SlideShare a Scribd company logo
1 of 48
 Problems with IPv4
 Basic IPv6 Protocol
 IPv6 features
 Auto-configuration, QoS, Security, Mobility
 Transition Plans
Transports a datagram from source host to
destination, possibly via several intermediate
nodes (“routers”)
Service is:
 Unreliable: Losses, duplicates, out-of-order
delivery
 Best effort: Packets not discarded
capriciously, delivery failure not necessarily
reported
 Connectionless: Each packet is treated
independently
VERS HLEN TOS TOTAL LENGTH
IDENTIFICATION FLAG FRAGMENT OFFSET
TTL PROTOCOL CHECKSUM
SOURCE ADDRESS
DESTINATION ADDRESS
OPTIONS (if any) + PADDING
0 4 8 16 19 31
 IPv4 has 32 bit addresses.
 Flat addressing (only netid + hostid with “fixed”
boundaries)
 Results in inefficient use of address space.
 Class B addresses are almost over.
 Addresses will exhaust in the next 5 years.
 IPv4 is victim of its own success.
 IP does not permit route aggregation
(limited supernetting possible with new routers)
 Mostly only class C addresses remain
 Number of networks is increasing very fast
(number of routes to be advertised goes up)
 Very high routing overhead
 lot more memory needed for routing table
 lot more bandwidth to pass routing information
 lot more processing needed to compute routes
 Maximum header length is 60 octets.
(Restricts options)
 Maximum packet length is 64K octets.
(Do we need more than that ?)
 ID for fragments is 16 bits. Repeats every 65537th
packet.
(Will two packets in the network have same ID?)
 Variable size header.
(Slower processing at routers.)
 No ordering of options.
(All routers need to look at all options.)
 Lack of quality-of-service support.
 Only an 8-bit ToS field, which is hardly used.
 Problem for multimedia services.
 No support for security at IP layer.
 Mobility support is limited.
 Strict monitoring of IP address assignment
 Private IP addresses for intranets
 Only class C or a part of class C to an organization
 Encourage use of proxy services
 Application level proxies
 Network Address Translation (NAT)
 Remaining class A addresses may use CIDR
 Reserved addresses may be assigned
But these will only postpone address exhaustion.
They do not address problems like QoS, mobility,
security.
 At least 109 networks, 1012 end-systems
 Datagram service (best effort delivery)
 Independent of physical layer technologies
 Robust (routing) in presence of failures
 Flexible topology (e.g., dual-homed nets)
 Better routing structures (e.g., aggregation)
 High performance (fast switching)
 Support for multicasting
 Support for mobile nodes
 Support for quality-of-service
 Provide security at IP layer
 Extensible
 Auto-configuration (plug-and--play)
 Straight-forward transition plan from IPv4
 Minimal changes to upper layer protocols
 Header format simplification
 Expanded routing and addressing capabilities
 Improved support for extensions and options
 Flow labeling (for QoS) capability
 Auto-configuration and Neighbour discovery
 Authentication and privacy capabilities
 Simple transition from IPv4
Traffic Class Flow LabelVers
Payload Length Next Header Hop Limit
Source Address
Destination Address
0 4 12 16 24 31
 Version number (4-bit field)
The value is always 6.
 Flow label (20-bit field)
Used to label packets requesting special handling by
routers.
 Traffic class (8-bit field)
Used to mark classes of traffic.
 Payload length (16-bit field)
Length of the packet following the IPv6 header, in octets.
 Next header (8-bit field)
The type of header immediately following the IPv6 header.
 Hop limit (8-bit field)
Decremented by 1 by each node that forwards the
packet.
Packet discarded if hop limit is decremented to zero.
 Source Address (128-bit field)
An address of the initial sender of the packet.
 Destination Address (128-bit field)
An address of the intended recipient of the packet. May
not be the ultimate recipient, if Routing Header is
present.
 Longer address - 32 bits  128 bits
 Fragmentation field moved to separate header
 Header checksum removed
 Header length removed (fixed length header)
 Length field excludes IPv6 header
 Time to live  Hop limit
 Protocol  Next header
 64-bit field alignment
 TOS replaced by flow label, traffic class
 Less used functions moved to extension headers.
 Only present when needed.
 Processed only by node identified in IPv6 destination
field.
=> much lower overhead than IPv4 options
Exception: Hop-by-Hop option header
 Eliminated IPv4’s 40-byte limit on options
 Currently defined extension headers: Hop-by-hop,
Routing, Fragment, Authentication, Privacy, End-to-end.
 Order of extension headers in a packet is defined.
 Headers are aligned on 8-byte boundaries.
Unicast Address for a single interface.
Multicast Identifier for a set of interfaces.
Packet is sent to all these interfaces.
Anycast Identifier for a set of interfaces.
Packet is sent to the nearest one.
 HEX in blocks of 16 bits
BC84 : 25C2 : 0000 : 0000 : 0000 : 55AB : 5521 : 0018
 leading zero suppression
BC84 : 25C2 : 0 : 0 :55AB : 5521 : 18
 Compressed format removes strings of 0s
BC84 : 25C2 :: 55AB : 5521 : 18
:: can appear only once in an address.
can also be used to compress leading or trailing 0s
 Mixed Notation (X:X:X:X:X:X:d.d.d.d)
e.g., ::144.16.162.21
 128-bit addresses
 Multiple addresses can be assigned to an interface
 Provider-based hierarchy to be used in the beginning
 Addresses should have 64-bit interface IDs in EUI-64
format
 Following special addresses are defined :
 IPv4-mapped
 IPv4-compatible
 link-local
 site-local
 Global Aggregate Address
 Link local address
 Site-local address
FP TLA NLA
3 13 32
SLA
64 bits
Interface ID
1111111010
10 bits
0
54 bits
Interface ID
64 bits
Public Topology Site
Topology
Interface Identifier
1111111011 0 Interface IDsubnet ID
10 bits 38 bits 16 bits 64 bits
16
Flags 000T 3 bits reserved
T= 0 permanent
T= 1 transient
Scope 2 link-local
5 site-local
8 org-local
E global
Permanent groups are formed independent of scope.
11111111 flags scope Group ID
8 bits 4 4 112 bits
 Hierarchical addresses are to be used.
 Initially only provider-based hierarchy will be used.
 Longest prefix match routing to be used.
(Same as IPv4 routing under CIDR.)
 OSPF, RIP, IDRP, ISIS, etc., will continue as is
(except 128-bit addresses).
 Easy renumbering should be possible.
 Provider selection possible with anycast groups.
 Protocol aids QoS support, not provide it.
 Flow labels
 To identify packets needing same quality-of-service
 20-bit label decided by source
 Flow classifier: Flow label + Source/Destination addresses
 Zero if no special requirement
 Uniformly distributed between 1 and FFFFFF
 Traffic class
 8-bit value
 Routers allowed to modify this field
 Provision for
 Authentication header
 Guarantees authenticity and integrity of data
 Encryption header
 Ensures confidentiality and privacy
 Encryption modes:
 Transport mode
 Tunnel mode
 Independent of key management algorithm.
 Security implementation is mandatory
requirement in IPv6.
 Mobile computers are becoming commonplace.
 Mobile IPv6 allows a node to move from one link to
another without changing the address.
 Movement can be heterogeneous, i.e., node can move
from an Ethernet link to a cellular packet network.
 Mobility support in IPv6 is more efficient than
mobility support in IPv4.
 There are also proposals for supporting micro-
mobility.
 Router Discovery - determines set of routers on the
link.
 Prefix Discovery - set of on-link address prefixes.
 Parameter Discovery - to learn link parameters such as
link MTU, or internet parameters like hop limit, etc.
 Address Auto-configuration - address prefixes that
can be used for automatically configuring interface
address.
 Address resolution - IP to link-layer address mapping.
 Duplicate Address Detection.
 Route Redirect - inform of a better first hop node to
reach a particular destination.
 Based on ICMPv6 messages
 Router Solicitation (RS)
 Router Advertisement (RA)
 Neighbour Solicitation (NS)
 Neighbour Advertisement (NA)
 Redirect
 Router Solicitation
 sent when an interface becomes enabled, hosts
request routers to send RA immediately.
 Router advertisement
 Sent by routers periodically or in response to RS.
 Hosts build a set of default routers based on this
information.
 Provides information for address auto-
configuration, set of on-link prefixes etc.
 Supplies internet/subnet parameters, like MTU,
and hop limit.
 Includes router’s link-layer address.
 Neighbour Solicitation
 To request link-layer address of neighbour
 Also used for Duplicate Address Detection
 Neighbour Advertisement
 Sent in response to NS
 May be sent without solicitation to announce
change in link-layer address
 Redirect - used to inform hosts of a better first
hop for a destination.
Anycast Addresses
 Multiple nodes on link may have this address
 All those nodes will respond to an NS message.
 Host will get multiple NA messages, but should
accept only one.
 The messages should be tagged as non-override.
Proxy advertisements
 Router may send NA on behalf of others.
 Useful for mobile nodes who have moved.
The problem
 System bootstrap (“plug and play”)
 Address renumbering
Addressing Possibilities
Manual Address configured by hand
Autonomous Host creates address with no external
interaction (e.g., link local)
Semi-autonomous Host creates address by combining a priori
information and some external information.
Stateless Server Host queries a server, and gets an address.
Server does not maintain a state.
Stateful Server Host queries a server, and gets an
address.
Server maintains a state.
 Link-local prefix concatenated with 64-bit MAC
address. (Autonomous mode)
 Prefix advertised by router concatenated with 64-bit
MAC address. (Semi-autonomous mode.)
 DHCPng (for server modes)
 Can provide a permanent address (stateless mode)
 Provide an address from a group of addresses, and keep
track of this allocation (stateful mode)
 Can provide additional network specific information.
 Can register nodes in DNS.
 To migrate to a new address
 change of provider
 change in network architecture
 Methods
 router adds a new prefix in RA, and informs that the old
prefix is no longer valid.
 When DHCP lease runs out, assign a new address to node.
 DHCPng can ask nodes to release their addresses.
 Requires DNS update. DHCPng can update DNS for clients.
 Existing conversations may continue if the old
address continues to be valid for some time.
 Minor changes in TCP
 Maximum segment size should be based on Path MTU.
 The packet size computation should take into account larger
size of IP header(s).
 Pseudo-header for checksum is different.
 UDP checksum computation is now mandatory.
 Most application protocol specifications are
independent of TCP/IP - hence no change.
 FTP protocol exchanges IPv4 addresses - hence
needs to be changed.
 The pseudo-header is changed in checksum
computation:
 Address are 128 bits.
 Payload length is 32 bits.
 Payload length is not copied from IPv6 header.
(Extension headers should not be counted.)
 Next header field of last extension header is used in place
of protocol.
 UDP packets must also have checksum.
(Since no IP checksum now.)
 ICMPv6
 Rate limiting feature added
 Timer based
 Bandwidth based
 IGMP, ARP merged
 Larger part of offending packet is included
 DNS
 AAAA type for IPv6 addresses
 A6 type: recursive definition of IP address
 Queries that do additional section processing are
redefined to do processing for both ‘A’ and
‘AAAA’ type records
 “Sockets” interface – the de facto standard API for
TCP/IP Applications.
 Need to change Socket API in order to reflect the
increased address length in IPv6.
 Also need to make new features like flow label,
visible to applications.
 A few new library routines
 Complete source and binary compatibility with
original API.
 One can have some sockets using IPv4 and others using
IPv6.
 No “flag”day.
 Incremental upgrade and deployment.
 Minimum upgrade dependencies.
 Interoperability of IPv4 and IPv6 nodes.
 Let sites transition at their own pace.
 Basic migration tools
 Dual stack and tunneling
 Translation
 New nodes support both IPv4 and IPv6.
 Upgrading from IPv4 to v4/v6 does not break
anything.
 Same transport layer and application above both.
 Provides complete interoperability with IPv4
nodes.
 Tunnel IPv6 packets across IPv4 topology.
 Configured tunnels:
 Explicitly configured tunnel endpoints.
 Router to router, host to router.
 Automatic tunnels:
 Automatic address resolution using embedded IPv4
address (like IPv4-compatible address).
 Host to host, router to host
 This will allow communication between IPv6 only
hosts and IPv4 only hosts.
 A typical translator consists of two components:
 translation between IPv4 and IPv6 packets.
 Address mapping between IPv4 and IPv6
 For translation, three technologies are available:
 header conversion
 transport relay
 application proxy
 Combination of Network Address Translation
(NAT) and Protocol Translation (PT)
 Meant for communication between IPv6-only
and IPv4-only nodes.
 No change is needed on the IPv6-only nodes.
 But translation is not stateless.
 Hence, single point of failure.
 Network Address Port Translation + Protocol
Translation
 In addition to changing IP address, changes the port
number also in the transport layer header.
 It will allow IPv6 nodes to communicate with IPv4
nodes transparently using a single IPv4 address.
 SIIT also translates between IPv4 and IPv6
headers.
 Stateless: Translator does not keep address
mapping.
 There has to be a translator on every path,
not necessarily on all physical links.
 Uses IPv4-translatable addresses.
 Assumes that there is an IPv4 address pool of
addresses for the subnet.
 PMTU discovery is optional on IPv4 network.
 Fragmentation is difficult to handle.
 Security Associations may not be transparent.
 Options may not be translatable.
 UDP checksum is optional over IPv4.
 Some ICMP messages are different.
 Connections can only start from IPv6 node.
 Maintain complete V4 routing till addresses last.
 Upgrade V4 routers to dual stack.
 Incrementally build up V6 backbone routing
system.
 Use v6-over-v4 tunnels to construct 6bone.
 Grow like Mbone (multicast backbone).
 De-activate tunnels as soon as underlying path
upgraded to V6.
 Incrementally upgrade V4 hosts to dual V4/V6
 Use IPv4-compatible addresses with existing IPv4
address assignments
 Host-to-host automatic tunneling over IPv4
 Upgrade routers to IPv6.
 Hosts may require native IPv6 addresses
 DNS upgrade is needed before hosts get IPv6
addresses
 Connect IPv6 router to an IPv6-enabled ISP.
 Install translators like NAT-PT or SIIT.
Thank You

More Related Content

What's hot (20)

Internet Protocol Version 4
Internet Protocol Version 4Internet Protocol Version 4
Internet Protocol Version 4
 
Ipv4 header
Ipv4 headerIpv4 header
Ipv4 header
 
I pv4 format
I pv4 formatI pv4 format
I pv4 format
 
Ipv4 packet structure
Ipv4 packet structureIpv4 packet structure
Ipv4 packet structure
 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
 
I pv6(internet protocol version 6)
I pv6(internet protocol version 6)I pv6(internet protocol version 6)
I pv6(internet protocol version 6)
 
IP Datagram Structure
IP Datagram StructureIP Datagram Structure
IP Datagram Structure
 
Network layer
Network layerNetwork layer
Network layer
 
Ip protocol
Ip protocolIp protocol
Ip protocol
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
 
INTERNET PROTOCOL VERSION 6
INTERNET PROTOCOL VERSION 6INTERNET PROTOCOL VERSION 6
INTERNET PROTOCOL VERSION 6
 
IPV6 Addressing
IPV6 Addressing IPV6 Addressing
IPV6 Addressing
 
Ipv4 tutorial
Ipv4 tutorialIpv4 tutorial
Ipv4 tutorial
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
01 Ipv6 Addressing
01 Ipv6 Addressing01 Ipv6 Addressing
01 Ipv6 Addressing
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
84486335 address-resolution-protocol-case-study
84486335 address-resolution-protocol-case-study84486335 address-resolution-protocol-case-study
84486335 address-resolution-protocol-case-study
 

Similar to Ippptspk 3

Similar to Ippptspk 3 (20)

Chapter6
Chapter6Chapter6
Chapter6
 
I pv4 and ipv6
I pv4 and ipv6I pv4 and ipv6
I pv4 and ipv6
 
IPv6 Addressing Architecture
IPv6 Addressing ArchitectureIPv6 Addressing Architecture
IPv6 Addressing Architecture
 
Networking presentation 9 march 2009
Networking presentation   9 march 2009Networking presentation   9 march 2009
Networking presentation 9 march 2009
 
IPv6
IPv6IPv6
IPv6
 
2 logical addressing
2 logical addressing2 logical addressing
2 logical addressing
 
Ipv6_final
Ipv6_finalIpv6_final
Ipv6_final
 
Network.pptx
Network.pptxNetwork.pptx
Network.pptx
 
IPv4.pdf
IPv4.pdfIPv4.pdf
IPv4.pdf
 
Computer network (17)
Computer network (17)Computer network (17)
Computer network (17)
 
IPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolIPv6 - The Next next generation protocol
IPv6 - The Next next generation protocol
 
Mod5
Mod5Mod5
Mod5
 
I pv6 mechanism
I pv6 mechanismI pv6 mechanism
I pv6 mechanism
 
IP Address
IP AddressIP Address
IP Address
 
IPV6.ppt
IPV6.pptIPV6.ppt
IPV6.ppt
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Internetworking
InternetworkingInternetworking
Internetworking
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Complete notes of computer networks. Bca or bsc students
Complete notes of computer networks. Bca or bsc studentsComplete notes of computer networks. Bca or bsc students
Complete notes of computer networks. Bca or bsc students
 
Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheet
 

Recently uploaded

Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 

Recently uploaded (20)

Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 

Ippptspk 3

  • 1.  Problems with IPv4  Basic IPv6 Protocol  IPv6 features  Auto-configuration, QoS, Security, Mobility  Transition Plans
  • 2. Transports a datagram from source host to destination, possibly via several intermediate nodes (“routers”) Service is:  Unreliable: Losses, duplicates, out-of-order delivery  Best effort: Packets not discarded capriciously, delivery failure not necessarily reported  Connectionless: Each packet is treated independently
  • 3. VERS HLEN TOS TOTAL LENGTH IDENTIFICATION FLAG FRAGMENT OFFSET TTL PROTOCOL CHECKSUM SOURCE ADDRESS DESTINATION ADDRESS OPTIONS (if any) + PADDING 0 4 8 16 19 31
  • 4.  IPv4 has 32 bit addresses.  Flat addressing (only netid + hostid with “fixed” boundaries)  Results in inefficient use of address space.  Class B addresses are almost over.  Addresses will exhaust in the next 5 years.  IPv4 is victim of its own success.
  • 5.  IP does not permit route aggregation (limited supernetting possible with new routers)  Mostly only class C addresses remain  Number of networks is increasing very fast (number of routes to be advertised goes up)  Very high routing overhead  lot more memory needed for routing table  lot more bandwidth to pass routing information  lot more processing needed to compute routes
  • 6.  Maximum header length is 60 octets. (Restricts options)  Maximum packet length is 64K octets. (Do we need more than that ?)  ID for fragments is 16 bits. Repeats every 65537th packet. (Will two packets in the network have same ID?)  Variable size header. (Slower processing at routers.)  No ordering of options. (All routers need to look at all options.)
  • 7.  Lack of quality-of-service support.  Only an 8-bit ToS field, which is hardly used.  Problem for multimedia services.  No support for security at IP layer.  Mobility support is limited.
  • 8.  Strict monitoring of IP address assignment  Private IP addresses for intranets  Only class C or a part of class C to an organization  Encourage use of proxy services  Application level proxies  Network Address Translation (NAT)  Remaining class A addresses may use CIDR  Reserved addresses may be assigned But these will only postpone address exhaustion. They do not address problems like QoS, mobility, security.
  • 9.  At least 109 networks, 1012 end-systems  Datagram service (best effort delivery)  Independent of physical layer technologies  Robust (routing) in presence of failures  Flexible topology (e.g., dual-homed nets)  Better routing structures (e.g., aggregation)  High performance (fast switching)  Support for multicasting
  • 10.  Support for mobile nodes  Support for quality-of-service  Provide security at IP layer  Extensible  Auto-configuration (plug-and--play)  Straight-forward transition plan from IPv4  Minimal changes to upper layer protocols
  • 11.  Header format simplification  Expanded routing and addressing capabilities  Improved support for extensions and options  Flow labeling (for QoS) capability  Auto-configuration and Neighbour discovery  Authentication and privacy capabilities  Simple transition from IPv4
  • 12. Traffic Class Flow LabelVers Payload Length Next Header Hop Limit Source Address Destination Address 0 4 12 16 24 31
  • 13.  Version number (4-bit field) The value is always 6.  Flow label (20-bit field) Used to label packets requesting special handling by routers.  Traffic class (8-bit field) Used to mark classes of traffic.  Payload length (16-bit field) Length of the packet following the IPv6 header, in octets.  Next header (8-bit field) The type of header immediately following the IPv6 header.
  • 14.  Hop limit (8-bit field) Decremented by 1 by each node that forwards the packet. Packet discarded if hop limit is decremented to zero.  Source Address (128-bit field) An address of the initial sender of the packet.  Destination Address (128-bit field) An address of the intended recipient of the packet. May not be the ultimate recipient, if Routing Header is present.
  • 15.  Longer address - 32 bits  128 bits  Fragmentation field moved to separate header  Header checksum removed  Header length removed (fixed length header)  Length field excludes IPv6 header  Time to live  Hop limit  Protocol  Next header  64-bit field alignment  TOS replaced by flow label, traffic class
  • 16.  Less used functions moved to extension headers.  Only present when needed.  Processed only by node identified in IPv6 destination field. => much lower overhead than IPv4 options Exception: Hop-by-Hop option header  Eliminated IPv4’s 40-byte limit on options  Currently defined extension headers: Hop-by-hop, Routing, Fragment, Authentication, Privacy, End-to-end.  Order of extension headers in a packet is defined.  Headers are aligned on 8-byte boundaries.
  • 17. Unicast Address for a single interface. Multicast Identifier for a set of interfaces. Packet is sent to all these interfaces. Anycast Identifier for a set of interfaces. Packet is sent to the nearest one.
  • 18.  HEX in blocks of 16 bits BC84 : 25C2 : 0000 : 0000 : 0000 : 55AB : 5521 : 0018  leading zero suppression BC84 : 25C2 : 0 : 0 :55AB : 5521 : 18  Compressed format removes strings of 0s BC84 : 25C2 :: 55AB : 5521 : 18 :: can appear only once in an address. can also be used to compress leading or trailing 0s  Mixed Notation (X:X:X:X:X:X:d.d.d.d) e.g., ::144.16.162.21
  • 19.  128-bit addresses  Multiple addresses can be assigned to an interface  Provider-based hierarchy to be used in the beginning  Addresses should have 64-bit interface IDs in EUI-64 format  Following special addresses are defined :  IPv4-mapped  IPv4-compatible  link-local  site-local
  • 20.  Global Aggregate Address  Link local address  Site-local address FP TLA NLA 3 13 32 SLA 64 bits Interface ID 1111111010 10 bits 0 54 bits Interface ID 64 bits Public Topology Site Topology Interface Identifier 1111111011 0 Interface IDsubnet ID 10 bits 38 bits 16 bits 64 bits 16
  • 21. Flags 000T 3 bits reserved T= 0 permanent T= 1 transient Scope 2 link-local 5 site-local 8 org-local E global Permanent groups are formed independent of scope. 11111111 flags scope Group ID 8 bits 4 4 112 bits
  • 22.  Hierarchical addresses are to be used.  Initially only provider-based hierarchy will be used.  Longest prefix match routing to be used. (Same as IPv4 routing under CIDR.)  OSPF, RIP, IDRP, ISIS, etc., will continue as is (except 128-bit addresses).  Easy renumbering should be possible.  Provider selection possible with anycast groups.
  • 23.  Protocol aids QoS support, not provide it.  Flow labels  To identify packets needing same quality-of-service  20-bit label decided by source  Flow classifier: Flow label + Source/Destination addresses  Zero if no special requirement  Uniformly distributed between 1 and FFFFFF  Traffic class  8-bit value  Routers allowed to modify this field
  • 24.  Provision for  Authentication header  Guarantees authenticity and integrity of data  Encryption header  Ensures confidentiality and privacy  Encryption modes:  Transport mode  Tunnel mode  Independent of key management algorithm.  Security implementation is mandatory requirement in IPv6.
  • 25.  Mobile computers are becoming commonplace.  Mobile IPv6 allows a node to move from one link to another without changing the address.  Movement can be heterogeneous, i.e., node can move from an Ethernet link to a cellular packet network.  Mobility support in IPv6 is more efficient than mobility support in IPv4.  There are also proposals for supporting micro- mobility.
  • 26.  Router Discovery - determines set of routers on the link.  Prefix Discovery - set of on-link address prefixes.  Parameter Discovery - to learn link parameters such as link MTU, or internet parameters like hop limit, etc.  Address Auto-configuration - address prefixes that can be used for automatically configuring interface address.  Address resolution - IP to link-layer address mapping.  Duplicate Address Detection.  Route Redirect - inform of a better first hop node to reach a particular destination.
  • 27.  Based on ICMPv6 messages  Router Solicitation (RS)  Router Advertisement (RA)  Neighbour Solicitation (NS)  Neighbour Advertisement (NA)  Redirect  Router Solicitation  sent when an interface becomes enabled, hosts request routers to send RA immediately.
  • 28.  Router advertisement  Sent by routers periodically or in response to RS.  Hosts build a set of default routers based on this information.  Provides information for address auto- configuration, set of on-link prefixes etc.  Supplies internet/subnet parameters, like MTU, and hop limit.  Includes router’s link-layer address.
  • 29.  Neighbour Solicitation  To request link-layer address of neighbour  Also used for Duplicate Address Detection  Neighbour Advertisement  Sent in response to NS  May be sent without solicitation to announce change in link-layer address  Redirect - used to inform hosts of a better first hop for a destination.
  • 30. Anycast Addresses  Multiple nodes on link may have this address  All those nodes will respond to an NS message.  Host will get multiple NA messages, but should accept only one.  The messages should be tagged as non-override. Proxy advertisements  Router may send NA on behalf of others.  Useful for mobile nodes who have moved.
  • 31. The problem  System bootstrap (“plug and play”)  Address renumbering Addressing Possibilities Manual Address configured by hand Autonomous Host creates address with no external interaction (e.g., link local) Semi-autonomous Host creates address by combining a priori information and some external information. Stateless Server Host queries a server, and gets an address. Server does not maintain a state. Stateful Server Host queries a server, and gets an address. Server maintains a state.
  • 32.  Link-local prefix concatenated with 64-bit MAC address. (Autonomous mode)  Prefix advertised by router concatenated with 64-bit MAC address. (Semi-autonomous mode.)  DHCPng (for server modes)  Can provide a permanent address (stateless mode)  Provide an address from a group of addresses, and keep track of this allocation (stateful mode)  Can provide additional network specific information.  Can register nodes in DNS.
  • 33.  To migrate to a new address  change of provider  change in network architecture  Methods  router adds a new prefix in RA, and informs that the old prefix is no longer valid.  When DHCP lease runs out, assign a new address to node.  DHCPng can ask nodes to release their addresses.  Requires DNS update. DHCPng can update DNS for clients.  Existing conversations may continue if the old address continues to be valid for some time.
  • 34.  Minor changes in TCP  Maximum segment size should be based on Path MTU.  The packet size computation should take into account larger size of IP header(s).  Pseudo-header for checksum is different.  UDP checksum computation is now mandatory.  Most application protocol specifications are independent of TCP/IP - hence no change.  FTP protocol exchanges IPv4 addresses - hence needs to be changed.
  • 35.  The pseudo-header is changed in checksum computation:  Address are 128 bits.  Payload length is 32 bits.  Payload length is not copied from IPv6 header. (Extension headers should not be counted.)  Next header field of last extension header is used in place of protocol.  UDP packets must also have checksum. (Since no IP checksum now.)
  • 36.  ICMPv6  Rate limiting feature added  Timer based  Bandwidth based  IGMP, ARP merged  Larger part of offending packet is included  DNS  AAAA type for IPv6 addresses  A6 type: recursive definition of IP address  Queries that do additional section processing are redefined to do processing for both ‘A’ and ‘AAAA’ type records
  • 37.  “Sockets” interface – the de facto standard API for TCP/IP Applications.  Need to change Socket API in order to reflect the increased address length in IPv6.  Also need to make new features like flow label, visible to applications.  A few new library routines  Complete source and binary compatibility with original API.  One can have some sockets using IPv4 and others using IPv6.
  • 38.  No “flag”day.  Incremental upgrade and deployment.  Minimum upgrade dependencies.  Interoperability of IPv4 and IPv6 nodes.  Let sites transition at their own pace.  Basic migration tools  Dual stack and tunneling  Translation
  • 39.  New nodes support both IPv4 and IPv6.  Upgrading from IPv4 to v4/v6 does not break anything.  Same transport layer and application above both.  Provides complete interoperability with IPv4 nodes.
  • 40.  Tunnel IPv6 packets across IPv4 topology.  Configured tunnels:  Explicitly configured tunnel endpoints.  Router to router, host to router.  Automatic tunnels:  Automatic address resolution using embedded IPv4 address (like IPv4-compatible address).  Host to host, router to host
  • 41.  This will allow communication between IPv6 only hosts and IPv4 only hosts.  A typical translator consists of two components:  translation between IPv4 and IPv6 packets.  Address mapping between IPv4 and IPv6  For translation, three technologies are available:  header conversion  transport relay  application proxy
  • 42.  Combination of Network Address Translation (NAT) and Protocol Translation (PT)  Meant for communication between IPv6-only and IPv4-only nodes.  No change is needed on the IPv6-only nodes.  But translation is not stateless.  Hence, single point of failure.
  • 43.  Network Address Port Translation + Protocol Translation  In addition to changing IP address, changes the port number also in the transport layer header.  It will allow IPv6 nodes to communicate with IPv4 nodes transparently using a single IPv4 address.
  • 44.  SIIT also translates between IPv4 and IPv6 headers.  Stateless: Translator does not keep address mapping.  There has to be a translator on every path, not necessarily on all physical links.  Uses IPv4-translatable addresses.  Assumes that there is an IPv4 address pool of addresses for the subnet.
  • 45.  PMTU discovery is optional on IPv4 network.  Fragmentation is difficult to handle.  Security Associations may not be transparent.  Options may not be translatable.  UDP checksum is optional over IPv4.  Some ICMP messages are different.  Connections can only start from IPv6 node.
  • 46.  Maintain complete V4 routing till addresses last.  Upgrade V4 routers to dual stack.  Incrementally build up V6 backbone routing system.  Use v6-over-v4 tunnels to construct 6bone.  Grow like Mbone (multicast backbone).  De-activate tunnels as soon as underlying path upgraded to V6.
  • 47.  Incrementally upgrade V4 hosts to dual V4/V6  Use IPv4-compatible addresses with existing IPv4 address assignments  Host-to-host automatic tunneling over IPv4  Upgrade routers to IPv6.  Hosts may require native IPv6 addresses  DNS upgrade is needed before hosts get IPv6 addresses  Connect IPv6 router to an IPv6-enabled ISP.  Install translators like NAT-PT or SIIT.