Operation Discussion--Analysis of ipv6 Security