Nokia demos mobile IPv6 call

It's for you


Nokia has demonstrated what it billed as the industry's first mobile IPv6 call. The demo, at this week's 3G World Congress in Hong Kong, featured real-time streaming video between two CDMA Dual-Stack handset on separate CDMA access networks using Mobile IPv6.

IPv6 is designed to replace the current Internet Protocol IPv4, which has a maximum address space for 4.3 billion. Some operators have worked around this limitation by using network address translation (NAT). NAT is fine for client/server-based Internet applications but limits the deployment of innovative network applications and services where every device needs a unique IP address.

Mobile IPv6 is a mobility protocol for IPv6 enabled handsets providing always-on capabilities and seamless mobility. Using the protocol enables terminals to maintain their IP connectivity as they move across networks with different access technologies, at least in theory. Mobile IPv6 also provides enhanced security and route-optimization techniques that can reduce handoff latencies for real-time services, such as Voice over IP and broadcast services.

"IPv6 is the next-generation of the internet protocol and has many advantages over IPv4 both for the network operators and the end-users," says Adam Gould, VP technology management and planning, Nokia CDMA. "IPv6 allows the deployment of millions of always-on, IP enabled devices, each with its own unique IP address. Additionally, Mobile IPv6 provides seamless mobility across access technologies (e.g. CDMA, WCDMA, WLAN) and is a powerful enabler for the next generation of services such as peer-to-peer services, push services and Voice over IP (VoIP) which demand always-on global [access] and seamless mobility."

Nokia supports dual-stack IPv4/IPv6/Mobile IPv6 in its terminals and the network, allowing interworking between IPv6 and IPv4 systems without translation technology. The firm said it was working closely with industry partners to support the transition to IPv6, the next generation internet protocol. ®

Related stories

Cisco takes IPv6 closer to the mainstream
Brussels gets up to speed with IPv6
Netscreen pilots security support for IPv6
Check Point secures IPv6 and P2P
IPv6 Task Force UK works on five-year plan

Similar topics


Other stories you might like

  • The future: Windows streaming through notched Apple screens

    Choice is the word for Jamf's Dean Hager

    Interview As Apple's devices continue to find favour with enterprise users, the fortress that is Windows appears to be under attack in the corporate world.

    Speaking to The Register as the Jamf Nation User Conference wound down, the software firm's CEO, Dean Hager, is - unsurprisingly - ebullient when it comes to the prospects for Apple gear in the world of suits.

    Jamf specialises in device management and authentication, and has long been associated with managing Apple hardware in business and education environments. In recent years it has begun connecting its products with services such as Microsoft's Azure Active Directory as administrators face up to a hybrid working future.

    Continue reading
  • There’s a wave of ransomware coming down the pipeline. What can you do about it?

    AI can help. Here’s how…

    Sponsored The Colonial Pipeline attack earlier this year showed just how devastating a ransomware attack is when it is targeted at critical infrastructure.

    It also illustrated how traditional security techniques are increasingly struggling to keep pace with determined cyber attackers, whether their aim is exfiltrating data, extorting organisations, or simply causing chaos. Or, indeed an unpleasant combination of all three.

    So, what are your options? More people looking for more flaws isn’t going to be enough – there simply aren’t enough skilled people, there are too many bugs, and there are way too many attackers. So, it’s clear that smart cyber defenders need to be supplemented by even smarter technology incorporating AI. You can learn what this looks like by checking out this upcoming Regcast, “Securing Critical Infrastructure from Cyber-attack” on October 28 at 5pm.

    Continue reading
  • Ransomware criminals have feelings too: BlackMatter abuse caused crims to shut down negotiation portal

    Or so says infsec outfit Emsisoft

    Hurling online abuse at ransomware gangs may have contributed to a hardline policy of dumping victims' data online, according to counter-ransomware company Emsisoft.

    Earlier this month, the Conti ransomware gang declared it would publish victims' data and break off ransom negotiations if anyone other than "respected journalist and researcher personalities" [sic] dared publish snippets of ransomware negotiations, amid a general hardening of attitudes among ransomware gangs.

    Typically these conversation snippets make it into the public domain because curious people log into ransomware negotiation portals hosted by the criminals. The BlackMatter (aka DarkSide) gang's portal credentials (detailed in a ransom note) became exposed to the wider world, however, and the resulting wave of furious abuse hurled at the crims prompted them to pull up the virtual drawbridge.

    Continue reading

Biting the hand that feeds IT © 1998–2021