Summary of the applicable government ipv6 mandate

Assignment Help Computer Network Security
Reference no: EM131312644

The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require government agencies to have their websites, email and other services available over IPv6.

Let's consider that you've been appointed as the IPv6 transition manager at a relatively small branch of a government agency (e.g., a branch of the Social Security agency in a medium-size town). Your main responsibility is to produce a plan with a timetable for achieving compliance with the IPv6 mandate. The plan should specify the guidelines, solutions, and technologies for supporting IPv6 throughout the agency branch. The plan should include the following, among other things:

- Summary of the applicable government IPv6 mandate
- Brief description of the networking facility at the branch (LANs, servers, routers, etc.)
- Summary of the main IPv6-related RFCs that pertain to the IPv6 support
- Cooperation with ISPs and equipment vendors to implement IPv6 support
- Summary of the solutions and technologies to be employed in implementing IPv6 (e.g., dual-stack, tunneling, translation)
- Timetable for completion of IPv6 transition
- Plan for testing the IPv6 compliance in expectation of an audit by the government

The deliverable is a report (in Word) of 6 to 10 pages, excluding the name and biblio pages, with 3 to 5 solid references (APA format), at least. The use of drawings and other graphics is highly recommended.

Please note that the case study report will be processed automatically by turnitin.com upon submission (for plagiarism check), and beware that if a similar report has been submitted to Apus previously, your report will be flagged as plagiarized. The ceiling turnitin score is normally 15%.

Verified Expert

Work is in 2000 words in APA format in MS word where the focus has been in Ipv4 to the ipv6 which has been set for the different patterns with the RFC. it also includes the details of the different patterns related to the ipv6 translation and the tunneling. this also includes the defined process about how to handle the different translation process which includes the RFC in the different category.

Reference no: EM131312644

Questions Cloud

Explain the governing boards role in strategic initiatives : Explain the governing board's role in these strategic initiatives, determining its responsibility and involvement.Evidence-based management means that operational and strategic decisions are made based upon the evidence that goals and objectives ar..
What is the true rate of interest that the company is paying : A company sold a $1 million issue of bonds with a 15 year life, paying 4 percent interest per year. The bonds were sold at par value. If the company paid a selling fee $50,000 and has an annual expense of $70,256 for mailing and record keeping, what ..
Internet an infrastructure-architecture : Is the Internet an infrastructure, architecture, or an application program? Why? If none of the above, then what is it?
Evaluate the worst case time-complexity of the sparse matrix : Provide the code to implement the four basic operations - traversal, search, insertion, deletion - for an unsorted doubly linked list.
Summary of the applicable government ipv6 mandate : ISSC 640 Case Study - Summary of the applicable government IPv6 mandate and brief description of the networking facility at the branch (LANs, servers, routers, etc.)
How does a stack of belleville washers fight self loosening : Describe the MIL-STD-1312 (NAS) test? Name three generic ways to prevent or at least minimize self-loosening? Define prevailing torque?
Amazon new information technology infrastructure : Describe Google and Amazon's new information technology infrastructure. What is the relationship between this new infrastructure and the global, Web-based platform? Explain why IT is a business pressure as well as an enabler of response activities..
What is the average number of comparisons required : What is the average number of comparisons required to determine if the collection contains the key 73
Before installation of the linux os : Why do you suppose so much planning needs to occur before installation of the Linux OS?

Reviews

inf1312644

12/15/2016 8:15:25 AM

Thank you such a great amount for the information! I will ask for the same expert again and I'll make sure to incorporate his name in every future solicitation! Likewise I needed to include that I am exceptionally satisfied with your organization including your brief email reactions, nature of experts and consideration. You have been an extraordinary help and I really value all that you have accomplished for me! Have a superb day! All the best.

Write a Review

Computer Network Security Questions & Answers

  Describe the process used in restoring the scrambled bits

You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment. Describe the process used in restoring the scrambled bits and insert plain text in the assignment

  Explain security model of class using cnss model

suppose that the security model is required for protection of your class. Using CNSS model, examine each of the cells and write a short statement.

  Show strategies to prevent such cyber warfare attack

Need a 1000 word paper on the various recent/news on the United States (particular the group known as Anonymous and Lulzsec). Also need the various strategies to prevent such cyber warfare attacks and prevention techniques.

  Describe the main elements of data breach notification laws

From the e-Activity, describe the main elements of data breach notification laws. Discuss the importance of breach notification for credit card information, as it relates to PCI-DSS.

  Difference between enterprise and it architecture

What is the difference between enterprise architecture and IT architecture and should enterprise architecture really be called "IT" architecture?"

  What is the value of your shared secret key

You begin the session by sending X your calculated value of TA. X responds by sending you the value TB = 167. What is the value of your shared secret key? Show all your work.

  Problem regarding the website migration project

Tony's Chips has recently been sold to a new independent company. The new company has hired you to manage a project that will move the old Website from an externally hosted solution to an internal one.

  Ethics or values within the hacking subculture.

Write a 1-2 page essay defining and showing examples of hacking and its subculture. Do hackers have ethics or values? If so, give examples of ethics or values within the hacking subculture.

  Determine the value of the symmetric key

Discuss some of the attacks on the Diffie Hellman key exchange protocol we discussed in the lecture. Present your solution for avoiding such attacks.

  Briefly describe the ict configuration of your company

Design suitable a security system for your company, clearly identifying the major security components of your design. Marks will be awarded on insight and elaboration.

  Classify this vulnerability using the risos model

The time-to-expire field is set at 0.5 because the administrator believes that this field unit is minutes (and wishes to set the time to 30 seconds) However, bind expects the field to be in seconds and reads the value as 0 - meaning that no data i..

  Thoughts regarding vulnerabilities surrounding computing

What are your thoughts regarding vulnerabilities surrounding the computing world today and the risks of computers being attacked.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd