SlideShare une entreprise Scribd logo
1  sur  20
Moving From IPv4 to IPv6




  Your Text here                                                                            Your Text here




                                                                       Shahar Geiger Maor
                                                                       VP & Senior Analyst
                                                                               shahar@stki.info



           Source: http://www.caida.org/research/topology/as_core_network/2007/
       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   1
Internet Protocol Version 6 (IPv6)


What is it?
 Internet Protocol Version 6 is the next generation protocol for
  the Internet
 IPv6 support 2^128 unique IP addresses
 quality of service for several new applications such as IPTel,
  video/audio,here interactive games or ecommerce Text here
         Your Text                             Your

 Less data loss, latency (jitter) or bandwidth
 Better mobility support, Multi-homing and Security




            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   2
IPv4 address that has been mapped
into IPv6 address space




   Your Text here                                                              Your Text here




                                                                                                3
   All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 7907000 www.stki.info
IPv6 and the Enterprise
Why should I care?
An escalating demand for IP addresses acted as the
 driving force behind the development of IPv6
significantly larger address space allows a provision for
 permanent unique addresses
        Your Text here                     Your Text here



Assessment of the existing infrastructure hardware for up
 grading to IPv6
Specifying IPv6 compliance in the RFPs


           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   4
IP Infrastructure (Internet)
IPv4 is an extraordinary success story
IP infrastructure or the “Internet/Intranets” have
 become a strategic resources
Communication lines/exchanges …. Leveraged to
 provide data connectivity
       Your Text here                 Your Text here
Countries have been leveraging off the existing
 infrastructure
Technological advances such as DSL technology have
 resulted in significant improvements



           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   5
IP Infrastructure




   Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   6
Addressing
Addressing appears to be another story
This is where the biggest arguments are taking place:



        Your Text here                                                                            Your Text here




             Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   7
Common Sense View
“All over IP” world is the main, cross-sectors, motivator
 for the integration of IPv6
Regardless of whether the address space will run out in 5
 years or 10 years, all evidence seem to point to the fact
 that we willhereneed a bigger address spaceYour Text here
       Your Text



Lack of a common view though is the greatest barrier to
 deployment




           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   8
What do CIOs want?




  Your Text here                                                                            Your Text here




       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   9
IPv6 is the solution
1. To increase IP addressing space.
2. Incorporates improvements based on the lessons
   learned from operating IPv4:
      stateless autoconfiguration
  •
      more efficient mobility management
  •
        Your Text here                                                                          Your Text here
      integrated IPsec
  •

  These are the fundamental aspects of IP version 6 (IPv6)
  So why not use it?


          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   10
What’s Holding it?
A very successful industry cannot be changed
 overnight
Deployment can only happen incrementally
Authorities need to ensure that there is no
 detrimental impact on IPv4 traffic in any way
       Your Text here                  Your Text here
Under these conditions the two key questions that
 need to be answered are:
  • Is it possible to justify investments in an IP upgrade ?
  • Can one ensure then the up-grade will not have adverse
    impacts ?


          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   11
Direct costs of IPv6 adoption
    EXPECTED COST BREAKDOWN OVER TYPE OF BUSINESS




  Your Text here                                                                            Your Text here




                                   Source: http://www.ipv6council.de/fileadmin/documents/IPv6_vertical_markets.pdf


      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   12
How to “Sell” IPv6 “Right”?




  Your Text here                                                                            Your Text here




                                                                                      Source: IPv6 Promotion Council of Japan
      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic        13
How to Remove Barriers
 There are two primary obstacles to this phased deployment:
   • People “don’t know how to implement it,”
   • “still feel uncertain about its stability and quality,”
 Removal of the first barrier
   • Can be done by preparing deployment manuals for each user entity
   • Clarifying the deployment processes and security models
   • Establishinghere
          Your Text a metric for deployment          Your Text here
 Removal of the second barrier
   • Verifying the reliability of IPv6
   • Identifying design and operation bugs through demonstration
     experiments and evaluations

ISOC position in market education



             Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   14
IPv6: Impacts and Opportunities
 Economic impacts
 Social impacts:
   • Promoting end-to-end communication and by enhancing
     innovation
   • New citizen-centric services and e-government
   • Freedom of speech and the content creation Your Text here
         Your Text here
   • Improve crime control
   • Education Over IP – Improve educational system
 Environmental impacts:
   • Energy management in buildings
   • Road traffic management
   • Risk detection and prevention

            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   15
IPv6: Impacts and Opportunities




   Your Text here                                                                            Your Text here




       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   16
IPv6: Impacts and Opportunities




   Your Text here                                                                            Your Text here




       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   17
IPv6: Impacts and Opportunities




   Your Text here                                                                            Your Text here




       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   18
IPv6: Impacts and Opportunities




   Your Text here                                                                            Your Text here




       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   19
Thank You!
Your Text here                                                                            Your Text here




    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   20

Contenu connexe

Similaire à IPv6

Similaire à IPv6 (20)

Considering Bare Metal
Considering Bare MetalConsidering Bare Metal
Considering Bare Metal
 
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
 
Edge 2016 IPv6 is here: the future is now
Edge 2016 IPv6 is here: the future is nowEdge 2016 IPv6 is here: the future is now
Edge 2016 IPv6 is here: the future is now
 
IPv6 Adoption --- Acceleration
IPv6 Adoption --- AccelerationIPv6 Adoption --- Acceleration
IPv6 Adoption --- Acceleration
 
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trendsSTKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
 
UKOUG - Implementing Enterprise API Management in the Oracle Cloud
UKOUG - Implementing Enterprise API Management in the Oracle CloudUKOUG - Implementing Enterprise API Management in the Oracle Cloud
UKOUG - Implementing Enterprise API Management in the Oracle Cloud
 
IPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdfIPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdf
 
237 06 12 12 The Critical Path To I Pv6 V5
237 06 12 12 The Critical Path To I Pv6 V5237 06 12 12 The Critical Path To I Pv6 V5
237 06 12 12 The Critical Path To I Pv6 V5
 
IPv6 Transition
IPv6 TransitionIPv6 Transition
IPv6 Transition
 
Things I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I startedThings I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I started
 
Oracle NoSQL
Oracle NoSQLOracle NoSQL
Oracle NoSQL
 
Building a Streaming Microservices Architecture - Data + AI Summit EU 2020
Building a Streaming Microservices Architecture - Data + AI Summit EU 2020Building a Streaming Microservices Architecture - Data + AI Summit EU 2020
Building a Streaming Microservices Architecture - Data + AI Summit EU 2020
 
Ppt on i pv6
Ppt on i pv6Ppt on i pv6
Ppt on i pv6
 
Keep the door open when transforming from Sitecore XM to composable DXP using...
Keep the door open when transforming from Sitecore XM to composable DXP using...Keep the door open when transforming from Sitecore XM to composable DXP using...
Keep the door open when transforming from Sitecore XM to composable DXP using...
 
Slides from Introduction to IPv6
Slides from Introduction to IPv6Slides from Introduction to IPv6
Slides from Introduction to IPv6
 
Oracle: Building Cloud Native Applications
Oracle: Building Cloud Native ApplicationsOracle: Building Cloud Native Applications
Oracle: Building Cloud Native Applications
 
IPv6 on the Cisco Campus
IPv6 on the Cisco CampusIPv6 on the Cisco Campus
IPv6 on the Cisco Campus
 
“Quantum” Performance Effects: beyond the Core
“Quantum” Performance Effects: beyond the Core“Quantum” Performance Effects: beyond the Core
“Quantum” Performance Effects: beyond the Core
 
Contact Center infrastructure 2014
Contact Center infrastructure 2014Contact Center infrastructure 2014
Contact Center infrastructure 2014
 
Adding IPv6 to the application layer
Adding IPv6 to the application layerAdding IPv6 to the application layer
Adding IPv6 to the application layer
 

Plus de Shahar Geiger Maor

Cyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of CybercrimeCyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of Cybercrime
Shahar Geiger Maor
 
Networking stki summit 2012 -shahar geiger maor
Networking  stki summit 2012 -shahar geiger maorNetworking  stki summit 2012 -shahar geiger maor
Networking stki summit 2012 -shahar geiger maor
Shahar Geiger Maor
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maor
Shahar Geiger Maor
 
Endpoints stki summit 2012-shahar geiger maor
Endpoints  stki summit 2012-shahar geiger maorEndpoints  stki summit 2012-shahar geiger maor
Endpoints stki summit 2012-shahar geiger maor
Shahar Geiger Maor
 
Risk, regulation and data protection
Risk, regulation and data protectionRisk, regulation and data protection
Risk, regulation and data protection
Shahar Geiger Maor
 
Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010
Shahar Geiger Maor
 

Plus de Shahar Geiger Maor (20)

Cyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of CybercrimeCyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of Cybercrime
 
From creeper to stuxnet
From creeper to stuxnetFrom creeper to stuxnet
From creeper to stuxnet
 
Mobile payment v3
Mobile payment v3Mobile payment v3
Mobile payment v3
 
Networking stki summit 2012 -shahar geiger maor
Networking  stki summit 2012 -shahar geiger maorNetworking  stki summit 2012 -shahar geiger maor
Networking stki summit 2012 -shahar geiger maor
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maor
 
Endpoints stki summit 2012-shahar geiger maor
Endpoints  stki summit 2012-shahar geiger maorEndpoints  stki summit 2012-shahar geiger maor
Endpoints stki summit 2012-shahar geiger maor
 
Risk, regulation and data protection
Risk, regulation and data protectionRisk, regulation and data protection
Risk, regulation and data protection
 
STKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelSTKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM Panel
 
Social Sec infosec -pptx
Social Sec  infosec -pptxSocial Sec  infosec -pptx
Social Sec infosec -pptx
 
Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2
 
Summit 2011 trends in information security
Summit 2011  trends in information securitySummit 2011  trends in information security
Summit 2011 trends in information security
 
Summit 2011 trends in infrastructure services
Summit 2011  trends in infrastructure servicesSummit 2011  trends in infrastructure services
Summit 2011 trends in infrastructure services
 
DLP Trends -Dec 2010
DLP Trends -Dec 2010DLP Trends -Dec 2010
DLP Trends -Dec 2010
 
כנס אבטחת מידע מוטו תקשורת V2
כנס אבטחת מידע  מוטו תקשורת V2כנס אבטחת מידע  מוטו תקשורת V2
כנס אבטחת מידע מוטו תקשורת V2
 
Cloud security v2
Cloud security v2Cloud security v2
Cloud security v2
 
PCI Challenges
PCI ChallengesPCI Challenges
PCI Challenges
 
Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010
 
Security Summit July 2009
Security Summit  July 2009Security Summit  July 2009
Security Summit July 2009
 
Green Security
Green SecurityGreen Security
Green Security
 
STKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services TrendsSTKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services Trends
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

IPv6

  • 1. Moving From IPv4 to IPv6 Your Text here Your Text here Shahar Geiger Maor VP & Senior Analyst shahar@stki.info Source: http://www.caida.org/research/topology/as_core_network/2007/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 1
  • 2. Internet Protocol Version 6 (IPv6) What is it?  Internet Protocol Version 6 is the next generation protocol for the Internet  IPv6 support 2^128 unique IP addresses  quality of service for several new applications such as IPTel, video/audio,here interactive games or ecommerce Text here Your Text Your  Less data loss, latency (jitter) or bandwidth  Better mobility support, Multi-homing and Security Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
  • 3. IPv4 address that has been mapped into IPv6 address space Your Text here Your Text here 3 All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 7907000 www.stki.info
  • 4. IPv6 and the Enterprise Why should I care? An escalating demand for IP addresses acted as the driving force behind the development of IPv6 significantly larger address space allows a provision for permanent unique addresses Your Text here Your Text here Assessment of the existing infrastructure hardware for up grading to IPv6 Specifying IPv6 compliance in the RFPs Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
  • 5. IP Infrastructure (Internet) IPv4 is an extraordinary success story IP infrastructure or the “Internet/Intranets” have become a strategic resources Communication lines/exchanges …. Leveraged to provide data connectivity Your Text here Your Text here Countries have been leveraging off the existing infrastructure Technological advances such as DSL technology have resulted in significant improvements Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
  • 6. IP Infrastructure Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
  • 7. Addressing Addressing appears to be another story This is where the biggest arguments are taking place: Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
  • 8. Common Sense View “All over IP” world is the main, cross-sectors, motivator for the integration of IPv6 Regardless of whether the address space will run out in 5 years or 10 years, all evidence seem to point to the fact that we willhereneed a bigger address spaceYour Text here Your Text Lack of a common view though is the greatest barrier to deployment Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
  • 9. What do CIOs want? Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
  • 10. IPv6 is the solution 1. To increase IP addressing space. 2. Incorporates improvements based on the lessons learned from operating IPv4: stateless autoconfiguration • more efficient mobility management • Your Text here Your Text here integrated IPsec • These are the fundamental aspects of IP version 6 (IPv6) So why not use it? Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
  • 11. What’s Holding it? A very successful industry cannot be changed overnight Deployment can only happen incrementally Authorities need to ensure that there is no detrimental impact on IPv4 traffic in any way Your Text here Your Text here Under these conditions the two key questions that need to be answered are: • Is it possible to justify investments in an IP upgrade ? • Can one ensure then the up-grade will not have adverse impacts ? Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
  • 12. Direct costs of IPv6 adoption EXPECTED COST BREAKDOWN OVER TYPE OF BUSINESS Your Text here Your Text here Source: http://www.ipv6council.de/fileadmin/documents/IPv6_vertical_markets.pdf Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
  • 13. How to “Sell” IPv6 “Right”? Your Text here Your Text here Source: IPv6 Promotion Council of Japan Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
  • 14. How to Remove Barriers  There are two primary obstacles to this phased deployment: • People “don’t know how to implement it,” • “still feel uncertain about its stability and quality,”  Removal of the first barrier • Can be done by preparing deployment manuals for each user entity • Clarifying the deployment processes and security models • Establishinghere Your Text a metric for deployment Your Text here  Removal of the second barrier • Verifying the reliability of IPv6 • Identifying design and operation bugs through demonstration experiments and evaluations ISOC position in market education Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
  • 15. IPv6: Impacts and Opportunities  Economic impacts  Social impacts: • Promoting end-to-end communication and by enhancing innovation • New citizen-centric services and e-government • Freedom of speech and the content creation Your Text here Your Text here • Improve crime control • Education Over IP – Improve educational system  Environmental impacts: • Energy management in buildings • Road traffic management • Risk detection and prevention Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
  • 16. IPv6: Impacts and Opportunities Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
  • 17. IPv6: Impacts and Opportunities Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
  • 18. IPv6: Impacts and Opportunities Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 18
  • 19. IPv6: Impacts and Opportunities Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
  • 20. Thank You! Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 20