IPv6.com




General Links

The Emergence of Next-Gen Networks, Part 1

“The future of the Army’s IT backbone is very similar to the commercial community,” Colonel Scot C. Miller, project manager for defense communications and Army switched systems, told TechNewsWorld. “We are putting in place a data network to enable ‘Everything Over IP’ with the ultimate goal of gaining all the value promised from a unified environment.”

ARIN Board Advises Internet Community on Migration to IPv6

CHANTILLY, Va., May 21 /PRNewswire-USNewswire/ — On 7 May 2007, the ARIN Board of Trustees passed a resolution advising the Internet technical community that migration to a new version of the Internet Protocol, IPv6, will be necessary to allow continued growth of the Internet.

Arch Rock Turns Wireless Sensors Into Internet Devices With ‘Primer Pack

Taking the last major step toward merging wireless sensor networks (WSNs) seamlessly into the world of Internet Protocol (IP) standards, Arch Rock Corporation has introduced the first commercial implementation of the Internet Engineering Task Force (IETF) 6LoWPAN proposed standard for IPv6 communication over low-power IEEE 802.15.4 wireless radio.

Flyzik: Another argument for IPv6

It’s February 13, 2007. I’m sitting here in my home office watching the snow and “wintry mix” outside the window while writing this article. I decided to write the piece because, with several meetings canceled due to weather, I had some extra time for paperwork. I’ll have a very productive day with my newfound time.

McManus: Opportunities lie beyond IPv6 deadline

John McManus, chief information officer and chief technology officer at the Commerce Department, said in a speech today that agencies looking at meeting the mandated 2008 IPv6 deadline as the end are missing the context of the transition.

Don’t be alarmed by IPv6’s declining numbers

Before a tsunami hits shore the sea recedes abruptly and there is a deceiving period of calm before the waves arrive. Given IPv6 address allocation trends, perhaps the analogy applies to the deployment of IPv6.

The truth about the IPv6 transition

Many have read that IPv6 will solve everything from spam to security to saving the Internet. But has anyone read the fine print on what an IPv6 transition will encompass and what it actually buys? To understand where we are with the current Internet IP addressing scheme, let us start with a telephone system analogy.

The $200 Billion Lunch: We’re switching to IPv6, dontcha know, and it might be worth it.

Remember Y2K? If you worked in Information Technology in the waning days of the last millennium, you probably remember Y2K as a combination of Christmas and the hardest workday of your life. We’d programmed ourselves into a potential disaster with the way computers handled dates, and fixing the problem took several years and a reported $100 billion. Well if you liked Y2K, you’ll LOVE IPv6.

Future Internet begins to take shape

An expert panel composed of top scientists and researchers, entrusted by the National Development and Research Commission (NDRC), on Saturday gave an acceptance certificate to an academic network called CERNET2 (China Education and Research Network 2), which connects 25 universities in 20 cities across the country.

Can Applications Benefit From IPv6?

The Microsoft Windows Meeting Space feature in Windows Vista (now in beta testing) simplifies common activities faced during business meetings, presentations, and collaborative sessions. The feature relies on Internet Protocol version 6 (IPv6), the protocol developed to address the scalability limitations of today’s Internet. As we describe in this article, Windows Meeting Space gains many advantages from its use of IPv6. Moreover, available transition technologies ensure that this mainstream application can safely rely on IPv6 on existing networks, long before the protocol is deployed natively.

IPv6: The future is now

The Office of Management and Budget has mandated that by June 30, 2008, the Internet backbone for every federal agency must be able to run Internet Protocol Version 6.

Internet Strategy: China’s Next Generation Internet

Meanwhile, out of sight, in research labs throughout China, engineers are busy working on another project that the Chinese government plans to unveil at the Olympics: China’s Next Generation Internet (CNGI), a faster, more secure, more mobile version of the current one. And unlike the Friendlies and the stadiums, which the world will forget as soon as the games end, CNGI’s impact will be felt for decades.

Google the ISP with 2^96 IPv6 addresses

Garett Rogers had this blog about “Google’s secret IPv6 plans”. It appears that Google owns a block of IPv6 addresses numbering approximately 7.9 x 1028 (79 billion billion billion addresses) or 296.

Google’s secret IPv6 plans

Google Operating System reports on Alex Lightman’s theory why Google is buying up “dark fiber” — to pursue IPv6 initiatives. According to Lightman, Google has a huge block of “slash 20” addresses — exactly what is needed to be a large scale service provider.

Robert Cringely shows blatant ignorance of networking

Normally I don’t get too worked up when someone makes a complete fool out of himself on networking issues but when a well known pundit like Robert Cringely of PBS writes an article that’s filled with errors from beginning to finish about IPv6, I have to call it like I see it. Here are some of the more blatant errors.

An Internet of Things, or an Internet of Verbs?

I’ve been a big fan of Kevin Ashton’s notion of “an Internet of Things;” I think it’s one of those happy phrases that is compact but deeply meaningful. There aren’t many moments when techno-punditry clarifies instead of muddling our understand, much less achieve a kind of poetic elegance; but for me, the Internet of Things does it.

IPv6 Answers.com

Internet Protocol Version 6) The next generation IP protocol. Started in 1991, the specification was completed in 1997 by the Internet Engineering Task Force (IETF). IPv6 is backward compatible with and is designed to fix the shortcomings of IPv4, such as data security and maximum number of user addresses.