1 / 21

Exploring IPv6: The Internet Protocol of Infinite Possibilities

Exploring IPv6: The Internet Protocol of Infinite Possibilities. Agenda. What Is IPv6?. Why Transition?. Applications and Benefits. Next Steps. Q and A. What Is IPv6?. Increases the quantity of unique IP addresses available to network devices to an almost infinite number

johnkthomas
Download Presentation

Exploring IPv6: The Internet Protocol of Infinite Possibilities

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Exploring IPv6:The Internet Protocol of Infinite Possibilities

  2. Agenda What Is IPv6? Why Transition? Applications and Benefits Next Steps Q and A

  3. What Is IPv6? • Increases the quantity of unique IP addresses available to network devices to an almost infinite number • Provides the foundation to radically change the way we communicate IPv4

  4. What Is IPv6? • Increases the quantity of unique IP addresses available to network devices to an almost infinite number • Provides the foundation to radically change the way we communicate IPv6

  5. What Does IPv6 Offer? 128 bits vs. 32 bits (IPv4 addresses predicted to exhaust by 2016) Address Space IPv6 eliminates the need for network address translation (NAT) and improves communication Quality of Service IP security is an integral part of the base protocol suite in IPv6 Data Security IPv6 hosts are not restricted by location Mobility

  6. A Move Toward Overcoming IPv4 Limitations Reclaim Original Intent of Global, End-to-End Internet Model Japan Europe U.S.A. • European Commission has sponsored several IPv6-focused programs, including 6NET. • Department of Defense defined an IPv6 migration process to be completed by 2008. • Office of Management and Budget mandated that all federal agencies migrate their networks to IPv6 by June 2008. • Japan is successfully transitioning to IPv6.

  7. IPv6 Enables IP Device Proliferation; Leads to Benefits Across the Board • Set-top boxes • Internet gaming • Appliances • Voice/video • Security monitoring • Building sensors • Media services • Collaboration • Mobility Higher Education/Research Consumer • Home care • Wireless asset tracking • Imaging • Mobility • Embedded devices • Industrial Ethernet • IP-enabled components • DoD • WIN-T • FCS • JTRS • GIG-BE • Animal tags • Imagery • Botanical • Weather • Telematics • Traffic control • Hotspots • Transit services Health Care Manufacturing Government (Federal/Public Sector) Agriculture/Wildlife Transportation

  8. Innovative capabilities to the desktop Microsoft’s Windows Vista and Apple’s Mac OS X v10.3 (and later versions) enable IPv6 by default. Powerful IP applications IPv6 enables sophisticated peer-to-peer communication tools that improve interagency collaboration. Next-generation multicast Cisco’s IPv6 multicast technologies optimize media-streaming applications, allowing timely video feeds and quality-rich information to be easily distributed to millions of citizens worldwide, simultaneously. Mobility support and wireless access IPv6’s nearly infinite capacity for addresses lends connectivity to myriad electronic devices—mobile phones, laptops, in-vehicle computers, televisions, cameras, etc. Security IPv6 is less vulnerable to scanning attacks than IPv4 and possesses capabilities for packet integrity. It mandates that security is provided through information encryption and source authentication. Plug-and-play IPv6 auto-configures new equipment to communicate with the network once it is detected, which means devices are ready to use right when needed. Survey the Benefits

  9. Coordinated citizen services Public safety—cross-functional access Smart buildings Agency mergers and acquisitions Integrated physical security—search and rescue Intelligent transportation systems Environmental impacts Teleworking—pandemic planning IPv6 Value Proposition

  10. A category 5 hurricane hits the Texas coast. Emergency, rescue groups, FEMA, and other first responders set up a central command station. Each group manages their efforts, while collaborating with the others from one location with real-time data. Rescue and recovery efforts are coordinated in a rapid, efficient manner. 1 2 3 4 Scenario: e-Government—Secure Mobile Conferencing

  11. Communications are established using a mobile device. A hostage has been taken at a federal building, and weapons were used. Law enforcement and special forces arrive to assist with negotiations. As communications are established, blueprints showing the building's layout, including vents and exits, are viewed from the same device. 7 6 8 5 2 1 4 3 Hostage, rescue personnel, and perpetrator are safely removed from the building. Building sensors and cameras report data to the rescuer’s handheld device showing the location of the weapons. A quick and accurate rescue operation is planned based on video surveillance footage and other specific details. Rescuers safely enter the building at a location near the hostage. Scenario: Integrated Physical Security— Building Specs

  12. On Friday night, the last employee leaves the building and forgets to turn off the lights. Sensors detect no movement in the building after a specified time. Sensors automatically adjust light and temperature controls, which saves money and conserves energy. On Monday morning when the first employee arrives, the lights and temperature controls are automatically reset. 1 2 3 4 Scenario: SMART Buildings—Climate Controls

  13. Vehicle and other sensors monitor emissions from public transportation and personal vehicles. Details are uploaded to a central location. Data gathered is transmitted to various locations to warn of potential health issues and smog ratings. 1 2 3 Scenario: Environmental—Emissions

  14. An oil tanker runs aground and the ship is leaking oil. The Coast Guard, EPA, and hazardous materials response teams are dispatched. En route, weather data is provided wirelessly to a mobile data computer, allowing the initialon-scene commander to properly deploy equipment and personnel. The video feeds from local waterway and traffic cameras are fed wirelessly to the mobile command post, which has been established. 2 3 4 5 1 6 Command personnel are able to better communicate with the ship’s captain, Coast Guard, and the EPA from land. The incident commander is able to monitor shifts in wind and weather patterns in real time at the command post, and is able to look up current information on ship traffic. DoT receives data from multiple sensor locations to determine impact on health and the environment. Scenario: Public Safety—Instant, Cross-Function Access

  15. 1 2 3 Two businesses in different locations are merged into one. Data, IP addresses, and other communication devices need to be merged into one location. A central controller makes all this happen from a remote location. Scenario: Business Productivity—Mergers and Acquisitions

  16. An employee is on a business trip using the company car. Vehicle maintenance sensors send the driver a notification that an oil change is needed. Those same sensors upload data to a central location and an appointment for the oil change is made. 2 3 4 5 1 6 The oil change appointment is sent to the driver’s PDA and placed on their calendar and a notice is sent to the vehicle. The driver confirms or changes the appointment. After the oil is changed, the sensors send another signal to a central location to update the vehicle’s records. Scenario: Intelligent Transport Systems—Maintenance

  17. A flu pandemic strikes the U.S. Non-critical employees work from their homes using their PC, laptop, or PDA. The spread of the flu is greatly decreased by reducing exposure risk. 2 3 4 5 1 6 Most businesses continue to run seamlessly as if from the office. Impromptu medical monitoring stations in infected/suspected areas are established. Medical care is swift, and the impact to the economy is minimal. Scenario: Telecommuting—Pandemics

  18. Cisco’s Assessment Services Collection-and-reporting tool to determine the IPv6 capability of your agency’s core infrastructure Customized scorecard, assessment, and audit based on your IPv6 readiness Migratory roadmap aligned with your strategic business objectives

  19. Find Out More • To find out more about IPv6 or Cisco’s network readiness assessment, visit: • www.cisco.com/go/ipv6 • www.cisco.com/go/federal

  20. Q and A

More Related