Introduction
IPv6 contains the potential to create robust internet with an enormous scale as compared to the contemporary situation (Sameeha, 2012). IPv4 Addresses comprise 32 bits and permit about four billion addresses only, while IPv6 has 128 bites allowing up to 340 trillion, trillion, trillion addresses. The IETF, in its work, has added enhancements in IPv6 in contrast to IPv4. The IPv6 protocol can efficiently handle packets, increase security, and improve performance. It enables providers of internet service to decrease the size of their tables routing by making them hierarchical. Security is considered as a significant advantage of IPv6 because the IPSec that provides data integrity, authentication, and confidentiality is cooked in IPv6 (Sameeha, 2012). Because of its possibility to deliver malware, IPv4 ICMP packets are frequently stopped by joint firewalls, however ICMPv6, the implementation of internet manage texts for IPv6 can be permitted since IPSec may be put into the ICMPv6 packets.
Hybrid Mobile Apps
Applications deployed in a device like any other app are referred to as hybrid mobile apps (Malavolta et al., 2015). They possess some elements from native apps. These apps are installed in a native container that uses a web view object of a mobile. The hybrid mobile apps are associated with certain advantages. That is, it combines the experience of users with agile cycle development and controlled costs (Malavolta et al., 2015). Besides, it helps in avoiding the limitations of the Apple App Store. That is to install an application in an Apple Store App, submission of the app has to be done and validation waiting time given. Also, the Hybrid mobile app allows reuse of the code of the web app part. Once the code is written, it is installed across all the platforms of the mobile. The hybrid mobile app cloud plays a significant role in hiding logic from the client. It works with already deployed modules in accessing API of any popular services, and it carries out some of the high-load activities (Malavolta et al., 2015).
Domain Name Service (DNS)
The use of DNS is to interpret domain names to IP addresses that computers can use to identify each other in the network. It is a brief system of correlating names with numbers (Walfish et al., 2004). It is dangerous to use central DNS like Dyn because, when hacked, they have a very significant impact. When hacked, the DDos servers are filled with traffic by a hacker that denies the legitimate user from gaining access to the network. DNS servers cannot combat this volume of capacity, and they swiftly stop being accessible. If the hackers were to hack DNS systems worldwide, they would lay down many websites for the cost of one. This will affect billions of internet users worldwide.
Internet of Things (IoT)
IoT is defined as the system of similar computing devices, digital and mechanical machines, people, objects, or animals provided with unique identifiers as well as data transferability over the network without a human to a computer or human to human interaction requirements (Weber, 2010). It connects something to the internet hence allowing it to receive or send information or both tasks, thus making things smart. IoT security faces some challenges to its scalability. For instance, physical protection has become one of the problems as the devices are kept scattered outside and inside smart offices and homes as a way of advertisement. Thus people can break them accidentally and more efficiently. In long-running sessions, IOT faces security challenges as they are tailored to low encrypting data flow, which is associated with short running sessions. Besides, privacy issues are not kept to standards as IoT data lies in communication patters as well as metadata, which is not encrypted (Weber, 2010).
Cloud Computing
Cloud computing is a virtualized pool of resources to application functionality from raw compute power available on-demand (Lubomski et al., 2016). Advanced automation is used by the provider to fulfill requests to the customers who procure cloud services. Virtualization depends on software to prompt hardware tasks and build a virtual computer system. Therefore, it makes information technology institutions execute many operating and virtual systems or applications in an individual server. Cloud computing and virtualization are not indistinguishable (Lubomski et al., 2016). Virtualization software enables computing surroundings separate from physical infrastructure. Cloud computing services transport shared computing resources that are on-demand through the internet. As a current solution, the company can start by virtualizing its services then transferring to cloud computing for bigger self-service or agility.
References
Lubomski, P., Kalinowski, A., & Krawczyk, H. (2016, June). Multi-level virtualization and its impact on system performance in cloud computing. In International Conference on Computer Networks (pp. 247-259). Springer, Cham. https://link.springer.com/chapter/10.1007/978-3-319-39207-3_22
Malavolta, I., Ruberto, S., Soru, T., & Terragni, V. (2015, May). Hybrid mobile apps in the google play store: An exploratory investigation. In 2015 2nd ACM international conference on mobile software engineering and systems (pp. 56-59). IEEE. https://ieeexplore.ieee.org/abstract/document/7283028/
Sameeha, M. A. A. (2012). Look at IPV6 Security advantages over IPV4. Network and Complex Systems, ISSN, 34-35. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.457.4164&rep=rep1&type=pdf
Walfish, M., Balakrishnan, H., & Shenker, S. (2004, March). Untangling the Web from DNS. In NSDI (Vol. 4, pp. 17-17). http://wind.lcs.mit.edu/papers/sfr-nsdi04.pdf
Weber, R. H. (2010). Internet of Things–New security and privacy challenges. Computer law & security review, 26(1), 23-30. https://www.sciencedirect.com/science/article/pii/S0267364909001939.
Cite this page
Essay Sample on IPv6: Enabling Robust Internet with Enhanced Features. (2023, Sep 17). Retrieved from https://proessays.net/essays/essay-sample-on-ipv6-enabling-robust-internet-with-enhanced-features
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Essay Sample on Virtual Teams and Robotics
- Summary of My View on Marketing Information System (MIS) Essay
- Organizational IT Maturity Assessment of Coca-Cola Company
- Evaluation Essay Sample on Google Company
- Secure Healthcare Data: Protecting Sensitive Info From Breaches & Leaks - Essay Sample
- Nuclear Energy: A Viable Solution for UAE's Electricity Needs - Essay Sample
- Recruiting and Selecting Qualified Candidates: Best Practices in the Digital Era