advantages And Disadvantages
Ipv6 Advantages And DisadvantagesIpv6 Advantages And Disadvantages
Ipv6 Advantages And Disadvantages
 
IPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdfIPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdf
 
IPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesIPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for Mobiles
 
IPv6: Forecasts and Trends
IPv6: Forecasts and TrendsIPv6: Forecasts and Trends
IPv6: Forecasts and Trends
 

Mehr von Cyren, Inc

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowCyren, Inc
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportCyren, Inc
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareCyren, Inc
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksCyren, Inc
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingCyren, Inc
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyCyren, Inc
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatCyren, Inc
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeCyren, Inc
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteCyren, Inc
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksCyren, Inc
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportCyren, Inc
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportCyren, Inc
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareCyren, Inc
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportCyren, Inc
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 PresentationCyren, Inc
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookCyren, Inc
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 

Mehr von Cyren, Inc (20)

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to know
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomware
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array works
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking survey
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threat
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrime
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsolete
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 

Kürzlich hochgeladen

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Kürzlich hochgeladen (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Slides from Introduction to IPv6

  • 1. An Introduction to IPv6Slides from May 2011 webcast
  • 2. 2 View the recorded webcast on SlideShare at… http://www.slideshare.net/Commtouch/an-introduction-to-ipv6 on
  • 3. Topics Covered Review of IPv4 What is IPv6 Impact of IPv6 Issues you need to understand Insights on the opportunities IPv6 will offer
  • 4. Speakers Limor SchafmanPresident, KeystoneTech Group Expertise in mobile & wireless, video games, digital media, advertising, hardware development & software systems Frequent conference speaker & moderator Co-founder and Chair Emeritus of the IPv6 Forum Israel Chapter Former host of thought leadership web shows including DigIn! Radio and Crash Course Dale GeeseyCOO, Auspex Technologies Security, networking and IT professional focused on IPv6 and Cyber Security Specializes in the introduction of advanced and next gen technologies 20 years working with the US federal government, DoD & telecom carriers Supporting government IPv6 Transition activities since 2004 Frequent speaker at Internet and technology events www.diginblog.com www.auspextech.com
  • 5. Have a question? Send questions to: IPv6@commtouch.com Responses posted: http://blog.commtouch.com
  • 6. Session: An Introduction to IPv6 Limor Schafman Dale Geesey Speakers:
  • 7. What is IPv6 IPv6 – Internet Protocol version 6 Exists many years Gaining increased public knowledge
  • 8. The History of Internet Protocol
  • 9. The History of Internet Protocol Packet switching developed in the 50’s & 60’s First versions of IP introduced in the 70’s for US Department of Defense programs Highly survivable communications system Production use in the 80’s on US DARPANET and then the Internet 90s saw the explosion of IP use on the Internet Easier more economical than other networks
  • 10. The History of Internet Protocol Too few addresses initially selected Didn’t realize how big Internet would get Arbitrarily selected 232 About 4.3 Billion addresses Internet initially an experiment
  • 11. The History of Internet Protocol Nobody imagined what the Internet would become Did not envision the number and types of devices that would connect to the Internet 2014 – 50 Billion individual elements on the Internet
  • 12. The History of Internet Protocol With IPv4 didn’t know where Internet was going IPv4
  • 13. The History of Internet Protocol With IPv4 didn’t know where Internet was going Today similar questions of where Internet will go in the future IPv4 IPv6
  • 14. The History of Internet Protocol With IPv4 didn’t know where Internet was going Today similar questions of where Internet will go in the future Exponentialgrowth IPv6 IPv4 IPv6
  • 15. The end of IPv4?
  • 16. ICANN IPv4 Addresses 4.3 Billion IPv4 addresses are running out
  • 17. The end of IPv4? Africa United States, Canada, parts of theCaribbean Asia Pacific Latin America, parts of theCaribbean Europe, Middle East, Central Asia ISPs, companies, etc.
  • 18. The end of IPv4? February 2011 Africa United States, Canada, parts of theCaribbean Asia Pacific Latin America, parts of theCaribbean Europe, Middle East, Central Asia ISPs, companies, etc.
  • 19. The end of IPv4? February 2011 6 month supply or less ISPs, companies, etc.
  • 20.
  • 21.
  • 22. Connecting to Internet NAT – Network Address Translation NAT Public IP Address
  • 23. Connecting to Internet NAT – Network Address Translation NAT Public IP Address
  • 24. Connecting to Internet Today often have 10s of thousands of people using one IP address With fewer IP addresses, this will become harder, resulting in Potential for breakages – won’t be able to connect More layered devices to allow more to connect, at a cost of lower quality for services Won’t see a collapse of Internet access, but will affect value added services
  • 26. What is IPv6 Developed in early 90s First version out in mid-to-late 90s Continues to be developed Designed to overcome limitations in IPv4
  • 27. What is IPv6 First issue was to deal with addressing Went from 232 to 2128 IPv4 Addresses IPv6 Addresses 4.3 Billion (4.3×109) 340 Undecillion (3.4×1038) 4,300,000,000 340,000,000,000,000,000,000,000,000,000,000,000,000
  • 28. What is IPv6 Security another major issue to deal with IPsec was retrofitted to IPv4, but built in to IPv6 from the start On the technical side… Introduced fixed headers to enable new capabilities not possible with IPv4 Extension Headers to enable a new stream of innovations
  • 30. Impacts of IPv6 Ability to develop networks that provide less gatekeepers in the way IPv6 global addressing enables you to… Minimize devices Minimize delay Simplify development Headers allow development of new quality and streaming services
  • 31. IPv6 Myths & Concerns
  • 32. Myths & Concerns Concern – it’s new Less experience deploying New code to develop Don’t have same time to understand and work out bugs Concern – Training and understanding There are differences – lack of IPv6 expertise Concern – Idea of using globally routed addresses Uncomfortable for some security professionals
  • 33. Myths & Concerns Most networks already have IPv6 Need to be aware of this
  • 35. IPv6 Deployment Deployed since late 90s early 2000s Large deployment last 4-5 years Most major carriers offer IPv6 Most operating systems, many applications support IPv6 A number of service and content providers offer IPv6 services Examples: Google, Netflix, Facebook
  • 36. Impact on Service Providers
  • 37. Impact on Service Providers Need to be looking at IPv6 if you’re not yet Demand from IPv6 will come from government agencies and organizations Eventually demand from businesses and consumer users If you’re a service provider need to look at How to fit IPv6 into your infrastructure Strategically, what new services will IPv6 enable you to offer
  • 38. Impact on Service Providers IPv6 offers a product and market opportunity Will impact on a product, strategic and business development basis Types of services to offer Types of customers to seek out to take advantage of new opportunities Your infrastructure needs to support end-user demand Video streaming, voice, and other new capabilities
  • 40. Opportunities for Security Vendors Tremendous room for growth Will help governments, businesses, service providers to implement policies Some of the pieces will be the same as IPv4, such as firewalls Some of the ways we do security will change, such as spam filtering Greater move to host-based security
  • 41. Opportunities for Security Vendors IPv6 is the perfect protocol for implementing cloud-based solutions Security will be an essential part of this
  • 43. Transitioning to IPv6 Many resources available, such as Regional Internet Registries ARIN: http://www.getipv6.info/index.php/Main_Page APNIC: http://www.apnic.net/community/ipv6-program RIPE: http://www.ripe.net/lir-services/resource-management/ipv6 AfriNIC: http://www.afrinic.net/IPv6/index.htm LACNIC: http://portalipv6.lacnic.net/en
  • 44. Transitioning to IPv6 You need an IPv6 transition plan Map out what you have today, what you need to do and how you need to do it TRANSITION IPV6 IPV4
  • 45. Transitioning to IPv6 You need an IPv6 transition plan Map out what you have today, what you need to do and how you need to do it Short term: Get interoperable with IPv6 very quickly, even if you don’t support new features Long term: Plan for how you’re going to do things in the future Simplify, cut costs and improve performance
  • 47. Final Thoughts If you haven’t started implementing IPv6, then its critical that you start Implement something to gain experience and understand IPv6 Make sure all equipment you buy today is IPv6 enabled Does it have capabilities that you need Plan Try Buy Correctly
  • 48. Thank you to Limor Schafman www.diginblog.com Dale Geeseywww.auspextech.com
  • 49. 49 View the recorded webcast on SlideShare at… http://www.slideshare.net/Commtouch/an-introduction-to-ipv6 on
  • 50. Send questions to: IPv6@commtouch.com Responses posted: http://blog.commtouch.com
  • 51. Look for our next IPv6 webcast: IPv6 Spam, Malware and Web Threats