Paper
5 November 2008 Application of IPv6 in GIS
Zhen-feng Wang, Liang Wang
Author Affiliations +
Proceedings Volume 7144, Geoinformatics 2008 and Joint Conference on GIS and Built Environment: The Built Environment and Its Dynamics; 714428 (2008) https://doi.org/10.1117/12.812828
Event: Geoinformatics 2008 and Joint Conference on GIS and Built Environment: Geo-Simulation and Virtual GIS Environments, 2008, Guangzhou, China
Abstract
The inherent flaws in current network, especially the inadequate IP address space, make the born of NGN (Next Generation Network). The NGN aims to enable the information sharing and inter-operation of heterogeneous networks. As the core of NGN, IPv6 (Internet Protocol version 6), which is designed as the successor of IPv4 running now, brings us many new features. It provides larger address space, supports mobile devices, and has built-in security policy, and so on. Although it brings us so many advantages and the backbone of NGN also has been constructed in many countries, we have difficulties moving to NGN. One of the main reasons is there are few killer applications for it. So what features can be employed by GIS, and how to use them is the main content of this paper. The IPv6 certainly offers new entry to solve some problems in GIS.
© (2008) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zhen-feng Wang and Liang Wang "Application of IPv6 in GIS", Proc. SPIE 7144, Geoinformatics 2008 and Joint Conference on GIS and Built Environment: The Built Environment and Its Dynamics, 714428 (5 November 2008); https://doi.org/10.1117/12.812828
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Geographic information systems

Internet

Network security

Computer security

Mobile devices

Cell phones

Computing systems

RELATED CONTENT

Security issues of GIServices
Proceedings of SPIE (October 28 2006)
Intelligent dissemination in a secure, wireless platform
Proceedings of SPIE (April 29 2009)
Research in trust-based user cooperation model
Proceedings of SPIE (October 28 2011)
Using overlays to improve network security
Proceedings of SPIE (July 08 2002)

Back to Top