This preview shows page 1. Sign up to view the full content.
Unformatted text preview: riority traffic. By assigning higher
priority to the packets belonging to real-time applications, the necessity of time
sensitiveness is restored. Packets that are time insensitive are assigned low
priority and serviced by the best effort approach. Senders can also request special
handling of packets by the routers by assigning flow labels to them, such as a nondefault quality of service or real-time service. With this feature, video and audio
data may be treated as flows whereas traditional data, such as file transfer and email, may not be treated as flows.
3. IPV6 with its ancillary security protocol provides a better communication tool
for secure business transaction over the Internet.
With a longer address field,
IPV6 permits extensions that would natively support authentication, data integrity,
and data confidentiality, which would address a variety of critical security
4. The enhanced routing capability of IPV6 includes support for mobile hosts.
This feature allows a node to move from one link to another without changing the
address. Movement can even be heterogeneous, that is, a node can move from an
Ethernet link to a cellular packet network.
5. Besides unicast and multicast, IPV6 has the provision of anycast addressing.
Anycast addressing allows a packet addressed to an anycast address to be
delivered to any one of a group of hosts.
6. IPV6 also permits auto-configuration. IP-enabled devices can thus gain full
access to the Internet without requiring time-consuming manual configuration.
7. IPV6 uses improved packet header format by dropping the least used options
from IPV4 packet header format. IT also has improved support for extensions
that brings greater flexibility in operations. All these features permit more efficient
packet handling. Points to Remember
1. The Internet is a huge network of computers that links many different types of
computers all over the world. It is a network of networks that share a common
mechanism for addressing (identifying) computers and a common set of
View Full Document
This document was uploaded on 04/07/2014.
- Spring '14