Network security and implementation based on IPV6
Zeng, Qijia (2011)
Zeng, Qijia
Turun ammattikorkeakoulu
2011
All rights reserved
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-2011062012317
https://urn.fi/URN:NBN:fi:amk-2011062012317
Tiivistelmä
With the application of Internet services continuing to develop, the portable demands for user mobility are growing rapidly. To solve the issue of the Internet, IPv6 protocol, based on IPv4, is proposed and studied. IPv6 replacing IPv4 and becoming a new IP protocol is an inevitable process, but IPv6 technology is not yet very mature, but it needs to be further improved.
Meanwhile, network operators work independently, they have their own network resources and equipment, and each of them uses different systems for supporting and managing programs. Users are continuously presented with a variety of service provider account numbers and passwords, which add burden and impede to use of network resources speed. Therefore, the corresponding authentication, authorization and accounting have become the urgent demand of business applications and enabling better integrations of the AAA IPv6 turns to a hotspot issue.
This thesis presents an overview of network security and studies the IPV6 basic characteristics on certain restricted network security. It also presents a comparison of the advantages and disadvantages of the transition tunnel IPv6 to IPv4 technology, dual stack technology and translation technology.
Meanwhile, network operators work independently, they have their own network resources and equipment, and each of them uses different systems for supporting and managing programs. Users are continuously presented with a variety of service provider account numbers and passwords, which add burden and impede to use of network resources speed. Therefore, the corresponding authentication, authorization and accounting have become the urgent demand of business applications and enabling better integrations of the AAA IPv6 turns to a hotspot issue.
This thesis presents an overview of network security and studies the IPV6 basic characteristics on certain restricted network security. It also presents a comparison of the advantages and disadvantages of the transition tunnel IPv6 to IPv4 technology, dual stack technology and translation technology.