This document discusses IPv6, including:
1. An overview of IPv6, which was developed to address the limited address space of IPv4 as internet usage grew exponentially.
2. IPv6 addresses are 128-bit and represented using eight groups of four hexadecimal digits separated by colons.
3. Reasons for the development of IPv6 include supporting more devices connected to the internet and incorporating security features not available in IPv4.
IPv6 is the most recent version of the Internet Protocol (IP), and was developed by IETF to overcome the inevitable exhaustion of IPv4 addresses. In order to simplify the transition towards IPv6, the protocol iterated very little on how IPv4 operates other than offering more address space. This inadvertently produced the exact opposite of the intended effect: with no compelling new features for anyone outside of network engineering, IPv6 deployment has been hampered for decades, as developers find increasingly creative ways of efficiently using IPv4 address space rather than bearing the cost of transition.
In this talk, Fastly Network Engineer João Taveira discusses these protocol design failures and instead explain how Fastly re-architected its infrastructure around IPv6. By addressing IPv6 in a clean-slate manner, Fastly avoided perpetuating many of the mistakes of IPv4, and the resulting network architecture has the potential to significantly affect the performance, resilience, and economics of content delivery.
You may have hoped to retire before IPv6 became a reality, but unfortunately the IPv4 address exhaustion came too fast. For the rest of us, we’re going to bite off a small piece of the 15-year old IPv6 pie and talk about how to get started!
• Address format refresher
• IPv4 and IPv6 protocol comparison
• IPv6 neighbor discovery and auto-configuration
• Current migration and coexistence strategies
• ICMPv6, DHCPv6, and DNSv6
• How to get started at home
"CHT IPv6 Measurement and Deployment" by Chia-Wei Tseng.
A presentation given at the APNIC 40 IPv6 Readiness Measurement BoF and APIPv6TF sessions on Wed 9 Sep 2015.
Pv6 Tutorial for Beginners - Learn IPv6 (Internet protocol Version-6) in simple and easy steps. A beginner's tutorial containing complete knowledge of IPv6, IPv6 Features,
IPv6 is the most recent version of the Internet Protocol (IP), and was developed by IETF to overcome the inevitable exhaustion of IPv4 addresses. In order to simplify the transition towards IPv6, the protocol iterated very little on how IPv4 operates other than offering more address space. This inadvertently produced the exact opposite of the intended effect: with no compelling new features for anyone outside of network engineering, IPv6 deployment has been hampered for decades, as developers find increasingly creative ways of efficiently using IPv4 address space rather than bearing the cost of transition.
In this talk, Fastly Network Engineer João Taveira discusses these protocol design failures and instead explain how Fastly re-architected its infrastructure around IPv6. By addressing IPv6 in a clean-slate manner, Fastly avoided perpetuating many of the mistakes of IPv4, and the resulting network architecture has the potential to significantly affect the performance, resilience, and economics of content delivery.
You may have hoped to retire before IPv6 became a reality, but unfortunately the IPv4 address exhaustion came too fast. For the rest of us, we’re going to bite off a small piece of the 15-year old IPv6 pie and talk about how to get started!
• Address format refresher
• IPv4 and IPv6 protocol comparison
• IPv6 neighbor discovery and auto-configuration
• Current migration and coexistence strategies
• ICMPv6, DHCPv6, and DNSv6
• How to get started at home
"CHT IPv6 Measurement and Deployment" by Chia-Wei Tseng.
A presentation given at the APNIC 40 IPv6 Readiness Measurement BoF and APIPv6TF sessions on Wed 9 Sep 2015.
Pv6 Tutorial for Beginners - Learn IPv6 (Internet protocol Version-6) in simple and easy steps. A beginner's tutorial containing complete knowledge of IPv6, IPv6 Features,
The Internet industry is undergoing a fundamental change as it transitions from IPv4 to IPv6. These slides are from the May 2011 webcast which provided an introduction to IPv6, covering the various issues and concerns about this new protocol, as well as the opportunities it offers.
The webcast featured Limor Schafman and Dale Geesey, IPv6 experts, discussing what IPv6 is, why it’s different, its advantages, the transition period from IPv4 and how organizations should start preparing.
You can view the webcast on the Commtouch Slideshare page.
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. IPv6 is intended to replace IPv4. Watch more: http://telecomacadmey.com/What-is-Ipv6/ ============================================================================================================ Join us on Site: http://telecomacadmey.com/ Join us on Facebook: https://www.facebook.com/Telecom-Acad... Join us on Twitter: https://twitter.com/TelecomAcad Join us on tumblr: https://www.tumblr.com/blog/telecomac... Join us on Quora: https://www.quora.com/profile/Telecom... Join us on Google +: https://plus.google.com/u/0/104392545... Join us on Instagram: https://www.instagram.com/telecomacad/ Join us on pinterest: https://www.pinterest.com/hamzathenet...
As with any new technology, IPv6 requires a learning curve for network managers and IT administration and operations personnel. This presentation covers many of the current best practices for approaching and progressing with an IPv6 deployment.
May 13, 2013, Swiss IPv6 Council Member Event.
The Impact of IPv6 to Net Politics
CGN Killer IPv6
- Why CGN isn't a good concept for the future, but IPv6 is.
464XLAT Tutorial, by Masataka Mawatari.
Presented at the APNIC 40 "Hypes? Fanfares? Fads? Wading through the muddy IPv6 puddle" session, Wed 9 Sep 2015.
The issue of deploying IPv6 Technology has been a topic of debate for more than a decade now.
Professionals have been discussing on the transition from Internet Protocol version 4 (IPVv4) to Internet
Protocol version 6 (IPv6) due to the fact that the IPv4 address space would soon be exhausted.
In this paper, we analyse the IPv4 and IPv6 technologies and look at the benefits of migrating to IPv6,
its social implications, risks & challenges and the opportunities the IPv6 migration offers
Today's Internet faces severe challenges including:
* IPv4 address exhaustion
* explosion of BGP tables and IP routing tables
* exponential traffic growth (which might not be a problem after all)
CommunicAsia 2017: IPv6 deployment architecture for IoTAPNIC
APNIC Training and Technical Assistance Manager Nurul Islam discusses the design options for IPv6 in a broadband access network and the impact that IoT will have on this in order to support future growth at CommunicAsia 2017.
IPv6 Success Stories– Network Operators Tell All!
Asela Galappattige (Sri Lanka Telecom); Senevi Herath (LEARN); Patrick Okui (Network Startup Resource Center); Matsuzaki Yoshinobu (IIJ)
In this session, we invite network operators to share their IPv6 success stories and lessons learned along the way that can help other managers of networks deploy IPv6. How did they do it? What technical, organizational, and political challenges did they face? Attendees will gain vital insight as network operators lay out the stages for IPv6 implementation—creating the business case for management buy-in, initiating a planning process, flipping the switch, and, finally, gathering measurements and proving success.
Welcome to the APNIC Member Gathering, MongoliaAPNIC
Services Director George Kuo presents on IPv6 deployment in the region; IPv6 in broadband networks, getting more IPv4 address space; APNIC whois data quality, and routing security at a Member Gathering in Mongolia from 13 to 14 June 2017.
The Internet industry is undergoing a fundamental change as it transitions from IPv4 to IPv6. These slides are from the May 2011 webcast which provided an introduction to IPv6, covering the various issues and concerns about this new protocol, as well as the opportunities it offers.
The webcast featured Limor Schafman and Dale Geesey, IPv6 experts, discussing what IPv6 is, why it’s different, its advantages, the transition period from IPv4 and how organizations should start preparing.
You can view the webcast on the Commtouch Slideshare page.
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. IPv6 is intended to replace IPv4. Watch more: http://telecomacadmey.com/What-is-Ipv6/ ============================================================================================================ Join us on Site: http://telecomacadmey.com/ Join us on Facebook: https://www.facebook.com/Telecom-Acad... Join us on Twitter: https://twitter.com/TelecomAcad Join us on tumblr: https://www.tumblr.com/blog/telecomac... Join us on Quora: https://www.quora.com/profile/Telecom... Join us on Google +: https://plus.google.com/u/0/104392545... Join us on Instagram: https://www.instagram.com/telecomacad/ Join us on pinterest: https://www.pinterest.com/hamzathenet...
As with any new technology, IPv6 requires a learning curve for network managers and IT administration and operations personnel. This presentation covers many of the current best practices for approaching and progressing with an IPv6 deployment.
May 13, 2013, Swiss IPv6 Council Member Event.
The Impact of IPv6 to Net Politics
CGN Killer IPv6
- Why CGN isn't a good concept for the future, but IPv6 is.
464XLAT Tutorial, by Masataka Mawatari.
Presented at the APNIC 40 "Hypes? Fanfares? Fads? Wading through the muddy IPv6 puddle" session, Wed 9 Sep 2015.
The issue of deploying IPv6 Technology has been a topic of debate for more than a decade now.
Professionals have been discussing on the transition from Internet Protocol version 4 (IPVv4) to Internet
Protocol version 6 (IPv6) due to the fact that the IPv4 address space would soon be exhausted.
In this paper, we analyse the IPv4 and IPv6 technologies and look at the benefits of migrating to IPv6,
its social implications, risks & challenges and the opportunities the IPv6 migration offers
Today's Internet faces severe challenges including:
* IPv4 address exhaustion
* explosion of BGP tables and IP routing tables
* exponential traffic growth (which might not be a problem after all)
CommunicAsia 2017: IPv6 deployment architecture for IoTAPNIC
APNIC Training and Technical Assistance Manager Nurul Islam discusses the design options for IPv6 in a broadband access network and the impact that IoT will have on this in order to support future growth at CommunicAsia 2017.
IPv6 Success Stories– Network Operators Tell All!
Asela Galappattige (Sri Lanka Telecom); Senevi Herath (LEARN); Patrick Okui (Network Startup Resource Center); Matsuzaki Yoshinobu (IIJ)
In this session, we invite network operators to share their IPv6 success stories and lessons learned along the way that can help other managers of networks deploy IPv6. How did they do it? What technical, organizational, and political challenges did they face? Attendees will gain vital insight as network operators lay out the stages for IPv6 implementation—creating the business case for management buy-in, initiating a planning process, flipping the switch, and, finally, gathering measurements and proving success.
Welcome to the APNIC Member Gathering, MongoliaAPNIC
Services Director George Kuo presents on IPv6 deployment in the region; IPv6 in broadband networks, getting more IPv4 address space; APNIC whois data quality, and routing security at a Member Gathering in Mongolia from 13 to 14 June 2017.
This presentation gives a brief description about IP Address (Internet protocol address), Classes of IPv4. And also included, what is IPv4 and what is IPv6.
Describe the similarities and differences between IPv4 & IPv6.So.pdfmayorothenguyenhob69
Describe how you would look up the critical z-value for a 72% on a normal curve table, what is
the critical z-value for a 72% confidence interval?
Solution
Za/2 = Z-table value = 1.08
Method 1:
I will use the below formula NORMINV(1-0.28/2,0,1)
Method 2:
To do this, if X ~ N(?, ?^2), then
STEP 1:
Z= X- ? / ? ~ N(0,1)
STEP 2:
A table of standardized normal values, can then be used to obtain an answer in terms of the
converted problem.
STEP 3:
Find x=Z ?+ ?
STEP 4:
Use below method
http://www.mathsisfun.com/data/standard-normal-distribution-table.html
Eg:
TYPE 1: (Z ? 1.65) = F(1.65) = 0.95.
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
Communication at the network layer is host-to-host (computer-to-computer). A computer somewhere in the world needs to communicate with another computer somewhere else in the world. For this communication, we need a global addressing scheme, called “logical addressing” Today, IP addresses are used to provide logical addresses in the network layer of the TCP/IP protocol suite.
IPV4 - The Internet addresses are 32 bits in length; this gives us a maximum of 2^32 addresses. These addresses are referred to as IPv4 (IP version 4) addresses or simply IP addresses. The need for more addresses, in addition to other concerns about the IP layer, motivated a new design of the IP layer called the new generation of IP or IPv6 (IP version 6).
In this version, the Internet addresses are 128 bits in length; this gives us a maximum of 2^128 addresses. 128-bit addresses give much greater flexibility in address allocation. These addresses are referred to as IPv6 (IP version 6) addresses.
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdfarcotstarsports
Research the IPv4 ns the IPv6 protocols, then prepare a report that explains the likes and
differences of the two protocols and include how and why the transition from IPv4 to IPv6 is to
occur.
Project report body must have 5 pages or more, with Times New Roman12 pt. print double
spaced. Also include a Cover sheet and a Reference page.
Solution
Introductory lines:
The internet protocol or IP specifies and describes the technical details and formats of fragments
of data (Also known as packets.) along with addressing schemes (numerical; actually in binary
but can be interpreted as decimals or hexadecimals assigned to each of the devices connected
through the network) in order to uniquely identify them and create a platform for secure and
reliable communication.
Ipv4 over the years was proved and deployed for communications over the internet. However in
the current days it becomes obsolete and deficient in order to serve the huge and increasing
number of users or network devices.
To make this possible, the IPv6 comes into existence. The IPv6 provides many extra features and
claims to support and serve this increasing number of devices for upcoming coming centuries.
Let’s discuss about the similar and distinct features of both IPv4 and IPv6.
IPv4 in terms of IP addresses, Address allocation, masks and types:
IPv6 in terms of IP addresses, Address allocation, masks and types:
IPv4 in terms of IP header:
Headers in IPv4 are of variable length that varies from 20 to 60 bytes.
IPv4 does not identify packet flow for QOS handling.
It adds checksum filed for identification of transmission errors in the data.
IPv6 in terms of IP header:
Uses fixed length of 40 bytes of headers and there is no concept of option filed in header.
It supports packet flow for QOS by flow level filed.
IPv6 does not implements checksum for error handling.
IPv4 in terms of IP packets ports and security:
IPv4 supports the packet size of 576 bytes.
They also support packet filtering mechanisms through firewalls.
IPv4 supports for port spaces of the range 1 to 65535
IPsec in IPv4 is optional.
IPv6 in terms of IP packets ports and security:
IPv6 supports the packet size of 1280 bytes.
They does not supports packet filtering mechanisms.
The way the portts work both in IPv4 and IPv6 are the same.
IPv6 has inbuilt IPsec support.
IPv4 was successful;;y deployed in 1981 over internet whereas IPv6 was planned to be deployed
from 1999 but could partially deployed till the date.
Why transition from IPv4 to IPv6 must occur ?
The deficiency of IP address of IPv4 type is one of the most eye catching reasons for transition
towards IPv6. Each and every day the Internet is experiencing phenomenal increase of devices
which are being connected and using the internet.
In order to provide services to all the address space of IPv4 seems to be fewer. Hence
a transition from IPv4 to IPv6 is must needed to satisfy such demand of larger address space.
Except this, the other technical features like improve.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
3. ● Internet Protocol Version (IPV6) is the latest version of the Internet Protocol:
➔ Designed to fulfill requirement of future Internet , Known to us as Next Generation Protocol.
➔ In the early 1990s, IETF (Internet Engineering Task Force) began discussions about the rapidly increasing
number of Internet users and the growing size of the Internet routing table.
➔ IPV6 developed in December 1998 , Recognized by Internet Engineering Task Force (IETF).
➔ IPV6 will make use of 128 bit address.
➔ IPV6 represented as 32 hexadecimal numbers arranged in 8 Quartets of 4 Hexadecimal Digit
separated by a ":"
Example:2001:ABCD:456:BCDE:ABCD:4321:EFAD:4532
➔ IPV6 is a Classful and Case insensitive for A,B,C,D,E,F.
➔ In 1999, the Internet Assigned Numbers Authority (IANA ) made the first assignments of public IPv6 address
blocks to the Regional Internet Registries.
1.IPV6 Overview
➢ Presented by: Kaushik Majumder
4. ➔ IPv4 stands for Internet Protocol version 4.
➔ IPV4 has served human being for decades on its best-effort-delivery mechanism.
➔ It was designed in early 80's and did not get any major change afterwards.
➔ At the time of its birth, Internet was limited Only to a few Universities for their research and to
Department of Defense.
➔ IPV4 is 32 bits long which offers around 4,294,967,296 (232)address
“ This address space was considered more than enough that time .”
● IPv4 was introduced in the late 1970s and was first officially described in RFC 760 in January 1980.
● Network Proxy and Network Address Translation (NAT) were introduced as a short-term solution to the
depletion of public IPv4 addresses, in the early 2000.
1.1 Recall IPV4
➢ Presented by: Kaushik Majumder
6. 1.3 WHY IPV6 ?
● How could 8 billion devices being connected
to the global network if there are only 4.29
billion possible IPv4 addresses?
● In 2010s, mobile devices took over our lives
and the number of Internet users increased
very quickly. You can see in figure that in
2012, there were 8.8 billion connected
devices.
● In 2011, IANA allocated the last two large blocks
of public IPv4 address space, 39.0.0.0/8 and
106.0.0.0/8, to the regional provider for the Asia-
Pacific region - APNIC.
● At this point, there were five /8 address blocks
remaining and IANA decided that they would be
distributed equally among the five regional
providers. After that, IANA had officially run out of
public IPv4 addresses.
➢ Presented by: Kaushik Majumder
7. ❏ Larger Address Space.
❏ End to End Connectivity.
❏ Auto-configuration.
❏ No more private address collisions.
❏ Better multicast routing.
❏ Simpler header format.
❏ Simplified, more efficient routing.
❏ True quality of service (QoS).
❏ Built-in authentication and privacy
support.
❏ Easier administration.
❏ Mobility
WHY IPV6
● Internet has grown exponentially.
● IPV4 on its does not provide any
security feature which makes data
vulnerable on internet
● Data Prioritization in IPV4 is not
up to date.
1.4 KEY Benefits Of IPV6:
➢ Presented by: Kaushik Majumder
8. 1.5 Where IPV5 ?
❏ Why IPv6 came after IPv4? Was there ever Internet Protocol Version 5?
● IPv5 was created for experimental reasons, specifically for video and voice transmissions.
● At First , Internet Protocol has been recognized has IPV4 Only.
● Version 0 to 3 were used while the protocol wa itself under development and
experimental process.
● IPV5 also known as Internet Stream Protocol.
● Big companies such as Apple and Sun experimented with it but it never came to be.
Later, the work done on IPv5 was used as a groundwork for today's VoIP protocols.
➢ Presented by: Kaushik Majumder
10. 1.7 IPV6 Larger Address Space
● IPv6 has 128 bit addresses and has a much larger address space than 32-bit IPv4 which offered us a bit more than 4 billion addresses.
● With 128 Bit in IPV6 , Will get: 340,282,366,920,938,463,463,374,607,431,768,211,456 address.
● According to Estimate, 1564 address Can be allocated every square meter in the earth.
● 340- undecillion
● 282- decillion
● 366- nonillion
● 920- octillion
● 938- septillion
● 463- sextillion
● 463- quintillion
● 374- quadrillion
● 607- trillion
● 431- billion
● 768- million
● 211- thousand
● 456
● The Internet Assigned Numbers
Authority (IANA) allocates only
a small portion of the whole
IPv6 space.
● IANA provides global unicast
addresses that start with
leading leftmost bits 001.
● Small portion of the addresses
starting with 000 and 111 are
allocated for special types.
● All other possible addresses are
reserved for future use and are
currently not being allocated.
➢ Presented by: Kaushik Majumder
12. 1.9 IPV6 Header
● Version – It is a 4-bit field that describes the IP type that is being used.For IPV6 packet ,this field is always set to 0110
● Traffic class – This field is similar to the Service Field of the IPv4 packet. It signifies the priority of the IPv6 packet. It
is responsible for handling the traffic based on the priority of the packet. In case of congestion on the router, it
discards the packets with low priority.It uses 8 bits of memory to control traffic congestion.
● Flow label – This label ensures that the packets maintain the sequential flow belonging to the same communication.
With the source’s help, the label router identifies which packet belongs to which flow of information. It also helps
to avoid the reordering of the data packets.
● Payload length – Payload length indicates the router about the size of the information contained by a particular
packet. Payload length also consists of the upper layer packet and extension header (if any). If the payload length
becomes greater than 65,535 bytes, then the payload length field becomes 0.
● Next Header – The next Header signifies the Extension Header type; in some cases, when the Extension Header is
not present, it signifies the protocols present inside the upper layer packet like UDP, TCP, etc. UDP (17) and TCP (6)
are the most common Next Headers, but other types of headers are also possible.
● Hop Limit – It is 8-bit long. It indicates the maximum number of routers the packet is capable of passing. This is similar
to TTL field in IPv4 header.
● Source address – It is 128 bits long. It is the address of the device that sends the packet.
● Destination address – It is also 128 bits long. It is the address of the device that receives the packet.
● Data – It represents the real data that should be transmitted.
➢ Presented by: Kaushik Majumder
13. ● The Internet Assigned Numbers Authority (IANA) is a standards organization that oversees global IP address
allocation, autonomous system number allocation, root zone management in the Domain Name System (DNS),
media types, and other Internet Protocol-related symbols and Internet numbers
● The Internet Corporation for Assigned Named and Numbers (ICANN) performs the IANA functions, allocating IP
addresses to the Regional Internet Registries (RIRs)
● The RIRs then allocate IP addresses to the organizations in their service regions. There are five RIRs in the world;
they are AFRINIC, APNIC, ARIN, LACNIC and RIPE NCC.
● AFRINIC: Africa
● APNIC: Asia/Pacific
● ARIN: North America
● LACNIC: Latin
America and some
Caribbean Islands
● RIPE NCC: Europe,
Middle east and
Central Asia
● Visit this site to know
about IPv6 Global
Unicast Address
Assignments:
https://www.iana.org/assignme
nts/ipv6-unicast-address-
assignments/ipv6-unicast-
address-assignments.xhtml
AFRINIC serves the Africa and the Indian Ocean regions. APNIC serves the Asia Pacific regions. ARIN serves North America and many
Caribbean and North Atlantic islands. LACNIC services Latin America and the Caribbean. And RIPE NCC serves Europe, the Middle East and
part of Central Asia
1.10 About IANA and RIR
15. 2.IPv6 Address Representation(Cont..)
● An IPv6 address is 128 bits in length and is written as eight groups of four hexadecimal digits.
● Each group is separated from the others by colons (:) as shown in figure.
● Hexadecimal characters are not case sensitive, therefore an address can be written either in uppercase or lowercase, both are
equivalent.
➢ Presented by: Kaushik Majumder
16. 2.IPv4 Address Representation
● IP addresses are 32 bits long and that they are separated into 4 decimal
numbers by dot separation (this is known as dotted decimal).
● Each number must represent 8bits.
Just as a reminder a bit is a binary digit, it can only represent a 0 or 1.
➢ Presented by: Kaushik Majumder
18. ● The range of IPv6 addresses are
0000:0000:0000:0000:0000:0000:0000:
0000 to FFFF: FFFF: FFFF: FFFF: FFFF:
FFFF: FFFF: FFFF. This expression is in
hexadecimal.
● If we convert one hextet into binary
it should be 16 bits, for example, we
have a hextet “0000” it is equal to
0000000000000000 (16 time 0s) and
hextet “FFFF” is equal to
1111111111111111 (16 time 1s).
2.2 Basic Relationship
Table
19. 0010000000000001000011011011100000000000000000000010111100111011
0000001010101010000000001111111111111110001010001001110001011010
0010000000000001 0000110110111000 0000000000000000 0010111100111011
0000001010101010 0000000011111111 1111111000101000 1001110001011010
0010 0000 0000 0001
After the conversion, remove the blanks added to the binary bits and write all four
hexadecimal digits together as shown below.
Now take the first block, and add a space after every 4 bits.
1.The following is the binary form of the
address.
2.To convert this binary address to
hexadecimal format, add a space after every
16 bits
2001
2001 0DB8 0000 2F3B 02AA 00FF FE28 9C5A
Now, follow the same steps and convert the remaining blocks to
hexadecimal format
2001:0DB8:0000:2F3B:02AA:00FF:FE28:9C5A Add a colon after each block and remove the blanks.
2.3 IPv6 address structure and notation
➢ Presented by: Kaushik Majumder
20. 2.4 Shortening IPv6 addresses
IPv6 addresses are long also difficult to remember. That's why there are rules that can significantly shorten the
address.
Omit groups of all zeros:
The first rule that we are going to look at is called Zero Compression. It says that a double colon (::) can replace a single,
contiguous string of one or more groups consisting of all 0s.
Groups 4,5,6 and 7 of the IP
address are all zeros.
The :: can only appear once in an IPv6 address.a double colon can be applied only once.
➢ Presented by: Kaushik Majumder
21. Note that there are two contiguous strings of zeros - Group 4 and 5, and Group 7. Here As per Rules, We can use only
one double colon, we can either replace groups 4 and 5 with :: or group 7, but not both.
2.4 Shortening IPv6 addresses
➢ Presented by: Kaushik Majumder
22. 2.5 Omit Leading zeros
The other way to shorten addresses is to Omit leading zeros(Rule 2) in any group of 4 hexadecimal digits. The rule applies only to leading zeros and no trailing zeros. Even if a group
consists of 4 zeros 0000 we can only omit the leading three 0.
Note that all underscored groups have at least on leading zero. For groups 2,3 and 8, the rules are pretty
straightforward, you just remove the leading zeros and that's about it. But if you look at group 4 for example, you
cannot remove all four zeros, so the trailing zero highlighted in yellow must remain.
➢ Presented by: Kaushik Majumder
23. Combining Rule 1 and 2
The shortest possible representation is achieved by combining both rules we have discussed. Let's get the IP address from example 3 and apply
rule 1 and rule 2 at the same time.
Example 1 - The match-all address
IPv6 address -
0000:0000:0000:0000:0000:0000:0000:
0000
Shortened - ::
Example 2 - The loopback address
IPv6 address -
0000:0000:0000:0000:0000:0000:0000:
0001
Shortened - ::1
2.5 Omit Leading zeros
➢ Presented by: Kaushik Majumder
24. QUESTION
● What’s the Shortest form of Following IPv6 :
1)FC00:0000:0000:0000:3E00:1275:0000:0034
2)FE95:FC6C:C540:0000:0000:0000:0000:9800
3)FF00:ACAD:0000:0000:1234:0000:0000:0001
4)2001:ACAD:0000:ABCD:FFFF:0000:0000:0001
➢ Presented by: Kaushik Majumder
25. ● Unicast: In unicast mode of addressing, an IPv6 interface (host) is uniquely identified in a network segment. The
IPv6 packet contains both source and destination IP addresses.When a network switch or a router receives a unicast IP
packet, destined to a single host, it sends out one of its outgoing interface which connects to that particular host.
● Multicast: A network layer identifier for a set of interfaces, belonging to different IPv6 enabled nodes. Packets
sent to a multicast address are delivered to all interfaces identified by that address. Therefore, it is one-to-many
communication.
● Anycast: A network layer identifier for a set of interfaces, belonging to different IPv6 enabled nodes. Packets
sent to an anycast address are delivered to the "closest" interface identified by that address. "Closest" typically means
the one with the best routing metric according to the IPv6 routing protocol. Therefore, it is one-to-closest
communication.
3.IPv6 Address Types
➢ Presented by: Kaushik Majumder
27. ● Global Unicast: A unique IPv6 address assigned to a host interface. These addresses have a global scope and
essentially the same purposes as IPv4 public addresses. Global unicast addresses are routable on the Internet.Global
unicast addresses start with binary value 001 (2000::/3).
3.1 IPV6 Unicast Address
● Link-local IPv6 address: An IPv6 address that allows communication between neighboring hosts that reside on
the same link. Link-local addresses have a local scope, and cannot be used outside the link. They always have the prefix
FE80::/10.
● Loopback IPv6 address: An IPv6 address used on a loopback interfaces. The IPv6 loopback address is
0:0:0:0:0:0:0:1, which can be notated as ::1/128.
➢ Presented by: Kaushik Majumder
28. ● Unspecified address: An IPv6 unspecified address is 0:0:0:0:0:0:0:0, which can be notated as ::/128.
● Unique local IPv6 addresses:Its have the similar function as IPv4 private addresses. They are not allocated by
an address registry and are not meant to be routed outside their domain. Unique local IPv6 addresses begin with
FD00::/8.
● Embedded IPv4: In-IPv6 is a unicast address that has only zeros in the first 96-bits of the address and an IPv4
address in the rightmost 32-bits.These types of IPv6 addresses are used in automatic tunnels supporting both IPv4 and
IPv6 protocol stacks.
3.1 IPV6 Unicast Address
➢ Presented by: Kaushik Majumder
29. IPv6 global addresses are similar to IPv4 public addresses. As the name implies, they are routable
on the internet. Currently IANA has assigned only 2000::/3 addresses to the global pool.
A global IPv6 address consists of three parts:
● Global Routing Prefix :The global routing prefix is assigned by the ISP to a customer or
site.This is similar to the network portion of an IPv4 address.
● Subnet ID – This is similar to the subnet portion of an IPv4 address.The difference is in IPv4 the
subnet is borrowed from the host portion of the address.In IPv6 the Subnet ID is a separate field
(/48 to /64) and not necessarily part of the Interface ID.
● Interface ID – 64 bits long. Typically composed of a part of the MAC address of the interface.
● The global unicast address is globally unique in the Internet, begin with 2 or 3(2000-3FFFF)
3.1.1 Global Unicast Address
➢ Presented by: Kaushik Majumder
30. 3.1.2 Global Unicast Prefix Allocations
● In the general case, It recommends the assignment of /48.
● /64 used when it is known that one and only one subnet is needed.
● /128 when one and only one device is connecting.
➢ Presented by: Kaushik Majumder
32. ● These addresses only work on the local link, we never route these addresses.
● These addresses are used to send and receive IPv6 packets on the same subnet.
● When you enable IPv6 on an interface then the device will automatically create a link-local address.
● We use the link-local address for things like neighbor discovery (the replacement for ARP) and as the next
hop address for routes in your routing table.
● Link Local Address from same range can be used on multiple interfaces on same router
● Link Local Address Can be established dynamically or Manually.
We use the FE80::/10 range for link-local addresses, this means that the first 10 bits are 1111 1110 10.
3.2 Link Local Address
(Link-local addresses are something new in IPv6)
➢ Presented by: Kaushik Majumder
33. EUI-64 (Extended Unique Identifier) is a method :
➢ We can use to automatically configure IPv6 host addresses.
➢ An IPv6 device will use the MAC address of its interface to generate a unique 64-bit interface ID.
➢ But a MAC address is 48 bit and the interface ID is 64 bit. What are we going to do with the missing bits?
★ Lets An Example : “39-A7-94”,
the first 24 bits of the identifier
and “07-CB-D0” becomes the last
24 bits of the identifier.
★ The middle 16 bits are given the
value “FF-FE”.
★ We change the seventh bit from
zero to one, which changes the
first octet from “39” to “3B”.
3.2.1 IPv6 EUI-64 Process
➢ Presented by: Kaushik Majumder
34. 3.2.2 Link Local Address Examples
➢ Presented by: Kaushik Majumder
35. A Link-local address can be established
dynamically or configured manually as a static
link local address.
Router(Config)#interface gi 0/0
Router(Config-if)#ipv6 enable
Router(Config-if)#ipv6 address fe80::1 link-local
Router(Config-if)#exit
3.2.3 Link Local Address Configuration
➢ Presented by: Kaushik Majumder
37. 3.3 IPv6 Multicast Address
● A multicast group is the group of multiple nodes in the network. To identify group members, a common
group ID is assigned to all group members.
● In IPv6 networks, this common group ID is known as the multicast address.
● Data packets sent on a multicast address are received by all group members.
● All multicast addresses are part of the prefix ff00::/8, which is equivalent to the IPv4 multicast address
space of 224.0.0.0/4.
● Two important rules apply to IPv4 and IPv6 multicast:
➔ Packets sent to a multicast group always has a unicast source address.
➔ A multicast address can not be a source address of a packet.
➢ Presented by: Kaushik Majumder
38. ● Well-Known Multicast Addresses:
Well-known multicast addresses have the prefix ff00::/12. This means that the first 3 hexadecimal digits of an address
will always be ff0. Well-known multicast addresses are predefined or reserved multicast addresses for assigned groups
of devices.Several examples of such addresses are shown in the table below:
● ff02::1: All IPv6 devices
● ff02::2: All IPv6 routers
● ff02::5: All OSPFv3 routers
● ff02::a: All EIGRP (IPv6) routers
● Solicited-Node Multicast Addresses:
● Solicited-node multicast addresses are used as a more efficient approach to IPv4’s broadcast address.
● It is used in Layer 3-to-Layer 2 address resolution, similar to how Address Resolution Protocol (ARP) is
used in IPv4.
● Solicited-node multicast addresses are automatically created using a special mapping of the device’s
unicast address with the solicited-node multicast prefix ff02:0:0:0:0:1:ff00::/104.
● This auto-generated multicast group is then used for address resolution, neighbor discovery, and
duplicate address detection.
3.3.1 Types of Multicast Address
➢ Presented by: Kaushik Majumder
39. 3.3.2 Well Known Multicast Address
● FFO2::1- All Ipv6 Devices
● All IPV6 Devices, including the router,
belong to this group.
● Every IPV6 device will listen and process
packets to this address.
● FF02::2- All IPV6 Routers
● All IPV6 routers belong to this group.
● Used by devices to communicate
with an IPV6 Router
➢ Presented by: Kaushik Majumder
40. ● There is Direct
Relationship between
Unicast and Solicited Node
Multicast Address.
● Solicited Node Multicast
Address Formed By :
❖ Prefix
FF02:0:0:0:0:1:FF00::/10
4 (FF02::1:FF xx:xxxx)
❖ Append the Lower-order
24 Bits of the address
Unicast
❖ Solicited Node Multicast
Addresses are also Mapped
to an Ethernet Mac
Address (Layer 2)
3.3.3 Solicited Node Multicast Address
➢ Presented by: Kaushik Majumder
41. All IPV6 Devices on the link
All IPV6 routers on the link
Solicited-Node Multicast Address
3.3.4 Verifying IPV6 Multicast Address on the Router
➢ Presented by: Kaushik Majumder
42. 4.IPv6 Neighbor Discovery Protocol
The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages
,well-known and solicited-node multicast addresses to determine :
➢ The link-layer address of a neighbor on the same network , verify the reachability of a neighbor,
and track neighboring devices
➢ Handling the Layer 3 to Layer 2 resolution process using multicast messages.
➢ Autoconfiguration of IPv6 addresses & DAD (Duplicate Address Detection)
IPv6 Neighbor Discovery Protocol defines 5 types of
messages :
● Router Solicitation (ICMPv6 type 133)
● Router Advertisement (ICMPv6 type 134)
● Neighbor Solicitation (ICMPv6 type 135)
● Neighbor Advertisement (ICMPv6 type 136)
● Redirect Message (ICMPv6 type 137)
IPV6 Header IPV6 Payload
IPV6 Packet
ICMPV6 Header NDP Message
ICMPV6 Header
➢ Presented by: Kaushik Majumder
43. 4.1 Router Solicitation & Router Advertisement
● Hosts use Router Solicitation messages to locate routers in their local segment.
● After Received an RS message, Routers generate Router Advertisements immediately
● The RS message uses ICMPv6 type 133 and is destined to the all-routers multicast address
FF02::2.
● All layer 3 multicast addresses have a corresponding layer 2 mac address.
● IPv6 routers attached to a local segment advertise their presence periodically via an ICMPv6
message called Router Advertisement (RA).
● The message is destined to the all-nodes multicast address FF02::1 which means that every
node on the segment receives and processes it.
● RA messages contain the prefix and the prefix length used on this segment as well as other
parameters such as MTU.
● Cisco routers advertise their presence on a segment every 200 seconds by default.
➢ Presented by: Kaushik Majumder
45. RS Message to Router
RA Message to Node
4.1.2 Examples of Router Solicitation & Router Advertisement
46. Neighbor Solicitation message is used by nodes :
● To resolve the physical address of a known IPv6 address (target address).
● To determine the link-layer address of a neighbor,The NS message is encapsulated in
● ICMPv6 type 135 and is destined to the solicited-node multicast group that is auto-
generated from the targeted IPv6 address.
● NS are also used for Duplicate Address Detection (DAD).
Neighbor advertisements are used by nodes:
● To respond to a Neighbor Solicitation message.
● The NA message is encapsulated in ICMPv6 type 136 and is destined for the unicast
address in the Neighbor Solicitation message.
4.2 Neighbor Solicitation & Neighbor advertisements
➢ Presented by: Kaushik Majumder
49. ● Send a Neighbor Solicitation (ICMPv6 type 135) message.
● Use the unspecified address as source address, the requested unicast addresses Solicited-Node multicast address
(SNMA), as target address and put the to-be-used unicast address as target address into the ICMPv6 payload.
4.3 IPv6 Duplicate Address Detection
➢ Presented by: Kaushik Majumder
51. There are three methods to configure a host with a global unicast address, default gateway,
DNS server, and a domain name:
● Method 1: Configure the host manually.
● Method 2: Using SLAAC and a Stateless DHCPv6 server.
● Method 3: Using a Stateful DHCPv6 server.
5.Process of Unicast Address Configure
➢ Presented by: Kaushik Majumder
52. ❏ Stateless autoconfiguration requires:
● No manual configuration of hosts,
● Minimal (if any) configuration of routers,
● No additional servers.
❏ Stateless Process:
1) The stateless mechanism enables a host to generate its own addresses.
2) It uses local information as well as non-local information that is advertised by routers to generate the addresses.
3) Routers advertise prefixes that identify the subnet or subnets that are associated with a link.
4) Hosts generate an interface identifier that uniquely identifies an interface on a subnet.
5) An address is formed by combining the prefix and the interface identifier.
In the absence of routers, a host can generate only link-local addresses. However, link-local addresses are only sufficient for
allowing communication among nodes that are attached to the same link.
Stateless autoconfiguration for IPv6 is like a “mini-DHCP” server for IPv6
IPv6 defines mechanisms for both stateful address and stateless address autoconfiguration.
5.1 IPv6 Stateless Address Autoconfiguration (SLAAC)
➢ Presented by: Kaushik Majumder
53. 5.1.1 Process of IPv6 Stateless Address Autoconfiguration (SLAAC)
(Only Using RA Message)
1. At First, When Configured Host to get its Ip address Automatically via SLAAC Process:
● Host sends an RS message to the router.
● This message is sent to the multicast address of all IPv6 routers FF02::2.
● It is the ICMPv6 message type 133.
2. After Receiving RS Message from Host:
● Routers send RA messages to provide IPv6 addressing information
● Includes the prefix and the prefix length of the local segment in the Message
● RA messages are always sent to the multicast address of all IPv6 nodes FF02::1.
● It is the ICMPv6 message type 134.
● A router sends an RA message periodically (configurable between 4 and 1800 seconds)
Router Solicitation
Router advertisement
➢ Presented by: Kaushik Majumder
54. 5.2 Process of IPv6 Stateless DHCPV6 & Statefull DHCPV6
(Using RA Message & DHCPV6)
❏ Stateless DHCPv6:
● A stateless DHCPv6 server does not provide IPv6 addresses at all.
● It only provides "other information" such as a DNS server list and a domain name.
● It works in conjunction with another feature called SLAAC that tells hosts how to generate
global unicast addresses.
● In this context stateless means that no server keeps track of what addresses have been
assigned by which hosts and what addresses are still available for an assignment.
❏ Stateful DHCPv6:
● A stateful DHCPv6 server provides IPv6 addresses and "other information" to hosts.
● It also keeps track of the state of each assignment and tracks the address pool availability and
resolves duplicated address conflicts.
● It also logs every assignment and keeps track of the expiration times.
➢ Presented by: Kaushik Majumder
55. 5.3 IPV6 Allocation Mechanisms(Stateless/Stateless DHCPv6/Statefull DHCPv6)
● How a client will be able to obtain IPv6 addressing information automatically will depend on what is established within
the RA message.
● A-flag - if it is set to 1, this informs hosts that they can auto-generate GUA address using SLAAC. If it is set to 0 means that auto-
configuration is not allowed for this segment.
● O-flag - if it is set to 1, this informs hosts that they can obtain a DNS server list and a domain name from a Stateless DHCPv6 server,
but not addressing information. Typically it works in conjunction with SLAAC for auto-addressing and both the A-flag and the O-flag
are set to 1.
● M-flag - if it is set to 1, this informs hosts that they can obtain a global address as well as DNS and a domain name from a Stateful
DHCPv6 server. Typically this means that auto-addressing using SLAAC is not allowed on this segment and both the A-flag and the
O-flag are set to 0.
➢ Presented by: Kaushik Majumder