SlideShare una empresa de Scribd logo
1 de 21
Introduction to IPv6

Presented by:
Hafiz Syed Adnan Ahmed(2122)
Zuhair ul Haq(2230)
Agenda
 Why we need IPv6
 The length of IPv6
 Features of IPv6
 Header Comparisons
 How can I write IPv4 to IPv6
 How to subnet IPv6
What is IPv6?
 IPv6 is the abbreviation for Internet Protocol version 6. We
are currently on Internet Protocol version 4, or IPv4, but IPv6
will be the next generation protocol for Internet
communication. Not only will IPv6 provide a much larger
address space, but it will also provide features such as
improved routing traffic and better security.
Why do we need IPv6?
 The Internet has experienced a phenomenal increase of
devices accessing the Internet. Because of this increase,
IPv4 addresses are running out. The solution is for IPv6 to
accommodate this increased demand by providing a much
larger address space, along with improved traffic routing and
better security.
Some of the advantages of
IPv6 are:
Larger IP address space: IPv6 has 128-bit address space or 4
times more address bits compared to IPv4's 32-bit address space.
This large address space will provide enough address space for
many decades to come. In real terms, every residential or
commercial customer will be able to receive more address space
from TWC than the entire IPv4 address space contains – several
billion IP addresses!
Better optimization:
 IPv6 takes the best of what made IPv4 successful and gets rid of
minor flaws and unused features
Why we need IPv6
 INTERNET  world’s largest public data network, doubling in size
every nine months
 IPv4, defines a 32-bit address - 232 (4,294,967,296) IPv4 addresses
available
 The first problem is concerned with the eventual depletion of the IP
address space.
 Traditional model of classful addressing does not allow the address space
to be used to its maximum potential.
Features of IPv6
 Larger Address Space
 Aggregation-based address hierarchy
– Efficient backbone routing
 Efficient and Extensible IP datagram
 Stateless Address Autoconfiguration
 Security (IPsec mandatory)
 Mobility
The Length of IPv6
128-bit IPv6 Address

3FFE:085B:1F1F:0000:0000:0000:00A9:1234

8 groups of 16-bit hexadecimal numbers separated by “:”
Leading zeros can be
removed
3FFE:85B:1F1F::A9:1234
:: = all zeros in one or more group of 16-bit hexadecimal numbers
Header comparison



the length of the ipv6 header in bytes
On the Internet, data is transmitted in the
form of network packets. IPv6 specifies a Removed (6)
new packet format, designed to minimize • ID, flags, flag offset
packet header processing by routers.
• TOS, hlen
• header checksum

Changed (3)
• total length => payload
• protocol => next header
• TTL => hop limit
20
bytes

40
bytes

Added (2)
• traffic class
• flow label

Expanded
• address 32 to 128 bits
Major Improvements of
IPv6 Header
 No option field: Replaced by extension header. Result
in a fixed length, 40-byte IP header.
 No header checksum: Result in fast processing.
 No fragmentation at intermediate nodes: Result in fast
IP forwarding.
IPv6 Address with an Embedded IPv4
Address
 IPv4-compatible IPv6 address is a special unicast IPv6 address used
by transition mechanisms on hosts and routers to automatically
create IPv4 tunnels to deliver IPv6 packets over IPv4 networks.
 Address is made up of six high-order fields of 16-bit hexadecimal
values, represented by X characters, followed by four low-order fields
of 8-bit decimal values (IPv4 address), represented by d characters
(for a total of 32 bits).
IPv6 Address with an Embedded IPv4
Address


Two kinds of IPv6 addresses have an embedded IPv4
address:

1. IPv4-compatible IPv6 address



Used to establish an automatic tunnel to carry IPv6 packets
over IPv4 networks.
related to a transition mechanism of the IPv6 protocol.

2. IPv4-mapped IPv6 address




Used only on the local scope of nodes having both IPv4 and
IPv6 stacks.
Nodes use IPv4-mapped IPv6 addresses internally only.
These addresses are never known outside the node itself and
should not go on the wire as IPv6 addresses.
IPv6 Address with an Embedded IPv4
Address
IPv4-compatible IPv6 address

IPv4-mapped IPv6 address
IPv6 Addressing
 128 bits (or 16 bytes) long: four times as long as its
predecessor.
 2128 : about 340 billion billion billion billion different
addresses
 Colon hexadecimal notation:
 addresses are written using 32 hexadecimal digits.
 digits are arranged into 8 groups of four to improve the readability.
 Groups are separated by colons

2001:0718:1c01:0016:020d:56ff:fe77:52a3
HOW TO Subnet IPv6
First some background… an IPv4. IPv6
address is comprised of eight (8) blocks of four
hexadecimal digits separated with a colon “:”.
Each digit can be either a number [0-9] or a
letter [a-f] for a total of 16 possible
combinations per digit. 164 (yes this should be
written 216) gives 65,536 possible combinations
per block. The double colon “::” abbreviation is
commonly used in place of all zeros. This
double colon can only be used once while
specifying and address.
IPv6 Prefixes
 The next thing to point out is
the major IPv6 subnet
boundaries. For example:
Questions?
Why we need ipv6...

Más contenido relacionado

La actualidad más candente (20)

IPv6
IPv6IPv6
IPv6
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
IP Address
IP AddressIP Address
IP Address
 
IPv6
IPv6IPv6
IPv6
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Internet Protocol Version 6
Internet Protocol Version 6Internet Protocol Version 6
Internet Protocol Version 6
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
 
ARP
ARPARP
ARP
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
IPv6 Transition & Deployment, including IPv6-only in cellular and broadband
IPv6 Transition & Deployment, including IPv6-only in cellular and broadbandIPv6 Transition & Deployment, including IPv6-only in cellular and broadband
IPv6 Transition & Deployment, including IPv6-only in cellular and broadband
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 

Similar a Why we need ipv6...

Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6Netwax Lab
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptxJoshuaAnnan5
 
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATIONIPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATIONgopi5692
 
Describe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfDescribe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfmayorothenguyenhob69
 
Ipv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaIpv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaJigar Tarsariya
 
IPV6 Introduction
IPV6 Introduction IPV6 Introduction
IPV6 Introduction Heba_a
 
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docxWhat are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docxloisj1
 
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...IOSR Journals
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdfniran10
 

Similar a Why we need ipv6... (20)

Introduction to IPv6
Introduction to IPv6Introduction to IPv6
Introduction to IPv6
 
Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptx
 
IPv6.pptx
IPv6.pptxIPv6.pptx
IPv6.pptx
 
Ip4 vs ip6
Ip4 vs ip6Ip4 vs ip6
Ip4 vs ip6
 
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATIONIPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
 
Describe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfDescribe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdf
 
i pv6
i pv6i pv6
i pv6
 
Ipv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaIpv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar Tarsariya
 
Ipv6
Ipv6Ipv6
Ipv6
 
UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
 
IPv6
IPv6IPv6
IPv6
 
IPV6 Introduction
IPV6 Introduction IPV6 Introduction
IPV6 Introduction
 
IPV6 INTRODUCTION
IPV6 INTRODUCTIONIPV6 INTRODUCTION
IPV6 INTRODUCTION
 
IPv6
IPv6IPv6
IPv6
 
IPv4.pdf
IPv4.pdfIPv4.pdf
IPv4.pdf
 
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docxWhat are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
 
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdf
 
IPV6
IPV6 IPV6
IPV6
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Why we need ipv6...

  • 1. Introduction to IPv6 Presented by: Hafiz Syed Adnan Ahmed(2122) Zuhair ul Haq(2230)
  • 2. Agenda  Why we need IPv6  The length of IPv6  Features of IPv6  Header Comparisons  How can I write IPv4 to IPv6  How to subnet IPv6
  • 3. What is IPv6?  IPv6 is the abbreviation for Internet Protocol version 6. We are currently on Internet Protocol version 4, or IPv4, but IPv6 will be the next generation protocol for Internet communication. Not only will IPv6 provide a much larger address space, but it will also provide features such as improved routing traffic and better security.
  • 4. Why do we need IPv6?  The Internet has experienced a phenomenal increase of devices accessing the Internet. Because of this increase, IPv4 addresses are running out. The solution is for IPv6 to accommodate this increased demand by providing a much larger address space, along with improved traffic routing and better security.
  • 5. Some of the advantages of IPv6 are: Larger IP address space: IPv6 has 128-bit address space or 4 times more address bits compared to IPv4's 32-bit address space. This large address space will provide enough address space for many decades to come. In real terms, every residential or commercial customer will be able to receive more address space from TWC than the entire IPv4 address space contains – several billion IP addresses!
  • 6. Better optimization:  IPv6 takes the best of what made IPv4 successful and gets rid of minor flaws and unused features
  • 7. Why we need IPv6  INTERNET  world’s largest public data network, doubling in size every nine months  IPv4, defines a 32-bit address - 232 (4,294,967,296) IPv4 addresses available  The first problem is concerned with the eventual depletion of the IP address space.  Traditional model of classful addressing does not allow the address space to be used to its maximum potential.
  • 8. Features of IPv6  Larger Address Space  Aggregation-based address hierarchy – Efficient backbone routing  Efficient and Extensible IP datagram  Stateless Address Autoconfiguration  Security (IPsec mandatory)  Mobility
  • 9. The Length of IPv6 128-bit IPv6 Address 3FFE:085B:1F1F:0000:0000:0000:00A9:1234 8 groups of 16-bit hexadecimal numbers separated by “:” Leading zeros can be removed 3FFE:85B:1F1F::A9:1234 :: = all zeros in one or more group of 16-bit hexadecimal numbers
  • 10. Header comparison   the length of the ipv6 header in bytes On the Internet, data is transmitted in the form of network packets. IPv6 specifies a Removed (6) new packet format, designed to minimize • ID, flags, flag offset packet header processing by routers. • TOS, hlen • header checksum Changed (3) • total length => payload • protocol => next header • TTL => hop limit 20 bytes 40 bytes Added (2) • traffic class • flow label Expanded • address 32 to 128 bits
  • 11. Major Improvements of IPv6 Header  No option field: Replaced by extension header. Result in a fixed length, 40-byte IP header.  No header checksum: Result in fast processing.  No fragmentation at intermediate nodes: Result in fast IP forwarding.
  • 12. IPv6 Address with an Embedded IPv4 Address  IPv4-compatible IPv6 address is a special unicast IPv6 address used by transition mechanisms on hosts and routers to automatically create IPv4 tunnels to deliver IPv6 packets over IPv4 networks.  Address is made up of six high-order fields of 16-bit hexadecimal values, represented by X characters, followed by four low-order fields of 8-bit decimal values (IPv4 address), represented by d characters (for a total of 32 bits).
  • 13. IPv6 Address with an Embedded IPv4 Address  Two kinds of IPv6 addresses have an embedded IPv4 address: 1. IPv4-compatible IPv6 address   Used to establish an automatic tunnel to carry IPv6 packets over IPv4 networks. related to a transition mechanism of the IPv6 protocol. 2. IPv4-mapped IPv6 address    Used only on the local scope of nodes having both IPv4 and IPv6 stacks. Nodes use IPv4-mapped IPv6 addresses internally only. These addresses are never known outside the node itself and should not go on the wire as IPv6 addresses.
  • 14. IPv6 Address with an Embedded IPv4 Address IPv4-compatible IPv6 address IPv4-mapped IPv6 address
  • 15. IPv6 Addressing  128 bits (or 16 bytes) long: four times as long as its predecessor.  2128 : about 340 billion billion billion billion different addresses  Colon hexadecimal notation:  addresses are written using 32 hexadecimal digits.  digits are arranged into 8 groups of four to improve the readability.  Groups are separated by colons 2001:0718:1c01:0016:020d:56ff:fe77:52a3
  • 16. HOW TO Subnet IPv6 First some background… an IPv4. IPv6 address is comprised of eight (8) blocks of four hexadecimal digits separated with a colon “:”. Each digit can be either a number [0-9] or a letter [a-f] for a total of 16 possible combinations per digit. 164 (yes this should be written 216) gives 65,536 possible combinations per block. The double colon “::” abbreviation is commonly used in place of all zeros. This double colon can only be used once while specifying and address.
  • 18.  The next thing to point out is the major IPv6 subnet boundaries. For example:
  • 19.