In November 2017, the General Office of the CPC Central Committee and the General Office of the State Council issued the "Action Plan for Promoting the Large-Scale Deployment of Internet Protocol Version 6 (IPv6)" and issued a notice requiring all regions and departments to implement it in light of their actual conditions. The plan points out that accelerating the large-scale deployment of IPv6 is an inevitable trend in the evolution and upgrading of the global Internet, a major opportunity for the innovative development of technology and industry, and an urgent need to strengthen network security capabilities. The implementation of IPv6 is imminent. There are four main reasons why my country should promote IPv6:
1. The development of the Internet of Things According to a report released by Gartner, there will be 25 billion IoT devices by 2020. A large number of sensing terminals or machines will be connected to mobile networks or the Internet, which will inevitably lead to a huge demand for IP addresses. IPv6 is the fundamental way to solve the address problem. The development of the Internet of Things depends on the support of IPv6 network infrastructure. IPv6-based IoT devices do not need to worry about the shortage of IP addresses. With billions of new IoT devices entering the market every year, connectivity is critical. IPv6 enables IoT products to be uniquely addressable without having to deal with all the traditional NAT and firewall issues. Advanced host devices have various tools to make firewalls and NAT routers work easily, but small IoT terminals cannot achieve this function. By using IPv6, IoT devices that support TCP/IP can more easily handle these problems. 2. Construction of smart cities For smart city construction, such as city cameras and various environmental sensors, a large number of IP addresses are required to connect to the Internet. IPv6 is critical to all smart city projects, which rely on publicly routable IP addresses for monitoring and data collection. The "Guiding Opinions on Deepening the Development of Industrial Internet through 'Internet + Advanced Manufacturing'" issued by the State Council pointed out that the industrial Internet requires a large number of industrial sensors, and that production automation monitoring must be carried out on each device on the production equipment and even on each part on the production line, and even more addresses. 3. The need for network security The original Internet security mechanism is only established at the application level, such as E-mail encryption, SNMPv2 network management security, access security (HTTP, SSL), etc., which cannot guarantee the security of the Internet from the IP layer. IP-level security guarantees the authentication and privacy characteristics of packets, and its specific implementation is mainly achieved by IP's AH (Authentication Header) and ESP (Encapsulating Security Payload) tags. The IPSec security system architecture can "seamlessly" provide various security services for network layer data transmission in IPv6 network environments, such as access control, identity control of data sources, data integrity checks, confidentiality guarantees, and resistance to replay attacks, solving the security issues of end-to-end data transmission at the network layer. 4. IPv4 addresses are running out Every device on the Internet is assigned a unique IP address for identification and location. IPv4 uses 32-bit addresses and provides about 4.3 billion addresses, but with the rapid growth of the Internet after modernization, the number of personal computers, smartphones, tablets, game systems, and all other devices connected to the Internet has skyrocketed, and the addresses required for connecting devices will far exceed the IPv4 address space. IPv6 uses 128-bit addresses and provides about 340 trillion addresses, enough to assign an IP address to every grain of sand on the earth. |
<<: Industrial IoT is so important to enterprises that future security is also a focus
>>: Analysis of the global manufacturing IoT market from 2017 to 2024
Memory security is not a new concept, but the sur...
In the blink of an eye, half of 2020 has passed. ...
How long does it take to download a 1G high-defin...
In an increasingly connected world, wireless netw...
Everyone has their responsibilities, but what to ...
Just like self-driving cars, IT networks are beco...
This article is reproduced from Leiphone.com. If ...
[[386748]] HTTP/0.9HTTP/0.9 was proposed in 1991 ...
DediPath's spring promotion is still ongoing,...
We’ve seen a lot of hype around 5G cellular and W...
The penetration rates of 5G packages for China Te...
The long-awaited 5G technology has finally arrive...
Five or six years ago, the rumor that "cloud...
VLAN technology is widely used in campus networks...