The magic of internet protocol

  • Authors

    • Khaldoun Batiha Philadelphia University
  • Protocol, Tunneling, Network-Topology, Packet, Address Consumption, Address Pool, IPV6 SERVICES, Ipv6 Prefix Representation, Ipv6 Header, Attacks.
  • As the developing use of web and intranet keep on expanding colossally, the issue to suit more clients and gadgets has been risen. Subsequently, a location range must be required to oblige the hurry. Sadly, IPv4 address region and alternatives are insufficient to meet this new necessity. A fresh out of the box new Protocol is expected to satisfy the developing interest. IPv6 is the best response to the above issues. We should have an early on study on IPv6 convention. IPv6 convention offers verity of advantages that incorporates a more extensive location region and upgraded choices and changes that are not beforehand be found in the IPv4. IPv6 in contrast with IPv4 have a wide address range, simple documentations for representation of a location, enhanced administrations and alternatives, upgraded header, propelled highlights, new choices and bolster, auto setup highlight, new convention bolster, Network Security, Virus and Worms Security, Support for different Operating frameworks and stage including Microsoft windows, Linux and MAC.

  • References

    1. [1] The ABCs of IP (Internet Protocol)†Online:, November 2006.

      [2] Cisco, “Internetworking Technology Overviewâ€, Chapter 30, Online:, June 1999.

      [3] Geoff Huston, “IPv4 Address Reportâ€, Online:, 15- June-2010.

      [4] Geoff Huston APNIC, “IPv4 Address Utilizationâ€, Online: 03-ipv4.pdf, March 2005.

      [5] Patrick Grossetete, Ciprian P. Popoviciu, Fred Wettling, Fred Wettling, "Global IPv6 Strategies: From Business Analysis to Operational Planning" Online:, 1st Edition, chapter 2, pp. 18-53, May 15, 2008.

      [6] “IPv6" From Wikipedia, Online:, 18 September 2010.

      [7] "IPv6 Headers", Online:, chapter 3, pp. 40-55, Des 12 1997.

      [8] Microsoft Corporation, Windows server 2008, "Introduction to IP version 6", Online: 3aa3abc2b2e9/IPv6.doc, Jan 2008.

      [9] Charles M. Kozierok, "TCP/IP GUID A COMPREHENSIVE, ILLUSTRATED INTERNET PROTOCOLS REFERENCE", online:, chapter 25, pp.373-381, October 2005.

      [10] Michael H. Warfield Senior Researcher and Fellow, X-Force Internet Security Systems, "Security Implications of IPv6", Online: A9855C2265FD/FinalDownload/DownloadId- 00C126912550109A76A0FBC92403BECC/9A18A7C3-C47C-4C27-96F5- A9855C2265FD/whitepapers/IPv6.pdf, 2003.

      [11] Kenjiro Cho Sony CSL/WIDE Project, Matthew Luckie U.Waikato/NLANR/CAIDA, Bradley Huffaker CAIDA/SDSC/UCSD, "Identifying IPv6 Network Problems in the DualStack World ", Online:

      [12] James M. Moscola, David Lim, Alan Tetley Department of Computer Science, Washington University, Campus Box 1045, One Brookings Drive, Saint Louis, MO 63130, "IPv6 Tunneling Over an IPv4 Network", Online:, December 13, 2001.

      [13] Samuel Sotillo East Carolina University, "IPv6 Security Issues", Online:, 2006.

      [14] Sean Convery (, Darrin Miller (, “IPv6 and IPv4 Threat Comparison and Best Practice Evaluation (v1.0)â€, 2004.

      [15] Doglase E. Comer, Department of Computer seines, Purdue University, West Lafayette, “Internetworking with TCP/IP Principles, Protocols and Architecturesâ€, Fourth Edition, Volume 1, chapter 7, pp. 95-107, 2000.

      [16] Amer N.AbuAli, Ismail Ghazi Shayeb, Khaldoun Batiha, Haifa Yabu Aliudos,The Benefits of Using Internet Protocol Version 6 (IPV6), International Review on Computers and Software - November 2010.

  • Downloads

  • How to Cite

    Batiha, K. (2017). The magic of internet protocol. Journal of Advanced Computer Science & Technology, 6(1), 1-12.