IPv4 is the current version of the Internet Protocol but has limitations including a limited 32-bit address space that is nearly depleted, lacking built-in network security, and limited quality of service capabilities. IPv6 was developed to address these issues by using a larger 128-bit address space to avoid scarcity, incorporating IPsec to provide security, and improving quality of service and auto-configuration features. While IPv6 adoption is still growing, transitioning networks to be dual-stacked with both IPv4 and IPv6 ensures compatibility and avoids missing traffic from users on IPv6-only networks.
IP V4
⢠Currentversion of Internet Protocol is IPv4.
⢠Used to send data over the Internet and makes interaction
between different services possible.
⢠Over the years, as response to these deficiencies and in
consideration of a global network in rapid growth, new
technologies, like SSL/TLS and IPSec, have been introduced to
remedy these issues.
3.
Limitations â IPV4
1. Maximum addressing space - uses 32-bit address space.
â Scarcity of IPv4 addresses, many organizations implemented
NAT to map multiple private addresses to a single public IP
address.
â NAT does not support network layer security standards and it
do not support the mapping of all upper layer protocols.
⢠More servers, workstations and devices which are connected
to the internet also demand the need for more addresses and
the current statistics prove that public IPv4 address space will
be depleted soon.
4.
2. Security RelatedIssues:
â IPv4 was published in 1981 and the current network security threats
were not anticipated that time
â Internet Protocol Security (IPSec) is a protocol suit which enables
network security by protecting the data being sent from being viewed
or modified. IPSec provides security for IPv4 packets, but IPSec is not
built-in and is optional.
5.
3. Quality ofService QoS:
â IPv4 and it relies on the 8 bits of the IPv4 Type of Service (TOS) field
and the identification of the payload.
â IPv4 Type of Service (TOS) field has limited functionality and payload
identification (uses a TCP or UDP port) is not possible when the IPv4
packet payload is encrypted.
6.
Next Generation -IP V6
⢠IPv6 addresses are based on 128 bits.
⢠Sites should run a dual-stack IPv6 configuration.
â Otherwise you could miss traffic from users who are only able to
access the Internet over IPv6 (which is not backwards compatible with
IPv4).
⢠Small amount running IPV6 but will increase.
â Only takes one missed customer to make you regret not taking the
steps to incorporate IPv6 into your infrastructure.
7.
Benefits
1. IPv6 reducesthe size of routing tables and makes routing
more efficient and hierarchical.
â Allows ISPs to aggregate the prefixes of their customers' networks into
a single prefix and announce this one prefix to the IPv6 Internet.
2. IPv6's simplified packet header makes packet processing more
efficient.
â Compared with IPv4, IPv6 contains no IP-level checksum, so the
checksum does not need to be recalculated at every router hop.
3. Multicast rather than broadcast.
â Allows bandwidth-intensive packet flows to be sent to multiple
destinations simultaneously, saving network bandwidth.
8.
4. Address auto-configuration(address assignment) is built in to
IPv6.
â Router will send prefix of the local link in its router advertisements.
â Host can generate its own IP by appending its link-layer (MAC)
address, converted into Extended Universal Identifier (EUI) 64-bit
format, to the 64 bits of the local link prefix.
5. Eliminating NAT, true end-to-end connectivity at the IP layer is
restored, enabling new and valuable services.
â Peer-to-peer networks are easier to create and maintain, and services
such as VoIP and Quality of Service (QoS) become more robust.
6. IPSEC- provides confidentiality, authentication and data
integrity, is part IPv6.
â Because of their potential to carry malware, IPv4 ICMP packets are
often blocked by corporate firewalls, but ICMPv6, the implementation
of the Internet Control Message Protocol for IPv6, may be permitted
because IPSec can be applied to the ICMPv6 packets.
9.
7. The SecureNeighbour Discovery (SEND) protocol is capable of
enabling cryptographic confirmation that a host is who it claims
to be at connection time.
â Renders Address Resolution Protocol (ARP) poisoning and other
naming-based attacks much more difficult.