You are on page 1of 17

Aadhithya rama sarma.

V
Ismail.N

KONGU ENGINEERING
COLLEGE, Erode.

WHAT IS NETWORK? Inter Connection of Autonomous Computers Large Number of Separate But Interconnected Computers .

Hacking . different: Many strong tools available to secure a computer network: Viruses and Worms.Introduction to Network Security Understand the need & outline a security policy relevant to any company. Each business has a different threshold of well-being.

Some Popular  UUCP Networks  IPv6 . Messaging services such as email. How devices communicate with each other over different types of networks. and SMS. Types of high speed WAN connections.Introduction to Networking Basic technology terms used when discussing networking. FTP.

UUCP    Unix to Unix Copy Was developed to connect the Unix hosts VMS Host .

IPv6       IETF Next Generation Internet Protocol or IPng Connectionless service model Used to Run High performance Network Provide Platform for New Functionality 128 bits 2^128 = 340 trillion trillion trillion addresses .

IPv6 Address Type & prefixes Unicast  Anycast  Multicast  Prefixes – equivalent functionality to a subnet mask in IPv4  .

IPv6 security options     Address spoofing Wire Tapping (active and passive) Replay Traffic analysis .

Transition Philosophy & Scenario       IPv6 is inevitable Prudent Supports Teaching and Research Choosing Different Ways Support IPv6 operation (Goal) Deployment not Straight Forward .

Network Infra Structure Component     Internal Name Servers BIND9 is used AAAA Records and AAAA Glue is added JANET supports IPv6 Transport .

Routing & Configuration       RIPng used for Internal IPv6 Routing IPv4 is Statistically Configured External Routing is same Site is not Multi Firmed IPv4 client uses DHCP IPv6 client uses DHCP v6 .

EXTENSIONS  Security   Network Management    Embrace IPv6 Transition mechanism to Deploy IPv6 Address Planning     Identifying new IPv6 related security. Similar Percentage of Allocation Multicast IPv4 – number of application Source Specific Multicast – Heavy in IPv6 .

Deployment Methodology  Gaining Initial Connectivity     IPv6 – Gannet through Regional MAN Obtaining Global Address Space 56 – prefix – 256 IPv6 are Created Deploying Basic Connectivity    Function Site Policy IPv6 Updating Ex Privacy Address .

Proxy Tools WLAN access point & web cams Transition Tool Box Internal Upgrade Core Network to Dual Stack . Usage of VLAN for Parallel IPv6 Supporting IPv4 & IPv6 Inter working Most Probably not Required.          Deployment Basic Internal N/w service Supports DNS. Routing & Host Config.

traceroute6. cftp) including the IPv6 enabled web browsers Many systems are shipped with IPv6 enabled telnet. ProFTPD is one of the more well known There are also many IPv6 enabled FTP clients (lftp. tnftp.Applications     Many FTP servers are IPv6 enabled. including *BSD. ssh. tracepath etc. Sometimes named ping6. ftp etc. tracepath6 . traceroute. Solaris and several Linux distributions IPv6 enabled systems have ping.

CONCLUSION  Fast-propagate worm is definitely possible in IPv6. some of them are theoretical and have not been found in the wild nowadays Bad design choices in IPv6 – can be eliminated easily   Densely allocated IPv6 addresses Easy-to-remember IPv6 addresses . at least in /64 enterprise networks  Factors that speedup the propagation   A variety of scanning techniques.