TITLE

The Internet Reloaded

AUTHOR(S)
O'Reilly, Dennis; Albro, Edward N.
PUB. DATE
November 2004
SOURCE
PCWorld;Nov2004, Vol. 22 Issue 11, p32
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on Internet Protocol version 6 (IPv6). Among other things, the 128-bit replacement for the 32-bit IPv4 provides a vast amount of new IP numbers--a sufficient quantity to give every molecule on earth its own network address. By the end of 2010, every new phone, appliance and consumer electronics device will probably require its own IP address. IPv6 necessitates an upgrade of routers and other Internet backbone equipment which is already underway; consumers will start enjoying the technology's benefits through 2008 as it spreads throughout the Internet and to consumer electronics.
ACCESSION #
14690431

 

Related Articles

  • Networking Your Gadgets. Lok, Corie // Technology Review;Jun2004, Vol. 107 Issue 5, p24 

    This article focuses on the possibility of networking a wide range of gadgets such as digital video disk players, MP3 players and cameras, among others, as of June 2004. The main roadblock to such a situation was allegedly cleared, when consumer electronics, chip, and computer manufacturers...

  • NETWORKING ANSWERS: New Technologies. Heltzel, Paul // PCWorld;May2002, Vol. 20 Issue 5, p88 

    Tests various networking hardware to determine which works best. Test of both wireless network hardware and those which use power-lines and phone-lines. Evaluation of the network standards HomePlug, HomePNA, Wi-Fi and Wi-Fi5. INSETS: GLOSSARY;How Fast Are They Really?;How Can I Share a Net...

  • Firmware-Level Latency Analysis on a Gigabit Network. Jin, Hyun-Wook; Yoo, Chuck; Choi, Jin-Young // Journal of Supercomputing;Aug2003, Vol. 26 Issue 1, p59 

    Gigabit networks are equipped with “increasingly” intelligent network interface cards, and the firmware running in the cards does various tasks related to end-to-end communication. For an accurate performance evaluation of gigabit networks, it is very important to characterize and...

  • Certified Expert: Working as a Protocol Analyst. Tittel, Ed // Certification Magazine;Jul2003, Vol. 5 Issue 7, p44 

    Provides information on computer network protocol analysis. Significance of protocol analysis to understanding a computer network; Tasks of protocol analysts; List of the networking fundamentals that protocol analysts should understand.

  • Network troubleshooting. Harris, Link // Australian PC User;Jul2005, Vol. 17 Issue 7, p102 

    Offers several computer network troubleshooting tips. Checking of the computer hardware; Customization of one's Desktop icons; Utilization of the same network protocol.

  • COMMUNICATION BETWEEN INTELLIGENT DEVICES IN LONWORKS CONTROL NETWORKS. Muresan, Nicolae; Orza, Bogdan; Vlaicu, Aurel // Acta Technica Napocensis. Electronica-Telecomunicatii;2010, Vol. 51 Issue 4, p57 

    A modern control network consists of a number of intelligent devices that communicate on one or more channels, using a common protocol. The network's intelligent devices, called nodes, may each include more microprocessors running the application, and the protocol. Also, each device includes a...

  • Network Reconnections.  // PCWorld;Jan2005, Vol. 23 Issue 1, p69 

    This paper presents tips on handling network connection issues. For instance, the computer suddenly loses its connection to the Internet. If a personal computer (PC) connects through a Dynamic Host Configuration Protocol server--which means its Internet Protocol address is automatically assigned...

  • SPEEDY CNC LINK.  // Machine Design;12/11/2003, Vol. 75 Issue 23, p106 

    Evaluates the FastWire digital protocol from OSAI-USA Inc. Features of the device; Applications.

  • Deciding the Correctness of Attacks on Authentication Protocols. Hagalisletto, Anders Moen // Journal of Software (1796217X);May2008, Vol. 3 Issue 5, p40 

    A new tool for automated validation of attacks on authentication protocols has been used to find several errors and ambiguities in the list of attacks described in the well known report by Clark and Jacob. In this paper the errors are presented and classified. Corrected descriptions of the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics