SlideShare a Scribd company logo
1 of 18
1/29/2015 1
Shashwat Shriparv
dwivedishashwat@gmail.com
InfinitySoft
1/29/2015 2
STARTING
ā€¢ It was in 1990 that (Internet Engineering Task Force) IETF
started working on a new version of Internet Protocol (IP),
one which would never run out of address, would solve a
variety of other problems, and be more flexible and efficient
as well. Its major goals were to:-
1) Support billions of hosts
2) Reduce the size of the routing tables
3) Simplify the protocols
4) Provide better security and authentication.
5) Pay more attention to type of services
6) Add multicasting
7) Allow the protocol to evolve in future
8) Permit the old and new protocol to coexist for yearsā€¦
1/29/2015 3
ā€¢ From a large number of proposals ,a modified combined version by now
called SIPP (Simple Internet Protocol Plus) was selected and given the
designation IPv6.
ā€¢ IPv6 meets the goals fairly well. It maintains the good features of IP,
discards the bad ones and add new ones when needed. In general IPv6 is
not compatible with IPv4 but is compatible with all other Internet protocols
including TCP,DNS,UDP etcā€¦
ā€¢ MAIN FEATURES
ļƒ¼ IPv6 has longer address than IPv4.
ļƒ¼ Simplification of header.
ļƒ¼ Better support for options
ļƒ¼ Big advance in security.
ļƒ¼ More attention to the type of services
1/29/2015 4
MAIN IPv6 HEADER ā€¢ The Version field is always 6 for
IPv6 and 4 for IPv4.
ā€¢ The Priority Field is used to
distinguish between packets
whose sources can be flow
controlled and those that cannot.
Values 0 to 7 are for
transmissions that are capable of
slowing down in view of
congestion. Values 8 to 15 are for
real time traffic whose sending
rate is constant, even if all the
packets are lost. This distinction
allows the router to deal with
packets better in event of
congestion. Within each group,
low-numbered are less important
than high numbered. The IPv6
standard suggests to use
1ļƒ  News
4ļƒ  FTP
6ļƒ  Telnet
1/29/2015 5
CONTDā€¦..
o The Flow label field is under experimentation and will be
used to allow a source and destination to set up a
pseudoconnection with particular properties and connections.
The flow can be set up in advance and given an identifier.
ā€¢ Each flow is designated by the source address, destination
address and flow numbers. Even if 2 flows coming from
different hosts but with the same flow number pass thru the
same router, the router will be able to tell them apart with the
help of source and destination address. Flow numbers will be
chosen randomly rather than assigned sequentially starting
from 1.
ā€¢ The Payload length field tells how many bytes follow the 40-
byte header..
1/29/2015 6
FOLLOWED BYā€¦..
ā€¢ The Next header field tells which of the currently 6 extension header
follows this one. If this header is the last IP header, the next header field
tells which transport protocol handler (e.g. TCP,UDP) to pass the packet to.
ā€¢ The Hop limit field is used to keep packets from living forever. It is same
as the Time to live field in IPv4 a field that is decremented on each hop..
ā€¢ Next is the Source address and Destination address fields. In the original
proposal, SIP used 8-byte address. But during many process reviews it was
felt that with 8-byte address IPv6 would run out of address within a span of
time and 16-byte address would never. So the latter was fixed.
1/29/2015 7
IPv6 ADDRESS SPACES
Prefix (Binary) Usage Fraction
0000 0000 Reserved (Including IPv4) 1/256
0000 0001 Unassigned 1/256
0000 001 OSI NSAP addresses 1/128
0000 010 Novell Netware IPX addresses 1/128
0000 011 Unassigned 1/128
0000 1 Unassigned 1/32
0001 Unassigned 1/16
001 Unassigned 1/8
010 Provider based addresses 1/8
011 Unassigned 1/8
1/29/2015 8
Prefix (Binary) Usage Fraction
100 Geographic base address 1/8
101 Unassigned 1/8
110 Unassigned 1/8
1110 Unassigned 1/16
11110 Unassigned 1/32
1111 10 Unassigned 1/64
1111 110 Unassigned 1/128
1111 1110 0 Unassigned 1/512
1111 1110 10 Link Local use address 1/1024
1111 1110 11 Site Local use address 1/1024
1111 1111 Multicast 1/256
1/29/2015 9
DETAILSā€¦
ā€¢ The IPv6 address space is divided as shown above. Addresses beginning
with 80 zeroes are reserved for IPv4 addresses. Two variants are supported,
distinguished by the next 16 bits. These variants relate to how IPv6 packets
will be tunneled over the existing IPv4 infrastructureā€¦
ā€¢ Multicast address have a 4 bit flag field and a 4 bit scope field following
the prefix, then a 112-bit group identifier. One of the flag bits in it
distinguishes permanent from transient groups. The scope field allows
multicast to be limited to the current link, site ,organization or planet.
These 4 scopes are spread out over the 16 values to allow new scopes to be
added laterā€¦
ā€¢ In addition to supporting standard unicast (point-to-point) and multicast
addresses, IPv6 also supports new kind of addressing, anycast which is like
multicasting, in that the destination is a group of addresses, but instead of
trying to deliver the packet to all of them, it tries to deliver it to just one,
usually the nearest oneā€¦
1/29/2015 10
COMPARISON OF IPv4 HEADER & IPv6
HEADER
1/29/2015 11
ā€¢ Purpose of comparing the IPv4 header with the IPv6 Header is to see what
has been left out of IPv6.:-
ā˜» The IHL Field in IPv4 is gone as the Next Header field in IPv6 tells what
follows the last IP header.
ā˜» All the fields relating to fragmentation in IPv4 were removed bcoz IPv6
takes a different approach to fragmentation. All IPv6 hosts and routers must
support packets of 576 bytes. This rule makes fragmentation less likely to
occur.
ā˜» Finally the Checksum field in IPv4 is gone bcoz it greatly reduces
performance. Removing all these features has resulted in lean and mean
network layer protocol which is IPv6ā€¦
1/29/2015 12
EXTENSION HEADERS
ā€¢ Each of the extension headers are optional, but if more than one is present,
they must appear directly after the fixed header. Some of the headers have a
fixed format while others contain a variable number of variable length
fields. Each item is encoded as a tuple (Type, Length, Value)ā€¦
ā€¢ The Type is a 1-byte field telling which option is chosen. Its values have
been chosen so that the first 2 bits tell the routers how to process the
options when they do not know. The choices are skip the option, discard
the packet and send back an ICMP packet, discard the packet and do not
send back an ICMP packet, to multicast addresses.
ā€¢ The Length is a 1-byte field. It tells how long the value is (0 to 255 bytes).
ā€¢ The Value is any information required upto 255 bytesā€¦
ā€¢ The different kinds of extension headers defined at present are listed in
detail belowā€¦.
1/29/2015 13
Extension header Description
Hop-by-hop options Miscellaneous information for routers
Routing Full or partial route to follow
Fragmentation Management of datagram packets
Authentication Verification of senderā€™s identity
Encrypted security payload Information about the encrypted contents
Destination options Additional information for destination
1/29/2015 14
HOP-BY-HOP
ā€¢ Used for information that all routers along the path must examine.
ā€¢ Format
Next Header 0 194 0
Jumbo payload length
ā€¢Like all extension headers, this one starts out with a byte telling
what kind of header comes the next. This byte is then followed by
another one which tells the duration for which the hop-by-hop header is
in bytes. The next 2 bytes defines the datagram size as a 4-byte number.
The last 4-byte gives the size of the datagram. Sizes less than 65,536 are
not permitted and will Result in router discarding the packet and sending
back an ICMP error message. The datagram's using this header are called
Jumbograms. Its use is important for supercomputer applicationsā€¦
1/29/2015 15
ROUTING HEADER
ā€¢ It lists one or more routers that must be visited on the way to the
destinations. Two types of routing are available.
ā€¢ Strict routingļƒ  The full path is supplied
ā€¢ Loose routingļƒ  Only selected routers are supplied
ā€¢ Format
Next Header 0 Number of
address
Next Address
Bit Map
1-24 Addresses
1/29/2015 16
CONTDā€¦
ā€¢ The first 4 bytes contains four 1-byte integers: the next header type, the
routing type (currently 0), the number of addresses present in the header (1
to 24) and the index of the next address to visit. The latter field starts at 0
and is incremented as each address is visited.
ā€¢ Then comes a reserved byte followed by the bit map with bits which tells
whether each address must follow strict source routing or loose source
routing.
ā€¢ The fragment header deals with fragmentation. In IPv6 only the source
host can fragment a packet.
ā€¢ The Authentication header provides a mechanism by which the receiver
of a packet can be sure of who send it. These headers use cryptographic
techniques to accomplish their missions. It contains 3 parts. First part has 4-
bytes holding the next header number, length of authentication header and
16 zero bits. Then comes the 32-bit key number. Finally the checksum. The
payload of authentication header is sent unencrypted.
1/29/2015 17
ā€¢ Encrypted security payload extension header is used for packets that
must be sent secretly. It starts out with a 32-bit key number followed by the
encrypted payload.
ā€¢ The Destination option header is intended for fields that needs to be
interpreted at the destination host.
1/29/2015 18
Shashwat Shriparv
dwivedishashwat@gmail.com
InfinitySoft

More Related Content

What's hot

Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheetbalamurugan N
Ā 
Part 9 : Congestion control and IPv6
Part 9 : Congestion control and IPv6Part 9 : Congestion control and IPv6
Part 9 : Congestion control and IPv6Olivier Bonaventure
Ā 
Internet innovation with Multipath TCP
Internet innovation with Multipath TCPInternet innovation with Multipath TCP
Internet innovation with Multipath TCPOlivier Bonaventure
Ā 
Part 7 : HTTP/2, UDP and TCP
Part 7 : HTTP/2, UDP and TCPPart 7 : HTTP/2, UDP and TCP
Part 7 : HTTP/2, UDP and TCPOlivier Bonaventure
Ā 
Innovation is back in the transport and network layers
Innovation is back in the transport and network layersInnovation is back in the transport and network layers
Innovation is back in the transport and network layersOlivier Bonaventure
Ā 
Network interview questions
Network interview questionsNetwork interview questions
Network interview questionsrajasekar1712
Ā 
Deploy ipv6 multicast_v0_1
Deploy ipv6 multicast_v0_1Deploy ipv6 multicast_v0_1
Deploy ipv6 multicast_v0_1Nguyen Thanh
Ā 
IPv6 Segment Routing : an end-to-end solution ?
IPv6 Segment Routing : an end-to-end solution ?IPv6 Segment Routing : an end-to-end solution ?
IPv6 Segment Routing : an end-to-end solution ?Olivier Bonaventure
Ā 
Dynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPFDynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPFAtakan ATAK
Ā 
BGP Overview
BGP OverviewBGP Overview
BGP OverviewMatt Bynum
Ā 
IPv6 Entreprise Multihoming
IPv6 Entreprise MultihomingIPv6 Entreprise Multihoming
IPv6 Entreprise MultihomingOlivier Bonaventure
Ā 

What's hot (20)

Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
Ā 
Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheet
Ā 
Part 9 : Congestion control and IPv6
Part 9 : Congestion control and IPv6Part 9 : Congestion control and IPv6
Part 9 : Congestion control and IPv6
Ā 
Internet innovation with Multipath TCP
Internet innovation with Multipath TCPInternet innovation with Multipath TCP
Internet innovation with Multipath TCP
Ā 
Part 7 : HTTP/2, UDP and TCP
Part 7 : HTTP/2, UDP and TCPPart 7 : HTTP/2, UDP and TCP
Part 7 : HTTP/2, UDP and TCP
Ā 
Innovation is back in the transport and network layers
Innovation is back in the transport and network layersInnovation is back in the transport and network layers
Innovation is back in the transport and network layers
Ā 
Network Layer
Network LayerNetwork Layer
Network Layer
Ā 
Network interview questions
Network interview questionsNetwork interview questions
Network interview questions
Ā 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
Ā 
0-RTT TCP converters
0-RTT TCP converters0-RTT TCP converters
0-RTT TCP converters
Ā 
Deploy ipv6 multicast_v0_1
Deploy ipv6 multicast_v0_1Deploy ipv6 multicast_v0_1
Deploy ipv6 multicast_v0_1
Ā 
IPv6 Segment Routing : an end-to-end solution ?
IPv6 Segment Routing : an end-to-end solution ?IPv6 Segment Routing : an end-to-end solution ?
IPv6 Segment Routing : an end-to-end solution ?
Ā 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
Ā 
Dynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPFDynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPF
Ā 
BGP Overview
BGP OverviewBGP Overview
BGP Overview
Ā 
11 bgp-ethernet
11 bgp-ethernet11 bgp-ethernet
11 bgp-ethernet
Ā 
Igmp
IgmpIgmp
Igmp
Ā 
Future Internet protocols
Future Internet protocolsFuture Internet protocols
Future Internet protocols
Ā 
rip, ospf 13-14
rip, ospf 13-14rip, ospf 13-14
rip, ospf 13-14
Ā 
IPv6 Entreprise Multihoming
IPv6 Entreprise MultihomingIPv6 Entreprise Multihoming
IPv6 Entreprise Multihoming
Ā 

Viewers also liked

Viewers also liked (18)

My sql
My sqlMy sql
My sql
Ā 
Hdmi
HdmiHdmi
Hdmi
Ā 
Gps
GpsGps
Gps
Ā 
Firewalls
FirewallsFirewalls
Firewalls
Ā 
Next generation technology
Next generation technologyNext generation technology
Next generation technology
Ā 
H base introduction & development
H base introduction & developmentH base introduction & development
H base introduction & development
Ā 
Fundamental programming structures in java
Fundamental programming structures in javaFundamental programming structures in java
Fundamental programming structures in java
Ā 
Infinitytech
InfinitytechInfinitytech
Infinitytech
Ā 
Hadoop migration and upgradation
Hadoop migration and upgradationHadoop migration and upgradation
Hadoop migration and upgradation
Ā 
Dynamic storage allocation techniques
Dynamic storage allocation techniquesDynamic storage allocation techniques
Dynamic storage allocation techniques
Ā 
Control statements in java
Control statements in javaControl statements in java
Control statements in java
Ā 
R language introduction
R language introductionR language introduction
R language introduction
Ā 
I mode
I modeI mode
I mode
Ā 
Honeypot
HoneypotHoneypot
Honeypot
Ā 
Database design concept
Database design conceptDatabase design concept
Database design concept
Ā 
Desirable software features simulation & modeling
Desirable software features simulation & modelingDesirable software features simulation & modeling
Desirable software features simulation & modeling
Ā 
Graphics processing unit
Graphics processing unitGraphics processing unit
Graphics processing unit
Ā 
Hbase
HbaseHbase
Hbase
Ā 

Similar to IPv6 Header Explained

A very good introduction to IPv6
A very good introduction to IPv6A very good introduction to IPv6
A very good introduction to IPv6Syed Arshad
Ā 
I pv6(internet protocol version 6)
I pv6(internet protocol version 6)I pv6(internet protocol version 6)
I pv6(internet protocol version 6)Subrata Kumer Paul
Ā 
Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Karunakant Rai
Ā 
Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6Zalak Patel
Ā 
Networking essentials lect2
Networking essentials lect2Networking essentials lect2
Networking essentials lect2Roman Brovko
Ā 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdfniran10
Ā 
IP Routing.pptx
IP Routing.pptxIP Routing.pptx
IP Routing.pptxssuser957b41
Ā 
I pv4 vs ipv6
I pv4 vs ipv6I pv4 vs ipv6
I pv4 vs ipv6liiramlkprov
Ā 
Unit 2- Next Generation IP-1.pptx
Unit 2- Next Generation IP-1.pptxUnit 2- Next Generation IP-1.pptx
Unit 2- Next Generation IP-1.pptxDESTROYER39
Ā 
Ipv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaIpv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaJigar Tarsariya
Ā 
IPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolIPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolMohit Sharma
Ā 
Introduction to IPv6-UoN
Introduction to IPv6-UoNIntroduction to IPv6-UoN
Introduction to IPv6-UoNMwendwa Kivuva
Ā 
IPv6 Community Event: IPv6 Protocol Architecture
IPv6 Community Event: IPv6 Protocol ArchitectureIPv6 Community Event: IPv6 Protocol Architecture
IPv6 Community Event: IPv6 Protocol ArchitectureAPNIC
Ā 

Similar to IPv6 Header Explained (20)

IPv4.pdf
IPv4.pdfIPv4.pdf
IPv4.pdf
Ā 
A very good introduction to IPv6
A very good introduction to IPv6A very good introduction to IPv6
A very good introduction to IPv6
Ā 
I pv6(internet protocol version 6)
I pv6(internet protocol version 6)I pv6(internet protocol version 6)
I pv6(internet protocol version 6)
Ā 
Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Introduction to ipv6 v1.3
Introduction to ipv6 v1.3
Ā 
Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6
Ā 
Networking essentials lect2
Networking essentials lect2Networking essentials lect2
Networking essentials lect2
Ā 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdf
Ā 
IP Routing.pptx
IP Routing.pptxIP Routing.pptx
IP Routing.pptx
Ā 
UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
Ā 
I.p. protocol
I.p. protocolI.p. protocol
I.p. protocol
Ā 
IPv6
IPv6IPv6
IPv6
Ā 
Introduction of ipv6
Introduction of ipv6Introduction of ipv6
Introduction of ipv6
Ā 
IPv6 By Vipin
IPv6 By VipinIPv6 By Vipin
IPv6 By Vipin
Ā 
I pv4 vs ipv6
I pv4 vs ipv6I pv4 vs ipv6
I pv4 vs ipv6
Ā 
Unit 2- Next Generation IP-1.pptx
Unit 2- Next Generation IP-1.pptxUnit 2- Next Generation IP-1.pptx
Unit 2- Next Generation IP-1.pptx
Ā 
Ipv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaIpv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar Tarsariya
Ā 
Introduction to IPv6
Introduction to IPv6Introduction to IPv6
Introduction to IPv6
Ā 
IPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolIPv6 - The Next next generation protocol
IPv6 - The Next next generation protocol
Ā 
Introduction to IPv6-UoN
Introduction to IPv6-UoNIntroduction to IPv6-UoN
Introduction to IPv6-UoN
Ā 
IPv6 Community Event: IPv6 Protocol Architecture
IPv6 Community Event: IPv6 Protocol ArchitectureIPv6 Community Event: IPv6 Protocol Architecture
IPv6 Community Event: IPv6 Protocol Architecture
Ā 

More from Shashwat Shriparv

Learning Linux Series Administrator Commands.pptx
Learning Linux Series Administrator Commands.pptxLearning Linux Series Administrator Commands.pptx
Learning Linux Series Administrator Commands.pptxShashwat Shriparv
Ā 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptxShashwat Shriparv
Ā 
Suspending a Process in Linux.pptx
Suspending a Process in Linux.pptxSuspending a Process in Linux.pptx
Suspending a Process in Linux.pptxShashwat Shriparv
Ā 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptxShashwat Shriparv
Ā 
Command Seperators.pptx
Command Seperators.pptxCommand Seperators.pptx
Command Seperators.pptxShashwat Shriparv
Ā 
Hive query optimization infinity
Hive query optimization infinityHive query optimization infinity
Hive query optimization infinityShashwat Shriparv
Ā 
Hbase interact with shell
Hbase interact with shellHbase interact with shell
Hbase interact with shellShashwat Shriparv
Ā 
Introduction to apache hadoop
Introduction to apache hadoopIntroduction to apache hadoop
Introduction to apache hadoopShashwat Shriparv
Ā 
Configure h base hadoop and hbase client
Configure h base hadoop and hbase clientConfigure h base hadoop and hbase client
Configure h base hadoop and hbase clientShashwat Shriparv
Ā 
Java interview questions
Java interview questionsJava interview questions
Java interview questionsShashwat Shriparv
Ā 
Intermediate code generation1
Intermediate code generation1Intermediate code generation1
Intermediate code generation1Shashwat Shriparv
Ā 
Information system availibility control
Information system availibility controlInformation system availibility control
Information system availibility controlShashwat Shriparv
Ā 

More from Shashwat Shriparv (20)

Learning Linux Series Administrator Commands.pptx
Learning Linux Series Administrator Commands.pptxLearning Linux Series Administrator Commands.pptx
Learning Linux Series Administrator Commands.pptx
Ā 
LibreOffice 7.3.pptx
LibreOffice 7.3.pptxLibreOffice 7.3.pptx
LibreOffice 7.3.pptx
Ā 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
Ā 
Suspending a Process in Linux.pptx
Suspending a Process in Linux.pptxSuspending a Process in Linux.pptx
Suspending a Process in Linux.pptx
Ā 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
Ā 
Command Seperators.pptx
Command Seperators.pptxCommand Seperators.pptx
Command Seperators.pptx
Ā 
Upgrading hadoop
Upgrading hadoopUpgrading hadoop
Upgrading hadoop
Ā 
Hive query optimization infinity
Hive query optimization infinityHive query optimization infinity
Hive query optimization infinity
Ā 
Hbase interact with shell
Hbase interact with shellHbase interact with shell
Hbase interact with shell
Ā 
H base development
H base developmentH base development
H base development
Ā 
H base
H baseH base
H base
Ā 
Apache tomcat
Apache tomcatApache tomcat
Apache tomcat
Ā 
Linux 4 you
Linux 4 youLinux 4 you
Linux 4 you
Ā 
Introduction to apache hadoop
Introduction to apache hadoopIntroduction to apache hadoop
Introduction to apache hadoop
Ā 
Configure h base hadoop and hbase client
Configure h base hadoop and hbase clientConfigure h base hadoop and hbase client
Configure h base hadoop and hbase client
Ā 
Java interview questions
Java interview questionsJava interview questions
Java interview questions
Ā 
C# interview quesions
C# interview quesionsC# interview quesions
C# interview quesions
Ā 
Inventory system
Inventory systemInventory system
Inventory system
Ā 
Intermediate code generation1
Intermediate code generation1Intermediate code generation1
Intermediate code generation1
Ā 
Information system availibility control
Information system availibility controlInformation system availibility control
Information system availibility control
Ā 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
Ā 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
Ā 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
Ā 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
Ā 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
Ā 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
Ā 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
Ā 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
Ā 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
Ā 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
Ā 
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhisoniya singh
Ā 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
Ā 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
Ā 
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge GraphSIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge GraphNeo4j
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
Ā 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
Ā 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
Ā 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ā 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Ā 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Ā 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Ā 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Ā 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Ā 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Ā 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Ā 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Ā 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Ā 
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
Ā 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Ā 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Ā 
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge GraphSIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Ā 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Ā 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Ā 

IPv6 Header Explained

  • 2. 1/29/2015 2 STARTING ā€¢ It was in 1990 that (Internet Engineering Task Force) IETF started working on a new version of Internet Protocol (IP), one which would never run out of address, would solve a variety of other problems, and be more flexible and efficient as well. Its major goals were to:- 1) Support billions of hosts 2) Reduce the size of the routing tables 3) Simplify the protocols 4) Provide better security and authentication. 5) Pay more attention to type of services 6) Add multicasting 7) Allow the protocol to evolve in future 8) Permit the old and new protocol to coexist for yearsā€¦
  • 3. 1/29/2015 3 ā€¢ From a large number of proposals ,a modified combined version by now called SIPP (Simple Internet Protocol Plus) was selected and given the designation IPv6. ā€¢ IPv6 meets the goals fairly well. It maintains the good features of IP, discards the bad ones and add new ones when needed. In general IPv6 is not compatible with IPv4 but is compatible with all other Internet protocols including TCP,DNS,UDP etcā€¦ ā€¢ MAIN FEATURES ļƒ¼ IPv6 has longer address than IPv4. ļƒ¼ Simplification of header. ļƒ¼ Better support for options ļƒ¼ Big advance in security. ļƒ¼ More attention to the type of services
  • 4. 1/29/2015 4 MAIN IPv6 HEADER ā€¢ The Version field is always 6 for IPv6 and 4 for IPv4. ā€¢ The Priority Field is used to distinguish between packets whose sources can be flow controlled and those that cannot. Values 0 to 7 are for transmissions that are capable of slowing down in view of congestion. Values 8 to 15 are for real time traffic whose sending rate is constant, even if all the packets are lost. This distinction allows the router to deal with packets better in event of congestion. Within each group, low-numbered are less important than high numbered. The IPv6 standard suggests to use 1ļƒ  News 4ļƒ  FTP 6ļƒ  Telnet
  • 5. 1/29/2015 5 CONTDā€¦.. o The Flow label field is under experimentation and will be used to allow a source and destination to set up a pseudoconnection with particular properties and connections. The flow can be set up in advance and given an identifier. ā€¢ Each flow is designated by the source address, destination address and flow numbers. Even if 2 flows coming from different hosts but with the same flow number pass thru the same router, the router will be able to tell them apart with the help of source and destination address. Flow numbers will be chosen randomly rather than assigned sequentially starting from 1. ā€¢ The Payload length field tells how many bytes follow the 40- byte header..
  • 6. 1/29/2015 6 FOLLOWED BYā€¦.. ā€¢ The Next header field tells which of the currently 6 extension header follows this one. If this header is the last IP header, the next header field tells which transport protocol handler (e.g. TCP,UDP) to pass the packet to. ā€¢ The Hop limit field is used to keep packets from living forever. It is same as the Time to live field in IPv4 a field that is decremented on each hop.. ā€¢ Next is the Source address and Destination address fields. In the original proposal, SIP used 8-byte address. But during many process reviews it was felt that with 8-byte address IPv6 would run out of address within a span of time and 16-byte address would never. So the latter was fixed.
  • 7. 1/29/2015 7 IPv6 ADDRESS SPACES Prefix (Binary) Usage Fraction 0000 0000 Reserved (Including IPv4) 1/256 0000 0001 Unassigned 1/256 0000 001 OSI NSAP addresses 1/128 0000 010 Novell Netware IPX addresses 1/128 0000 011 Unassigned 1/128 0000 1 Unassigned 1/32 0001 Unassigned 1/16 001 Unassigned 1/8 010 Provider based addresses 1/8 011 Unassigned 1/8
  • 8. 1/29/2015 8 Prefix (Binary) Usage Fraction 100 Geographic base address 1/8 101 Unassigned 1/8 110 Unassigned 1/8 1110 Unassigned 1/16 11110 Unassigned 1/32 1111 10 Unassigned 1/64 1111 110 Unassigned 1/128 1111 1110 0 Unassigned 1/512 1111 1110 10 Link Local use address 1/1024 1111 1110 11 Site Local use address 1/1024 1111 1111 Multicast 1/256
  • 9. 1/29/2015 9 DETAILSā€¦ ā€¢ The IPv6 address space is divided as shown above. Addresses beginning with 80 zeroes are reserved for IPv4 addresses. Two variants are supported, distinguished by the next 16 bits. These variants relate to how IPv6 packets will be tunneled over the existing IPv4 infrastructureā€¦ ā€¢ Multicast address have a 4 bit flag field and a 4 bit scope field following the prefix, then a 112-bit group identifier. One of the flag bits in it distinguishes permanent from transient groups. The scope field allows multicast to be limited to the current link, site ,organization or planet. These 4 scopes are spread out over the 16 values to allow new scopes to be added laterā€¦ ā€¢ In addition to supporting standard unicast (point-to-point) and multicast addresses, IPv6 also supports new kind of addressing, anycast which is like multicasting, in that the destination is a group of addresses, but instead of trying to deliver the packet to all of them, it tries to deliver it to just one, usually the nearest oneā€¦
  • 10. 1/29/2015 10 COMPARISON OF IPv4 HEADER & IPv6 HEADER
  • 11. 1/29/2015 11 ā€¢ Purpose of comparing the IPv4 header with the IPv6 Header is to see what has been left out of IPv6.:- ā˜» The IHL Field in IPv4 is gone as the Next Header field in IPv6 tells what follows the last IP header. ā˜» All the fields relating to fragmentation in IPv4 were removed bcoz IPv6 takes a different approach to fragmentation. All IPv6 hosts and routers must support packets of 576 bytes. This rule makes fragmentation less likely to occur. ā˜» Finally the Checksum field in IPv4 is gone bcoz it greatly reduces performance. Removing all these features has resulted in lean and mean network layer protocol which is IPv6ā€¦
  • 12. 1/29/2015 12 EXTENSION HEADERS ā€¢ Each of the extension headers are optional, but if more than one is present, they must appear directly after the fixed header. Some of the headers have a fixed format while others contain a variable number of variable length fields. Each item is encoded as a tuple (Type, Length, Value)ā€¦ ā€¢ The Type is a 1-byte field telling which option is chosen. Its values have been chosen so that the first 2 bits tell the routers how to process the options when they do not know. The choices are skip the option, discard the packet and send back an ICMP packet, discard the packet and do not send back an ICMP packet, to multicast addresses. ā€¢ The Length is a 1-byte field. It tells how long the value is (0 to 255 bytes). ā€¢ The Value is any information required upto 255 bytesā€¦ ā€¢ The different kinds of extension headers defined at present are listed in detail belowā€¦.
  • 13. 1/29/2015 13 Extension header Description Hop-by-hop options Miscellaneous information for routers Routing Full or partial route to follow Fragmentation Management of datagram packets Authentication Verification of senderā€™s identity Encrypted security payload Information about the encrypted contents Destination options Additional information for destination
  • 14. 1/29/2015 14 HOP-BY-HOP ā€¢ Used for information that all routers along the path must examine. ā€¢ Format Next Header 0 194 0 Jumbo payload length ā€¢Like all extension headers, this one starts out with a byte telling what kind of header comes the next. This byte is then followed by another one which tells the duration for which the hop-by-hop header is in bytes. The next 2 bytes defines the datagram size as a 4-byte number. The last 4-byte gives the size of the datagram. Sizes less than 65,536 are not permitted and will Result in router discarding the packet and sending back an ICMP error message. The datagram's using this header are called Jumbograms. Its use is important for supercomputer applicationsā€¦
  • 15. 1/29/2015 15 ROUTING HEADER ā€¢ It lists one or more routers that must be visited on the way to the destinations. Two types of routing are available. ā€¢ Strict routingļƒ  The full path is supplied ā€¢ Loose routingļƒ  Only selected routers are supplied ā€¢ Format Next Header 0 Number of address Next Address Bit Map 1-24 Addresses
  • 16. 1/29/2015 16 CONTDā€¦ ā€¢ The first 4 bytes contains four 1-byte integers: the next header type, the routing type (currently 0), the number of addresses present in the header (1 to 24) and the index of the next address to visit. The latter field starts at 0 and is incremented as each address is visited. ā€¢ Then comes a reserved byte followed by the bit map with bits which tells whether each address must follow strict source routing or loose source routing. ā€¢ The fragment header deals with fragmentation. In IPv6 only the source host can fragment a packet. ā€¢ The Authentication header provides a mechanism by which the receiver of a packet can be sure of who send it. These headers use cryptographic techniques to accomplish their missions. It contains 3 parts. First part has 4- bytes holding the next header number, length of authentication header and 16 zero bits. Then comes the 32-bit key number. Finally the checksum. The payload of authentication header is sent unencrypted.
  • 17. 1/29/2015 17 ā€¢ Encrypted security payload extension header is used for packets that must be sent secretly. It starts out with a 32-bit key number followed by the encrypted payload. ā€¢ The Destination option header is intended for fields that needs to be interpreted at the destination host.