Internet protokolü (Internet Protocol-IP), 1981 yılında RFC 791 (Request For Comments) ile tanımlanmıştır. Günümüzde de yaygın olarak kullanılan IPv4'ün (IP version 4) internetin hızlı gelişmesi nedeniyle, sunduğu adres sayısı yetersiz kalmaktadır. Bu sorunu çözmek ve protokole yeni fonksiyonlar kazandırmak için IPv6 (IP version 6), IETF (Internet Engineering Task Force) tarafından RFC 2460 ile 1998 yılında tanımlanmıştır. IPv6 128 bitlik adres yapısıyla (2128 adet) IPv4'e göre çok daha büyük adres uzayına sahiptir. Bu adres artışı kullanıcılara adres tahsis etmede rahatlık sağlaması yanında, gerçek zamanlı ses ve görüntü aktarımı, mobilite ve güvenlik gibi konularda da avantaj sağlamaktadır. Ayrıca NAT (Network Address Translation)...
Cílem práce je podrobně představit principy, funkcionality a nedostatky firewallů fungujících nad IP...
Security is an important aspect in computer network operations. To support, computer network securit...
The remarkable growth of the Internet has revealed many security threats and vulnerability issues of...
ABSTRACTTHE PROCESS OF TRANSITION FROM IPv4 TO IPv6The rapid increase in the number of devices conne...
This thesis work reviews transition to IPv6-protocol and how to consider information security and fi...
Günümüzde milyonlarca kullanıcı, bilgi paylaşımı ve haberleşmeye olanak veren iletişim kanalları ara...
The specification of the IPv6 network protocol is considered in the qualification work. These includ...
It is no secret that the pool of public internet addresses available with Internet Protocol version ...
Internet Protocol version 6 (IPv6) is the successor of Internet Protocol version 4 (IPv4). IPv6 will...
Network security specialists familiar with IPv4 protocol would gladly hope that the IPv6 protocol wo...
It is the year 2010. Modern forms of communication are increasingly using IP networks infrastructure...
Ever since the explosion in the growth of the Internet in the 1990's, the exhaustion of the IPv4 add...
Due to the increase of internet usage especially in homes, offices and there will be many devices th...
Abstract: Internet Protocols are utilized to empower the communication between the computing devices...
The internet is one of society’s most influential cyber technologies, it practically surrounds every...
Cílem práce je podrobně představit principy, funkcionality a nedostatky firewallů fungujících nad IP...
Security is an important aspect in computer network operations. To support, computer network securit...
The remarkable growth of the Internet has revealed many security threats and vulnerability issues of...
ABSTRACTTHE PROCESS OF TRANSITION FROM IPv4 TO IPv6The rapid increase in the number of devices conne...
This thesis work reviews transition to IPv6-protocol and how to consider information security and fi...
Günümüzde milyonlarca kullanıcı, bilgi paylaşımı ve haberleşmeye olanak veren iletişim kanalları ara...
The specification of the IPv6 network protocol is considered in the qualification work. These includ...
It is no secret that the pool of public internet addresses available with Internet Protocol version ...
Internet Protocol version 6 (IPv6) is the successor of Internet Protocol version 4 (IPv4). IPv6 will...
Network security specialists familiar with IPv4 protocol would gladly hope that the IPv6 protocol wo...
It is the year 2010. Modern forms of communication are increasingly using IP networks infrastructure...
Ever since the explosion in the growth of the Internet in the 1990's, the exhaustion of the IPv4 add...
Due to the increase of internet usage especially in homes, offices and there will be many devices th...
Abstract: Internet Protocols are utilized to empower the communication between the computing devices...
The internet is one of society’s most influential cyber technologies, it practically surrounds every...
Cílem práce je podrobně představit principy, funkcionality a nedostatky firewallů fungujících nad IP...
Security is an important aspect in computer network operations. To support, computer network securit...
The remarkable growth of the Internet has revealed many security threats and vulnerability issues of...