This preview shows page 1. Sign up to view the full content.
Unformatted text preview: ially.
Presently, the Internet works on IPV4 (Internet Protocol Version 4), which is
popularly known as IP.IPV4 has been around since 1978. By the middle of 1990s,
it was recognized that there are several limitations in IPV4 i a new version of
Internet Protocol (IP) needs to be worked out. Some of the important limitations
identified IPV4 are:
1. The 32-bit address space of IPV4 is not sufficient to cope up with the growing
size of the Internet and its user community. That is, it would not permit enough
Internet addresses for the rapidly growing number of users. What was sufficient
for a few million users or a few thousands of networks, will of longer be sufficient
to support a world with tens of billions of nodes and hundreds of million of
2. When IPV4 was defined, multimedia applications were not so popular. Hence
IPV4 lacks feature support multimedia applications that need real-time services or
time-sensitive services. 3. IPV4 has no support for security at IP layer. With several Internet applications
dealing with critical data, security has become an important issue.
4. IPV4 has limited mobility support, which has become a need for the users
dealing with mobile applications.
To address these limitations of IPV4, the Internet Engineering Task Force (IETF)
developed and proposed a new version of the Internet Protocol. This version is
popularly known as IPV6 (Internet Protocol Version 6) or Next Generation IP.
The key features of IPV6 are:
1. It uses 128-bit address space instead of 32-bit in IPV4, which is believed to
ensure that the world will not run out of IP addresses. With this large address
space, it is expected that the Internet under IPV6 can support 10 15 (quadrillion)
hosts and 1012 (trillion) networks (the Internet under IPV4 can support maximum
232 hosts). Therefore the IPV6 address space is approximately 64 x 10 9 times
more than that of IPV4.
It uses flow labeling and priority concepts to support real-time services.
Senders can label packets that belong to high-p...
View Full Document
This document was uploaded on 04/07/2014.
- Spring '14