210 likes | 228 Views
Exploring IPv6: The Internet Protocol of Infinite Possibilities. Agenda. What Is IPv6?. Why Transition?. Applications and Benefits. Next Steps. Q and A. What Is IPv6?. Increases the quantity of unique IP addresses available to network devices to an almost infinite number
E N D
Exploring IPv6:The Internet Protocol of Infinite Possibilities
Agenda What Is IPv6? Why Transition? Applications and Benefits Next Steps Q and A
What Is IPv6? • Increases the quantity of unique IP addresses available to network devices to an almost infinite number • Provides the foundation to radically change the way we communicate IPv4
What Is IPv6? • Increases the quantity of unique IP addresses available to network devices to an almost infinite number • Provides the foundation to radically change the way we communicate IPv6
What Does IPv6 Offer? 128 bits vs. 32 bits (IPv4 addresses predicted to exhaust by 2016) Address Space IPv6 eliminates the need for network address translation (NAT) and improves communication Quality of Service IP security is an integral part of the base protocol suite in IPv6 Data Security IPv6 hosts are not restricted by location Mobility
A Move Toward Overcoming IPv4 Limitations Reclaim Original Intent of Global, End-to-End Internet Model Japan Europe U.S.A. • European Commission has sponsored several IPv6-focused programs, including 6NET. • Department of Defense defined an IPv6 migration process to be completed by 2008. • Office of Management and Budget mandated that all federal agencies migrate their networks to IPv6 by June 2008. • Japan is successfully transitioning to IPv6.
IPv6 Enables IP Device Proliferation; Leads to Benefits Across the Board • Set-top boxes • Internet gaming • Appliances • Voice/video • Security monitoring • Building sensors • Media services • Collaboration • Mobility Higher Education/Research Consumer • Home care • Wireless asset tracking • Imaging • Mobility • Embedded devices • Industrial Ethernet • IP-enabled components • DoD • WIN-T • FCS • JTRS • GIG-BE • Animal tags • Imagery • Botanical • Weather • Telematics • Traffic control • Hotspots • Transit services Health Care Manufacturing Government (Federal/Public Sector) Agriculture/Wildlife Transportation
Innovative capabilities to the desktop Microsoft’s Windows Vista and Apple’s Mac OS X v10.3 (and later versions) enable IPv6 by default. Powerful IP applications IPv6 enables sophisticated peer-to-peer communication tools that improve interagency collaboration. Next-generation multicast Cisco’s IPv6 multicast technologies optimize media-streaming applications, allowing timely video feeds and quality-rich information to be easily distributed to millions of citizens worldwide, simultaneously. Mobility support and wireless access IPv6’s nearly infinite capacity for addresses lends connectivity to myriad electronic devices—mobile phones, laptops, in-vehicle computers, televisions, cameras, etc. Security IPv6 is less vulnerable to scanning attacks than IPv4 and possesses capabilities for packet integrity. It mandates that security is provided through information encryption and source authentication. Plug-and-play IPv6 auto-configures new equipment to communicate with the network once it is detected, which means devices are ready to use right when needed. Survey the Benefits
Coordinated citizen services Public safety—cross-functional access Smart buildings Agency mergers and acquisitions Integrated physical security—search and rescue Intelligent transportation systems Environmental impacts Teleworking—pandemic planning IPv6 Value Proposition
A category 5 hurricane hits the Texas coast. Emergency, rescue groups, FEMA, and other first responders set up a central command station. Each group manages their efforts, while collaborating with the others from one location with real-time data. Rescue and recovery efforts are coordinated in a rapid, efficient manner. 1 2 3 4 Scenario: e-Government—Secure Mobile Conferencing
Communications are established using a mobile device. A hostage has been taken at a federal building, and weapons were used. Law enforcement and special forces arrive to assist with negotiations. As communications are established, blueprints showing the building's layout, including vents and exits, are viewed from the same device. 7 6 8 5 2 1 4 3 Hostage, rescue personnel, and perpetrator are safely removed from the building. Building sensors and cameras report data to the rescuer’s handheld device showing the location of the weapons. A quick and accurate rescue operation is planned based on video surveillance footage and other specific details. Rescuers safely enter the building at a location near the hostage. Scenario: Integrated Physical Security— Building Specs
On Friday night, the last employee leaves the building and forgets to turn off the lights. Sensors detect no movement in the building after a specified time. Sensors automatically adjust light and temperature controls, which saves money and conserves energy. On Monday morning when the first employee arrives, the lights and temperature controls are automatically reset. 1 2 3 4 Scenario: SMART Buildings—Climate Controls
Vehicle and other sensors monitor emissions from public transportation and personal vehicles. Details are uploaded to a central location. Data gathered is transmitted to various locations to warn of potential health issues and smog ratings. 1 2 3 Scenario: Environmental—Emissions
An oil tanker runs aground and the ship is leaking oil. The Coast Guard, EPA, and hazardous materials response teams are dispatched. En route, weather data is provided wirelessly to a mobile data computer, allowing the initialon-scene commander to properly deploy equipment and personnel. The video feeds from local waterway and traffic cameras are fed wirelessly to the mobile command post, which has been established. 2 3 4 5 1 6 Command personnel are able to better communicate with the ship’s captain, Coast Guard, and the EPA from land. The incident commander is able to monitor shifts in wind and weather patterns in real time at the command post, and is able to look up current information on ship traffic. DoT receives data from multiple sensor locations to determine impact on health and the environment. Scenario: Public Safety—Instant, Cross-Function Access
1 2 3 Two businesses in different locations are merged into one. Data, IP addresses, and other communication devices need to be merged into one location. A central controller makes all this happen from a remote location. Scenario: Business Productivity—Mergers and Acquisitions
An employee is on a business trip using the company car. Vehicle maintenance sensors send the driver a notification that an oil change is needed. Those same sensors upload data to a central location and an appointment for the oil change is made. 2 3 4 5 1 6 The oil change appointment is sent to the driver’s PDA and placed on their calendar and a notice is sent to the vehicle. The driver confirms or changes the appointment. After the oil is changed, the sensors send another signal to a central location to update the vehicle’s records. Scenario: Intelligent Transport Systems—Maintenance
A flu pandemic strikes the U.S. Non-critical employees work from their homes using their PC, laptop, or PDA. The spread of the flu is greatly decreased by reducing exposure risk. 2 3 4 5 1 6 Most businesses continue to run seamlessly as if from the office. Impromptu medical monitoring stations in infected/suspected areas are established. Medical care is swift, and the impact to the economy is minimal. Scenario: Telecommuting—Pandemics
Cisco’s Assessment Services Collection-and-reporting tool to determine the IPv6 capability of your agency’s core infrastructure Customized scorecard, assessment, and audit based on your IPv6 readiness Migratory roadmap aligned with your strategic business objectives
Find Out More • To find out more about IPv6 or Cisco’s network readiness assessment, visit: • www.cisco.com/go/ipv6 • www.cisco.com/go/federal