WO2023031953A2 - Internet protocol version 16 (ipv16) - Google Patents

Internet protocol version 16 (ipv16) Download PDF

Info

Publication number
WO2023031953A2
WO2023031953A2 PCT/IN2022/050620 IN2022050620W WO2023031953A2 WO 2023031953 A2 WO2023031953 A2 WO 2023031953A2 IN 2022050620 W IN2022050620 W IN 2022050620W WO 2023031953 A2 WO2023031953 A2 WO 2023031953A2
Authority
WO
WIPO (PCT)
Prior art keywords
ipvl6
address
virtual
connectivity
ipv6
Prior art date
Application number
PCT/IN2022/050620
Other languages
French (fr)
Inventor
Bosubabu Sambana
Original Assignee
Bosubabu Sambana
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bosubabu Sambana filed Critical Bosubabu Sambana
Publication of WO2023031953A2 publication Critical patent/WO2023031953A2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/604Address structures or formats
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/668Internet protocol [IP] address subnets

Definitions

  • IPvl6 Internet Protocol version 16
  • IPvl6 Internet Protocol Version 16 (IPvl6) ” service for allowing relates to the creation of an extended new version of Internet Protocol version 16 and its supports to current technologies and future technologies too without any interrupt.
  • IPvl6 Internet Protocol Version 16
  • the present invention mainly focused on IPvl6 will create a new financial market of the entire globe due to the upgrade of new technologies and impact of social needs to will come new technology companies and its generate financial markets and improve the global economy.
  • IPvl6 supports and gives Intelligent adopted platforms because the entire IPvl6 is working based on Artificial Intelligence and Blockchain Technologies.
  • the Internet is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies.
  • TCP/IP Internet protocol suite
  • the Internet carries a vast range of information resources and services, such as the interlinked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and file sharing.
  • WWW World Wide Web
  • electronic mail electronic mail
  • telephony electronic mail
  • file sharing file sharing
  • the Internet is in reality a simple facilitating channel that allows many users to interconnect with many services.
  • the Internet has been used initially as a means to send an email or to communicate and transfer files. In the last few years, it has become what is best termed an electronic marketing and distribution channel.
  • DARPA Defense Advanced Research Projects Agency
  • Robert E. Kahn joined the DARPA Information Processing Technology Office, where he worked on both satellite packet networks and ground-based radio packet networks and recognized the value of being able to communicate across both.
  • IPv4 the current version of IP
  • IPv6 version 6
  • IPv6 is designed to solve the problems of IPv4. It does so by creating a new version of the protocol which serves the function of IPv4 but without t h e same limitations of IPv4. IPv6 is not different from IPv4: what you have learned in IPv4 will be valuable when you deploy IPv6.
  • IPv6 The differences between IPv6 and IPv4 are in five major areas: addressing and routing, security, network address translation, administrative workload, and support for mobile devices. IPv6 also includes an important feature: a set of possible migration and transition plans from IPv4. Since 1994, over 30 IPv6 RFCs have been published.
  • Changing IP means changing dozens of Internet protocols and conventions, ranging from how IP addresses are stored in DNS (domain name system) and applications, to how datagrams are sent and routed over Ethernet, PPP, Token Ring, FDDI, and every other medium, to how programmers call network functions.
  • DNS domain name system
  • IPv4 and IPv6 are also standards and protocols, and procedures for the coexistence of IPv4 and IPv6: Tunnelling IPv6 in IPv4, tunnelling IPv4 in IPv6, running IPv4 and IPv6 on the same system (dual-stack) for an extended period, and mixing and matching the two protocols in a variety of environments.
  • IP Internet Protocol
  • IP the Internet Protocol
  • IP provides for the carriage of datagrams from a source host to destination hosts, possibly passing through one or more routers and networks in the process.
  • a datagram is a finite length packet of bits containing a header and a payload.
  • hosts and routers on the Internet are involved in processing the IP headers. The hosts must create them ... and the routers must examine them to make routing decisions, and modify them as the IP packets make their way from the source to the destination.”
  • TCP is a protocol designed ... to provide its clients at a higher layer of protocol a reliable, sequenced, flow-controlled end to end octet-stream.
  • This protocol allows for the easy and ready flow of data from one user to another by agreements at various levels of the network to handle, process, manage and control the underlying data packets.
  • Protocols such as TCP/IP will be the heart of the evolution of the Internet. We shall focus later on such protocols as applied to multimedia and new access methods. One can best understand the protocol evolution by looking more closely at TCP /IP.
  • the first part of the address identifies the network (NET-ID) on which the host resides, the second part identifies the host (Host-ID) on the given network.
  • NET-ID network
  • Host-ID host
  • five address classes had been defined to identify the border between Net-ID and host-ID and a fixed way. The idea of classes helps a router to decide how many bits of a given IP address identify a network number and how many bits are therefore available for host numbering.
  • Classes A, B, and C had been created to provide different network addresses ranges. Additionally, Class D is the range of IP multicast addresses, that is they have no topological structure. Finally, class E had been reserved for research experiments and is not used on the Internet. The usage of classes has a long tradition on the Internet and was the main reason for IP address depletion which first was overcome by classless routing and NAT and finally by IPv6. The first byte (or "octet") of an IP address identifies the class. For example, the address 205.176.253.5 is a class C address.
  • IP Architecture The "classful" method of identifying network IDs based on the given IP address class is inflexible and leads to address space depletion. Class C networks are too small for most organizations but classes A and B are too large. A waste of the IP address space happened by giving class B or class A address space to customers which do not need the entire space. LANs were getting bigger and bigger and logical separation of an organization's network (e. g. of a class A network number) would be a great help. IP Architecture
  • the IP security architecture provides cryptographic protection for IP datagrams in IPv4 and IPv6 network packets. This protection can include confidentiality, strong integrity of the data, data authentication, and partial sequence integrity. Partial sequence integrity is also known as replay protection.
  • Network architecture is understood as the set of layers and layer protocols that constitute the communication system.
  • Network architectures offer different ways of solving a critical issue when it comes to building a network: transfer data quickly and efficiently by the devices that make up the network.
  • the Internet protocol suite provides end-to-end data communication specifying how data should be packetized, addressed, transmitted, routed, and received. This functionality is organized into four abstraction layers, which classify all related protocols according to each protocol's scope of networking.
  • the layers are the link layer, containing communication methods for data that remains within a single network segment (link); the internet layer, providing internetworking between independent networks; the transport layer, handling host- to-host communication; and the application layer, providing process-to-process data exchange for applications.
  • the characteristic architecture of the Internet Protocol Suite is its broad division into operating scopes for the protocols that constitute its core functionality.
  • the defining specification of the suite is RFC 1122, which broadly outlines four abstraction layers.
  • IPV4 Internet Protocol Version 4
  • IPv4 Internet Protocol version 4
  • IP Internet Protocol
  • IPv6 Internet Protocol version 4
  • IPv4 is still by far the most widely deployed Internet Layer protocol. It uses 32-bit addressing and allows for 4,294,967,296 unique addresses.
  • IPv4 is the Internet Protocol version in use on the Internet today, and implementation of the protocol is running on hundreds of millions of computers.
  • IPV6 Internet Protocol Version 6
  • IPv6 Internet Protocol version 6
  • IPv4 Internet Protocol version 4
  • IPng Internet Protocol version 6
  • IPng IP next generation
  • IPng was designed to take an evolutionary step from IPv4. It was not a design goal to take a radical step away from IPv4. Functions that work in IPv4 were kept in IPng.
  • the Internet operates by transferring data between hosts in packets that are routed across networks as specified by routing protocols. These packets require an addressing scheme, such as IPv4 or IPv6, to specify their source and destination addresses. Each host, computer, or another device on the Internet requires an IP address to communicate.
  • IPv6 is an internet-layer protocol for packet-switched internetworking and provides end-to-end datagram transmission across multiple IP networks. [0040]. While IPv4 allows 32 bits for an IP address and therefore has 232(4294 967 296) possible addresses, IPv6 uses 128-bit addresses, for an address space of 2128 (approximately 3.4x1038) addresses.
  • IPV4 addresses are being consumed at an alarming rate and it is estimated that 2010 would be the last year for IPV4, some sources say they may last until 2012.
  • IPV4 exhaustion is huge growth in the number of internet users, mobile devices using an Internet connection, and always-on devices such as ADSL modems and cable modems. This brings us to the development and adoption of IPV6 as an alternate solution.
  • NAT network address translation
  • IPv6 has also impeded business-to-business direct network connections, requiring baroque and elaborate address translators to make everything work reliably, scaling poorly, and offering a highly vulnerable single point of failure. [0047].
  • One of the goals of IPv6's address space expansion is to make NAT unnecessary, improving total connectivity, reliability, and flexibility. IPv6 will re-establish transparency and end-to-end traffic across the Internet. The new IPv6 addresses are large and cumbersome to deal with, so IPv6 reduces the number of people who have to read and write them.
  • IPv6 A second major goal of IPv6 is to reduce the total time which people have to spend configuring and managing systems.
  • An IPv6 system can participate in “stateless” autoconfiguration, where it creates a guaranteed-unique IP address by combining its TAN MAC address with a prefix provided by the network router — DHCP is not needed, of course, DHCP is still useful for other parameters, such as DNS servers, and is supported as DHCPv6 where needed.
  • IPv6 also offers a middle ground between the two extremes with protocols such as STP (“Service Tocation Protocol”), which may make the lives of network managers easier.
  • STP Service Tocation Protocol
  • High- bandwidth multimedia and fault tolerance applications are the focus of the fourth major goal of IPv6.
  • Multimedia applications can take advantage of multicast: The transmission of a single datagram to multiple receivers.
  • IPv4 has some multicast capabilities, these are optional, and not every router and host support them. With IPv6, multicast is a requirement.
  • IPv6 also defines a new kind of service, called “anycast.” Tike multicast, anycast has groups of nodes that send and receive packets. But when a packet is sent to an anycast group in IPv6, it is only delivered to one of the members of the group.
  • IPv6 Another aspect of VPNs built into IPv6 is QoS (Quality of Service). IPv6 supports the same QoS features as IPv4, including the DiffServ indication, as well as a new 20-bit traffic flow field. Although the use of this part of IPv6 is not defined, it is provided as a solid base to build QoS protocols.
  • QoS Quality of Service
  • IPv6 The fifth major goal of IPv6 is VPNs, virtual private networks.
  • the new IPSec security protocols, ESP (Encapsulating Security Protocol), and AH (authentication header) are add- ons to IPv4.
  • IPv6 builds in and requires these protocols, which will mean that secure networks will be easier to build and deploy in an IPv6 world.
  • IPv6 is mature enough to be used in corporate and commercial networks, as many case studies and d deployments worldwide show.
  • IPvl6 is the upgrade of both version works and functionalities the same, security provides the same with extended Intelligent Block wise interconnectivity with genesis block to end - to - end-user connectivity during the packet delivery, if any Third Party or Untrusted person connect within this queue, here no chance to connect at any case due to all queue are run with an encrypted module, and internally any error raised self-driven mechanism will automatically detect and resolve this issue the same on the running queue without any interrupt.
  • IPv4 and IPv6 High investments in new IPv4 and IPv6 setups, fixes, or complex configurations for IPv4 and IPv6 (especially NATs and internal counters) should be avoided, if possible because they are investments in a technology that will slowly be phased - 3 out. When you reach the point where this becomes necessary, evaluate IPvl6. Whatever you invest in IPvl6 is an investment in future technology.
  • the significant objective is to identify the key access network interface requirements and access configurations to provide a secure encrypted effective gateway from telecommunications access multiple networks and telecommunications access components to IP networks including both wired and wireless accesses along with Virtual IP connectivity access.
  • IPvl6 over IPv6 and IPv4 tunnels are widely used to connect large regional IPvl6 networks, because it is relatively hard to construct an International or cross-continent native relationship recommendation of IPvl6 network. This makes the characteristics of IPV16 of IPV16 over IPv4, IPv6 security tunnels very vital to the performance of the global IPvl6 Internet operations.
  • IPvl6 is a new and extended version of Internet Protocol and it is a significant impact on existing and future technologies for centuries growing and expand identified universal facts and computer science fields and other areas too.
  • Figure.1 is represented of Block Diagram o£Pvl6 Datagram Format and modular operations
  • Figure.2 represents the process of Functional Retrieved procedural of IPvl6 Classes Classification Diagram for Architecture Operational Procedures
  • Figure.3 represents the Proposed method and IPvl6 Architecture
  • IPvl6 over IPv6 and IPv4 tunnels are widely used to connect large regional IPvl6 networks, because it is relatively hard to construct an International or cross-continent native relationship recommendation of IPvl6 network. This makes the characteristics of IPV16 of IPV16 over IPv4, IPv6 security tunnels very vital to the performance of the global IPvl6 Internet operations.
  • IPv6 in an instant is possible because of the vast number of internet expansions and of their great users.
  • IPv6 also defined a new kind of service, called “ anycast”, like multicast, and proposed IPvl6 is multicast and Virtual IP with Unlimited and Infinity High Security with multicast and Virtual IP address each block connectivity. Universal users and Interstellar and Expand Universe users allocations.
  • IPvl6 supports and enhance the same Quality of Service (QoS) features as IPv4 and IPv6
  • IPvl6 in near future, maybe Technology up-gradation, classes extensions, IP address extensions, create virtual IP address, and limitless connection through virtual IP address and holographic projection also performed
  • IPvl6 Integrated with intelligent or self-driven network virtual assistance during safely packet delivery IPvl6 is mature enough to be used in corporate and business and universal and space celestial object connectivity through virtual IP addresses.
  • IPvl6 is most flexible to workspace communications, and expendable universal object categorization, and the interstellar universe and space planet or object communications, because limitless extended addresses one increased based on utilization.
  • ISPs Internet Services Providers
  • users still have problems related to the newness of products, but distributed on routers on work stations, and computers/ Laptops/ Personal Digital Assistances.
  • IPv4 and IPv6 hosts must interoperate and supports IPvl6 functionalities and interconnectivity operations.
  • IPvl6 is the availability of a DNS Server to manage IPvl6 addresses. No extra requirements are needed for routers.
  • This IPvl6 Datagram ( Figure.1) represents an entire basic transfer unit connected with a packet-switched network. Datagrams are typically structured in header and payload sections, and they provide a connectionless communication service across a packet-switched network without any interrupts. This Figured shows how to interact with every operation.
  • the proposed Universal Wide Web illustrates to work the same as World Wide Web and the main aim is to create expand to the Future Internet Architecture and upgrade and merge existing WWW architecture.
  • Figure.2 represents a full description of the entire IPvl6 Classes apart from Classes A to I, newly added F to I have its functionalities and requirements for existing technologies and upcoming versions along with future technologies, how to work, and Bit Sequence, Default Subnet Mark along with User Level requirements.
  • Figured and Figure.2 represent a full description of the entire IPvl6 datagram and architecture along with the working environment and its functionalities.
  • IP version 4 (IPv4) is showing its age as unexpected growth problems have appeared. Most notable is the rapid consumption of network addresses and the explosion in performance requirements for intermediate routing nodes. IPv4 was deployed when exceeding the theoretical maximum number of four billion nodes was not a possibility.
  • IPv6 Internet Protocol version 6
  • IPvl6 will adapt identified and undefined problems of IPv6 computer technology and network transmission problems to resolve the gaps between IPv6 to IPvl6 and upcoming technologies and versions too. [0086]. IPvl6 will create new platforms of multiple technologies based on Future Technologies and resolved unmanned.
  • IPvl6 has overcome all technological pending needs and supports future technologies, these technologies will create new areas of research and market for centuries.
  • IPvl6 will create a new financial market of the entire globe due to the upgrade of new technologies and impact of social needs to will come new technology companies and its generate financial markets and improve the global economy.
  • IPvl6 supports and gives Intelligent adopted platforms because the entire IPvl6 is working based on Artificial Intelligence and Blockchain Technologies.

Description

Internet Protocol version 16 (IPvl6)
BOSUBABU SAMBANA
INDIAN
BOSUBABU SAMBANA,
S/o. S. DANDASI,
HOUSE.NO: 20-3-72,
PURUSHOTHAPURAM,
GANDHINAGAR, PALASA-532221,
SRIKAKULAM DISTRICT, ANDHRA PRADESH, INDIA. e-mail: bosukalam@gmail.com
Figure imgf000002_0001
Mobile: +91 9640641136
Aadhar No: 731537694496
The following specification particularly describes the invention and the manner in which it is to be performed. FIELD OF INVENTION
[001]. The present invention “ Internet Protocol Version 16 (IPvl6) ” service for allowing relates to the creation of an extended new version of Internet Protocol version 16 and its supports to current technologies and future technologies too without any interrupt. I propose New Internet Protocol version for technology up-gradation and limitless end-user connectivity and create new classes F and Class H, and Class I for extended to present classes and its performed Public, private, protected environment access with UWW for at the User Level, it is performed to operate both I and H Classes for Unlimited and Infinity High Security with multicast and Virtual IP address each block connectivity for Universal users and Interstellar and Expand Universe users’ allocations.
[002]. The present invention mainly focused on IPvl6 will create a new financial market of the entire globe due to the upgrade of new technologies and impact of social needs to will come new technology companies and its generate financial markets and improve the global economy.
[003]. IPvl6 supports and gives Intelligent adopted platforms because the entire IPvl6 is working based on Artificial Intelligence and Blockchain Technologies.
BACKGROUND OF INVENTION
[004]. The Internet is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies.
[005]. The Internet carries a vast range of information resources and services, such as the interlinked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and file sharing.
[006]. The word internet was used as early as 1849, meaning “ interconnected or interwoven”. The word Internet was used in 1974 as the shorthand form of Internetwork.
[007 . The Internet is in reality a simple facilitating channel that allows many users to interconnect with many services. The Internet has been used initially as a means to send an email or to communicate and transfer files. In the last few years, it has become what is best termed an electronic marketing and distribution channel.
[008]. The Internet protocol suite resulted from research and development conducted by the Defense Advanced Research Projects Agency (DARPA) in the late 1960s. After initiating the pioneering ARPANET in 1969, DARPA started work on several other data transmission technologies.
[009]. In 1972, Robert E. Kahn joined the DARPA Information Processing Technology Office, where he worked on both satellite packet networks and ground-based radio packet networks and recognized the value of being able to communicate across both.
[0010]. In the spring of 1973, Vinton Cerf, who helped develop the existing ARPANET Network Control Program (NCP) protocol, joined Kahn to work on open-architecture interconnection models to design the next protocol generation for the ARPANET.
[0011]. In 1975, a two-network IP communications test was performed between Stanford and University College Eondon. In November 1977, a three-network IP test was conducted between sites in the US, the UK, and Norway. Several other IP prototypes were developed at multiple research centers between 1978 and 1983. Before the January 1, 1983 "Flag Day", the Internet used NCP instead of TCP as the transport layer protocol.
[0012]. In 1991, the IETF decided that the current version of IP, called IPv4, had outlived its design. The new version of IP, called either IPng (Next Generation) or IPv6 (version 6), was the result of a long and tumultuous process that came to a head in 1994 when the IETF gave a clear direction for IPv6.
[0013]. IPv6 is designed to solve the problems of IPv4. It does so by creating a new version of the protocol which serves the function of IPv4 but without t h e same limitations of IPv4. IPv6 is not different from IPv4: what you have learned in IPv4 will be valuable when you deploy IPv6.
[0014]. The differences between IPv6 and IPv4 are in five major areas: addressing and routing, security, network address translation, administrative workload, and support for mobile devices. IPv6 also includes an important feature: a set of possible migration and transition plans from IPv4. Since 1994, over 30 IPv6 RFCs have been published.
[0015]. Changing IP means changing dozens of Internet protocols and conventions, ranging from how IP addresses are stored in DNS (domain name system) and applications, to how datagrams are sent and routed over Ethernet, PPP, Token Ring, FDDI, and every other medium, to how programmers call network functions.
[0016]. The IETF, though, is not so insane as to assume that everyone is going to change everything overnight. So, there are also standards and protocols, and procedures for the coexistence of IPv4 and IPv6: Tunnelling IPv6 in IPv4, tunnelling IPv4 in IPv6, running IPv4 and IPv6 on the same system (dual-stack) for an extended period, and mixing and matching the two protocols in a variety of environments.
Internet Protocol (IP)
[0017]. "IP (the Internet Protocol) provides for the carriage of datagrams from a source host to destination hosts, possibly passing through one or more routers and networks in the process. A datagram is a finite length packet of bits containing a header and a payload. ... Both hosts and routers on the Internet are involved in processing the IP headers. The hosts must create them ... and the routers must examine them to make routing decisions, and modify them as the IP packets make their way from the source to the destination."
[0018]. "TCP is a protocol designed ... to provide its clients at a higher layer of protocol a reliable, sequenced, flow-controlled end to end octet-stream.
[0019]. The essence of Internet facilitation and accessibility is the set of protocols available to the community to allow access by a wide variety of hosts in a complex and fully distributed fashion. The protocols are at the heart of Internet success.
[0020]. They are the "software and system agreements" that allow disparate machines and software to talk across equally disparate networks. The current protocols focus on data transactions, with some innovation allowing images and limited multimedia; namely voice and video. [0021]. The future challenge will be the development of new and innovative protocols to allow both low-end user access to growing while at the same time enriching the capability of the information transferred. The key underlying protocol structure that makes the Internet function is the Transport Control Protocol/Internet Protocol, TCP/IP protocol suite.
[0022]. This protocol allows for the easy and ready flow of data from one user to another by agreements at various levels of the network to handle, process, manage and control the underlying data packets. Protocols such as TCP/IP will be the heart of the evolution of the Internet. We shall focus later on such protocols as applied to multimedia and new access methods. One can best understand the protocol evolution by looking more closely at TCP /IP.
[0023]. The first part of the address identifies the network (NET-ID) on which the host resides, the second part identifies the host (Host-ID) on the given network. At the beginning of the Internet, five address classes had been defined to identify the border between Net-ID and host-ID and a fixed way. The idea of classes helps a router to decide how many bits of a given IP address identify a network number and how many bits are therefore available for host numbering.
[0024]. Classes A, B, and C had been created to provide different network addresses ranges. Additionally, Class D is the range of IP multicast addresses, that is they have no topological structure. Finally, class E had been reserved for research experiments and is not used on the Internet. The usage of classes has a long tradition on the Internet and was the main reason for IP address depletion which first was overcome by classless routing and NAT and finally by IPv6. The first byte (or "octet") of an IP address identifies the class. For example, the address 205.176.253.5 is a class C address.
[0025]. The "classful" method of identifying network IDs based on the given IP address class is inflexible and leads to address space depletion. Class C networks are too small for most organizations but classes A and B are too large. A waste of the IP address space happened by giving class B or class A address space to customers which do not need the entire space. LANs were getting bigger and bigger and logical separation of an organization's network (e. g. of a class A network number) would be a great help. IP Architecture
[0026]. The IP security architecture (EPsec) provides cryptographic protection for IP datagrams in IPv4 and IPv6 network packets. This protection can include confidentiality, strong integrity of the data, data authentication, and partial sequence integrity. Partial sequence integrity is also known as replay protection.
[0027] . Network architecture is understood as the set of layers and layer protocols that constitute the communication system. Network architectures offer different ways of solving a critical issue when it comes to building a network: transfer data quickly and efficiently by the devices that make up the network.
[0028]. The Internet protocol suite provides end-to-end data communication specifying how data should be packetized, addressed, transmitted, routed, and received. This functionality is organized into four abstraction layers, which classify all related protocols according to each protocol's scope of networking.
[0029]. From lowest to highest, the layers are the link layer, containing communication methods for data that remains within a single network segment (link); the internet layer, providing internetworking between independent networks; the transport layer, handling host- to-host communication; and the application layer, providing process-to-process data exchange for applications.
[0030]. The characteristic architecture of the Internet Protocol Suite is its broad division into operating scopes for the protocols that constitute its core functionality. The defining specification of the suite is RFC 1122, which broadly outlines four abstraction layers.
[0031]. These have stood the test of time, as the IETF has never modified this structure. As such a model of networking, the Internet Protocol Suite predates the OSI model, a more comprehensive reference framework for general networking systems.
Internet Protocol Version 4 (IPV4)
[0032]. Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP) and it is the first version of the protocol to be widely deployed. Together with IPv6, it is at the core of standards-based internetworking methods of the Internet. IPv4 is still by far the most widely deployed Internet Layer protocol. It uses 32-bit addressing and allows for 4,294,967,296 unique addresses.
[0033]. Even though the name seems to imply that it's the fourth generation of the key Internet Protocol, version 4 of IP was the first that was widely used in modern TCP/IP.
[0034]. IPv4, as it is sometimes called to differentiate it from the newer IPv6, is the Internet Protocol version in use on the Internet today, and implementation of the protocol is running on hundreds of millions of computers.
[0035]. It provides the basic datagram delivery capabilities upon which all of TCP/IP functions and it has proven its quality in use over more than two decades.
Internet Protocol Version 6 (IPV6)
[0036]. Internet Protocol version 6 (IPv6) is a version of the Internet Protocol (IP) intended to succeed IPv4, which is the protocol currently used to direct almost all Internet traffic. IPv6 stands for Internet Protocol version 6 also known as IPng (IP next generation) is the second version of the Internet Protocol to be used generally across the virtual world.
[0037]. The first version was IPv4. IPng was designed to take an evolutionary step from IPv4. It was not a design goal to take a radical step away from IPv4. Functions that work in IPv4 were kept in IPng.
[0038]. Functions that didn’t work were removed. The Internet operates by transferring data between hosts in packets that are routed across networks as specified by routing protocols. These packets require an addressing scheme, such as IPv4 or IPv6, to specify their source and destination addresses. Each host, computer, or another device on the Internet requires an IP address to communicate.
[0039]. The growth of the Internet has created a need for more addresses than are possible with IPv4. Like IPv4, IPv6 is an internet-layer protocol for packet-switched internetworking and provides end-to-end datagram transmission across multiple IP networks. [0040]. While IPv4 allows 32 bits for an IP address and therefore has 232(4294 967 296) possible addresses, IPv6 uses 128-bit addresses, for an address space of 2128 (approximately 3.4x1038) addresses.
[0041]. This expansion allows for many more devices and users on the internet as well as extra flexibility in allocating addresses and efficiency for routing traffic. It also eliminates the primary need for network address translation (NAT), which gained widespread deployment as an effort to alleviate IPv4 address exhaustion.
Limitations of IPv4
[0042]. Since the 1980s it has been apparent that the number of available IPv4 addresses is being exhausted at a rate that was not initially anticipated in the design of the network. This was the driving factor for the introduction of class full networks, for the creation of CIDR addressing.
[0043]. But despite these measures, the IPV4 addresses are being consumed at an alarming rate and it is estimated that 2010 would be the last year for IPV4, some sources say they may last until 2012.
[0044]. The primary reason for IPV4 exhaustion is huge growth in the number of internet users, mobile devices using an Internet connection, and always-on devices such as ADSL modems and cable modems. This brings us to the development and adoption of IPV6 as an alternate solution.
Advantages of IPv6
[0045]. With such a huge address space, ISPs will have sufficient IP addresses to allocate enough addresses to every customer so that every IP device has a truly unique address whether it’s behind a firewall or not. NAT (network address translation) has become a very common technique to deal with the shortage of IP addresses. Unfortunately, NAT doesn’t work very well for many Internet applications, ranging from old dependable, such as NFS and DNS, to newer applications such as group conferencing.
[0046]. NAT has also impeded business-to-business direct network connections, requiring baroque and elaborate address translators to make everything work reliably, scaling poorly, and offering a highly vulnerable single point of failure. [0047]. One of the goals of IPv6's address space expansion is to make NAT unnecessary, improving total connectivity, reliability, and flexibility. IPv6 will re-establish transparency and end-to-end traffic across the Internet. The new IPv6 addresses are large and cumbersome to deal with, so IPv6 reduces the number of people who have to read and write them.
[0048]. A second major goal of IPv6 is to reduce the total time which people have to spend configuring and managing systems. An IPv6 system can participate in “stateless” autoconfiguration, where it creates a guaranteed-unique IP address by combining its TAN MAC address with a prefix provided by the network router — DHCP is not needed, of course, DHCP is still useful for other parameters, such as DNS servers, and is supported as DHCPv6 where needed.
[0049]. IPv6 also offers a middle ground between the two extremes with protocols such as STP (“Service Tocation Protocol”), which may make the lives of network managers easier. High- bandwidth multimedia and fault tolerance applications are the focus of the fourth major goal of IPv6.
[0050]. Multimedia applications can take advantage of multicast: The transmission of a single datagram to multiple receivers. Although IPv4 has some multicast capabilities, these are optional, and not every router and host support them. With IPv6, multicast is a requirement.
[0051] . IPv6 also defines a new kind of service, called “anycast.” Tike multicast, anycast has groups of nodes that send and receive packets. But when a packet is sent to an anycast group in IPv6, it is only delivered to one of the members of the group.
[0052]. This new capability is especially appropriate in a fault- tolerant environment: web servers and DNS servers could all benefit from IPv6's anycast technology. Another aspect of VPNs built into IPv6 is QoS (Quality of Service). IPv6 supports the same QoS features as IPv4, including the DiffServ indication, as well as a new 20-bit traffic flow field. Although the use of this part of IPv6 is not defined, it is provided as a solid base to build QoS protocols.
[0053]. The fifth major goal of IPv6 is VPNs, virtual private networks. The new IPSec security protocols, ESP (Encapsulating Security Protocol), and AH (authentication header) are add- ons to IPv4. IPv6 builds in and requires these protocols, which will mean that secure networks will be easier to build and deploy in an IPv6 world.
The need for IPV16
[0054]. As long IPv4 and IPv6 networks do what you need them to do, let them run as well as and welcome to upgrade to new protocol version too. But when an IPv4 network hits the limits for some reason, choose IPv6. IPv6 is mature enough to be used in corporate and commercial networks, as many case studies and d deployments worldwide show.
[0055]. In the way IPvl6 is the upgrade of both version works and functionalities the same, security provides the same with extended Intelligent Block wise interconnectivity with genesis block to end - to - end-user connectivity during the packet delivery, if any Third Party or Untrusted person connect within this queue, here no chance to connect at any case due to all queue are run with an encrypted module, and internally any error raised self-driven mechanism will automatically detect and resolve this issue the same on the running queue without any interrupt.
[0056]. Even Network failure or any other issues have occurred self-esteem duplicate acknowledgment sent to sender and at the same time receiver also receive the same information for end-to-end connectivity, in the way Intelligent self-resolve mechanism to detects when the queue is processing and predict entire processing queue operations and guided supervised learning techniques and identified targeted node connectivity through Unsupervised Teaming techniques to resolve multiple connectivity at the same time.
[0057] . High investments in new IPv4 and IPv6 setups, fixes, or complex configurations for IPv4 and IPv6 (especially NATs and internal counters) should be avoided, if possible because they are investments in a technology that will slowly be phased - 3 out. When you reach the point where this becomes necessary, evaluate IPvl6. Whatever you invest in IPvl6 is an investment in future technology.
Here's the list of indicators that it may be time for you to consider or integrate IPv6:
(a). Your IPv4 network or NAT implementation needs to be fixed or extended.
(b). You are running out of address space. (c). You want to prepare your network for applications that are based on advanced features of Ipv4 and IPv6.
(d). You need end-to-end security for a large number of users and you do not have the address space, or you struggle with a NAT implementation.
(e) . Your hardware or applications reach the end of their lifecycle and must be replaced.
Make sure you buy products that support IPvl6, even if you don't enable it right away.
OBJECTIVE OF THE INNOVATION
[0058]. The significant objective is to identify the key access network interface requirements and access configurations to provide a secure encrypted effective gateway from telecommunications access multiple networks and telecommunications access components to IP networks including both wired and wireless accesses along with Virtual IP connectivity access.
[0059]. In Near Future IPvl6 over IPv6 and IPv4 tunnels are widely used to connect large regional IPvl6 networks, because it is relatively hard to construct an International or cross-continent native relationship recommendation of IPvl6 network. This makes the characteristics of IPV16 of IPV16 over IPv4, IPv6 security tunnels very vital to the performance of the global IPvl6 Internet operations.
SUMMARY OF INNOVATION
[0060]. The proposed IPvl6 is a new and extended version of Internet Protocol and it is a significant impact on existing and future technologies for mankind growing and expand identified universal facts and computer science fields and other areas too.
[0061]. The proposed system collects the future of the IP protocol also requires analysis. With new approaches for integrating connectionless services with traditional telecommunications services and with new applications and businesses coming into use, likely, a new IP protocol, meeting all the new needs, including additional control requirements will be developed. The architectural implications of this have yet to be determined. BRIEF DESCRIPTION OF DRAWINGS
Figure.1, is represented of Block Diagram o£Pvl6 Datagram Format and modular operations
Figure.2, represents the process of Functional Retrieved procedural of IPvl6 Classes Classification Diagram for Architecture Operational Procedures Figure.3, represents the Proposed method and IPvl6 Architecture
DETAILED DESCRIPTION OF INVENTION
[0062]. The proposed work and presents the related knowledge and background for a better understanding of our proposed system.
(a). The entire working mechanism is description is figure.1, 2 and 3
[0063]. In Near Future IPvl6 over IPv6 and IPv4 tunnels are widely used to connect large regional IPvl6 networks, because it is relatively hard to construct an International or cross-continent native relationship recommendation of IPvl6 network. This makes the characteristics of IPV16 of IPV16 over IPv4, IPv6 security tunnels very vital to the performance of the global IPvl6 Internet operations.
[0064]. Migrating from IPvl6 and IPv4, IPv6 in an instant is possible because of the vast number of internet expansions and of their great users.
[0065]. Many organizations and Top class MNCs are becoming more and more dependent on the Internet on the Internet for their daily utilization and work, and they, therefore, cannot tolerate downtime for the replacement of the IP Protocol. As we expected in the upcoming days, there will not be one special day on which IPv6 and IPv6 will be turned off and IPvl6 turned on because those protocols can coexist without any problems.
[0066]. The migration from IPv4, IPv6 to IPvl6, must be implemented node by node by using auto-configuration procedures to eliminate the need to configure the IPvl6 host manually. In this way, users can immediately benefit from the many advantages of IPvl6, while maintaining the possibilities of communicating with IPv6 and IPv4 users or peripherals. Consequently, there is no reason to delay, updating from IPv6 to IPvl6. [0067]. IPv6 also defined a new kind of service, called “ anycast”, like multicast, and proposed IPvl6 is multicast and Virtual IP with Unlimited and Infinity High Security with multicast and Virtual IP address each block connectivity. Universal users and Interstellar and Expand Universe users allocations.
[0068]. When packet sends from sender to receiver, during the packet transmission, and proposed system predict cum calculating time delay, throughput, error rate, automatically, then after colliding or interrupt occurred, immediately duplicate virtual address or packet received from a damaged packet, simultaneal information sends to sender and receiver. In this session, Virtual IP plays a key role in this critical way.
[0069]. IPvl6 supports and enhance the same Quality of Service (QoS) features as IPv4 and IPv6
When to Choose IPvl6
[0070]. As long IPv4 and IPv6 networks do what you need them to do, let them run, But when an IPv4 and IPv6 network hits the limits for various reasons, choose IPvl6 in near future, maybe Technology up-gradation, classes extensions, IP address extensions, create virtual IP address, and limitless connection through virtual IP address and holographic projection also performed
[0071]. Integrated with intelligent or self-driven network virtual assistance during safely packet delivery IPvl6 is mature enough to be used in corporate and business and universal and space celestial object connectivity through virtual IP addresses.
[0072]. IPvl6 is most flexible to workspace communications, and expendable universal object categorization, and the interstellar universe and space planet or object communications, because limitless extended addresses one increased based on utilization.
The Migration from IPv4, IPv6 to IPvl6
[0073]. The year from 1997 to 2000 will be characterized by the adoption of IPv6 by Internet
Service Providers (ISPs) and users. During 1997, users still have problems related to the newness of products, but distributed on routers on work stations, and computers/ Laptops/ Personal Digital Assistances.
[0074]. At that point of time, companies or organizations will begin to migrate, less or migrate, less or more gradually, to IPv6 and IPvl6, and new network technologies are integrated with current way, it is time to update all networks as the same way existing environment, and supports future technologies to,
The curiosity of functional goals of the migration are as follows
(a). IPv4 and IPv6 hosts must interoperate and supports IPvl6 functionalities and interconnectivity operations.
(b). The key uses of IPvl6 hosts and routers must be thought that migration and easy way to implementation of Simple Internet Transition(SIT).
(c). The functional uses of IPvl6 hosts and routers must be encrypted distributed over non- traumatic Internet.
(d). Possibility of Progressive and Non-Traumatic Transition: The only requirements for
IPv4 and IPv6 hosts and routers updated to IPvl6, one at a time, without requiring other hosts and / or routers to be updated simultaneously.
(e). Minimum requirements for updating: The only requirement for updating hosts to
IPvl6 is the availability of a DNS Server to manage IPvl6 addresses. No extra requirements are needed for routers.
(f). Addressing Simplicity: When a router or a host is updated to IPvl6, it can also continue to use IPv4 and IPv6 addresses.
(g). Low initial costs and user-friendly: No preparatory work is necessary to begin the migration to IPv4 and IPv6 for IP 16.
(h). A structure of IPv6 address that allows the derivations of IPvl6 address from IPV4 and
IPv6 addresses.
(i). A technique to encapsulate IPvl6 packets inside IPv4 and IPv6 packets (Tunnelling) to allow IPvl6 packets to traverse clouds not yet updated to IPvl6 The IPvl6 Datagram Format
[0075]. This IPvl6 Datagram (Figure.1) represents an entire basic transfer unit connected with a packet-switched network. Datagrams are typically structured in header and payload sections, and they provide a connectionless communication service across a packet-switched network without any interrupts. This Figured shows how to interact with every operation.
[0076]. Initially Versions and Header length connected to types of class and Traffic classes of packet transfer of every end-to-end connectivity, and Flow control working as previous versions
Universal Wide Web (UWW)
[0077]. The proposed Universal Wide Web illustrates to work the same as World Wide Web and the main aim is to create expand to the Future Internet Architecture and upgrade and merge existing WWW architecture.
[0078]. Communicate Interstellar objects and Galaxies using Radio Signals are integrated with the proposed architecture, and Virtual IP - IPvl6 to expand the internal space communications very quickly with secured allocated channels and allocated secured individual recognized block channels are connected with Internet and resolve to interrupt signals and message transfer delayed problem, transfer data with secure manner working mechanism the same existing technologies and support future technologies also.
Inter-Process Communication
[0079]. To avoid message delay during transmission from identified or/ and unidentified sources and an encrypted secure message transfer into Space Communication Medium through Tight transmission rate along with Time dilatation effect.
Proposed New Classes and Their Functionalities
[0080]. Figure.2 represents a full description of the entire IPvl6 Classes apart from Classes A to I, newly added F to I have its functionalities and requirements for existing technologies and upcoming versions along with future technologies, how to work, and Bit Sequence, Default Subnet Mark along with User Level requirements.
[0081]. Figured and Figure.2 represent a full description of the entire IPvl6 datagram and architecture along with the working environment and its functionalities.
TECHNICAL PROBLEM
[0082]. IP version 4 (IPv4) is showing its age as unexpected growth problems have appeared. Most notable is the rapid consumption of network addresses and the explosion in performance requirements for intermediate routing nodes. IPv4 was deployed when exceeding the theoretical maximum number of four billion nodes was not a possibility.
[0083]. With the advancements and the proliferation of computer technology, that limit will be reached in the next decade. Will your days of Web surfing come to an end? Not likely, since the Internet Protocol version 6 (IPv6).
[0084]. Communicate Interstellar objects and Galaxies using Radio Signals are integrated with the proposed architecture, and Virtual IP - IPvl6 to expand the internal space communications very quickly with secured allocated channels and allocated secured individual recognized block channels are connected with Internet and resolve to interrupt signals and message transfer delayed problem, transfer data with secure manner working mechanism the same existing technologies and support future technologies also.
SOLUTION TO PROBLEM
[0085]. IPvl6 will adapt identified and undefined problems of IPv6 computer technology and network transmission problems to resolve the gaps between IPv6 to IPvl6 and upcoming technologies and versions too. [0086]. IPvl6 will create new platforms of multiple technologies based on Future Technologies and resolved unmanned.
ADVANTAGEOUS EFFECTS OF INVENTION
[0087]. All Advantages of this Innovation and future applications are detailed descriptions available in the Claims and Drawings.
INDUSTRIAL APPLICABILITY
[0088]. IPvl6 has overcome all technological pending needs and supports future technologies, these technologies will create new areas of research and market for mankind.
[0089]. IPvl6 will create a new financial market of the entire globe due to the upgrade of new technologies and impact of social needs to will come new technology companies and its generate financial markets and improve the global economy.
[0090]. IPvl6 supports and gives Intelligent adopted platforms because the entire IPvl6 is working based on Artificial Intelligence and Blockchain Technologies.

Claims

I Claim,
1). The invention “Internet Protocol Version 16 (IPvl6)” comprises of Create a secure and new protocol version for the Internet protocol system working based on Artificial Intelligence and Blockchain Technologies.
(a). In the way IPvl6 is the upgrade of both version works and functionalities the same, security provides the same with extended Intelligent Block wise interconnectivity with genesis block to end - to - end-user connectivity during the packet delivery, if any Third Party or Untrusted person connect within this queue, here no chance to connect at any case due to all queue are run with an encrypted module, and internally any error raised self-driven mechanism will automatically detect and resolve this issue the same on the running queue without any interrupt.
(b). Even Network failure or any other issues have occurred self-esteem duplicate acknowledgment sent to sender and at the same time receiver also receive the same information for end-to-end connectivity, in the way Intelligent self-resolve mechanism to detects when the queue is processing and predict entire processing queue operations and guided supervised learning techniques and identified targeted node connectivity through Unsupervised Teaming techniques to resolve multiple connectivity at the same time.
(c). In the Technology up-gradation, classes extensions, IP address extensions, create virtual IP address, and limitless connection through virtual IP address and holographic projection also performed.
(d). Integrated with intelligent or self-driven network virtual assistance during safely packet delivery IPvl6 is mature enough to be used in corporate and business and universal and space celestial object connectivity through virtual IP addresses.
(e). This protocol creates a virtual IP address along with a shareable identity with authentication by the owner of individual IP.
2). The invention as claimed in claim 1, “ Universal Wide Web (UWW) “, describes the expandable Inter-Galactic and outer Space connectivity through
(a). Deep Space Connectivity along with Communicate Interstellar objects and
Galaxies using Radio Signals are integrated with the proposed architecture, and Virtual IP - IPvl6 to expand the internal space communications very quickly with secured allocated channels.
(b). Extension of WWW (World Wide Web), and integrated with Virtual Holographic connectivity with Cryptographic Security end-to-end tunnelling connectivity (c). Communicate Interstellar objects and Galaxies using Radio Signals are integrated with the proposed architecture, and Virtual IP - IPvl6 to expand the internal space communications very quickly with secured allocated channels and allocated secured individual recognized block channels are connected with Internet and resolve to interrupt signals and message transfer delayed problem, transfer data with secure manner working mechanism the same existing technologies and support future technologies also.
(d). The proposed Universal Wide Web illustrates to work the same as World Wide
Web and the main aim is to create expand to the Future Internet Architecture and upgrade and merge existing WWW architecture. ). The invention as claimed in claim 1, Create new class F and Class H, and Class I for extended to present classes and IP ADDRESS are run single IP address inherited desired Sub-IP address
(a). 210 address Space along with the Bit Transfer rate of each transmission.
(b). Net-ID, Host-ID are there, but I proposed Virtual Block — ID.
(c). Creates a virtual IP address
(d). 1024.1024.1024.1024, after assigned task, to perform Virtual IP address as per user requirements, and address is 1024 KB and this architecture supports Updated and current technologies.
(e). 1024.1024.1024.1024-X-Xn (where X means 1,2,3. n)
(f). Proposed Class F range of First Octet Range of 256 to 511, and Binary Bit Sequence of
0000 0001 0000 0000 to 0000 0010 0000 1110, and Default Subnet Mask is 1024.0.0.0, and User Level operations are Private Mode, which means protect private module with encrypted chain operations
(g). Proposed Class G range of First Octet Range of 512 - 638, and Binary Bit Sequence of
0010 0000 0000 0000 to 0000 00100111 1110, and Default Subnet Mask is 1024.1024.0.0, and User Level operations are Protect Channel (Universal Wide Web), which means protect private and public modules with encrypted chain operations
(h). The First Octet Range of 639 is used for special purposes for future needs and connectivity to any version.
(i). Proposed Class H range of First Octet Range of 640 - 767, and Binary Bit Sequence of
0000 0010 1000 0000 to 0000 0010 1111 1111, and Default Subnet Mask is
1024.1024.1024.0 along with LoopBack Genesis Link, and User Level operations are Protect Channel (Universal Wide Web), which means protect private and public modules access with encrypted chain operations
(j). Proposed Class I range of First Octet Range of 768-1024, and Binary Bit Sequence of 0000
0000 0011 0000 0000 to 0000 0010 0000 0000, and Default Subnet Mask is 1024.1024.1024.0 along with LoopBack Genesis Link, and User Level operations are Protect Channel (Universal Wide Web), which means protect private and public modules access with encrypted chain operations.
(k). At the User Level, it is performed to operate both I and H Classes for Unlimited and
Infinity High Security with multicast and Virtual IP address each block connectivity. Universal users and Interstellar and Expand Universe users’ allocations (1). Figure.1, 2, and 3 represent a full description of the entire IPvl6 Classes apart from Classes A too I, newly added F to I have its functionalities and requirements for existing technologies and upcoming versions along with future technologies, how to work, and Bit Sequence, Default Subnet Mark along with User Level requirements, and the full description of the entire IPvl6 datagram and architecture along with the working environment and its functionalities. ). The invention as claimed in claim 1, Blockchain enhanced Security coverage
(a). Transmit Life-Time Virtual Connectivity
(b). IPvl6 support and proposed new areas of virtual gateways along with Create a
Virtual IP address for secure transmission.
(c). The entire IPvl6 Classes apart from Classes A to I newly added F to I have its functionalities and requirements for existing technologies and upcoming versions along with future technologies, how to work, and Bit Sequence, Default Subnet Mark along with User Level requirements.
(d). This IPvl6 Datagram (Figured) represents an entire basic transfer unit connected with a packet-switched network. Datagrams are typically structured in header and payload sections, and they provide a connectionless communication service across a packet- switched network without any interrupts. This Figured shows how to interact with every operation.
(e). Initially Versions and Header length connected to types of class and Traffic classes of packet transfer of every end-to-end connectivity, and Flow control working as previous versions ). The invention as claimed in claim 1, Create Duplicate Acknowledgment for Error
Detection and Correction
(a). IPvl6 will adapt unidentified and undefined problems of IPv6 computer technology and network transmission problems to resolve the gaps between IPv6 to IPvl6 and upcoming technologies and versions too.
(b). During message transmission, if any network or any other failures have occurred, an Intelligent Self-driven system automatically analyzes the processing queue and guide according to data leaks and failures, send necessary action to be taken without any queue interrupt.
(c). Address Space and checksum, Error Control, Flow control, and Transmission
Control process are the same on existing technologies to upgrade version, during transmission any problems are raised, Intelligent prediction system analysis entire operations at every movement in the layer transmission.
(d). Internal Layer message transmission authenticated Fibonacci chain series connectivity linked with every stage level operation module at every conversation from source to the destination if any data leaks are awake, predict the mechanism and behavior of node connectivity with detecting entire route mapping once before transmission, and sends duplicate acknowledgment as per receiver requirements. 21 ). Whenever or whatever you invest in IPvl6 is an investment in IPvl6 is a Future Technology. Here are the following specifications that may be time for you to consider or integrate IPv4 and IPv6.
(a). User’s IPv4 or IPv6 network or NAT implementation needs to be fixed or extended and supported to IPvl6, as the same features and same functionalities.
(b). Users are running out of address space with limited or extended configurated NAT implementations .
(c). Users want to prepare the user’s network for applications that are based on advanced features of IPvl6 and integrated with IPv4 and IPv6.
(d). Users want to prepare their network for applications that are based on network extended possibilities.
(e). Users need end-to-end block encrypted security for a limitless number of users and you do not have the address space or you or user or customer struggle with a NAT implementation at a user level, and resolves this issue through IPvl6.
(f). Users or your hardware or applications reach the end of their lifecycle and then immediately virtual duplicate packet collision occurred then First In First OUT(FIFO) priority on their existing queue without any disturbance.
PCT/IN2022/050620 2021-08-30 2022-07-06 Internet protocol version 16 (ipv16) WO2023031953A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN202141039287 2021-08-30
IN202141039287 2021-08-30

Publications (1)

Publication Number Publication Date
WO2023031953A2 true WO2023031953A2 (en) 2023-03-09

Family

ID=85413160

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2022/050620 WO2023031953A2 (en) 2021-08-30 2022-07-06 Internet protocol version 16 (ipv16)

Country Status (1)

Country Link
WO (1) WO2023031953A2 (en)

Similar Documents

Publication Publication Date Title
Wu et al. Transition from IPv4 to IPv6: A state-of-the-art survey
Ali Comparison study between IPV4 & IPV6
Hagen IPv6 essentials
US6708219B1 (en) Method and system for dual-network address utilization
RU2357281C2 (en) Virtual broadcasting network for inter-domain connection
US9258272B1 (en) Stateless deterministic network address translation
AU2002256072A1 (en) System and method for performing IP telephony
Cui et al. 4over6: network layer virtualization for IPv4-IPv6 coexistence
Amoss et al. Handbook of IPv4 to IPv6 transition: Methodologies for institutional and corporate networks
Chandra et al. A comparative study on IPv4 and IPv6
Miller Implementing IPv6: supporting the next generation protocols
Shah et al. An examination of next generation IP migration techniques: Constraints and evaluation
Cooper et al. IPv6: business applications and implementation concerns
Jain et al. Performance Comparison Between Different Tunneling Techniques Using Different Routing Protocols
Gupta et al. Solving ipv4 (32 bits) address shortage problem using ipv6 (128 bits)
WO2023031953A2 (en) Internet protocol version 16 (ipv16)
Jayanthi et al. Next generation internet protocol-Technical realms
Rooney et al. IP Address Management
Hamarsheh Deploying IPv4-only connectivity across local IPv6-only access networks
Durand et al. RFC 6333: Dual-stack lite broadband deployments following IPv4 exhaustion
Padole et al. An Insight into IP Addressing
Chen et al. Analysis of IPv6 network communication using simulation
Khan et al. Necessity to migrate to IPv6
Saklani et al. Technical comparison between IPv4 & IPv6 and migration from IPv4 to IPv6
Chimiak et al. Enhanced IP: IPv4 with 64-bit addresses

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22863815

Country of ref document: EP

Kind code of ref document: A2