SlideShare a Scribd company logo
1 of 15
IPV4 & IPV6
IPV4 ( IP Version 4 )
IPv4 (Internet Protocol Version 4) is the fourth revision of the
Internet Protocol (IP) used to identify devices on a network
through an addressing system. The Internet Protocol is
designed for use in interconnected systems of packet-
switched computer communication networks. It is the most
widely deployed Internet protocol used to connect devices to
the Internet. With the growth of the Internet it is expected that
the number of unused IPv4 addresses will eventually run out
because every device including computers, smartphones and
game consoles that connects to the Internet requires an
address.
Some advantages and disadvantages
of IPv4
• Connectionless Protocol and Best effort based.
• Addresses are easier to remember.
• Existing networks are already using it.
• Classful and classless addressing.
• Millions of addresses are wasted.
• Planning for excessive growth was not foreseen, addresses are running
out.
IPv4 Address Classes
 In the early days of the Internet, the IANA (Internet Assigned Numbers
Authority) defined five classes of public IP addresses as shown below.
Class A addresses
 Class A addresses are used for very large networks and always start with
a leftmost bit being a zero. Each class A network can hold as many as
16,777,216 hosts.
 There are only 127 class A addresses and these were very quickly used up
- examples include Apple, IBM and MIT.
 Many host addresses have been released back to ICANN to support
classless addresses.
Class B addresses
 These addresses are used for medium sized networks and always start
with the leftmost bits 10. Each class B network can hold as many as
65,534 hosts.
 There are 16,384 class B addresses which are all used up - examples
include Microsoft and Glasgow University.
 As with class A addresses, some of the host addresses have been
released back to ICANN to support classless addressing.
IPv6 (IP Version 6)
A new Internet addressing system Internet Protocol version 6
(IPv6) is being deployed to fulfill the need for more Internet
addresses. IPv6 (Internet Protocol Version 6) is also called IPNG
(Internet Protocol next generation). IPv6 is the successor to
Internet Protocol Version 4 (IPv4). It was designed as an
evolutionary upgrade to the Internet Protocol and will, in fact,
coexist with the older IPv4 for some time. IPv6 is designed to
allow the Internet to grow steadily, both in terms of the number of
hosts connected and the total amount of data traffic transmitted.
Some advantages and disadvantages
of IPv6
• New header format.
• Large address space.
• Efficient routing
• Built in security.
• Larger addresses harder to remember.
• Transition takes time and is not always smooth.
• Not always usable some machines have to be replaced.
ipv4 & ipv6
ipv4 & ipv6

More Related Content

What's hot

IP Configuration
IP ConfigurationIP Configuration
IP ConfigurationStephen Raj
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus networkAalap Tripathy
 
BGP Techniques for Network Operators
BGP Techniques for Network OperatorsBGP Techniques for Network Operators
BGP Techniques for Network OperatorsAPNIC
 
PlayFab Advanced Cloud Script
PlayFab Advanced Cloud ScriptPlayFab Advanced Cloud Script
PlayFab Advanced Cloud ScriptThomas Robbins
 
OpenFlow tutorial
OpenFlow tutorialOpenFlow tutorial
OpenFlow tutorialopenflow
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracerAnabia Anabia
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPTPijush Kanti Das
 
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)Faisal Jatt
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training PresentationRohit Singh
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IPMichael Lamont
 
Vulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructureVulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructureSergey Gordeychik
 

What's hot (20)

High–Performance Computing
High–Performance ComputingHigh–Performance Computing
High–Performance Computing
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
What is Ping
What is PingWhat is Ping
What is Ping
 
DHCP & DNS
DHCP & DNSDHCP & DNS
DHCP & DNS
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus network
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
BGP Techniques for Network Operators
BGP Techniques for Network OperatorsBGP Techniques for Network Operators
BGP Techniques for Network Operators
 
PlayFab Advanced Cloud Script
PlayFab Advanced Cloud ScriptPlayFab Advanced Cloud Script
PlayFab Advanced Cloud Script
 
OpenFlow tutorial
OpenFlow tutorialOpenFlow tutorial
OpenFlow tutorial
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracer
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
 
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
Packet tracer
Packet tracerPacket tracer
Packet tracer
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
DHCP Protocol
DHCP ProtocolDHCP Protocol
DHCP Protocol
 
Vulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructureVulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructure
 

Similar to ipv4 & ipv6

IP Address
IP AddressIP Address
IP Addresstishko18
 
Ipv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaIpv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaJigar Tarsariya
 
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docxWhat are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docxloisj1
 
A Review Paper On IPv4 And IPv6 A Comprehensive Survey
A Review Paper On IPv4 And IPv6  A Comprehensive SurveyA Review Paper On IPv4 And IPv6  A Comprehensive Survey
A Review Paper On IPv4 And IPv6 A Comprehensive SurveyHannah Baker
 
internet protocol version6
internet protocol version6internet protocol version6
internet protocol version6Akhil Kumar
 
Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...Adii Shah
 
IPv4 provided the primary addressing scheme in TCPIP. However after.pdf
IPv4 provided the primary addressing scheme in TCPIP. However after.pdfIPv4 provided the primary addressing scheme in TCPIP. However after.pdf
IPv4 provided the primary addressing scheme in TCPIP. However after.pdfformicreation
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6alibefkani
 
A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6Amber Ford
 
Describe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfDescribe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfmayorothenguyenhob69
 
Ipv6 Advantages And Disadvantages
Ipv6 Advantages And DisadvantagesIpv6 Advantages And Disadvantages
Ipv6 Advantages And DisadvantagesJacqueline Thomas
 
wepik-ipv4-the-old-but-gold-internet-protocol-20230824161407Ealf.pdf
wepik-ipv4-the-old-but-gold-internet-protocol-20230824161407Ealf.pdfwepik-ipv4-the-old-but-gold-internet-protocol-20230824161407Ealf.pdf
wepik-ipv4-the-old-but-gold-internet-protocol-20230824161407Ealf.pdfParinayWadhwa
 
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
 

Similar to ipv4 & ipv6 (20)

IP Address
IP AddressIP Address
IP Address
 
Ipv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaIpv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar Tarsariya
 
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docxWhat are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
 
A Review Paper On IPv4 And IPv6 A Comprehensive Survey
A Review Paper On IPv4 And IPv6  A Comprehensive SurveyA Review Paper On IPv4 And IPv6  A Comprehensive Survey
A Review Paper On IPv4 And IPv6 A Comprehensive Survey
 
internet protocol version6
internet protocol version6internet protocol version6
internet protocol version6
 
Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...
 
I pv4 vs ipv6
I pv4 vs ipv6I pv4 vs ipv6
I pv4 vs ipv6
 
IPv4 provided the primary addressing scheme in TCPIP. However after.pdf
IPv4 provided the primary addressing scheme in TCPIP. However after.pdfIPv4 provided the primary addressing scheme in TCPIP. However after.pdf
IPv4 provided the primary addressing scheme in TCPIP. However after.pdf
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
14 564
14 56414 564
14 564
 
A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6
 
Ip4 vs ip6
Ip4 vs ip6Ip4 vs ip6
Ip4 vs ip6
 
Ip
IpIp
Ip
 
Describe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfDescribe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdf
 
Ipv6 Advantages And Disadvantages
Ipv6 Advantages And DisadvantagesIpv6 Advantages And Disadvantages
Ipv6 Advantages And Disadvantages
 
Final ppt
Final pptFinal ppt
Final ppt
 
40120130405018 2
40120130405018 240120130405018 2
40120130405018 2
 
IPv6
IPv6IPv6
IPv6
 
wepik-ipv4-the-old-but-gold-internet-protocol-20230824161407Ealf.pdf
wepik-ipv4-the-old-but-gold-internet-protocol-20230824161407Ealf.pdfwepik-ipv4-the-old-but-gold-internet-protocol-20230824161407Ealf.pdf
wepik-ipv4-the-old-but-gold-internet-protocol-20230824161407Ealf.pdf
 
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
 

More from Burhan Ahmed

Wireless mobile communication
Wireless mobile communicationWireless mobile communication
Wireless mobile communicationBurhan Ahmed
 
Uses misuses and risk of software
Uses misuses and risk of softwareUses misuses and risk of software
Uses misuses and risk of softwareBurhan Ahmed
 
The distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
The distinction of prophet muhammad (s.a.w) among the teachers of moral conductThe distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
The distinction of prophet muhammad (s.a.w) among the teachers of moral conductBurhan Ahmed
 
Software house organization
Software house organizationSoftware house organization
Software house organizationBurhan Ahmed
 
Social interaction
Social interactionSocial interaction
Social interactionBurhan Ahmed
 
Planning work activities
Planning work activitiesPlanning work activities
Planning work activitiesBurhan Ahmed
 
Peripheral devices
Peripheral devicesPeripheral devices
Peripheral devicesBurhan Ahmed
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applicationsBurhan Ahmed
 
Operator overloading
Operator overloadingOperator overloading
Operator overloadingBurhan Ahmed
 
Job analysis and job design
Job analysis and job designJob analysis and job design
Job analysis and job designBurhan Ahmed
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual propertyBurhan Ahmed
 

More from Burhan Ahmed (20)

Wireless mobile communication
Wireless mobile communicationWireless mobile communication
Wireless mobile communication
 
Virtual function
Virtual functionVirtual function
Virtual function
 
Uses misuses and risk of software
Uses misuses and risk of softwareUses misuses and risk of software
Uses misuses and risk of software
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Trees
TreesTrees
Trees
 
Topology
TopologyTopology
Topology
 
The distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
The distinction of prophet muhammad (s.a.w) among the teachers of moral conductThe distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
The distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
 
Software house organization
Software house organizationSoftware house organization
Software house organization
 
Social interaction
Social interactionSocial interaction
Social interaction
 
Role model
Role modelRole model
Role model
 
Rights and duties
Rights and dutiesRights and duties
Rights and duties
 
Planning work activities
Planning work activitiesPlanning work activities
Planning work activities
 
Peripheral devices
Peripheral devicesPeripheral devices
Peripheral devices
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
 
Operator overloading
Operator overloadingOperator overloading
Operator overloading
 
Normalization
NormalizationNormalization
Normalization
 
Managing strategy
Managing strategyManaging strategy
Managing strategy
 
Letter writing
Letter writingLetter writing
Letter writing
 
Job analysis and job design
Job analysis and job designJob analysis and job design
Job analysis and job design
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

ipv4 & ipv6

  • 2.
  • 3.
  • 4. IPV4 ( IP Version 4 ) IPv4 (Internet Protocol Version 4) is the fourth revision of the Internet Protocol (IP) used to identify devices on a network through an addressing system. The Internet Protocol is designed for use in interconnected systems of packet- switched computer communication networks. It is the most widely deployed Internet protocol used to connect devices to the Internet. With the growth of the Internet it is expected that the number of unused IPv4 addresses will eventually run out because every device including computers, smartphones and game consoles that connects to the Internet requires an address.
  • 5.
  • 6. Some advantages and disadvantages of IPv4 • Connectionless Protocol and Best effort based. • Addresses are easier to remember. • Existing networks are already using it. • Classful and classless addressing. • Millions of addresses are wasted. • Planning for excessive growth was not foreseen, addresses are running out.
  • 7. IPv4 Address Classes  In the early days of the Internet, the IANA (Internet Assigned Numbers Authority) defined five classes of public IP addresses as shown below.
  • 8. Class A addresses  Class A addresses are used for very large networks and always start with a leftmost bit being a zero. Each class A network can hold as many as 16,777,216 hosts.  There are only 127 class A addresses and these were very quickly used up - examples include Apple, IBM and MIT.  Many host addresses have been released back to ICANN to support classless addresses.
  • 9. Class B addresses  These addresses are used for medium sized networks and always start with the leftmost bits 10. Each class B network can hold as many as 65,534 hosts.  There are 16,384 class B addresses which are all used up - examples include Microsoft and Glasgow University.  As with class A addresses, some of the host addresses have been released back to ICANN to support classless addressing.
  • 10.
  • 11. IPv6 (IP Version 6) A new Internet addressing system Internet Protocol version 6 (IPv6) is being deployed to fulfill the need for more Internet addresses. IPv6 (Internet Protocol Version 6) is also called IPNG (Internet Protocol next generation). IPv6 is the successor to Internet Protocol Version 4 (IPv4). It was designed as an evolutionary upgrade to the Internet Protocol and will, in fact, coexist with the older IPv4 for some time. IPv6 is designed to allow the Internet to grow steadily, both in terms of the number of hosts connected and the total amount of data traffic transmitted.
  • 12.
  • 13. Some advantages and disadvantages of IPv6 • New header format. • Large address space. • Efficient routing • Built in security. • Larger addresses harder to remember. • Transition takes time and is not always smooth. • Not always usable some machines have to be replaced.