SlideShare a Scribd company logo
1 of 40
Download to read offline
PART IV: NETWORK LAYER
NEXT GENERATION IP
Subject: Computer Networks
Tutor: Bilal Munir Mughal
1
Ch-22
Content Outline
 IPv6 ADDRESSING
 Representation
 Address Space
 Address Space Allocation
 Autoconfiguration
 Renumbering
 THE IPv6 PROTOCOL
 Packet Format
 Extension Header
2
Content Outline
 THE ICMPv6 PROTOCOL
 Error-Reporting Messages
 Informational Messages
 Neighbor-Discovery Messages
 Group Membership Messages
 TRANSITION FROM IPv4 TO IPv6
 Strategies
 Use of IP Addresses
3
IPv6 ADDRESSING
 Internet Protocol version 6 (IPv6) or IP new generation
(IPng)
 The main reason for migration from IPv4 to IPv6 is the
small size of the address space in IPv4.
 It is interesting to know that IPv5 was a proposal,
based on the OSI model, that never materialized.
4
IPv6 ADDRESSING
 The following lists the main changes in the IPv6
protocol:
larger address space,
better header format,
new options,
allowance for extension,
support for resource allocation,
and support for more security.
 The implementation of theses changes made it
necessary to create a new version of the ICMP
protocol, ICMPv6
5
IPv6 ADDRESSING
Representation
 Abbreviation
 The leading zeros of a section can be omitted e.g.
0074 can be written as 74, 000F as F, and 0000 as
0. Note that 3210 cannot be abbreviated.
 Zero compression, i.e. we can remove all the
consecutive zeros and replace them with a double
semicolon.
6
IPv6 ADDRESSING
 If there is more than one run of zero sections, only one
of them can be compressed.
Mixed Notation
 (::130.24.24.18) appropriate during the transition
period in which an IPv4 address is embedded in an
IPv6 address (as the rightmost 32 bits).
CIDR Notation
 IPv6 uses hierarchical addressing. For this reason,
IPv6 allows slash or CIDR notation e.g. the following
shows prefix of 60 bits using CIDR
FDEC::BBFF:0:FFFF/60
7
IPv6 ADDRESSING
Address Space
 IPv6 contains 2128 addresses
340, 282, 366, 920, 938, 463, 463, 374, 607, 431, 768, 211, 456
Three Address Types
 In IPv6, a destination address can belong to one of
three categories: unicast, anycast, and multicast.
8
IPv6 ADDRESSING
Unicast Address
 A unicast address defines a single interface (computer
or router).
 The packet sent to a unicast address will be routed to
the intended recipient.
Anycast Address
 An anycast address defines a group of computers
that all share a single address.
 A packet with an anycast address is delivered to only
one member of the group, the most reachable one.
9
IPv6 ADDRESSING
Multicast Address
 A multicast address also defines a group of
computers.
 However, in anycasting, only one copy of the packet is
sent to one of the members of the group; in
multicasting each member of the group receives a
copy.
 IPv6 has designated a block for multicasting.
 IPv6 does not define broadcasting, it considers
broadcasting as a special case of multicasting.
10
IPv6 ADDRESSING:
ADDRESS SPACE ALLOCATION
 Like the address space of IPv4, the address space of
IPv6 is divided into several blocks of varying size and
each block is allocated for a special purpose.
 Most of the blocks are still unassigned and have been
set aside for future use.
11
IPv6 ADDRESSING:
ADDRESS SPACE ALLOCATION
Global Unicast Addresses…
12
IPv6 ADDRESSING:
ADDRESS SPACE ALLOCATION
Global Unicast Addresses…
 A link-layer address whose length is less than 64 bits
can be embedded as the whole or part of the
interface identifier, eliminating the mapping process.
 Two common linklayer addressing schemes can be
considered for this purpose: the 64-bit extended
unique identifier (EUI-64) defined by IEEE and the
48-bit link-layer address defined by Ethernet.
13
IPv6 ADDRESSING:
ADDRESS SPACE ALLOCATION
Global Unicast Addresses…
14
IPv6 ADDRESSING:
ADDRESS SPACE ALLOCATION
Special Addresses
 Addresses that use the prefix (0000::/8) are
reserved, but part of this block is used to define some
special addresses.
15
IPv6 ADDRESSING:
ADDRESS SPACE ALLOCATION
 Other Assigned Blocks
 IPv6 uses two large blocks for private addressing
and one large block for multicasting.
16
IPv6 ADDRESSING:
AUTOCONFIGURATION
 In IPv6, DHCP protocol can still be used to allocate an
IPv6 address to a host, but a host can also configure
itself.
 When a host in IPv6 joins a network, it can configure
itself using the following process:
1. The host first creates a link local address for itself. This
is done by taking the 10-bit link local prefix (1111
1110 10), adding 54 zeros, and adding the 64-bit
interface identifier, which any host knows how to
generate from its interface card. The result is a 128-bit
link local address.
17
IPv6 ADDRESSING:
AUTOCONFIGURATION
2. The host then tests to see if this link local address is
unique and not used by other hosts. Since the 64-bit
interface identifier is supposed to be unique, the link
local address generated is unique with a high
probability. However, to be sure, the host sends a
neighbor solicitation message (see Chapter 28) and
waits for a neighbor advertisement message. If any host
in the subnet is using this link local address, the process
fails and the host cannot autoconfigure itself; it needs to
use other means such as DHCP for this purpose.
18
IPv6 ADDRESSING:
AUTOCONFIGURATION
3. If the uniqueness of the link local address is passed, the
host stores this address as its link local address (for
private communication), but it still needs a global
unicast address. The host then sends a router solicitation
message (discussed later in the chapter) to a local
router. If there is a router running on the network, the
host receives a router advertisement message that
includes the global unicast prefix and the subnet prefix
that the host needs to add to its interface identifier to
generate its global unicast address. If the router cannot
help the host with the configuration, it informs the host in
the router advertisement message (by setting a flag).
The host then needs to use other means for configuration.
19
IPv6 ADDRESSING:
RENUMBERING
 To allow sites to change the service provider,
renumbering of the address prefix (n) was built into
IPv6 addressing.
 Each site is given a prefix by the service provider to
which it is connected.
 If the site changes the provider, the address prefix
needs to be changed.
 A router to which the site is connected can advertise a
new prefix and let the site use the old prefix for a
short time before disabling it.
20
IPv6 ADDRESSING:
RENUMBERING
 In other words, during the transition period, a site has
two prefixes.
 The main problem in using the renumbering
mechanism is the support of the DNS, which needs to
propagate the new addressing associated with a
domain name.
 A new protocol for DNS, called Next Generation
DNS, is under study to provide support for this
mechanism.
21
THE IPv6 PROTOCOL
 The following shows other changes implemented in the
protocol in addition to changing address size and
format.
 Better header format. IPv6 uses a new header format
in which options are separated from the base header
and inserted, when needed, between the base
header and the data. This simplifies and speeds up
the routing process because most of the options do
not need to be checked by routers.
 New options. IPv6 has new options to allow for
additional functionalities.
22
THE IPv6 PROTOCOL
 Allowance for extension. IPv6 is designed to allow the
extension of the protocol if required by new
technologies or applications.
 Support for resource allocation. In IPv6, the type-of-
service field has been removed, but two new fields,
traffic class and flow label, have been added to
enable the source to request special handling of the
packet. This mechanism can be used to support traffic
such as real-time audio and video.
 Support for more security. The encryption and
authentication options in IPv6 provide confidentiality
and integrity of the packet.
23
THE IPv6 PROTOCOL:
PACKET FORMAT
24
THE IPv6 PROTOCOL:
PACKET FORMAT
 Version. The 4-bit version field defines the version
number of the IP. For IPv6, the value is 6.
 Traffic class. The 8-bit traffic class field is used to
distinguish different payloads with different delivery
requirements. It replaces the type-of-service field in
IPv4.
 Flow label. The flow label is a 20-bit field that is
designed to provide special handling for a particular
flow of data. We will discuss this field later.
25
THE IPv6 PROTOCOL:
PACKET FORMAT
 Payload length. The 2-byte payload length field
defines the length of the IP datagram excluding the
header. Note that IPv4 defines two fields related to
the length: header length and total length. In IPv6, the
length of the base header is fixed (40 bytes); only
the length of the payload needs to be defined.
 Next header. It is an 8-bit field defining the type of
the first extension header (if present) or the type of
the data that follows the base header in the
datagram. This field is similar to the protocol field in
IPv4, but we talk more about it when we discuss the
payload.
26
THE IPv6 PROTOCOL:
PACKET FORMAT
 Hop limit. The 8-bit hop limit field serves the same
purpose as the TTL field in IPv4.
 Source and destination addresses. The source address
field is a 16-byte (128-bit) Internet address that
identifies the original source of the datagram. The
destination address field is a 16-byte (128-bit)
Internet address that identifies the destination of the
datagram.
 Payload. Compared to IPv4, the payload field in IPv6
has a different format and meaning
27
THE IPv6 PROTOCOL:
PACKET FORMAT
28
THE IPv6 PROTOCOL:
PACKET FORMAT
 The payload in IPv6 means a combination of zero or
more extension headers (options) followed by the
data from other protocols (UDP, TCP, and so on).
 In IPv6, options, which are part of the header in IPv4,
are designed as extension headers.
 The payload can have as many extension headers as
required by the situation.
 Each extension header has two mandatory fields, next
header and the length, followed by information related to
the particular option.
29
THE IPv6 PROTOCOL:
PACKET FORMAT
 Concept of Flow and Priority in IPv6
 In IPv6, the flow label has been directly added to
IPv6 datagram to allow us to use IPv6 as a
connection-oriented protocol.
 To a router, a flow is a sequence of packets that share
the same characteristics, such as traveling the same
path, using the same resources, having the same kind
of security, and so on.
 In its simplest form, a flow label can be used to speed
up the processing of a packet by a router. In its more
sophisticated form, a flow label can be used to support
the transmission of real-time audio and video.
30
THE IPv6 PROTOCOL:
PACKET FORMAT
 Fragmentation and Reassembly
 IPv6 datagrams can be fragmented only by the
source, not by the routers; the reassembly takes place
at the destination.
 The fragmentation of packets at routers is not
allowed to speed up the processing of packets in the
router.
31
THE IPv6 PROTOCOL:
PACKET FORMAT
 Extension Header
 An IPv6 packet is made of a base header and some
extension headers.
 The length of the base header is fixed at 40 bytes.
 However, to give more functionality to the IP datagram,
the base header can be followed by up to six extension
headers.
32
THE IPv6 PROTOCOL:
OPTIONS
 Comparison of Options between IPv4 and IPv6
 The no-operation and end-of-option options in IPv4 are
replaced by Pad1 and PadN options in IPv6.
 The record route option is not implemented in IPv6 because it was
not used.
 The timestamp option is not implemented because it was not used.
 The source route option is called the source route extension header
in IPv6.
 The fragmentation fields in the base header section of IPv4 have
moved to the fragmentation extension header in IPv6.
 The authentication extension header is new in IPv6.
 The encrypted security payload extension header is new in IPv6.
33
THE ICMPV6 PROTOCOL
 The ICMP, ARP (Chapter 9), and IGMP protocols in
version 4 (Chapter 21) are combined into one single
protocol, ICMPv6.
34
THE ICMPV6 PROTOCOL
 We can divide the messages in ICMPv6 into four
groups:
35
THE ICMPV6 PROTOCOL
 Error-Reporting Messages
 Destination-Unreachable Message
 Packet-Too-Big Message
 Time-Exceeded Message
 Parameter-Problem Message
 Informational Messages
 Echo-Request Message
 Echo-Reply Message
36
THE ICMPV6 PROTOCOL
 Neighbor-Discovery Messages
 Router-Solicitation Message
 Router-Advertisement Message
 Neighbor-Solicitation Message
 Neighbor-Advertisement Message
 Redirection Message
 Inverse-Neighbor-Solicitation Message
 Inverse-Neighbor-Advertisement Message
 Group Membership Messages
 Membership-Query Message
 Membership-Report Message
37
TRANSITION FROM IPV4 TO IPV6
 Because of the huge number of systems in the Internet, the
transition from IPv4 to IPv6 cannot happen suddenly.
 It will take a considerable amount of time before every
system in the Internet can move from IPv4 to IPv6.
 The transition must be smooth to prevent any problems
between IPv4 and IPv6 systems.
 Three strategies have been devised for transition: dual
stack, tunneling, and header translation.
 One or all of these three strategies can be implemented
during the transition period.
38
TRANSITION FROM IPV4 TO IPV6:
STRATEGIES
39
40
Questions?

More Related Content

Similar to DCN 5th ed. slides ch22 Next Generation IP.pdf

Moushumi Maria (071464056)
Moushumi Maria (071464056)Moushumi Maria (071464056)
Moushumi Maria (071464056)mashiur
 
A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6Amber Ford
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002suvobgd
 
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
 
An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3
An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3
An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3Eswar Publications
 
Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...Adii Shah
 
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...IOSR Journals
 
Americas Headquarters IPv6 Addressing White Paper IPv6 Introduction
Americas Headquarters  IPv6 Addressing White Paper IPv6 IntroductionAmericas Headquarters  IPv6 Addressing White Paper IPv6 Introduction
Americas Headquarters IPv6 Addressing White Paper IPv6 IntroductionScott Faria
 

Similar to DCN 5th ed. slides ch22 Next Generation IP.pdf (20)

UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
 
IPv6
IPv6IPv6
IPv6
 
i pv6
i pv6i pv6
i pv6
 
CCNA CHAPTER 16 BY jetarvind kumar madhukar
CCNA CHAPTER 16 BY jetarvind kumar madhukarCCNA CHAPTER 16 BY jetarvind kumar madhukar
CCNA CHAPTER 16 BY jetarvind kumar madhukar
 
Lect 2 i pv6-latest-rami
Lect 2 i pv6-latest-ramiLect 2 i pv6-latest-rami
Lect 2 i pv6-latest-rami
 
Moushumi Maria (071464056)
Moushumi Maria (071464056)Moushumi Maria (071464056)
Moushumi Maria (071464056)
 
IPv6
IPv6IPv6
IPv6
 
A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
 
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
 
Ip seminar
Ip seminarIp seminar
Ip seminar
 
IPv4.pdf
IPv4.pdfIPv4.pdf
IPv4.pdf
 
RASHMI VT REPORT
RASHMI VT REPORTRASHMI VT REPORT
RASHMI VT REPORT
 
An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3
An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3
An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3
 
Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...
 
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...
 
I pv6 aag-v3_019-kr
I pv6 aag-v3_019-krI pv6 aag-v3_019-kr
I pv6 aag-v3_019-kr
 
I pv6 aag-v3_019-kr
I pv6 aag-v3_019-krI pv6 aag-v3_019-kr
I pv6 aag-v3_019-kr
 
Americas Headquarters IPv6 Addressing White Paper IPv6 Introduction
Americas Headquarters  IPv6 Addressing White Paper IPv6 IntroductionAmericas Headquarters  IPv6 Addressing White Paper IPv6 Introduction
Americas Headquarters IPv6 Addressing White Paper IPv6 Introduction
 
I pv6 for cmu
I pv6 for cmuI pv6 for cmu
I pv6 for cmu
 

More from Bilal Munir Mughal

DCN Slides ch10 Error Detection and Correction.ppt
DCN Slides ch10 Error Detection and Correction.pptDCN Slides ch10 Error Detection and Correction.ppt
DCN Slides ch10 Error Detection and Correction.pptBilal Munir Mughal
 
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdfDCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdfBilal Munir Mughal
 
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdf
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdfDCN 5th ed. slides ch23 Introduction to Transport Layer.pdf
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdfBilal Munir Mughal
 
DCN 5th ed. slides ch07 Transmission Media.pdf
DCN 5th ed. slides ch07 Transmission Media.pdfDCN 5th ed. slides ch07 Transmission Media.pdf
DCN 5th ed. slides ch07 Transmission Media.pdfBilal Munir Mughal
 
DCN 5th ed. slides ch05 Analog Transmission.pdf
DCN 5th ed. slides ch05 Analog Transmission.pdfDCN 5th ed. slides ch05 Analog Transmission.pdf
DCN 5th ed. slides ch05 Analog Transmission.pdfBilal Munir Mughal
 
DCN 5th ed. slides ch04 Digital Transmission.pdf
DCN 5th ed. slides ch04 Digital Transmission.pdfDCN 5th ed. slides ch04 Digital Transmission.pdf
DCN 5th ed. slides ch04 Digital Transmission.pdfBilal Munir Mughal
 
DCN 5th ed. slides ch03 Introduction to Physical Layer.pdf
DCN 5th ed. slides ch03 Introduction to Physical Layer.pdfDCN 5th ed. slides ch03 Introduction to Physical Layer.pdf
DCN 5th ed. slides ch03 Introduction to Physical Layer.pdfBilal Munir Mughal
 
DCN 5th ed. slides ch02-Network Models.pptx
DCN 5th ed. slides ch02-Network Models.pptxDCN 5th ed. slides ch02-Network Models.pptx
DCN 5th ed. slides ch02-Network Models.pptxBilal Munir Mughal
 
DCN 5th ed. slides ch01-Introduction.pdf
DCN 5th ed. slides ch01-Introduction.pdfDCN 5th ed. slides ch01-Introduction.pdf
DCN 5th ed. slides ch01-Introduction.pdfBilal Munir Mughal
 

More from Bilal Munir Mughal (9)

DCN Slides ch10 Error Detection and Correction.ppt
DCN Slides ch10 Error Detection and Correction.pptDCN Slides ch10 Error Detection and Correction.ppt
DCN Slides ch10 Error Detection and Correction.ppt
 
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdfDCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
DCN 5th ed. slides ch24 Transport-Layer Protocols.pdf
 
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdf
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdfDCN 5th ed. slides ch23 Introduction to Transport Layer.pdf
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdf
 
DCN 5th ed. slides ch07 Transmission Media.pdf
DCN 5th ed. slides ch07 Transmission Media.pdfDCN 5th ed. slides ch07 Transmission Media.pdf
DCN 5th ed. slides ch07 Transmission Media.pdf
 
DCN 5th ed. slides ch05 Analog Transmission.pdf
DCN 5th ed. slides ch05 Analog Transmission.pdfDCN 5th ed. slides ch05 Analog Transmission.pdf
DCN 5th ed. slides ch05 Analog Transmission.pdf
 
DCN 5th ed. slides ch04 Digital Transmission.pdf
DCN 5th ed. slides ch04 Digital Transmission.pdfDCN 5th ed. slides ch04 Digital Transmission.pdf
DCN 5th ed. slides ch04 Digital Transmission.pdf
 
DCN 5th ed. slides ch03 Introduction to Physical Layer.pdf
DCN 5th ed. slides ch03 Introduction to Physical Layer.pdfDCN 5th ed. slides ch03 Introduction to Physical Layer.pdf
DCN 5th ed. slides ch03 Introduction to Physical Layer.pdf
 
DCN 5th ed. slides ch02-Network Models.pptx
DCN 5th ed. slides ch02-Network Models.pptxDCN 5th ed. slides ch02-Network Models.pptx
DCN 5th ed. slides ch02-Network Models.pptx
 
DCN 5th ed. slides ch01-Introduction.pdf
DCN 5th ed. slides ch01-Introduction.pdfDCN 5th ed. slides ch01-Introduction.pdf
DCN 5th ed. slides ch01-Introduction.pdf
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

DCN 5th ed. slides ch22 Next Generation IP.pdf

  • 1. PART IV: NETWORK LAYER NEXT GENERATION IP Subject: Computer Networks Tutor: Bilal Munir Mughal 1 Ch-22
  • 2. Content Outline  IPv6 ADDRESSING  Representation  Address Space  Address Space Allocation  Autoconfiguration  Renumbering  THE IPv6 PROTOCOL  Packet Format  Extension Header 2
  • 3. Content Outline  THE ICMPv6 PROTOCOL  Error-Reporting Messages  Informational Messages  Neighbor-Discovery Messages  Group Membership Messages  TRANSITION FROM IPv4 TO IPv6  Strategies  Use of IP Addresses 3
  • 4. IPv6 ADDRESSING  Internet Protocol version 6 (IPv6) or IP new generation (IPng)  The main reason for migration from IPv4 to IPv6 is the small size of the address space in IPv4.  It is interesting to know that IPv5 was a proposal, based on the OSI model, that never materialized. 4
  • 5. IPv6 ADDRESSING  The following lists the main changes in the IPv6 protocol: larger address space, better header format, new options, allowance for extension, support for resource allocation, and support for more security.  The implementation of theses changes made it necessary to create a new version of the ICMP protocol, ICMPv6 5
  • 6. IPv6 ADDRESSING Representation  Abbreviation  The leading zeros of a section can be omitted e.g. 0074 can be written as 74, 000F as F, and 0000 as 0. Note that 3210 cannot be abbreviated.  Zero compression, i.e. we can remove all the consecutive zeros and replace them with a double semicolon. 6
  • 7. IPv6 ADDRESSING  If there is more than one run of zero sections, only one of them can be compressed. Mixed Notation  (::130.24.24.18) appropriate during the transition period in which an IPv4 address is embedded in an IPv6 address (as the rightmost 32 bits). CIDR Notation  IPv6 uses hierarchical addressing. For this reason, IPv6 allows slash or CIDR notation e.g. the following shows prefix of 60 bits using CIDR FDEC::BBFF:0:FFFF/60 7
  • 8. IPv6 ADDRESSING Address Space  IPv6 contains 2128 addresses 340, 282, 366, 920, 938, 463, 463, 374, 607, 431, 768, 211, 456 Three Address Types  In IPv6, a destination address can belong to one of three categories: unicast, anycast, and multicast. 8
  • 9. IPv6 ADDRESSING Unicast Address  A unicast address defines a single interface (computer or router).  The packet sent to a unicast address will be routed to the intended recipient. Anycast Address  An anycast address defines a group of computers that all share a single address.  A packet with an anycast address is delivered to only one member of the group, the most reachable one. 9
  • 10. IPv6 ADDRESSING Multicast Address  A multicast address also defines a group of computers.  However, in anycasting, only one copy of the packet is sent to one of the members of the group; in multicasting each member of the group receives a copy.  IPv6 has designated a block for multicasting.  IPv6 does not define broadcasting, it considers broadcasting as a special case of multicasting. 10
  • 11. IPv6 ADDRESSING: ADDRESS SPACE ALLOCATION  Like the address space of IPv4, the address space of IPv6 is divided into several blocks of varying size and each block is allocated for a special purpose.  Most of the blocks are still unassigned and have been set aside for future use. 11
  • 12. IPv6 ADDRESSING: ADDRESS SPACE ALLOCATION Global Unicast Addresses… 12
  • 13. IPv6 ADDRESSING: ADDRESS SPACE ALLOCATION Global Unicast Addresses…  A link-layer address whose length is less than 64 bits can be embedded as the whole or part of the interface identifier, eliminating the mapping process.  Two common linklayer addressing schemes can be considered for this purpose: the 64-bit extended unique identifier (EUI-64) defined by IEEE and the 48-bit link-layer address defined by Ethernet. 13
  • 14. IPv6 ADDRESSING: ADDRESS SPACE ALLOCATION Global Unicast Addresses… 14
  • 15. IPv6 ADDRESSING: ADDRESS SPACE ALLOCATION Special Addresses  Addresses that use the prefix (0000::/8) are reserved, but part of this block is used to define some special addresses. 15
  • 16. IPv6 ADDRESSING: ADDRESS SPACE ALLOCATION  Other Assigned Blocks  IPv6 uses two large blocks for private addressing and one large block for multicasting. 16
  • 17. IPv6 ADDRESSING: AUTOCONFIGURATION  In IPv6, DHCP protocol can still be used to allocate an IPv6 address to a host, but a host can also configure itself.  When a host in IPv6 joins a network, it can configure itself using the following process: 1. The host first creates a link local address for itself. This is done by taking the 10-bit link local prefix (1111 1110 10), adding 54 zeros, and adding the 64-bit interface identifier, which any host knows how to generate from its interface card. The result is a 128-bit link local address. 17
  • 18. IPv6 ADDRESSING: AUTOCONFIGURATION 2. The host then tests to see if this link local address is unique and not used by other hosts. Since the 64-bit interface identifier is supposed to be unique, the link local address generated is unique with a high probability. However, to be sure, the host sends a neighbor solicitation message (see Chapter 28) and waits for a neighbor advertisement message. If any host in the subnet is using this link local address, the process fails and the host cannot autoconfigure itself; it needs to use other means such as DHCP for this purpose. 18
  • 19. IPv6 ADDRESSING: AUTOCONFIGURATION 3. If the uniqueness of the link local address is passed, the host stores this address as its link local address (for private communication), but it still needs a global unicast address. The host then sends a router solicitation message (discussed later in the chapter) to a local router. If there is a router running on the network, the host receives a router advertisement message that includes the global unicast prefix and the subnet prefix that the host needs to add to its interface identifier to generate its global unicast address. If the router cannot help the host with the configuration, it informs the host in the router advertisement message (by setting a flag). The host then needs to use other means for configuration. 19
  • 20. IPv6 ADDRESSING: RENUMBERING  To allow sites to change the service provider, renumbering of the address prefix (n) was built into IPv6 addressing.  Each site is given a prefix by the service provider to which it is connected.  If the site changes the provider, the address prefix needs to be changed.  A router to which the site is connected can advertise a new prefix and let the site use the old prefix for a short time before disabling it. 20
  • 21. IPv6 ADDRESSING: RENUMBERING  In other words, during the transition period, a site has two prefixes.  The main problem in using the renumbering mechanism is the support of the DNS, which needs to propagate the new addressing associated with a domain name.  A new protocol for DNS, called Next Generation DNS, is under study to provide support for this mechanism. 21
  • 22. THE IPv6 PROTOCOL  The following shows other changes implemented in the protocol in addition to changing address size and format.  Better header format. IPv6 uses a new header format in which options are separated from the base header and inserted, when needed, between the base header and the data. This simplifies and speeds up the routing process because most of the options do not need to be checked by routers.  New options. IPv6 has new options to allow for additional functionalities. 22
  • 23. THE IPv6 PROTOCOL  Allowance for extension. IPv6 is designed to allow the extension of the protocol if required by new technologies or applications.  Support for resource allocation. In IPv6, the type-of- service field has been removed, but two new fields, traffic class and flow label, have been added to enable the source to request special handling of the packet. This mechanism can be used to support traffic such as real-time audio and video.  Support for more security. The encryption and authentication options in IPv6 provide confidentiality and integrity of the packet. 23
  • 25. THE IPv6 PROTOCOL: PACKET FORMAT  Version. The 4-bit version field defines the version number of the IP. For IPv6, the value is 6.  Traffic class. The 8-bit traffic class field is used to distinguish different payloads with different delivery requirements. It replaces the type-of-service field in IPv4.  Flow label. The flow label is a 20-bit field that is designed to provide special handling for a particular flow of data. We will discuss this field later. 25
  • 26. THE IPv6 PROTOCOL: PACKET FORMAT  Payload length. The 2-byte payload length field defines the length of the IP datagram excluding the header. Note that IPv4 defines two fields related to the length: header length and total length. In IPv6, the length of the base header is fixed (40 bytes); only the length of the payload needs to be defined.  Next header. It is an 8-bit field defining the type of the first extension header (if present) or the type of the data that follows the base header in the datagram. This field is similar to the protocol field in IPv4, but we talk more about it when we discuss the payload. 26
  • 27. THE IPv6 PROTOCOL: PACKET FORMAT  Hop limit. The 8-bit hop limit field serves the same purpose as the TTL field in IPv4.  Source and destination addresses. The source address field is a 16-byte (128-bit) Internet address that identifies the original source of the datagram. The destination address field is a 16-byte (128-bit) Internet address that identifies the destination of the datagram.  Payload. Compared to IPv4, the payload field in IPv6 has a different format and meaning 27
  • 29. THE IPv6 PROTOCOL: PACKET FORMAT  The payload in IPv6 means a combination of zero or more extension headers (options) followed by the data from other protocols (UDP, TCP, and so on).  In IPv6, options, which are part of the header in IPv4, are designed as extension headers.  The payload can have as many extension headers as required by the situation.  Each extension header has two mandatory fields, next header and the length, followed by information related to the particular option. 29
  • 30. THE IPv6 PROTOCOL: PACKET FORMAT  Concept of Flow and Priority in IPv6  In IPv6, the flow label has been directly added to IPv6 datagram to allow us to use IPv6 as a connection-oriented protocol.  To a router, a flow is a sequence of packets that share the same characteristics, such as traveling the same path, using the same resources, having the same kind of security, and so on.  In its simplest form, a flow label can be used to speed up the processing of a packet by a router. In its more sophisticated form, a flow label can be used to support the transmission of real-time audio and video. 30
  • 31. THE IPv6 PROTOCOL: PACKET FORMAT  Fragmentation and Reassembly  IPv6 datagrams can be fragmented only by the source, not by the routers; the reassembly takes place at the destination.  The fragmentation of packets at routers is not allowed to speed up the processing of packets in the router. 31
  • 32. THE IPv6 PROTOCOL: PACKET FORMAT  Extension Header  An IPv6 packet is made of a base header and some extension headers.  The length of the base header is fixed at 40 bytes.  However, to give more functionality to the IP datagram, the base header can be followed by up to six extension headers. 32
  • 33. THE IPv6 PROTOCOL: OPTIONS  Comparison of Options between IPv4 and IPv6  The no-operation and end-of-option options in IPv4 are replaced by Pad1 and PadN options in IPv6.  The record route option is not implemented in IPv6 because it was not used.  The timestamp option is not implemented because it was not used.  The source route option is called the source route extension header in IPv6.  The fragmentation fields in the base header section of IPv4 have moved to the fragmentation extension header in IPv6.  The authentication extension header is new in IPv6.  The encrypted security payload extension header is new in IPv6. 33
  • 34. THE ICMPV6 PROTOCOL  The ICMP, ARP (Chapter 9), and IGMP protocols in version 4 (Chapter 21) are combined into one single protocol, ICMPv6. 34
  • 35. THE ICMPV6 PROTOCOL  We can divide the messages in ICMPv6 into four groups: 35
  • 36. THE ICMPV6 PROTOCOL  Error-Reporting Messages  Destination-Unreachable Message  Packet-Too-Big Message  Time-Exceeded Message  Parameter-Problem Message  Informational Messages  Echo-Request Message  Echo-Reply Message 36
  • 37. THE ICMPV6 PROTOCOL  Neighbor-Discovery Messages  Router-Solicitation Message  Router-Advertisement Message  Neighbor-Solicitation Message  Neighbor-Advertisement Message  Redirection Message  Inverse-Neighbor-Solicitation Message  Inverse-Neighbor-Advertisement Message  Group Membership Messages  Membership-Query Message  Membership-Report Message 37
  • 38. TRANSITION FROM IPV4 TO IPV6  Because of the huge number of systems in the Internet, the transition from IPv4 to IPv6 cannot happen suddenly.  It will take a considerable amount of time before every system in the Internet can move from IPv4 to IPv6.  The transition must be smooth to prevent any problems between IPv4 and IPv6 systems.  Three strategies have been devised for transition: dual stack, tunneling, and header translation.  One or all of these three strategies can be implemented during the transition period. 38
  • 39. TRANSITION FROM IPV4 TO IPV6: STRATEGIES 39