IPv6 thick and thick hair for the security of information-based color [full text]

After entering the 21st century, biometrics, radio and television, and IT have also expanded their penetration in the security industry while expanding their territory in their own fields. In the networked trend, the integration of security and IT is the most significant.

From a technical point of view, from the initial network cameras to the millions of high-definitions that are now based on IT technology, they are gradually moving toward practical applications. Zhang Yufan, engineer of the technical support department of Shanghai Poseidon Computer Technology Co., Ltd., said that in addition to relaying high-tech, remote monitoring, and network technologies to security, IT is also imperceptibly transferring its methodology to the security field, including IT. General-purpose, standardized, functionally perfect, high-availability, and highly-compatibility products and systems, establishing a unified method and standard for operation and maintenance. Nowadays, as another iconic and beautiful scenery in the IT industry, IPv6, security models are coming.

IPv6: The Sun at 7 o'clock

Although the Internet has not been published for many years, the IPv4 protocol family, which is the foundation of the Internet, has been shown to be exhausted. The most serious problem is that the IP address is about to run out (China is expected to be in the end of 2011-2012). As early as 1992, the problem of insufficient address space of the IPv4 of the IETF began to be reviewed. In 1994, the next-generation Internet protocol began to be proposed, and after several years of improvement, the proposal of IPv6 was officially the draft standard of the IETF in 1998. (DraftStandrad).

As the "successor" of the current version of the IP protocol IPv4, IPv6 is not only capable of "giving an IP to any grain of sand on the planet", but also its network security, mobility, QoS (Quality of Service), and convection. There are also obvious advantages in support. Therefore, once launched, it triggered a lot of shock in the industry. However, after all kinds of radiance, IPv6 suffered a decade-long snowfall for various reasons.

In the past two years, the alarm for the last batch of IPv4 addresses has come to an end. This has also put the focus on IPv6 on an unprecedented peak. After returning to IPv6 under the spotlight, the basic standards have matured. The sun, like a seven or eight o'clock, is rising. In the interview, Hu Linfeng, product director of the video surveillance division of Ruijie Communications Co., Ltd., said that IPv6 scale experiment will be launched globally, and various types of IPv6-enabled network devices will emerge one after another and gradually enter commercial applications. In regions such as North America, Western Europe, and Asia Pacific, local IPv6 networks have been established, such as the pure IPv6 experimental backbone network such as China’s CNGI and Japan’s e-Japan.

"Smooth" art

Under certain circumstances, the more adequate a technology is developed and the wider its application, it may not be a good thing because it may become an obstacle to the deployment of the next new technology. In the promotion, IPv6 happens to run into such an awkward situation: IPv4's huge user groups and devices make IPv6 have to consider how to achieve a smooth transition from IPv4 to IPv6.

However, "There are so many solutions in the transition process to IPv6, because there is no one unified solution. Once published, all IPv4 and IPv6 interoperability problems can be resolved. Each solution has different conditions. Advantages and Limitations, said Dr. Xiangyang Zhao, a member of the China Regional Committee of the IPv6 Forum and a CTO of China Digital Network Co., Ltd. In order to achieve the four goals of the gradual evolution, gradual deployment, address compatibility, and cost reduction of the transition from IPv4 to IPv6, the IETF (Internet Engineering Task Force) recommended the evolution of the dual-stack protocol, tunneling technology, and NAT. These evolutions are already in Europe, Japan, and China. The commercial or experimental network is demonstrated and practiced.

Dual Stack Protocol
The dual-stack protocol refers to the simultaneous support of the IPv4 and IPv6 protocol stacks from the user side to the network side. Dual-stack nodes support communication with both IPv4 and IPv6 nodes. They can use the IPv4 protocol to interwork with IPv4 nodes, and can also directly use the IPv6 protocol to interwork with IPv6 nodes. IPv4/IPv6 dual-stack nodes have the ability to resolve IPv4 and IPv6 addresses, ie, domain name resolvers on dual-stack nodes can handle both AAAA and A types of records. It provides full compatibility for IPv4 and IPv6, but due to the need for dual routing infrastructure, it not only increases the complexity of the network, but it still cannot solve the problem of IP address exhaustion.

Tunnel technology

Tunneling technology provides a way to use an existing IP (IPv4 or IPv6) network architecture technology to implement another IP (also IPv4 or IPv6) communication technology. The basic working method is as follows: The tunnel entrance first encapsulates and sends the data packet into the tunnel. After receiving the encapsulated data packet, the tunnel exit first confirms whether it needs to be reassembled; then the IP outside the tunnel encapsulation is removed and the received data packet is processed accordingly. In order to allow packets to pass through the tunnel, the tunnel entrance may need to maintain the soft state information of the tunnel, such as recording parameters such as the tunnel MTU. The advantage of the tunnel technology is that the network only needs to maintain a single stack, which can solve the problem of IPv4 public network address shortage. For example, through DS-LITE, IPv4 services can be carried on IPv6 networks, so that old services can also run on new networks. The technical disadvantages of the tunnel are also obvious. It is necessary to deploy equipment at both ends of the tunnel, which is relatively complicated. High requirements on the terminal system.

NAT (Network Address Translation) refers to when a pure IPv4 host and a pure IPv6 host communicate with each other. Because the protocol stacks of the two parties are different, translation of the protocol is necessary. Translation involves two aspects; one is the translation of the IPv4 and IPv6 network protocol layers; the other is the translation between IPv4 applications and IPv6 applications. Due to the incompatibility of IPv4 and IPv6 protocol design, translation techniques should be avoided as much as possible.

Of course, the characteristics of the dual-stack protocol are more in line with the needs of the security industry. The explanation given by Pouston Zhang Yufan is that the IPv4/IPv6 dual stack technology will be the future technical direction. It adopts a modular approach to porting and updating various IPv6 functions. It does not require users to upgrade hardware and is the best choice for transition. Wei San, general manager of Shenzhen Sanshan Technology Co., Ltd., said that application vendors and equipment vendors basically implement tunneling or dual stack technology. Among them, the application vendor's software mostly implements the IPv4/IPv6 dual-stack protocol as the main solution, and performs a balanced transition during the upgrade from IPv4 to IPv6, and minimizes investment risks.

Shantou or trend concept hype

Because the United States has an overwhelming advantage over IPv4 addresses, its IPv6 front was once silenced, and now the U.S. government has begun to create the noise of this next-generation Internet technology and implement its plan to deploy secure, IPv6-enabled network services. According to Stargate Ruijie Hu Linfeng, the U.S. Federal Purchase Regulations clearly stipulate that hardware and software sold by all manufacturers must be compatible with IPv6 after June 1, 2010. All government websites will support IPv6 at the end of 2012, and the government will only purchase IPv6 support. The IT equipment completed the nationwide IPv6 upgrade in 2014.

When the Ministry of Industry and Information Technology of the People's Republic of China issued the "Decision of the State Council on Cultivating and Developing Strategic Emerging Industries" in October 2010, it has made it clear that it will focus on building the next-generation Internet headed by IPv6 during the "12th Five-Year Plan" period.

Eric Besson, Minister of Industry, Energy and Digital Economy of France, announced that France will accelerate the development of IPv6, the next-generation IP address technology. The government ministries and commissions network will soon be the first to use this technology.

IPv6 is enjoying more and more high courtesies in the world. However, as countries have stepped up their efforts to speed up the deployment of IPv6, voices about IPv6 as "a concept that is greater than the substance" or "a vendor's gimmick" have been heard. IP is in urgent need of upgrading.

"The upgrade needs of IP addresses are not so urgent. Because it is possible to sell the latest hardware that handles both IPv4 and IPv6 addresses, upgrading this large-scale IPv4 network to IPv6 is a big benefit for some network equipment giants. It is about promoting IPv6. The urgency is more likely to be just about commercial promotion of network devices,” said an Internet analyst who declined to be named.

Some security personnel also suggested that for most security systems, IPv6 applications are not so urgent. Dong Haoqing, an engineer at Shanghai SIXTY Information Technology Co., Ltd., holds a similar view: “The admonition of IPv4 address is just as serious for the security industry as the millennium bug is on the Internet, but it is not really a big problem. Although the Internet of Things and security are rapidly integrated, And the security networking has a huge demand for IP addresses, but the problem of IP addresses has not yet radiated enough fascination for security vendors to use them, because the vast majority of the current network of security systems is not open to the outside world. In addition, as far as IPV6 is concerned, it is actually a network layer, and the relationship between the network layer and the application layer is not always tight, so the depletion of IPV4 addresses does not mean that there will be problems in the LAN, and the project providers and users will have complete A series of network methods can be used to solve the problem of network export, and many terminals may go out through the same address on the corporate intranet; also, many large security systems in the industry do not actually require open security systems such as subways and public security. Independently, the police's internal network is also independent, neither of which is connected to the Internet." Liu Fuhua, an engineer at Beijing Hanbang Hi-Tech Digital Technology Co., Ltd., also believes that the development and application of IPv6 currently involves major areas of communication, such as operating software, routers, switches, wireless networks, and applications that interact with the WAN. Even large-scale application of IPv6 technology should be the forefront of communication/IT. Only after having a certain network application environment will the security industry begin to apply IPv6 technology on a large scale.

It can be seen that although the goal of IPv6 evolution is clear, from the point of view of operation and deployment, it is impossible and unrealistic to implement IPv4 to IPv6. On the one hand, it is necessary to effectively protect existing investments to minimize the cost of upgrades; on the other hand, for different scenarios in the coexistence phase of IPv4 and IPv6, different technology combinations need to be considered in stages, steps, and scenarios to form a transition. The solution of the stage. Therefore, the evolution plan needs to be further integrated with China's specific network practices and operational practices.

Big project word preaching

At present, under the joint promotion of government departments and communication operators, the application of IPv6-based security systems has been exposed. According to Wang Zhiwu, a product specialist of Sichuan Aipu Vision Digital Co., Ltd.'s marketing department, it is because of the low occupancy rate packet encapsulation technology, high transmission, and high routing forwarding capabilities that IPv6 can be fully utilized in large-scale high-security video surveillance systems. Shows, such as the Beijing Olympics, the Shanghai World Expo and the Shenzhen Universiade that is being held.

In 58 venues for the Beijing 2008 Olympic Games, China Netcom deployed a comprehensive IPv6 video surveillance system with a unified terminal addressing scheme. It is understood that the IPv6 video camera used in the Beijing Olympic Games can automatically configure IPv6 addresses and other parameters when accessing a network system. They are controlled by a central software program that enables interconnection and interoperability and automatic configuration. In addition, these cameras use standard Ethernet cables or wireless access networks, making them simpler than traditional closed-circuit cameras using coaxial cables. A few days ago, BOCOG has introduced this system to the 2012 Olympic Organizing Committee.

The Shanghai World Expo Park Network adopts a dual-stack BRASNAT64 solution, which implements dual-stack user access and IPv6/IPv4 mutual visits to ensure the smooth operation of the World Expo. According to ZTE's technical personnel, the Shanghai World Expo Park Network covers the World Expo Hotel and News Center, and provides IPv6 information bearing services for interactive Expo kiosks and real-time monitoring. The dual-stack BARS equipment of the Shanghai World Expo Campus Network deploys PPPoEv6 and IPoEv6 to implement IPv6-only user access. In order to achieve broadband Internet access for hotel users, the PPPoEv6NDRA access mode is used to combine the advantages of automatic deployment of IPv6 plug-and-play with the manageability advantages of PPPoEv6. User access is convenient. For the characteristics of multiple terminals of the same user in the news center, the PPPoEv6/IPoEv6DHCPv6-PD access mode is used to allocate corresponding length IPv6 prefixes to the users. Then the IPv6 address of the user terminal is automatically completed in combination with IPv6 plug and play advantages. Some user terminals adopt the dual-stack mode. To implement such user access, the dual-stack BRAS deploys the "SinglePPPforboth and IPv4/IPv6" function. That is, the user can obtain both IPv4/IPv6 addresses through one-time PPPoE dial-up and implement dual-stack user. Access.

If the integration of IPv6 and video surveillance at the Olympics and World Expo is just a small trial, then the two sides of the Universiade can be said to achieve a true sense of close contact - "Shenzhen Universiade video surveillance system is China's first commercial video based on IPv6 surveillance system". In order to implement the IPv6 protocol video streaming and video network monitoring at the Shenzhen Universiade, Digital China Ruixing adopted the Sm@rtEYE video surveillance solution to implement the IPv6 wireless broadband video surveillance system. During the project construction process, Digital China used Sm@rtEYE video surveillance system to successfully achieve high-definition video signal transmission over wireless broadband over long distances under the IPv6 protocol; without any external equipment, the network camera can be directly inserted into the network port, plug and play Remote users can access network cameras at any time and any place through any networked terminal such as PC, laptop, PDA, mobile phone, etc. In addition, relying on Sm@rtEYE, the IPv6 wireless broadband video surveillance system built this time will give full play to the advantages of intelligence and high-definition, provide high-definition images and all-round surveillance vision for the Universiade security work, and fully solve the current monitoring system video is not clear, Unable to do well documented and other ills.

The large-scale commercial application of IPv6 and video surveillance convergence is taking the benchmark posture in the forefront of the development of the security industry. While accelerating the progress and improvement of IPv6's own technology, it will also deploy and implement the IPv6 monitoring network construction in the future. Commercial use has played a textbook-type demonstration and promotion role.

"Thick product" to be "thin hair"

In the field of Internet applications, IPv4 still dominates the IP network. Prior to the popularity of IPv6 networks, the pioneers of IPv6 still have a long way to go, but IPv6 is the trend of the Internet. It is understood that current mainstream network equipment providers have already given relevant IPv6 solutions, and telecom operators are also planning to deploy IPv6 networks. Once the basic network IPv6 transition is completed, network video surveillance equipment will inevitably transition to IPv6.

Of course, for the moment, the time is not yet ripe for IPv6 to play in the security field. According to Guo Hui, digital product manager of Tiandi Weiye, the integration of security systems and IPv6 is mainly reflected in the integration of terminal equipment and IPv6 network. However, the interconnection of IPv6 and network video surveillance systems is not that simple. Although some manufacturers, such as Panasonic, Axis, and Microtel, have first introduced network cameras and back-end management platforms that support dual protocols, their practical significance Not great. "Security monitoring system as a whole application, from the front end to the back end, acquisition to storage, and user supervision, each device and platform software must support the IPv6 protocol in order to ensure the normal operation of the entire system, and the reality is that each device or subsystem comes from It is difficult for different manufacturers to achieve a unified agreement,” explained Xu Weicheng, product manager of Hikvision. Of course, the security companies that are at the forefront will naturally not forget this fertile virgin land. In addition to deepening the development of IPv6 products, they have also stepped up exchanges with operators to jointly conduct research and experiments in this area so as to lay them out as soon as possible. IPv6 access to security applications. According to Cai Wei, customer service manager of Shenzhen Topview Technology Co., Ltd., in the security industry, network video surveillance equipment, including network cameras, network video servers, and network video surveillance platform software, will be the first to leap into IPv6 applications.

Liu Mingming

“With the development of the entire broadband industry, the video surveillance system based on IPv6 technology has provided the basis for massive IP addresses, combined with operational and manageable features, and provided a very favorable basis for the promotion of video surveillance services from industry applications to public applications. Conditions, application effect is good.” Talking about the prospect of IPv6 application in the security industry, Bai Liangru, an engineer of the technical department of China Netcom (Group) Co., Ltd. said. While advancing monitoring and networking, IPv6 technology will also benefit other security subsystems, including alarms, access control, and intercom. In addition, in the foreseeable future, the wave of the Internet of Things will also detonate the application of IPv6 in smart cities, smart communities, smart homes, intelligent transportation, intelligent facilities and other security services.

Super Abrasives


Superabrasives come in the form of grinding wheels and are used when the material being processed is either too hard or too delicate for regular abrasives.

Industrial diamonds are one of the most common materials used to create the grinding material. Contrary to popular belief, diamonds are not as rare as marketing campaigns will tell you.

After diamonds,cubic boron nitride is the second more durable material for cutting. This is followed by polycrystalline.

The most obvious advantage is that these Grinding Wheels are extremely hard and durable. This allows them to give better performance and greater longevity over regular abrasives.

When your wheel lasts longer you will see reduced costs for fixtures and tooling. This opens up your budget up to investing in more machines.

You will notice that the wear and cuts on your materials will be even. Because the abrasiveness of the wheel is so strong, it doesn`t develop uneven worn away spots as quickly as regular abrasive wheels.

So the output from your production will be consistent. So your manufacturing efforts will produce reliable and consistent results.

It can be tough to justify the upfront increased costs of superabrasive wheels. But the durability and quality of their production output make them well worth it.

But you`ll quickly realize that your productivity has increased by using superabrasives. You will have more parts processed per wheel and fewer wheel changes.

Kemei produces both conventional grinding wheel and super abrasive grinding wheels, such as white aluminum grinding wheel, pink wheel ,green silicon wheel, diamond grinding wheel and CBN grinding wheels.

If you need any type of grinding wheel and any suggestion on grinding wheels, just contact us.


Super Abrasives,Grinding Wheel Stone,Grinding Wheel For Bench Grinder,Electroplated Cbn Cut Off Wheel

Henan Jinlun Superhard Material Co., Ltd , https://www.jinlunsuperhard.com