SlideShare una empresa de Scribd logo
1 de 9
Chapter 7: Introduction to IPv6
Introduction:
IPv6 is an Internet Layer protocol for packet-switched internetworking and
provides end-to-end datagram transmission across multiple IP networks, closely
adhering to the design principles developed in the previous version of the
protocol, Internet Protocol Version 4 (IPv4). IPv6 was first formally described
in Internet standard document published in December 1998. In addition to
offering more addresses, IPv6 also implements features not present in IPv4. It
simplifies aspects of address assignment (stateless address autoconfiguration),
network renumbering and router announcements when changing network
connectivity providers. It simplifies processing of packets by routers by placing
the need for packet fragmentation into the end points.
IPv6 does not specify interoperability features with IPv4, but essentially creates
a parallel, independent network. Exchanging traffic between the two networks
requires translator gateways employing one of several transition mechanisms,
such as NAT64, the tunneling protocols 6to4, 6in4, Teredo.
Origination of IPv6:
Its main purpose of origination is the insufficiency of the IPv4 technology.
IPv4 included an addressing system that used numerical identifiers consisting of
32 bits. These addresses are typically displayed in quad-dotted notation as
decimal values of four octets, each in the range 0 to 255, or 8 bits per number.
Thus, IPv4 provides an addressing capability of 232 or approximately 4.3
billion addresses.
IPv6 Addressing:
Chapter 7: Introduction to IPv6
Chapter 7: Introduction to IPv6
Advantages of IPv6 over IPv4:
 Larger address space
The main advantage of IPv6 over IPv4 is its larger address space. The length of an IPv6
address is 128 bits, compared with 32 bits in IPv4.The address space therefore has 2128 or
approximately 3.4×1038 addresses.
 Multicasting
Multicasting is the transmission of a packet to multiple destinations in a single send
operation, is part of the base specification in IPv6. In IPv4 this is an optional although
commonly implemented feature.IPv6 multicast addressing shares common features and
protocols with IPv4 multicast, but also provides changes and improvements by eliminating
the need for certain protocols.
 Stateless address auto-configuration (SLAAC)
IPv6 hosts can configure themselves automatically when connected to an IPv6 network using
the Neighbor Discovery Protocol via Internet Control Message Protocol version 6 (ICMPv6)
router discovery messages.
If IPv6 stateless address auto-configuration is unsuitable for an application, a network may
use stateful configuration with the Dynamic Host Configuration Protocol version 6
(DHCPv6) or hosts may be configured manually using static methods.
 Network-layer security
Internet Protocol Security (IPsec) was originally developed for IPv6, but found widespread
deployment first in IPv4, for which it was re-engineered. IPsec was a mandatory specification
of the base IPv6 protocol suite.
 Simplified processing by routers
In IPv6, the packet header and the process of packet forwarding have been simplified.
Although IPv6 packet headers are at least twice the size of IPv4 packet headers, packet
processing by routers is generally more efficient, thereby extending the end-to-end principle
of Internet design.
 Mobility
Unlike mobile IPv4, mobile IPv6 avoids triangular routing and is therefore as efficient as
native IPv6. IPv6 routers may also allow entire subnets to move to a new router connection
point without renumbering.
 Options extensibility
The IPv6 packet header has a fixed size (40 octets). Options are implemented as additional
extension headers after the IPv6 header, which limits their size only by the size of an entire
packet. The extension header mechanism makes the protocol extensible in that it allows
future services for quality of service, security, mobility, and others to be added without
redesign of the basic protocol.
 Jumbograms
IPv4 limits packets to 65535 (216−1) octets of payload. An IPv6 node can optionally handle
packets over this limit, referred to as jumbograms, which can be as large as 4294967295
Chapter 7: Introduction to IPv6
(232−1) octets. The use of jumbograms may improve performance over high-MTU
(Maximum Tranmission Unit) links. The use of jumbograms is indicated by the Jumbo
Payload Option header.
 Privacy
Like IPv4, IPv6 supports globally unique IP addresses by which the network activity of each
device can potentially be tracked.
The design of IPv6 intended to re-emphasize the end-to-end principle of network design that
was originally conceived during the establishment of the early Internet. In this approach each
device on the network has a unique address globally reachable directly from any other
location on the Internet.
IPv4 VS IPv6 Header
An IPv4 header contains the following fields:
version The IP version number, 4.
length The length of the datagram header in 32-bit words.
type of service Contains five subfields that specify the precedence, delay, throughput,
reliability, and cost desired for a packet. (The Internet does not guarantee this request.) This
field is not widely used on the Internet.
total length The length of the datagram in bytes including the header, options, and the
appended transport protocol segment or packet.
Identification An integer that identifies the datagram.
Chapter 7: Introduction to IPv6
Flags:Controls datagram fragmentation together with the identification field. The flags
indicate whether the datagram may be fragmented, whether the datagram is fragmented, and
whether the current fragment is the final one.
fragment offset The relative position of this fragment measured from the beginning of the
original datagram in units of 8 bytes.
time to live How many routers a datagram can pass through. Each router decrements this
value by 1 until it reaches 0 when the datagram is discarded. This keeps misrouted datagrams
from remaining on the Internet forever.
Protocol The high-level protocol type.
header checksum A number that is computed to ensure the integrity of the header values.
source address The 32-bit IPv4 address of the sending host.
destination address The 32-bit IPv4 address of the receiving host.
Options A list of optional specifications for security restrictions, route recording, and source
routing. Not every datagram specifies an options field.
Padding Null bytes which are added to make the header length an integral multiple of 32
bytes as required by the header length field.
Chapter 7: Introduction to IPv6
Specifically, IPv6 omits the following fields in its header.
• header length (the length is constant)
• identification
• flags
• fragment offset (this is moved into fragmentation extension headers)
• header checksum (the upper-layer protocol or security extension header handles data
integrity)
IPv6 options improve over IPv4 by being placed in separate extension headers that are
located between the IPv6 header and the transport-layer header in a packet. Most extension
headers are not examined or processed by any router along a packet's delivery path until it
arrives at its final destination. This mechanism improves router performance for packets
containing options. In IPv4, the presence of any options requires the router to examine all
options.
Another improvement is that IPv6 extension headers, unlike IPv4 options, can be of arbitrary
length and the total amount of options that a packet carries is not limited to 40 bytes. This
feature, and the manner in which it is processed, permit IPv6 options to be used for functions
that were not practical in IPv4, such as the IPv6 Authentication and Security Encapsulation
options.
By using extension headers, instead of a protocol specifier and options fields, newly defined
extensions can be integrated more easily into IPv6.
IPV6 Addressing:
Address Representation:
Represented by breaking 128 bit into Eight 16-bit segments (Each 4 Hex character each)
Each segment is written in Hexadecimal separated by colons.
Hex digit are not case sensitive.
Rule 1:
Drop leading zeros:
2001:0050:0000:0235:0ab4:3456:456b:e560
2001:050:0:235:ab4:3456:456b:e560
Rule2:
Successive fields of zeros can be represented as “::” , But double colon appear only once in
the address.
FF01:0:0:0:0:0:0:1
FF01::1
Note : An address parser identifies the number of missing zeros by separating the two parts
and entering 0 until the 128 bits are complete. If two “::” notations are placed in the
address, there is no way to identify the size of each block of zeros.
Ipv4 vs ipv6
Chapter 7: Introduction to IPv6
Translation from Ipv4 to IPv6
Until IPv6 completely supplants IPv4, a number of transition mechanisms are needed to
enable IPv6-only hosts to reach IPv4 services and to allow isolated IPv6 hosts and networks
to reach the IPv6 Internet over the IPv4 infrastructure. People have made various proposals
for this transition period:
Dual IP stack implementation
The dual-stack protocol implementation in an operating system is a fundamental IPv4-to-
IPv6 transition technology. It implements IPv4 and IPv6 protocol stacks either independently
or in a hybrid form. The hybrid form is commonly implemented in modern operating systems
that implement IPv6. Dual-stack hosts are described in RFC 4213.
Modern hybrid dual-stack implementations of IPv4 and IPv6 allow programmers to write
networking code that works transparently on IPv4 or IPv6. The software may use hybrid
sockets designed to accept both IPv4 and IPv6 packets. When used in IPv4 communications,
hybrid stacks use an IPv6 application programming interface and represent IPv4 addresses in
a special address format, the IPv4-mapped IPv6 address.
Chapter 7: Introduction to IPv6
IPv4-mapped IPv6 addresses
Hybrid dual-stack IPv6/IPv4 implementations recognize a special class of addresses, the
IPv4-mapped IPv6 addresses. In these addresses, the first 80 bits are zero, the next 16 bits are
one, and the remaining 32 bits are the IPv4 address. You may see these addresses with the
first 96 bits written in the standard IPv6 format, and the remaining 32 bits written in the
customary dot-decimal notation of IPv4. For example,ffff:192.0.2.128 represents the IPv4
address 192.0.2.128. A deprecated format for IPv4-compatible IPv6 addresses was :192.0.2.128.
Because of the significant internal differences between IPv4 and IPv6, some of the lower-
level functionality available to programmers in the IPv6 stack does not work identically with
IPv4-mapped addresses. Some common IPv6 stacks do not implement the IPv4-mapped
address feature, either because the IPv6 and IPv4 stacks are separate implementations (e.g.,
Microsoft Windows 2000, XP, and Server 2003), or because of security concerns
(OpenBSD). On these operating systems, a program must open a separate socket for each IP
protocol it uses. On some systems, e.g., the Linux kernel, NetBSD, and FreeBSD, this feature
is controlled by the socket option IPV6_V6ONLY, as specified in RFC 3493.
Tunneling
In order to reach the IPv6 Internet, an isolated host or network must use the existing IPv4
infrastructure to carry IPv6 packets. This is done using a technique known as tunneling,
which encapsulates IPv6 packets within IPv4, in effect using IPv4 as a link layer for IPv6. IP
protocol 41 indicates IPv4 packets which encapsulate IPv6 datagrams. Some routers or
network address translation devices may block protocol 41. To pass through these devices,
you might use UDP packets to encapsulate IPv6 datagrams. Other encapsulation schemes,
such as AYIYA or Generic Routing Encapsulation, are also popular. Conversely, on IPv6-
only internet links, when access to IPv4 network facilities is needed, tunneling of IPv4 over
IPv6 protocol occurs, using the IPv6 as a link layer for IPv4.
Automatic tunneling
Automatic tunneling refers to a technique where the routing infrastructure automatically
determines the tunnel endpoints. Some automatic tunneling techniques are below. 6to4 is
recommended by RFC 3056. It uses protocol 41 encapsulation. Tunnel endpoints are
determined by using a well-known IPv4 any cast address on the remote side, and embedding
IPv4 address information within IPv6 addresses on the local side. 6to4 is widely deployed
today.
Teredo is an automatic tunneling technique that uses UDP encapsulation and can allegedly
cross multiple NAT boxes. IPv6, including 6to4 and Teredo tunneling, are enabled by default
in Windows Vista and Windows 7. Most Unix systems implement only 6to4, but Teredo can
be provided by third-party software such as Miredo.
ISATAP treats the IPv4 network as a virtual IPv6 local link, with mappings from each IPv4
address to a link-local IPv6 address. Unlike 6to4 and Teredo, which are inter-site tunnelling
mechanisms, ISATAP is an intra-site mechanism, meaning that it is designed to provide IPv6
connectivity between nodes within a single organisation.
Configured and automated tunneling (6in4)
In configured tunneling, the tunnel endpoints are explicitly configured, either by an
administrator manually or the operating system's configuration mechanisms, or by an
automatic service known as a tunnel broker; this is also referred to as automated tunneling.
Chapter 7: Introduction to IPv6
Configured tunneling is usually more deterministic and easier to debug than automatic
tunneling, and is therefore recommended for large, well-administered networks. Automated
tunneling provides a compromise between the ease of use of automatic tunneling and the
deterministic behaviour of configured tunneling.
Raw encapsulation of IPv6 packets using IPv4 protocol number 41 is recommended for
configured tunneling; this is sometimes known as 6in4 tunneling. As with automatic
tunneling, encapsulation within UDP may be used in order to cross NAT boxes and firewalls.
Proxying and translation for IPv6-only hosts
After the regional Internet registries have exhausted their pools of available IPv4 addresses, it
is likely that hosts newly added to the Internet might only have IPv6 connectivity. For these
clients to have backward-compatible connectivity to existing IPv4-only resources, suitable
IPv6 transition mechanisms must be deployed. One form of address translation is the use of a
dual-stack application-layer proxy server, for example a web proxy.
NAT-like techniques for application-agnostic translation at the lower layers in routers and
gateways have been proposed. The NAT-PT standard was dropped due to a number of
criticisms, however more recently the continued low adoption of IPv6 has prompted a new
standardization effort under the name NAT64.
Application transition
RFC 4038, Application Aspects of IPv6 Transition, is an informational RFC that covers the
topic of IPv4 to IPv6 application transition mechanisms.

Más contenido relacionado

La actualidad más candente

IPv6 header
IPv6 headerIPv6 header
IPv6 headerHeba_a
 
IPv6: Internet Protocol version 6
IPv6: Internet Protocol version 6IPv6: Internet Protocol version 6
IPv6: Internet Protocol version 6Ankita Mahajan
 
Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Karunakant Rai
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6mithilak
 
Introduction to IPv6-UoN
Introduction to IPv6-UoNIntroduction to IPv6-UoN
Introduction to IPv6-UoNMwendwa Kivuva
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdfniran10
 
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...IOSR Journals
 
Performance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition TechniquesPerformance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition TechniquesAndy Juan Sarango Veliz
 
Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...Adii Shah
 
IPV6 Introduction
IPV6 Introduction IPV6 Introduction
IPV6 Introduction Heba_a
 
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...Iftikhar Wazir
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
 
Ipv6 introduction - MUM 2011 presentation
Ipv6 introduction - MUM 2011 presentationIpv6 introduction - MUM 2011 presentation
Ipv6 introduction - MUM 2011 presentationIDEA4PRO
 
IPv6 next generation protocol
IPv6 next generation protocolIPv6 next generation protocol
IPv6 next generation protocolRupshanker Mishra
 
IPv6 - Neighbour Discovery
IPv6 - Neighbour DiscoveryIPv6 - Neighbour Discovery
IPv6 - Neighbour DiscoveryHeba_a
 
Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6Dharmesh Patel
 

La actualidad más candente (20)

IPv6 header
IPv6 headerIPv6 header
IPv6 header
 
IPv6: Internet Protocol version 6
IPv6: Internet Protocol version 6IPv6: Internet Protocol version 6
IPv6: Internet Protocol version 6
 
Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Introduction to ipv6 v1.3
Introduction to ipv6 v1.3
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
 
IPv6
IPv6IPv6
IPv6
 
Introduction to IPv6-UoN
Introduction to IPv6-UoNIntroduction to IPv6-UoN
Introduction to IPv6-UoN
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdf
 
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
 
Performance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition TechniquesPerformance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition Techniques
 
Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...
 
IPV6 Introduction
IPV6 Introduction IPV6 Introduction
IPV6 Introduction
 
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
 
Ipv6 introduction - MUM 2011 presentation
Ipv6 introduction - MUM 2011 presentationIpv6 introduction - MUM 2011 presentation
Ipv6 introduction - MUM 2011 presentation
 
IPv4 vs IPv6
IPv4 vs IPv6IPv4 vs IPv6
IPv4 vs IPv6
 
IPv6 next generation protocol
IPv6 next generation protocolIPv6 next generation protocol
IPv6 next generation protocol
 
IPv6 - Neighbour Discovery
IPv6 - Neighbour DiscoveryIPv6 - Neighbour Discovery
IPv6 - Neighbour Discovery
 
IPv6
IPv6IPv6
IPv6
 
Ipv6 routing
Ipv6 routingIpv6 routing
Ipv6 routing
 
Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6
 

Similar a i pv6

A Survey On Next Generation Internet Protocol IPv6
A Survey On Next Generation Internet Protocol  IPv6A Survey On Next Generation Internet Protocol  IPv6
A Survey On Next Generation Internet Protocol IPv6Carrie Romero
 
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATIONIPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATIONgopi5692
 
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002suvobgd
 
Paper id 25201418
Paper id 25201418Paper id 25201418
Paper id 25201418IJRAT
 
DCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdfDCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdfBilal Munir Mughal
 
Review of IPv4 and IPv6 and various implementation methods of IPv6
Review of IPv4 and IPv6 and various implementation methods of IPv6Review of IPv4 and IPv6 and various implementation methods of IPv6
Review of IPv4 and IPv6 and various implementation methods of IPv6IRJET Journal
 
Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6Netwax Lab
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptxJoshuaAnnan5
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...IOSR Journals
 
Features & benifits of ipv6 firewall
Features & benifits of ipv6 firewallFeatures & benifits of ipv6 firewall
Features & benifits of ipv6 firewallAnthony Daniel
 

Similar a i pv6 (20)

Ipv6
Ipv6Ipv6
Ipv6
 
A Survey On Next Generation Internet Protocol IPv6
A Survey On Next Generation Internet Protocol  IPv6A Survey On Next Generation Internet Protocol  IPv6
A Survey On Next Generation Internet Protocol IPv6
 
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATIONIPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
 
Paper id 25201418
Paper id 25201418Paper id 25201418
Paper id 25201418
 
DCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdfDCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdf
 
14 564
14 56414 564
14 564
 
Review of IPv4 and IPv6 and various implementation methods of IPv6
Review of IPv4 and IPv6 and various implementation methods of IPv6Review of IPv4 and IPv6 and various implementation methods of IPv6
Review of IPv4 and IPv6 and various implementation methods of IPv6
 
Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptx
 
IPV6 INTRODUCTION
IPV6 INTRODUCTIONIPV6 INTRODUCTION
IPV6 INTRODUCTION
 
IPv4.pdf
IPv4.pdfIPv4.pdf
IPv4.pdf
 
I pv4 and ipv6
I pv4 and ipv6I pv4 and ipv6
I pv4 and ipv6
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
M017147275
M017147275M017147275
M017147275
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
 
Features & benifits of ipv6 firewall
Features & benifits of ipv6 firewallFeatures & benifits of ipv6 firewall
Features & benifits of ipv6 firewall
 

Más de BishalWosti1

data link layer to print
data link layer to printdata link layer to print
data link layer to printBishalWosti1
 
introduction of network
introduction of networkintroduction of network
introduction of networkBishalWosti1
 
error detection correction
error detection correctionerror detection correction
error detection correctionBishalWosti1
 

Más de BishalWosti1 (7)

application layer
application layerapplication layer
application layer
 
transport layer
transport layertransport layer
transport layer
 
network layer
network layernetwork layer
network layer
 
data link layer to print
data link layer to printdata link layer to print
data link layer to print
 
introduction of network
introduction of networkintroduction of network
introduction of network
 
error detection correction
error detection correctionerror detection correction
error detection correction
 
network security
network securitynetwork security
network security
 

Último

An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptxNikhil Raut
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 

Último (20)

🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 

i pv6

  • 1. Chapter 7: Introduction to IPv6 Introduction: IPv6 is an Internet Layer protocol for packet-switched internetworking and provides end-to-end datagram transmission across multiple IP networks, closely adhering to the design principles developed in the previous version of the protocol, Internet Protocol Version 4 (IPv4). IPv6 was first formally described in Internet standard document published in December 1998. In addition to offering more addresses, IPv6 also implements features not present in IPv4. It simplifies aspects of address assignment (stateless address autoconfiguration), network renumbering and router announcements when changing network connectivity providers. It simplifies processing of packets by routers by placing the need for packet fragmentation into the end points. IPv6 does not specify interoperability features with IPv4, but essentially creates a parallel, independent network. Exchanging traffic between the two networks requires translator gateways employing one of several transition mechanisms, such as NAT64, the tunneling protocols 6to4, 6in4, Teredo. Origination of IPv6: Its main purpose of origination is the insufficiency of the IPv4 technology. IPv4 included an addressing system that used numerical identifiers consisting of 32 bits. These addresses are typically displayed in quad-dotted notation as decimal values of four octets, each in the range 0 to 255, or 8 bits per number. Thus, IPv4 provides an addressing capability of 232 or approximately 4.3 billion addresses. IPv6 Addressing:
  • 3. Chapter 7: Introduction to IPv6 Advantages of IPv6 over IPv4:  Larger address space The main advantage of IPv6 over IPv4 is its larger address space. The length of an IPv6 address is 128 bits, compared with 32 bits in IPv4.The address space therefore has 2128 or approximately 3.4×1038 addresses.  Multicasting Multicasting is the transmission of a packet to multiple destinations in a single send operation, is part of the base specification in IPv6. In IPv4 this is an optional although commonly implemented feature.IPv6 multicast addressing shares common features and protocols with IPv4 multicast, but also provides changes and improvements by eliminating the need for certain protocols.  Stateless address auto-configuration (SLAAC) IPv6 hosts can configure themselves automatically when connected to an IPv6 network using the Neighbor Discovery Protocol via Internet Control Message Protocol version 6 (ICMPv6) router discovery messages. If IPv6 stateless address auto-configuration is unsuitable for an application, a network may use stateful configuration with the Dynamic Host Configuration Protocol version 6 (DHCPv6) or hosts may be configured manually using static methods.  Network-layer security Internet Protocol Security (IPsec) was originally developed for IPv6, but found widespread deployment first in IPv4, for which it was re-engineered. IPsec was a mandatory specification of the base IPv6 protocol suite.  Simplified processing by routers In IPv6, the packet header and the process of packet forwarding have been simplified. Although IPv6 packet headers are at least twice the size of IPv4 packet headers, packet processing by routers is generally more efficient, thereby extending the end-to-end principle of Internet design.  Mobility Unlike mobile IPv4, mobile IPv6 avoids triangular routing and is therefore as efficient as native IPv6. IPv6 routers may also allow entire subnets to move to a new router connection point without renumbering.  Options extensibility The IPv6 packet header has a fixed size (40 octets). Options are implemented as additional extension headers after the IPv6 header, which limits their size only by the size of an entire packet. The extension header mechanism makes the protocol extensible in that it allows future services for quality of service, security, mobility, and others to be added without redesign of the basic protocol.  Jumbograms IPv4 limits packets to 65535 (216−1) octets of payload. An IPv6 node can optionally handle packets over this limit, referred to as jumbograms, which can be as large as 4294967295
  • 4. Chapter 7: Introduction to IPv6 (232−1) octets. The use of jumbograms may improve performance over high-MTU (Maximum Tranmission Unit) links. The use of jumbograms is indicated by the Jumbo Payload Option header.  Privacy Like IPv4, IPv6 supports globally unique IP addresses by which the network activity of each device can potentially be tracked. The design of IPv6 intended to re-emphasize the end-to-end principle of network design that was originally conceived during the establishment of the early Internet. In this approach each device on the network has a unique address globally reachable directly from any other location on the Internet. IPv4 VS IPv6 Header An IPv4 header contains the following fields: version The IP version number, 4. length The length of the datagram header in 32-bit words. type of service Contains five subfields that specify the precedence, delay, throughput, reliability, and cost desired for a packet. (The Internet does not guarantee this request.) This field is not widely used on the Internet. total length The length of the datagram in bytes including the header, options, and the appended transport protocol segment or packet. Identification An integer that identifies the datagram.
  • 5. Chapter 7: Introduction to IPv6 Flags:Controls datagram fragmentation together with the identification field. The flags indicate whether the datagram may be fragmented, whether the datagram is fragmented, and whether the current fragment is the final one. fragment offset The relative position of this fragment measured from the beginning of the original datagram in units of 8 bytes. time to live How many routers a datagram can pass through. Each router decrements this value by 1 until it reaches 0 when the datagram is discarded. This keeps misrouted datagrams from remaining on the Internet forever. Protocol The high-level protocol type. header checksum A number that is computed to ensure the integrity of the header values. source address The 32-bit IPv4 address of the sending host. destination address The 32-bit IPv4 address of the receiving host. Options A list of optional specifications for security restrictions, route recording, and source routing. Not every datagram specifies an options field. Padding Null bytes which are added to make the header length an integral multiple of 32 bytes as required by the header length field.
  • 6. Chapter 7: Introduction to IPv6 Specifically, IPv6 omits the following fields in its header. • header length (the length is constant) • identification • flags • fragment offset (this is moved into fragmentation extension headers) • header checksum (the upper-layer protocol or security extension header handles data integrity) IPv6 options improve over IPv4 by being placed in separate extension headers that are located between the IPv6 header and the transport-layer header in a packet. Most extension headers are not examined or processed by any router along a packet's delivery path until it arrives at its final destination. This mechanism improves router performance for packets containing options. In IPv4, the presence of any options requires the router to examine all options. Another improvement is that IPv6 extension headers, unlike IPv4 options, can be of arbitrary length and the total amount of options that a packet carries is not limited to 40 bytes. This feature, and the manner in which it is processed, permit IPv6 options to be used for functions that were not practical in IPv4, such as the IPv6 Authentication and Security Encapsulation options. By using extension headers, instead of a protocol specifier and options fields, newly defined extensions can be integrated more easily into IPv6. IPV6 Addressing: Address Representation: Represented by breaking 128 bit into Eight 16-bit segments (Each 4 Hex character each) Each segment is written in Hexadecimal separated by colons. Hex digit are not case sensitive. Rule 1: Drop leading zeros: 2001:0050:0000:0235:0ab4:3456:456b:e560 2001:050:0:235:ab4:3456:456b:e560 Rule2: Successive fields of zeros can be represented as “::” , But double colon appear only once in the address. FF01:0:0:0:0:0:0:1 FF01::1 Note : An address parser identifies the number of missing zeros by separating the two parts and entering 0 until the 128 bits are complete. If two “::” notations are placed in the address, there is no way to identify the size of each block of zeros. Ipv4 vs ipv6
  • 7. Chapter 7: Introduction to IPv6 Translation from Ipv4 to IPv6 Until IPv6 completely supplants IPv4, a number of transition mechanisms are needed to enable IPv6-only hosts to reach IPv4 services and to allow isolated IPv6 hosts and networks to reach the IPv6 Internet over the IPv4 infrastructure. People have made various proposals for this transition period: Dual IP stack implementation The dual-stack protocol implementation in an operating system is a fundamental IPv4-to- IPv6 transition technology. It implements IPv4 and IPv6 protocol stacks either independently or in a hybrid form. The hybrid form is commonly implemented in modern operating systems that implement IPv6. Dual-stack hosts are described in RFC 4213. Modern hybrid dual-stack implementations of IPv4 and IPv6 allow programmers to write networking code that works transparently on IPv4 or IPv6. The software may use hybrid sockets designed to accept both IPv4 and IPv6 packets. When used in IPv4 communications, hybrid stacks use an IPv6 application programming interface and represent IPv4 addresses in a special address format, the IPv4-mapped IPv6 address.
  • 8. Chapter 7: Introduction to IPv6 IPv4-mapped IPv6 addresses Hybrid dual-stack IPv6/IPv4 implementations recognize a special class of addresses, the IPv4-mapped IPv6 addresses. In these addresses, the first 80 bits are zero, the next 16 bits are one, and the remaining 32 bits are the IPv4 address. You may see these addresses with the first 96 bits written in the standard IPv6 format, and the remaining 32 bits written in the customary dot-decimal notation of IPv4. For example,ffff:192.0.2.128 represents the IPv4 address 192.0.2.128. A deprecated format for IPv4-compatible IPv6 addresses was :192.0.2.128. Because of the significant internal differences between IPv4 and IPv6, some of the lower- level functionality available to programmers in the IPv6 stack does not work identically with IPv4-mapped addresses. Some common IPv6 stacks do not implement the IPv4-mapped address feature, either because the IPv6 and IPv4 stacks are separate implementations (e.g., Microsoft Windows 2000, XP, and Server 2003), or because of security concerns (OpenBSD). On these operating systems, a program must open a separate socket for each IP protocol it uses. On some systems, e.g., the Linux kernel, NetBSD, and FreeBSD, this feature is controlled by the socket option IPV6_V6ONLY, as specified in RFC 3493. Tunneling In order to reach the IPv6 Internet, an isolated host or network must use the existing IPv4 infrastructure to carry IPv6 packets. This is done using a technique known as tunneling, which encapsulates IPv6 packets within IPv4, in effect using IPv4 as a link layer for IPv6. IP protocol 41 indicates IPv4 packets which encapsulate IPv6 datagrams. Some routers or network address translation devices may block protocol 41. To pass through these devices, you might use UDP packets to encapsulate IPv6 datagrams. Other encapsulation schemes, such as AYIYA or Generic Routing Encapsulation, are also popular. Conversely, on IPv6- only internet links, when access to IPv4 network facilities is needed, tunneling of IPv4 over IPv6 protocol occurs, using the IPv6 as a link layer for IPv4. Automatic tunneling Automatic tunneling refers to a technique where the routing infrastructure automatically determines the tunnel endpoints. Some automatic tunneling techniques are below. 6to4 is recommended by RFC 3056. It uses protocol 41 encapsulation. Tunnel endpoints are determined by using a well-known IPv4 any cast address on the remote side, and embedding IPv4 address information within IPv6 addresses on the local side. 6to4 is widely deployed today. Teredo is an automatic tunneling technique that uses UDP encapsulation and can allegedly cross multiple NAT boxes. IPv6, including 6to4 and Teredo tunneling, are enabled by default in Windows Vista and Windows 7. Most Unix systems implement only 6to4, but Teredo can be provided by third-party software such as Miredo. ISATAP treats the IPv4 network as a virtual IPv6 local link, with mappings from each IPv4 address to a link-local IPv6 address. Unlike 6to4 and Teredo, which are inter-site tunnelling mechanisms, ISATAP is an intra-site mechanism, meaning that it is designed to provide IPv6 connectivity between nodes within a single organisation. Configured and automated tunneling (6in4) In configured tunneling, the tunnel endpoints are explicitly configured, either by an administrator manually or the operating system's configuration mechanisms, or by an automatic service known as a tunnel broker; this is also referred to as automated tunneling.
  • 9. Chapter 7: Introduction to IPv6 Configured tunneling is usually more deterministic and easier to debug than automatic tunneling, and is therefore recommended for large, well-administered networks. Automated tunneling provides a compromise between the ease of use of automatic tunneling and the deterministic behaviour of configured tunneling. Raw encapsulation of IPv6 packets using IPv4 protocol number 41 is recommended for configured tunneling; this is sometimes known as 6in4 tunneling. As with automatic tunneling, encapsulation within UDP may be used in order to cross NAT boxes and firewalls. Proxying and translation for IPv6-only hosts After the regional Internet registries have exhausted their pools of available IPv4 addresses, it is likely that hosts newly added to the Internet might only have IPv6 connectivity. For these clients to have backward-compatible connectivity to existing IPv4-only resources, suitable IPv6 transition mechanisms must be deployed. One form of address translation is the use of a dual-stack application-layer proxy server, for example a web proxy. NAT-like techniques for application-agnostic translation at the lower layers in routers and gateways have been proposed. The NAT-PT standard was dropped due to a number of criticisms, however more recently the continued low adoption of IPv6 has prompted a new standardization effort under the name NAT64. Application transition RFC 4038, Application Aspects of IPv6 Transition, is an informational RFC that covers the topic of IPv4 to IPv6 application transition mechanisms.