Ipv4/6 Comparisom Of Ipsec

Read Complete Research Material



[IPV4/6 Comparisom Of Ipsec]

[Name of the Institute]

[Name of the Instructor]

ACKNOWLEDGEMENT

First of all, it would give me great pleasure to show my gratitude to my professor, for his propositions, remarks, understanding and patience. It would also be an honour to express gratitude to my parents, my mother, my father, my sister and my brother for their endless support in my life and allowing me to make all my decisions. I would also like to take the opportunity to show appreciation to my co-workers for their expert cooperation on every occasion. I would also like to be grateful to the Department, managers of the university, instructors and students who have supported me throughout this research.

DECLARATION

I declare that the content presented in this thesis/dissertation is, in my understanding and opinion, original and has not been presented for scholarly assessment in the past, either completely or partly, for an academic degree at this educational institution or elsewhere. I would also like to admit that I have studied and understood the principles, prerequisites, processes and guidelines of the University regarding the higher academic degree research award and to my dissertation. I would also like to declare that I have abided by the University's principles, prerequisites, processes and guidelines.

ABSTRACT

Every day the world grows more and more dependent on digital communi- cation. Technologies like e-mail or the World Wide Web that not so long ago were considered experimental, have rst become accepted and then in-dispensable tools of everyday life. New communication technologies built on top of the existing ones continuously race to provide newer and better functionality. Even established communication media like books, radio, or television have become digital in an e ort to avoid extinction. In this torrent of digital communication a constant struggle takes place. On one hand, people, organizations, companies and countries attempt to control the ongoing communications and subject them to their policies and laws. Currently, one of the most ubiquitous protocols in deployment is the In- ternet Protocol version 4 (IPv4). Its universal presence and range make it an ideal candidate for covert channel investigation. However, IPv4 is ap- proaching the end of its dominance as its address space nears exhaustion. This imminent exhaustion of IPv4 address space will soon force a mass mi- gration towards Internet Protocol version 6 (IPv6) expressly designed as its successor. While the protocol itself is already over a decade old, its adoption is still in its infancy. The low acceptance of IPv6 results in an insucient understanding of its security properties.

TABLE OF CONTENT

ACKNOWLEDGEMENTii

DECLARATIONiii

ABSTRACTiv

CHAPTER 1: INTRODUCTION6

Background of the Study6

Purpose and Significance of the Study7

IPv48

IPv69

CHAPTER 2: LITERATURE REVIEW11

IPV4 Packet and Field Descriptions11

Fast Handover for Mobile IPv613

CHAPTER 3: METHODOLOGY15

Gantt Chart16

Risk Assesment17

REFERENCES18

CHAPTER 1: INTRODUCTION

The Internet Protocol (IP) is the primary protocol used for relaying the network packets from source to destination through the Internet. It was initially designed in 1974 by Vint Cerf and Bob Kahn to connect systems that are in different geographical locations. Today, much of the world's population is becoming more connected to and reliant on the Internet ...
Related Ads