13 research outputs found

    Análisis del protocolo Ipv6 su evolución y aplicabilidad

    Get PDF
    El cambio de Internet 4 a Internet 6 es necesario conforme el espacio de direcciones asignables se reduce y crecen los sitios y aplicaciones que requieren les sea asignada una IP propia, por lo tanto es necesario que desde ya se empiece a desarrollar una metodología de migración en las redes locales, al igual que se desarrolla políticas de seguridad, de compartición de recursos, etc.Descripción de IPv4.- Organización de internet.- Modelo de referencia OSI frente a TCP/IP.- Problemas con IPv4.- Historia del IPv6.- Características de IPv6.- Notación IPv6.- Tipos de direcciones IPv6.- Datagrama IPv6.- DNS para IPv6.- principales protocolos en IPv6.- Seguridad en IPv6.- Organización administradores, políticas de distribución y asignación de direcciones Ipv6.- Funciones de DSTM.- Túneles .- Traductores.- Implementación de una isla IPv6 y conexión con el 6bone

    El nuevo protocolo de internet : IPv6

    Get PDF
    El Protocolo de Internet versión 6 (Internet Protocol Version 6, IPv6) es el nivel más reciente del protocolo de Internet (IP) y actualmente se incluye como parte del soporte IP en muchos productos incluyendo los principales sistemas operativos de ordenador. El IPv6 ha sido llamado "IPng" (IP siguiente generación o Next Generation). Formalmente, el IPv6 es un grupo de especificaciones de la Fuerza de Tarea de Ingeniería de Internet (Internet Engineering Task Force, IETF). El IPv6 se diseñó como un grupo de mejoras evolutivas a la actual versión 4 del IP Version 4. Los hosts de red y los nodos intermedios ya sea con IPv4 o IPv6 pueden manejar paquetes formateados para cualquier nivel del Protocolo Internet. Los usuarios y proveedores de servicio pueden actualizarse al IPv6 independientemente, sin tenerse que coordinarse entre sí. La más obvia mejora en el IPv6 sobre el IPv4 es que las direcciones IP se alargan de 32 a 128 bits. Esta extensión anticipa un considerable crecimiento futuro de Internet y proporciona un alivio a lo que se consideraba una inminente escasez de direcciones de red. El IPv6 describe reglas para tres tipos de dirección: unicast (de un host a otro), anycast (de un host al más cercano de varios hosts), y multicast (de un host a múltiples hosts). Otras ventajas del IPv6 son: Se especifican opciones en una extensión al encabezado que sólo se examina en su destino, acelerando así el rendimiento general de la red. La introducción de una dirección "anycast" proporciona la posibilidad de enviar un mensaje al más cercano de varios hosts de puerta posibles con la idea de que cualquiera de ellos puede administrar el envío del paquete a otros. Los mensajes anycast pueden usarse para actualizar tablas de routing durante el proceso. Los paquetes pueden identificarse como pertenecientes a un "flujo" particular de modo que a los que son parte de una presentación de multimedia que tiene que llegar en "tiempo real" se les pueda proporcionar una mayor calidad de servicio (quality-of-service) comparados con otros clientes. El encabezado IPv6 ahora incluye extensiones que permiten que un paquete especifique un mecanismo para autenticar su origen para asegurar la integridad de los datos y la intimidad

    Protocolo de seguridad orientado a IPv6 - IPsec.

    Get PDF
    Con la necesidad de expansión que tiene internet y la declaratoria de agotamiento del direccionamiento IPv4 por parte de IANA, entidad dedicada a supervisar la asignación global de direcciones IP, surgió en 1998 el nuevo protocolo de comunicaciones denominado IPV6 el cual reemplazaría a IPv4 gracias a que cuenta con un direccionamiento de 128 bits en comparación con los 32 bits de la versión anterior, cubriendo las necesidades de direccionamiento IP y con ella viene una solución de seguridad muy potente denominada IPsec. El protocolo IPsec integrada en IPv6 características de seguridad como: encabezados de autenticación AH, autenticación de origen de los datos, cifrado de seguridad ESP y utilización de VPN o túneles. Es de precisar que para una entidad, la realización de la transición de IPv4 a IPv6 debe realizarse de manera gradual y con anterioridad efectuar un estudio en donde se contemple infraestructura existente, software utilizado y la red de internet brindada por el ISP, todo este conjunto de variables debe estar alineado y configurado para que mediante la ayuda de ambientes de transición como dual-stack se permita la comunicación de paquetes tanto de IPv4 como IPv6 de tal forma que no exista traumatismo y sea transparente para los usuarios que utilizan la red.With the need for expansion of the internet and the declaration of exhaustion of IPv4 addressing by IANA, an entity dedicated to supervising the global allocation of IP addresses, the new communications protocol called IPV6 emerged in 1998, which would replace IPv4 thanks to the fact that It has 128-bit addressing compared to 32-bit in the previous version, covering IP addressing needs and with it comes a very powerful security solution called IPsec. The IPsec protocol built into IPv6 security features such as: AH authentication headers, data origin authentication, ESP security encryption, and use of VPNs or tunnels. It is necessary to specify that for an entity, the transition from IPv4 to IPv6 must be carried out gradually and beforehand carry out a study that includes existing infrastructure, software used and the internet network provided by the ISP, all this set The number of variables must be aligned and configured so that through the help of transitional environments such as dual-stack, the communication of both IPv4 and IPv6 packets is allowed in such a way that there is no trauma and is transparent for the users who use the network

    Standards as interdependent artifacts : the case of the Internet

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Engineering Systems Division, 2008.Includes bibliographical references.This thesis has explored a new idea: viewing standards as interdependent artifacts and studying them with network analysis tools. Using the set of Internet standards as an example, the research of this thesis includes the citation network, the author affiliation network, and the co-author network of the Internet standards over the period of 1989 to 2004. The major network analysis tools used include cohesive subgroup decomposition (the algorithm by Newman and Girvan is used), regular equivalence class decomposition (the REGE algorithm and the method developed in this thesis is used), nodal prestige and acquaintance (both calculated from Kleinberg's technique), and some social network analysis tools. Qualitative analyses of the historical and technical context of the standards as well as statistical analyses of various kinds are also used in this research. A major finding of this thesis is that for the understanding of the Internet, it is beneficial to consider its standards as interdependent artifacts. Because the basic mission of the Internet (i.e. to be an interoperable system that enables various services and applications) is enabled, not by one or a few, but by a great number of standards developed upon each other, to study the standards only as stand-alone specifications cannot really produce meaningful understandings about a workable system. Therefore, the general approaches and methodologies introduced in this thesis which we label a systems approach is a necessary addition to the existing approaches. A key finding of this thesis is that the citation network of the Internet standards can be decomposed into functionally coherent subgroups by using the Newman-Girvan algorithm.(cont.) This result shows that the (normative) citations among the standards can meaningfully be used to help us better manage and monitor the standards system. The results in this thesis indicate that organizing the developing efforts of the Internet standards into (now) 121 Working Groups was done in a manner reasonably consistent with achieving a modular (and thus more evolvable) standards system. A second decomposition of the standards network was achieved by employing the REGE algorithm together with a new method developed in this thesis (see the Appendix) for identifying regular equivalence classes. Five meaningful subgroups of the Internet standards were identified, and each of them occupies a specific position and plays a specific role in the network. The five positions are reflected in the names we have assigned to them: the Foundations, the Established, the Transients, the Newcomers, and the Stand-alones. The life cycle among these positions was uncovered and is one of the insights that the systems approach on this standard system gives relative to the evolution of the overall standards system. Another insight concerning evolution of the standard system is the development of a predictive model for promotion of standards to a new status (i.e. Proposed, Draft and Internet Standards as the three ascending statuses). This model also has practical potential to managers of standards setting organizations and to firms (and individuals) interested in efficiently participating in standards setting processes. The model prediction is based on assessing the implicit social influence of the standards (based upon the social network metric, betweenness centrality, of the standards' authors) and the apparent importance of the standard to the network (based upon calculating the standard's prestige from the citation network).(cont.) A deeper understanding of the factors that go into this model was also developed through the analysis of the factors that can predict increased prestige over time for a standard. The overall systems approach and the tools developed and demonstrated in this thesis for the study of the Internet standards can be applied to other standards systems. Application (and extension) to the World Wide Web, electric power system, mobile communication, and others would we believe lead to important improvements in our practical and scholarly understanding of these systems.by Mo-Han Hsieh.Ph.D

    DSpace 1.8 manual

    Get PDF

    Format for Literal IPv6 Addresses in URL's

    No full text

    dspace 6.0 manual

    Get PDF

    DSpace 4.x Documentation

    Get PDF

    DSpace 5.x Documentation

    Get PDF
    DSpace is an open source software platform that enables organisations to: - capture and describe digital material using a submission workflow module, or a variety of programmatic ingest options - distribute an organisation's digital assets over the web through a search and retrieval system - preserve digital assets over the long term This system documentation includes a functional overview of the system, which is a good introduction to the capabilities of the system, and should be readable by non-technical folk. Everyone should read this section first because it introduces some terminology used throughout the rest of the documentation. For people actually running a DSpace service, there is an installation guide, and sections on configuration and the directory structure. Finally, for those interested in the details of how DSpace works, and those potentially interested in modifying the code for their own purposes, there is a detailed architecture and design section.DSpace is an open source software platform that enables organisations to: - capture and describe digital material using a submission workflow module, or a variety of programmatic ingest options - distribute an organisation's digital assets over the web through a search and retrieval system - preserve digital assets over the long term This system documentation includes a functional overview of the system, which is a good introduction to the capabilities of the system, and should be readable by non-technical folk. Everyone should read this section first because it introduces some terminology used throughout the rest of the documentation. For people actually running a DSpace service, there is an installation guide, and sections on configuration and the directory structure. Finally, for those interested in the details of how DSpace works, and those potentially interested in modifying the code for their own purposes, there is a detailed architecture and design section
    corecore