Data Security in the Transition from IPv4 to IPv6
Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 8
Abstract
IPv4 is a foundation of Internet communication. Designed many years ago the protocol is inadequate in modern networks. New sixth ersion is replacing the older one. It is often repeated that IPv6 was designated to solve some security problems. This statement is true only to some extent. IPv6 deployment for the future infrastructure IPv6DFI (especially in the transition phase) will have large impact, not always positive on many aspects of Internet services: network performance, data security, economy. As number of IPv6 networks grow, new threat awareness and understanding become more important. The paper attempts to present comprehensive survey on IPv6 security and to identify many issues of data security in the transition from IPv4 to IPv6 phase.
Authors and Affiliations
VISHAL S. DHOLE, NITA V. JAISWAL and PROF. D. M. DHAKHNE
Analysis of Self Tuning Fuzzy PID Internal Model Control
In this paper internal model control and fuzzy self-tuning PID controller is combined into a whole controller which make up a new controller fuzzy self-tuning PID internal model controller. First the internal model con...
slugA Study on Effectiveness of Celebrity endorsements towards television viewers perceptive in Salem city, Tamilnadu, India
The instrument of celebrity endorsement has nowadays become a pervasive element in advertising and communication management. India as a country is known for loving its stars. The Indians idolize their favorite actors a...
Diversity Reception Technique for QoS Improvement
The diversity is used to provide the receiver with several replicas of the same signal. The diversity techniques like selection diversity, equal gain diversity and maximum ratio combining diversity have been discussed...
A Survey on Fingerprint Recognition System
Fingerprints have been widely accepted throughout the world and is considered to be the most prominent biometric. Several robust techniques have been developed for fingerprint matching and identification. This paper di...
slugFailure Model of Peopleware Factors: A Neuro-Computing Approach
Human Resource can play a critical role in the success and failure of Information systems in an organization. It has been established that even the best of Information systems do fail due to the neglect of the human fa...