UIPv6 protocol stack released

 

Cisco, Atmel and the Swedish Institute of Computer Science (SICS) have announced the availability of uIPv6.

The open-source IPv6-ready protocol stack is capable of designating Internet Protocol addresses for virtually any electronic device.

According to Rob Adams of Cisco, "UIPv6 has the potential to impact a wide range of market verticals where automation is key, just as voice over IP did in enterprise telephony."

UIPv6 includes standard IP applications and can be easily customised for specific requirements. The protocol stack is integrated in the Contiki operating system developed by SICS, and can be utilised for both commercial and non-commercial applications.

"An open-source, standard-compliant, small-footprint IPv6 implementation is essential to enable the next generation of sensor network applications," said Adam Dunkels, senior scientist at SICS and Contiki project leader.

Patrick Wetterwald, president of the IP for Smart Objects Alliance (IPSO) concurred. "By running an IPv6 stack, operating a network of sensors thus becomes as easy as operating a network of PCs, IP phones, or any other IP devices."

The new uIPv6 stack requires a mere 0.5 KB of SRAM for data structures, a minimum of 1.3 KB of SRAM for buffering, and 11 KB of Flash for the code. UIPv6 also includes an implementation of the 6LoWPAN standard, the adaptation layer between 802.15.4 and IPv6.

theinquirer.net (c) 2010 Incisive Media


UIPv6 protocol stack released
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 705

Vote