CommunicAsia 2017: IPv6 deployment architecture for IoTAPNIC
APNIC Training and Technical Assistance Manager Nurul Islam discusses the design options for IPv6 in a broadband access network and the impact that IoT will have on this in order to support future growth at CommunicAsia 2017.
IPv6 deployment architecture for broadband access networksAPNIC
At CommunicAsia 2016, Training and Technical Assistance Manager Nurul Islam discussed the design option for IPv6 in a broadband access network and the impact that IoT will have on this in order to support future growth.
Welcome to the APNIC Member Gathering, MongoliaAPNIC
Services Director George Kuo presents on IPv6 deployment in the region; IPv6 in broadband networks, getting more IPv4 address space; APNIC whois data quality, and routing security at a Member Gathering in Mongolia from 13 to 14 June 2017.
Abitcool - A vast array of small-scale service providers with gigabit access,...APNIC
Abitcool - A vast array of small-scale service providers with gigabit access, by Tony Hain. A presentation given at APNIC 38 during the APOPS 3 session.
Network State Awareness & Troubleshooting, by Faraz Shamim.
A presentation given at APRICOT 2016’s Network State Awareness and Troubleshooting tutorial on 25 February 2016.
CommunicAsia 2017: IPv6 deployment architecture for IoTAPNIC
APNIC Training and Technical Assistance Manager Nurul Islam discusses the design options for IPv6 in a broadband access network and the impact that IoT will have on this in order to support future growth at CommunicAsia 2017.
IPv6 deployment architecture for broadband access networksAPNIC
At CommunicAsia 2016, Training and Technical Assistance Manager Nurul Islam discussed the design option for IPv6 in a broadband access network and the impact that IoT will have on this in order to support future growth.
Welcome to the APNIC Member Gathering, MongoliaAPNIC
Services Director George Kuo presents on IPv6 deployment in the region; IPv6 in broadband networks, getting more IPv4 address space; APNIC whois data quality, and routing security at a Member Gathering in Mongolia from 13 to 14 June 2017.
Abitcool - A vast array of small-scale service providers with gigabit access,...APNIC
Abitcool - A vast array of small-scale service providers with gigabit access, by Tony Hain. A presentation given at APNIC 38 during the APOPS 3 session.
Network State Awareness & Troubleshooting, by Faraz Shamim.
A presentation given at APRICOT 2016’s Network State Awareness and Troubleshooting tutorial on 25 February 2016.
IPv6 Success Stories– Network Operators Tell All!
Asela Galappattige (Sri Lanka Telecom); Senevi Herath (LEARN); Patrick Okui (Network Startup Resource Center); Matsuzaki Yoshinobu (IIJ)
In this session, we invite network operators to share their IPv6 success stories and lessons learned along the way that can help other managers of networks deploy IPv6. How did they do it? What technical, organizational, and political challenges did they face? Attendees will gain vital insight as network operators lay out the stages for IPv6 implementation—creating the business case for management buy-in, initiating a planning process, flipping the switch, and, finally, gathering measurements and proving success.
Enterprise networks using private IPv4 address space might not feel the need to migrate to IPv6. They are wrong and might be faced with severe consequences in the future.
464XLAT Tutorial, by Masataka Mawatari.
Presented at the APNIC 40 "Hypes? Fanfares? Fads? Wading through the muddy IPv6 puddle" session, Wed 9 Sep 2015.
BGP: Whats so special about the number 512?GeoffHuston
It was reported that parts of the Internet crashed when the number of routes in the Internet's Inter-domain routing table (BGP) exceeded 512K routes. This presentation looks at the growth of the Internet's routing table and how this correlates to the capacity and speed of memory in hardware routers.
May 13, 2013, Swiss IPv6 Council Member Event.
The Impact of IPv6 to Net Politics
CGN Killer IPv6
- Why CGN isn't a good concept for the future, but IPv6 is.
Today's Internet faces severe challenges including:
* IPv4 address exhaustion
* explosion of BGP tables and IP routing tables
* exponential traffic growth (which might not be a problem after all)
IPv6 Success Stories– Network Operators Tell All!
Asela Galappattige (Sri Lanka Telecom); Senevi Herath (LEARN); Patrick Okui (Network Startup Resource Center); Matsuzaki Yoshinobu (IIJ)
In this session, we invite network operators to share their IPv6 success stories and lessons learned along the way that can help other managers of networks deploy IPv6. How did they do it? What technical, organizational, and political challenges did they face? Attendees will gain vital insight as network operators lay out the stages for IPv6 implementation—creating the business case for management buy-in, initiating a planning process, flipping the switch, and, finally, gathering measurements and proving success.
Enterprise networks using private IPv4 address space might not feel the need to migrate to IPv6. They are wrong and might be faced with severe consequences in the future.
464XLAT Tutorial, by Masataka Mawatari.
Presented at the APNIC 40 "Hypes? Fanfares? Fads? Wading through the muddy IPv6 puddle" session, Wed 9 Sep 2015.
BGP: Whats so special about the number 512?GeoffHuston
It was reported that parts of the Internet crashed when the number of routes in the Internet's Inter-domain routing table (BGP) exceeded 512K routes. This presentation looks at the growth of the Internet's routing table and how this correlates to the capacity and speed of memory in hardware routers.
May 13, 2013, Swiss IPv6 Council Member Event.
The Impact of IPv6 to Net Politics
CGN Killer IPv6
- Why CGN isn't a good concept for the future, but IPv6 is.
Today's Internet faces severe challenges including:
* IPv4 address exhaustion
* explosion of BGP tables and IP routing tables
* exponential traffic growth (which might not be a problem after all)
Overview of IPv6 protocol along with various transition scenarios for the migration from IPv4 to IPv6
IPv6 is the current and future Internet Protocol standard. As anticipated, IPv4 addresses became exhausted around 2012.
The IP address scarcity is the main driver for IPv6 protocol adoption.
IPv6 defines a much larger address space that should be sufficient for the foreseeable future, even taking into account Internet of Things scenarios with zillions of small devices connected to the Internet.
IPv6 is, however, much more than simply an expansion of the address space. IPv6 defines a clean address architecture with globally aggregatable addresses thus reducing routing table sizes in Internet routers.
IPv6 extension headers provide a standard mechanism for stacking protocols such as IP, IPSec, routing headers and upper layer headers such as TCP.
ICMP (Internet Control Message Protocol) is already defined for IPv4. ICMP was totally revamped for IPv6 and as ICMPv6 provides common functions like IP address and prefix assignment.
Lack of business drivers for migrating to IPv6 is responsible for sluggish adoption of IPv6 in carrier and enterprise networks.
Numerous transition mechanisms were developed to ease the transition from IPv4 to IPv6. Many of these mechanisms are complex and difficult to administer.
The transition mechanisms can be coarsely classified into dual-stack, tunneling and translation mechanisms.
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...Louis Göhl
Take a sprinkling of Windows 7, add Windows Server 2008 R2, IPv6 and IPsec and you have a solution that will allow direct access to your corporate network without the need for VPNs. Come to these demo-rich sessions and learn how to integrate DirectAccess into your environment. In Part 1 learn about IPv6 addressing, host configuration and transitioning technologies including 6to4, ISATAP, Teredo and IPHTTPS. Through a series of demos learn how to build an IPv6 Network and interoperate with IPv4 networks and hosts. In Part 2 we add the details of IPSec, and components that are only available with Windows 7 and Windows Server 2008 R2 to build the DirectAccess infrastructure. Learn how to control access to corporate resources and manage Internet connected PCs through group policy. Part 1 is highly recommended as a prerequisite for Part 2.
From KubeCon to ContainerDays, eBPF is trendy in the Cloud Native world. What is eBPF, and why is it revolutionary, and what can it bring to you specifically?
Through concrete examples applied to observability, networking, and security, this talk will explain the principles of eBPF and its concrete advantages to connect and secure Cloud Native applications.
This talk will explain what is eBPF, why it is revolutionary is several fields, give examples of tools using eBPF and what they gain from it, and open up to the future of that technology.
You may have hoped to retire before IPv6 became a reality, but unfortunately the IPv4 address exhaustion came too fast. For the rest of us, we’re going to bite off a small piece of the 15-year old IPv6 pie and talk about how to get started!
• Address format refresher
• IPv4 and IPv6 protocol comparison
• IPv6 neighbor discovery and auto-configuration
• Current migration and coexistence strategies
• ICMPv6, DHCPv6, and DNSv6
• How to get started at home
The implementation of embedded IPv6 applications in an IPv4 world require one of several strategies of converting or tunneling IPv6 traffic through the IPv4 internet.
Using a set of Network Critical Success Factors (NCSFs) - things network operators need to get right to run a good network - I then use them to evaluate IPv4 Network Address Translation.
I then look at the fundamental nature of IPv6 (and IPv4), and how it can better suite the two different application communications architectures - client-server and peer-to-peer.
Finally, I describe how some of the perceived benefits of NAT can be achieved with IPv6 without performing address translation.
This is an updated version of my AusNOG 2016 presentation on the same topic.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
3. Flashback: Internet Architecture
• 1st generation Internet: Peer-to-peer model
– End devices have content to share
– A computer (PC/mainframe/terminal) is connected to the Internet
– Scope of Internet usage was limited to academic research and US
defense network
– Processing power and capacity was an important issue
– Applications were processed using CPU-based machines
• Needs stable and considerable power to run this
– End-to-end visibility was a requirement
3
4. Flashback: Internet Architecture
• 2nd generation Internet: Client server model
– WWW, email etc services were invented
– Majority of Internet content stored on the server
– Client machines used to access content from the server
– Exponential growth of Internet started
– IETF realized IPv4 protocol address space was insufficient
• (1990 IETF Meeting by Solensky)
– IPv4 protocol has outlived its design life
– NAT/CIDR introduced to expand the lifetime of IPv4
– End-to-end visibility has disappeared
4
5. Flashback: Internet Architecture
• 3rd generation Internet : Peer-to-peer and client server
– End devices will have information to exchange
– Low cost, low power, wireless, embedded computing devices
• Exchange control information both ways with central server
• Hardware-based embedded processing VS CPU-based computer processing
– Scope of Internet usage will expand beyond traditional client server
application
• Hybrid client server and peer-to-peer
– End-to-end communication will be very important
• Restriction-free growth of architecture will be key design
consideration
5
6. IPv4 for Broadband Access Network
DOCSIS/Head End BRASHome/Cable
DSLAM BRASHome/DSL
Wifi /Controller BRASSmart Device
Mobile Tower GGSNMobile Device
xDSL
DOCSIS Cable
FTTx /Metro Ethernet
Wifi Hotspot
Mobile Internet/3G/4G
Fiber to Home/Metro EthernetHome/Ethernet
Dual Stack/MPLS (6PE/6VPE) IP Core NetworkHybrid Broadband Access Network
6
7. IPv4 for Broadband Access Network
DOCSIS/Head End BRASHome/Cable
DSLAM BRASHome/DSL
Wifi /Controller BRASSmart Device
Mobile Tower GGSNMobile Device
xDSL
DOCSIS Cable
FTTx /Metro Ethernet
Wifi Hotspot
Mobile Internet/3G/4G
Fiber to Home/Metro EthernetHome/Ethernet
Dual Stack/MPLS (6PE/6VPE) IP Core NetworkHybrid Broadband Access Network
7
8. IPv4 for Broadband Access Network
DOCSIS/Head End BRASHome/Cable
DSLAM BRASHome/DSL
Wifi /Controller BRASSmart Device
Mobile Tower GGSNMobile Device
xDSL
DOCSIS Cable
FTTx /Metro Ethernet
Wifi Hotspot
Mobile Internet/3G/4G
Fiber to Home/Metro EthernetHome/Ethernet
Dual Stack/MPLS (6PE/6VPE) IP Core NetworkHybrid Broadband Access Network
Public IPv4
Private IPv4
8
9. IPv4 for Broadband Access Network
DOCSIS/Head End BRASHome/Cable
DSLAM BRASHome/DSL
Wifi /Controller BRASSmart Device
Mobile Tower GGSNMobile Device
xDSL
DOCSIS Cable
FTTx /Metro Ethernet
Wifi Hotspot
Mobile Internet/3G/4G
Fiber to Home/Metro EthernetHome/Ethernet
Dual Stack/MPLS (6PE/6VPE) IP Core NetworkHybrid Broadband Access Network
Public IPv4
Private IPv4
CPE
End user NAT or CG NAT
DHCP
Allocate end device IP
9
10. IPv4 for Broadband Access Network
• This architecture will scale if:
– End user devices are limited
– End-to-end communication is NOT required
– Internet remains in “Client Server” Architecture
• This architecture may not scale if:
– IoT growth sky rockets on end site
– It needs a control process to keep track of individual devices
• DHCP, BRAS, PPPoE etc.
– It needs end-to-end communication
• Internet changes back to “Peer-to-peer” model
10
11. IPv4/IPv6 Header Comparison
• IPv4 contains 10 basic header fields
• IPv6 contains 6 basic header fields
• IPv6 header comprises 40 octets (fixed) in contrast to 20 octets (variable) in IPv4
• So a smaller number of header fields and the header is 64-bit aligned to enable fast
processing by current processors
11
12. IPv6 Addressing Structure
12
1 128
ISP /32
20
128 bits
Customer site /48
16
End site subnet /64
16 64
Device 128-bit address
Interface ID
65
Network prefix
64
Unicast /3
3
Regional /12
9
ISP given global prefix SLAC interface ID
14. Network Prefix - Global Routing Table
14
Stat source: http://bgp.potaroo.net/v6/as2.0/index.html
Active AS
De-aggregation: 610038/54062
= 11.28 Prefix/ASN
(as of May 22, 2016)
(IPv4)
15. Network Prefix - Global Routing Table
15
Stat source: http://bgp.potaroo.net/v6/as2.0/index.html
De-aggregation: 29336/11631
= 2.52 Prefix/ASN
(as of May 22, 2016)
Active AS
(IPv6)
16. Legitimate Prefix Global Routing
• Multihome and portable prefix
Internet
Blocked
AS64501
Check LoA of Cust prefix
Manual process email to tech-c
Automated process IRR & RPKI
ISP Prefix
3fff:ffff::/32
Customer Prefix
2001:0DB8::/32
Filter requirement for Transit ISP
Route filter permit /48 & /32 in/out
or
Route filter permit ::/0 only in/out
AS64500
Check LoA of Cust prefix
Manual process email to tech-c
Automated process IRR & RPKI
AS64502
Blocked
/50, /47, /46 etc most specific
/32, /48 only most specific
AllowedAllowed
16
17. IPv6 End Site Subnet
• What is an IPv6 “end site”?
– Last part of the network
– Not further extended to another L3
network
– Future Internet growth on “end
site”
– Internet of Things (IoT)
– Internet of Everything
– Possibly growth area on “end site”
• How far can it grow?
– 264 possible devices
17
18. IPv6 End Site Subnet
• What is an IPv6 “end site”?
– Last part of the network
– Not further extended to another L3
network
– Future Internet growth on “end site”
– Internet of Things (IoT)
– Internet of Everything
– Possibly growth area on “end site”
• How far can it grow?
– 264 possible devices
18
19. IPv6 Broadband Access Network
/64 IPv6 p-to-p/64 IPv6 Home wLAN
DHCP
PD (Home) + RA (p-to-p)
/64 Prefix Delegation to Home Network
To IP Core Network
Case “A”
/64 P-to-P (RA or/64 P-to-P (RA or/64 P-to-P (RA or LL)
19
20. IPv6 Broadband Access Network
/64 IPv6 p-to-p/64 IPv6 Home wLAN
DHCP
PD (Home) + RA (p-to-p)
/64 Prefix Delegation to Home Network
To IP Core Network
Case “A”
/64 P-to-P (RA or/64 P-to-P (RA or
20
21. IPv6 Broadband Access Network
/64 IPv6 p-to-p/64 IPv6 Home wLAN
DHCP
PD (Home) + RA (p-to-p)
/64 Prefix Delegation to Home Network
To IP Core Network
Case “A”
/64 P-to-P (RA/LL)
/64 IPv6 Home wLAN (DHCP PD)
/64 P-to-P (RA or
This is a public IPv6 global address for home wLAN
No NAT
21
22. IPv6 Broadband Access Network
/64 IPv6 p-to-p/64 IPv6 Home wLAN
DHCP
PD (Home) + RA (p-to-p)
/64 Prefix Delegation to Home Network
To IP Core Network
Case “A”
/64 P-to-P (RA/LL)
/64 IPv6 Home wLAN (DHCP PD)
/64 P-to-P (RA or
Based on RFC6164 P-to-P prefix can be /127, /126 etc
22
23. Home/DSL DSLAM BRAS
/64 IPv6 p-to-p/64 IPv6 Home wLAN
/64 IPv6 p-to-p/64 IPv6 p-to-p
/64 IPv6 p-to-p
/64 IPv6 Home wLAN
/64 IPv6 Home wLAN
DHCP
PD (Home) + RA (p-to-p)
/64 Prefix Delegation to Home Network
/56 Prefix Delegation to Home Network
To IP Core Network
IPv6 Broadband Access Network
Case “A”
Case “B”
23
24. Home/DSL DSLAM BRAS
/64 IPv6 p-to-p/64 IPv6 Home wLAN
/64 IPv6 p-to-p/64 IPv6 p-to-p
/64 IPv6 p-to-p
/64 IPv6 Home wLAN
/64 IPv6 Home wLAN
DHCP
PD (Home) + RA (p-to-p)
/64 Prefix Delegation to Home Network
/56 Prefix Delegation to Home Network
To IP Core Network
IPv6 Broadband Access Network
Case “A”
Case “B”
24
25. Home/DSL DSLAM BRAS
/64 IPv6 p-to-p/64 IPv6 Home wLAN
/64 IPv6 p-to-p/64 IPv6 p-to-p
/64 IPv6 p-to-p
/64 IPv6 Home wLAN
/64 IPv6 Home wLAN
DHCP
PD (Home) + RA (p-to-p)
/64 Prefix Delegation to Home Network
/56 Prefix Delegation to Home Network
To IP Core Network
IPv6 Broadband Access Network
Case “A”
Case “B”
25
26. Home/DSL DSLAM BRAS
/64 IPv6 p-to-p/64 IPv6 Home wLAN
/64 IPv6 p-to-p/64 IPv6 p-to-p
/64 IPv6 p-to-p
/64 IPv6 Home wLAN
/64 IPv6 Home wLAN
DHCP
PD (Home) + RA (p-to-p)
/64 Prefix Delegation to Home Network
/56 Prefix Delegation to Home Network
To IP Core Network
IPv6 Broadband Access Network
Case “A”
Case “B”
/56 IPv6 Home wLAN (DHCP PD)
26
27. Home/DSL DSLAM BRAS
/64 IPv6 p-to-p/64 IPv6 Home wLAN
/64 IPv6 p-to-p/64 IPv6 p-to-p
/64 IPv6 p-to-p
/64 IPv6 Home wLAN
/64 IPv6 Home wLAN
DHCP
PD (Home) + RA (p-to-p)
/64 Prefix Delegation to Home Network
/56 Prefix Delegation to Home Network
To IP Core Network
IPv6 Broadband Access Network
Case “A”
Case “B”
/56 IPv6 Home wLAN (DHCP PD)
/64 IPv6 PD Home DHCP
/64 IPv6 PD Home DHCP
27
28. IPv6 Broadband Access Network
/64 IPv6 p-to-p/64 IPv6 Home wLAN
DHCP
PD (Home) + RA (p-to-p)
/64 Prefix Delegation to Home Network
To IP Core Network
/64 P-to-P
(RA or
28
29. IPv6 Broadband Access Network
/64 IPv6 p-to-p/64 IPv6 Home wLAN
DHCP
PD (Home) + RA (p-to-p)
/64 Prefix Delegation to Home Network
To IP Core Network
/64 P-to-P
(RA or
End site growth:
* 264 devices
* Auto configuration (SLAC)
* ISP DHCP one prefix only
29
30. Policy Guideline on IPv6 Delegation
/64 P-to-P
(RA or
APNIC IPv6 Address Delegation Guideline
30
31. Policy Guideline on IPv6 Delegation
/64 P-to-P
(RA or
APNIC IPv6 Address Delegation Guideline
31
32. Policy Guideline on IPv6 Delegation
/64 P-to-P
(RA or
APNIC IPv6 Address Delegation Guideline
32
33. Future IoT Layer 2 & 3 Standard !!
IoT apps
LoRa,
voice, email, IM
video, TV, conf
WWW, DNS
802.11x/WiMax
mobile/4G/LTE
cable/xDSLx/FTTx
IPv6
6loWPAN
33
34. Future IoT Layer 2 & 3 Standard !!
IoT apps
LoRa,
voice, email, IM
video, TV, conf
WWW, DNS
802.11x/WiMax
mobile/4G/LTE
cable/xDSLx/FTTx
IPv6
6loWPAN
/64 IPv6 p-to-p/64 IPv6 Home wLAN
DHCP
PD (Home) + RA (p-to-p)
/64 Prefix Delegation to Home Network
To IP Core Network
/64 P-to-P
(RA or
End Site Growth:
* 264 Devices
* Auto Configuration
* ISP DHCP One Prefix Only
34