Explain benefits of implementing ipv-six

Assignment Help Computer Network Security
Reference no: EM131708475

Assignment

You are a well-known expert in the design and security of corporate network infrastructures. As such, Z Corporation, Inc. (ZCorp) has contacted you and is requesting a proposal for a network infrastructure integration design.

ZCorp is a global financial institution that intends to add Internet Protocol version 6 (IPv6) to its existing network. The headquarters of ZCorp is in Denver, CO and it also has main offices in Sydney, Australia, Vienna, Austria, Tokyo, Japan, and Rio de Janeiro, Brazil. Local routers are providing network services such as Dynamic Host Configuration Protocol (DHCP), network address translation (NAT), and Domain Name System (DNS). It is using Enhanced Interior Gateway Routing Protocol (EIGRP) as its interior gateway protocol and Exterior Gateway Protocol (EGP) as its exterior gateway protocol. Its wide area network (WAN) involves multiple T3 connections and the use of Asynchronous Transfer Mode (ATM). It is unclear to the ZCorp information technology (IT) staff whether they should replace Internet Protocol version 4 (IPv4) with IPv6 or use both versions of IP (dual-stack operation).

Your mission is to prepare a proposal document that makes a recommendation for either replacing IPv4 with IPv6 or using both version of IP. This recommendation must be supported and explained in detail. Research IPv4 and IPv6 to understand differences, benefits, and challenges. Seek information regarding LANs implementing dual protocol stacks. Make a recommendation for a) replacing IPv4 with IPv6; b) using IPv4 and IPv6 together (dual-stack operation). Support your recommendation.

Your proposal should specify a phased approach for your recommendation. You should include the following considerations in your document:

• Benefits of implementing IPv6, especially in the area of security
• Potential issues and concerns with IPv6
• Whether or not to continue the use of network services with IPv6
• Necessary changes to existing hardware with IPv6
• Other resource factors
• High level set of steps to implement your recommendation including IP addressing scheme

Your proposal should be a Word document of 3-5 body pages that includes a title page and an abstract. Citations and references list must be in APA style. Refer to the APA style guide found in the Library for further information.

Reference no: EM131708475

Questions Cloud

Discuss ethical and environmental issue in purchasing : Sustainability is an important ethical and environmental issue in purchasing. Describe one material, product, or service that can contribute
Create a work breakdown structure that includes all tasks : Create a Work Breakdown Structure (WBS) that includes all project tasks (hierarchically grouped) and durations. Establish task precedence relationships.
What is an explication of a poem : What is an explication of a poem? It is a detailed explanation or interpretation. It discusses the poem's form (Sonnet? Quatrains? Free form?).
Discuss systematically assess staffs performance : Conducting an evaluation of a program can also allow a program manager to systematically assess staff's performance
Explain benefits of implementing ipv-six : Explain Benefits of implementing IPv6, especially in the area of security. Potential issues and concerns with IPv6.
Find the total number of seats on each flight : Write an SQL query for each of the following. Find the flights departing from an airport in NY state. Find the flights with no reservations
Consumers as way to structure market segmentation : The importance for market researchers to study statistically significant differences among groups of consumers as a way to structure market segmentation.
Advantage of a? partnership : Which of the following is an advantage of a? partnership?
Calculate the inventory turnover for the retailer : Use this information to calculate the inventory turnover for the retailer last year.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Do you foresee a fusion between lan and wan

Do you foresee a fusion between LAN, MAN, and WAN technologies in the future?

  Develop a security matrix spreadsheet and security strategy

Create a security matrix spreadsheet and security strategy summary. Include the user roles and matching security rights that would be expected to be created for the Akron site.

  Describe the purpose of a ddos attack

Describe the purpose of a DDoS attack. How is a DDoS attack configured. How can DDoS attacks be detected and prevented. Research the internet for a DDoS attack. Describe the events.

  Write paper about stuxnet virus

Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry. Write paper about Stuxnet..

  Write the conclusion to the information security policy

Write the conclusion to the Information Security Policy? Write the Network Security Policy section of the Information Security Policy.

  Security risks associated with social networking sites

Discusses the security risks associated with social networking sites

  Is there any way that eve can read encrypted communications

Suppose that Eve runs a key server. Alice downloads a key from the key server which Eve claims is Bob's public key. Bob downloads a key from the key server which Eve claims is Alice's public key.

  Cisco firewall

Using the Web, research the costs associated with the following items when implemented by a firm with 1,000 employees and 100 servers, Managed antivirus software (not open source) license for 500 workstations, Cisco firewall

  Describe ways hacker can gain access to employee information

Describe two (2) ways a hacker can gain access to employee information. Recommend the steps an organization could take to address these security breaches after the fact. Then, outline a plan for preventing these breaches from occurring, and specif..

  Examine common web application vulnerabilities and attacks

Examine three common Web application vulnerabilities and attacks, and recommend corresponding mitigation strategies for each. Provide a rationale for your response.

  Identify at least three different social media networks and

identify at least three different social media networks and describe how they are used.explain the advantages and

  How system with capabilities as its access control mechanism

In general, do capabilities offer more or less protection against Trojan horses than do access control lists? Justify your answer in light of the theoretical equivalence of ACLs and C-Lists.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd