SlideShare una empresa de Scribd logo
1 de 21
Introduction to IPv6

Presented by:
Hafiz Syed Adnan Ahmed(2122)
Zuhair ul Haq(2230)
Agenda
 Why we need IPv6
 The length of IPv6
 Features of IPv6
 Header Comparisons
 How can I write IPv4 to IPv6
 How to subnet IPv6
What is IPv6?
 IPv6 is the abbreviation for Internet Protocol version 6. We
are currently on Internet Protocol version 4, or IPv4, but IPv6
will be the next generation protocol for Internet
communication. Not only will IPv6 provide a much larger
address space, but it will also provide features such as
improved routing traffic and better security.
Why do we need IPv6?
 The Internet has experienced a phenomenal increase of
devices accessing the Internet. Because of this increase,
IPv4 addresses are running out. The solution is for IPv6 to
accommodate this increased demand by providing a much
larger address space, along with improved traffic routing and
better security.
Some of the advantages of
IPv6 are:
Larger IP address space: IPv6 has 128-bit address space or 4
times more address bits compared to IPv4's 32-bit address space.
This large address space will provide enough address space for
many decades to come. In real terms, every residential or
commercial customer will be able to receive more address space
from TWC than the entire IPv4 address space contains – several
billion IP addresses!
Better optimization:
 IPv6 takes the best of what made IPv4 successful and gets rid of
minor flaws and unused features
Why we need IPv6
 INTERNET  world’s largest public data network, doubling in size
every nine months
 IPv4, defines a 32-bit address - 232 (4,294,967,296) IPv4 addresses
available
 The first problem is concerned with the eventual depletion of the IP
address space.
 Traditional model of classful addressing does not allow the address space
to be used to its maximum potential.
Features of IPv6
 Larger Address Space
 Aggregation-based address hierarchy
– Efficient backbone routing
 Efficient and Extensible IP datagram
 Stateless Address Autoconfiguration
 Security (IPsec mandatory)
 Mobility
The Length of IPv6
128-bit IPv6 Address

3FFE:085B:1F1F:0000:0000:0000:00A9:1234

8 groups of 16-bit hexadecimal numbers separated by “:”
Leading zeros can be
removed
3FFE:85B:1F1F::A9:1234
:: = all zeros in one or more group of 16-bit hexadecimal numbers
Header comparison



the length of the ipv6 header in bytes
On the Internet, data is transmitted in the
form of network packets. IPv6 specifies a Removed (6)
new packet format, designed to minimize • ID, flags, flag offset
packet header processing by routers.
• TOS, hlen
• header checksum

Changed (3)
• total length => payload
• protocol => next header
• TTL => hop limit
20
bytes

40
bytes

Added (2)
• traffic class
• flow label

Expanded
• address 32 to 128 bits
Major Improvements of
IPv6 Header
 No option field: Replaced by extension header. Result
in a fixed length, 40-byte IP header.
 No header checksum: Result in fast processing.
 No fragmentation at intermediate nodes: Result in fast
IP forwarding.
IPv6 Address with an Embedded IPv4
Address
 IPv4-compatible IPv6 address is a special unicast IPv6 address used
by transition mechanisms on hosts and routers to automatically
create IPv4 tunnels to deliver IPv6 packets over IPv4 networks.
 Address is made up of six high-order fields of 16-bit hexadecimal
values, represented by X characters, followed by four low-order fields
of 8-bit decimal values (IPv4 address), represented by d characters
(for a total of 32 bits).
IPv6 Address with an Embedded IPv4
Address


Two kinds of IPv6 addresses have an embedded IPv4
address:

1. IPv4-compatible IPv6 address



Used to establish an automatic tunnel to carry IPv6 packets
over IPv4 networks.
related to a transition mechanism of the IPv6 protocol.

2. IPv4-mapped IPv6 address




Used only on the local scope of nodes having both IPv4 and
IPv6 stacks.
Nodes use IPv4-mapped IPv6 addresses internally only.
These addresses are never known outside the node itself and
should not go on the wire as IPv6 addresses.
IPv6 Address with an Embedded IPv4
Address
IPv4-compatible IPv6 address

IPv4-mapped IPv6 address
IPv6 Addressing
 128 bits (or 16 bytes) long: four times as long as its
predecessor.
 2128 : about 340 billion billion billion billion different
addresses
 Colon hexadecimal notation:
 addresses are written using 32 hexadecimal digits.
 digits are arranged into 8 groups of four to improve the readability.
 Groups are separated by colons

2001:0718:1c01:0016:020d:56ff:fe77:52a3
HOW TO Subnet IPv6
First some background… an IPv4. IPv6
address is comprised of eight (8) blocks of four
hexadecimal digits separated with a colon “:”.
Each digit can be either a number [0-9] or a
letter [a-f] for a total of 16 possible
combinations per digit. 164 (yes this should be
written 216) gives 65,536 possible combinations
per block. The double colon “::” abbreviation is
commonly used in place of all zeros. This
double colon can only be used once while
specifying and address.
IPv6 Prefixes
 The next thing to point out is
the major IPv6 subnet
boundaries. For example:
Questions?
Why we need ipv6...

Más contenido relacionado

La actualidad más candente

IPV6 Addressing
IPV6 Addressing IPV6 Addressing
IPV6 Addressing Heba_a
 
Ipv6 the next generation protocol
Ipv6 the next generation protocolIpv6 the next generation protocol
Ipv6 the next generation protocolPRADEEP Cheekatla
 
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.pptForouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.pptJayaprasanna4
 
Internet Protocol Version 6
Internet Protocol Version 6Internet Protocol Version 6
Internet Protocol Version 6sandeepjain
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
Network address translation
Network address translationNetwork address translation
Network address translationVarsha Honde
 
Classless inter domain routing
Classless inter domain routingClassless inter domain routing
Classless inter domain routingVikash Gangwar
 
Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6Dharmesh Patel
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP AddressingKushal Sheth
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6Adeel Rasheed
 

La actualidad más candente (20)

IPV6 Addressing
IPV6 Addressing IPV6 Addressing
IPV6 Addressing
 
Ipv6 the next generation protocol
Ipv6 the next generation protocolIpv6 the next generation protocol
Ipv6 the next generation protocol
 
Subnetting
SubnettingSubnetting
Subnetting
 
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.pptForouzan-ch19-Network-Layer-Logical-Addressing.ppt
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
 
Internet Protocol Version 6
Internet Protocol Version 6Internet Protocol Version 6
Internet Protocol Version 6
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
IPV6 INTRODUCTION
IPV6 INTRODUCTIONIPV6 INTRODUCTION
IPV6 INTRODUCTION
 
Ipv6
Ipv6Ipv6
Ipv6
 
Classless inter domain routing
Classless inter domain routingClassless inter domain routing
Classless inter domain routing
 
ipv6 ppt
ipv6 pptipv6 ppt
ipv6 ppt
 
MAC & IP addresses
MAC & IP addressesMAC & IP addresses
MAC & IP addresses
 
Ip address
Ip address Ip address
Ip address
 
Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6
 
Introduction to IPv6
Introduction to IPv6Introduction to IPv6
Introduction to IPv6
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 

Similar a Why we need ipv6...

Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6Netwax Lab
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptxJoshuaAnnan5
 
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATIONIPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATIONgopi5692
 
Describe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfDescribe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfmayorothenguyenhob69
 
Ipv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaIpv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaJigar Tarsariya
 
IPV6 Introduction
IPV6 Introduction IPV6 Introduction
IPV6 Introduction Heba_a
 
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docxWhat are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docxloisj1
 
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...IOSR Journals
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdfniran10
 
IPV6 , ipv6 ,TCP/IP, TCP ,IP
IPV6 , ipv6 ,TCP/IP, TCP ,IPIPV6 , ipv6 ,TCP/IP, TCP ,IP
IPV6 , ipv6 ,TCP/IP, TCP ,IPRamkrishna bhagat
 

Similar a Why we need ipv6... (20)

Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptx
 
IPv6.pptx
IPv6.pptxIPv6.pptx
IPv6.pptx
 
Ip4 vs ip6
Ip4 vs ip6Ip4 vs ip6
Ip4 vs ip6
 
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATIONIPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
 
Describe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfDescribe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdf
 
i pv6
i pv6i pv6
i pv6
 
Ipv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaIpv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar Tarsariya
 
Ipv6
Ipv6Ipv6
Ipv6
 
UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
 
IPv6
IPv6IPv6
IPv6
 
IPV6 Introduction
IPV6 Introduction IPV6 Introduction
IPV6 Introduction
 
IPv6
IPv6IPv6
IPv6
 
IPv4.pdf
IPv4.pdfIPv4.pdf
IPv4.pdf
 
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docxWhat are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
 
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdf
 
IPV6
IPV6 IPV6
IPV6
 
Computer networks
Computer networksComputer networks
Computer networks
 
IPV6 , ipv6 ,TCP/IP, TCP ,IP
IPV6 , ipv6 ,TCP/IP, TCP ,IPIPV6 , ipv6 ,TCP/IP, TCP ,IP
IPV6 , ipv6 ,TCP/IP, TCP ,IP
 

Último

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Último (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Why we need ipv6...

  • 1. Introduction to IPv6 Presented by: Hafiz Syed Adnan Ahmed(2122) Zuhair ul Haq(2230)
  • 2. Agenda  Why we need IPv6  The length of IPv6  Features of IPv6  Header Comparisons  How can I write IPv4 to IPv6  How to subnet IPv6
  • 3. What is IPv6?  IPv6 is the abbreviation for Internet Protocol version 6. We are currently on Internet Protocol version 4, or IPv4, but IPv6 will be the next generation protocol for Internet communication. Not only will IPv6 provide a much larger address space, but it will also provide features such as improved routing traffic and better security.
  • 4. Why do we need IPv6?  The Internet has experienced a phenomenal increase of devices accessing the Internet. Because of this increase, IPv4 addresses are running out. The solution is for IPv6 to accommodate this increased demand by providing a much larger address space, along with improved traffic routing and better security.
  • 5. Some of the advantages of IPv6 are: Larger IP address space: IPv6 has 128-bit address space or 4 times more address bits compared to IPv4's 32-bit address space. This large address space will provide enough address space for many decades to come. In real terms, every residential or commercial customer will be able to receive more address space from TWC than the entire IPv4 address space contains – several billion IP addresses!
  • 6. Better optimization:  IPv6 takes the best of what made IPv4 successful and gets rid of minor flaws and unused features
  • 7. Why we need IPv6  INTERNET  world’s largest public data network, doubling in size every nine months  IPv4, defines a 32-bit address - 232 (4,294,967,296) IPv4 addresses available  The first problem is concerned with the eventual depletion of the IP address space.  Traditional model of classful addressing does not allow the address space to be used to its maximum potential.
  • 8. Features of IPv6  Larger Address Space  Aggregation-based address hierarchy – Efficient backbone routing  Efficient and Extensible IP datagram  Stateless Address Autoconfiguration  Security (IPsec mandatory)  Mobility
  • 9. The Length of IPv6 128-bit IPv6 Address 3FFE:085B:1F1F:0000:0000:0000:00A9:1234 8 groups of 16-bit hexadecimal numbers separated by “:” Leading zeros can be removed 3FFE:85B:1F1F::A9:1234 :: = all zeros in one or more group of 16-bit hexadecimal numbers
  • 10. Header comparison   the length of the ipv6 header in bytes On the Internet, data is transmitted in the form of network packets. IPv6 specifies a Removed (6) new packet format, designed to minimize • ID, flags, flag offset packet header processing by routers. • TOS, hlen • header checksum Changed (3) • total length => payload • protocol => next header • TTL => hop limit 20 bytes 40 bytes Added (2) • traffic class • flow label Expanded • address 32 to 128 bits
  • 11. Major Improvements of IPv6 Header  No option field: Replaced by extension header. Result in a fixed length, 40-byte IP header.  No header checksum: Result in fast processing.  No fragmentation at intermediate nodes: Result in fast IP forwarding.
  • 12. IPv6 Address with an Embedded IPv4 Address  IPv4-compatible IPv6 address is a special unicast IPv6 address used by transition mechanisms on hosts and routers to automatically create IPv4 tunnels to deliver IPv6 packets over IPv4 networks.  Address is made up of six high-order fields of 16-bit hexadecimal values, represented by X characters, followed by four low-order fields of 8-bit decimal values (IPv4 address), represented by d characters (for a total of 32 bits).
  • 13. IPv6 Address with an Embedded IPv4 Address  Two kinds of IPv6 addresses have an embedded IPv4 address: 1. IPv4-compatible IPv6 address   Used to establish an automatic tunnel to carry IPv6 packets over IPv4 networks. related to a transition mechanism of the IPv6 protocol. 2. IPv4-mapped IPv6 address    Used only on the local scope of nodes having both IPv4 and IPv6 stacks. Nodes use IPv4-mapped IPv6 addresses internally only. These addresses are never known outside the node itself and should not go on the wire as IPv6 addresses.
  • 14. IPv6 Address with an Embedded IPv4 Address IPv4-compatible IPv6 address IPv4-mapped IPv6 address
  • 15. IPv6 Addressing  128 bits (or 16 bytes) long: four times as long as its predecessor.  2128 : about 340 billion billion billion billion different addresses  Colon hexadecimal notation:  addresses are written using 32 hexadecimal digits.  digits are arranged into 8 groups of four to improve the readability.  Groups are separated by colons 2001:0718:1c01:0016:020d:56ff:fe77:52a3
  • 16. HOW TO Subnet IPv6 First some background… an IPv4. IPv6 address is comprised of eight (8) blocks of four hexadecimal digits separated with a colon “:”. Each digit can be either a number [0-9] or a letter [a-f] for a total of 16 possible combinations per digit. 164 (yes this should be written 216) gives 65,536 possible combinations per block. The double colon “::” abbreviation is commonly used in place of all zeros. This double colon can only be used once while specifying and address.
  • 18.  The next thing to point out is the major IPv6 subnet boundaries. For example:
  • 19.