SlideShare a Scribd company logo
1 of 46
Govt. Engineering College, Bikaner
Submitted to:-
Mrs. Anita Chandel
Assistant professor
Dept. of Information
Technology
Submitted by:-
Mohit Kumar Sharma
Information Technology
13EEBIT031
8th Sem, 4th Year
Information Technology Department
IPV6
The Next Generation
Protocol
OUTLINES
Introduction
What is IPv6
IPv6 features
Ipv6 Packet
IPv4 vs IPv6
Addressing
Security
Pros & Cons
Intorduction
What is IP?
The Internet Protocol (IP) is the method or protocol
by which data is sent from one computer to another
on the Internet. Each computer (known as a host) on
the Internet has at least one IP address that uniquely
identifies it from all other computers on the Internet.
The current version of the Internet Protocol IPv4 was first
developed in the 1970s, and the main protocol standard RFC
791 that governs IPv4 functionality was published in 1981.
Internet Engineering Task Force (IETF) initiated as early as in
1994, the design and development of a suite of protocols and
standards now known as Internet Protocol Version 6 (IPv6).
IPv6 was first formally described in Internet standard
document published in December 1998.
History
Connectionless Protocol
Best effort delivery
Used on packet-switched network
Addressing
IPv4 uses 32-bit addresses which limits the address space to
4294967296 (232) addresses.
IPv4 reserves special address blocks for private networks(~18
million addresses) and multicast addresses (~270 million
addresses).
IPv4
IPv4 Address Classes
IPv4 Packet
Subnetting
Network Address Translation (NAT)
Classless Inter Domain Routing (CIDR)
Techniques to reduce address
shortage in IPv4
Three-level hierarchy: network, subnet, and host.
The extended-network-prefix is composed of the
classful network-prefix and the subnet-number
The extended-network-prefix has traditionally
been identified by the subnet mask
Subnetting
Network-Prefix Subnet-Number Host-Number
Subnetting Example
Internet
G
H1 H2
H3 H4
Subnet mask 255.255.255.0
All traffic
to 128.10.0.0
128.10.1.1 128.10.1.2
128.10.2.1 128.10.2.2
Sub-network 128.10.1.0
Sub-network 128.10.2.0
Net mask 255.255.0.0
Network Address Translation
Each organization- single
IP address
Within organization –
each host with IP unique
to the orgn., from
reserved set of IP
addresses
NAT Example
Eliminates traditional classful IP routing.
Supports the deployment of arbitrarily sized
networks
Routing information is advertised with a bit
mask/prefix length specifies the number of leftmost
contiguous bits in the network portion of each routing table entry
Example: 192.168.0.0/30
Classless Inter-Domain Routing
1. Internet Users or PC
 ~530 million users in 2002, ~945 million by 2004
 (Source: Computer Industry Almanac)
 Emerging population/geopolitical and Address space
2. PDA, Pen-Tablet, Notepad,…
 ~20 million in 2004
3. Mobile phones
 Already 1 billion mobile phones delivered by the industry
4. Transportation
 1 billion automobiles forecast for 2008
 Internet access in Planes
5. Consumer devices
 Billions of Home and Industrial Appliances
Do We Really Need a Larger Address
Space?
Internet Around us
What is IPv6?
Network layer protocol for packet switched internet
works.
Conservative extension of IPv4.
Virtually unlimited IP address possible. (Major advantage over
IPv4)
 IPv6 has a larger 128-bit address space, providing for
340 undecillion addresses. (That is the number 340, followed
by 36 zeroes.)
Originally called as IP Next Generation (IPng).
IPv6
Features
Larger address space
Stateless auto configuration of host.
Multicast
Network Layer Security. (encryption and authentication, is an integral part
of base protocol)
Mobility
Supports quality of service (QoS) parameters for
realtime audio and video.
Features of IPv6
IPv6 Packet
Two main parts: Header and Payload
Header is in first 40Bytes
The payload can be up to 64KB in size in standard
mode, or larger with a "jumbo payload" option.
IPv6 Packet
IPv6 Packet
IPv4 vs IPv6
IPv4 & IPv6 Header Comparison
Version IHL Type of Service
Total
Identification Flags
Fragment
Offset
Time to Live Protocol Header Checksum
Source Address
Destination Address
Options Padding
Version Traffic Class Flow Label
Payload Length
Next
Header
Hop Limit
Source Address
Destination Address
IPv4 Header IPv6 Header
- field’s name kept from IPv4 to IPv6
- fields not kept in IPv6
- Name & position changed in IPv6
- New field in IPv6
Difference
IPv4 IPv6
Source and destination addresses are 32 bits (4
bytes) in length.
Source and destination addresses are 128 bits (16
bytes) in length.
IPsec support is optional. IPsec support is required.
No identification of packet flow for QoS handling by
routers is present within the IPv4 header.
Packet flow identification for QoS handling by
routers is included in the IPv6 header using the
Flow Label field
Fragmentation is done by both routers and the
sending host.
Fragmentation is not done by routers, only by the
sending host.
Header includes a checksum. Header does not include a checksum.
Header includes options. All optional data is moved to IPv6 extension
headers.
Address Resolution Protocol (ARP) uses broadcast
ARP Request frames to resolve an IPv4 address to
a link layer address.
ARP Request frames are replaced with multicast
Neighbor Solicitation messages.
Addressing
Addresses are 128 bit long versus 32 bit in IPv4
Able to support 2128 (about 3.4×1038) addresses, for each
of the roughly 6.5 billion people alive today.
In most of the cases NAT (Network address translation)
is not required.
Makes large networks simpler, by avoiding the need for
complex sub netting schemes
Whats New?
128-bit IPv6 Address
3FFE:085B:1F1F:0000:0000:0000:00A9:1234
8 groups of 16-bit hexadecimal numbers separated by “:”
t hexadecimal numbersseparatedby “:”
Leading zeros can be removed
3FFE:85B:1F1F::A9:1234
:: = all zeros in one or more group of 16-bit hexadecimal numbers
Address Allocation
2001 0410
ISP prefix
Site prefix
Subnet prefix
/32 /48 /64
Registry
/23
Interface ID
The allocation process was recently updated by the registries:
IANA allocates from 2001::/16 to regional registries
Each regional registry allocation is a ::/23
ISP allocations from the regional registry is a ::/36 (immediate
allocation) or ::/32 (initial allocation) or shorter with justification
Policy expectation that an ISP allocates a ::/48 prefix to each
customer
Addresses have scope
Link Local
Site Local
Global
Addresses have lifetime
Valid and Preferred lifetime
IPv6 - Addressing Model
Link-LocalSite-LocalGlobal
Unicast
 One address on a single interface
 Delivery to single interface
Multicast
 Address of a set of interfaces
 Delivery to all interfaces in the set
Anycast
 Address of a set of interfaces
 Delivery to a single interface in the set
No broadcast addresses
Types of IPv6 Addresses
Security
All implementations required to support authentication and
encryption headers (“IPsec”)
Authentication separate from encryption for use
in situations where encryption is prohibited or prohibitively
expensive
Authentication header
 Guarantees authenticity and integrity of data
Encryption header
 Ensures confidentiality and privacy
Encryption modes:
 Transport mode
 Tunnel mode
IPv6 Security
 Authentication
 Data Integrity
 Anti-Reply
 It doesn’t provide any data confidentiality(Encryption).
Authentication Header
All functions of AH(Authentication, Data integrity, Anti-reply)
Also support data confidentiality(Encryption)
The benifits of using Encapsulating Security Payload (ESP) are
listed below.
• Confidentiality of Datagrams through encryption.
• Traffic flow confidentiality using security gateways.
• Authentication of data origin using digital certificates.
• Anti-replay services using sequence number mechanism.
Encapsulating Security Payload (ESP)
Encapsulating Security Payload (ESP)
Encryption Mode- Transport mode
End-to-end data
transmission security using
Transport Mode
IPsec Transport mode
protects upper-layer
protocols (Ex: TCP or UDP)
and Transport mode is used
to secure end-to-end (device
to device) communications.
Encryption Mode- Tunnel mode
IPSec tunnel mode is used to secure gateway-to-gateway
traffic.
IPSec tunnel mode is used to secure network layer packet also.
Transport vs Tunnel Mode
Transport mode is a
good option
securing host-to-
host communication
and Tunnel mode is
the option for
Virtual Private
Network (VPN).
Pros & Cons
Provides more address space ( which is being needed in larger
buisness)
More powerful internet (128bit versus IPv4's current 32 bit)
Offers and overall larger scale internet-which again will be
needed in the future
Address allocation is done by the device itself
Support for security using (IPsec) Internet Protocol Security
Pros
It will be much harder to remember IP addresses (compared to
the addresses now)
Creating a smooth transition from IPv4 to IPv6
IPv6 is not available to machines that run IPv4
Any consumer costs in having to replace an IPv4 machine
Time to convert over to IPv6
Cons
Department of Telecommunications, of Government of India has
run workshops on IPv6 on 13 February 2015 at Silvassa & on 11
February 2015, at DoT headquarters,New Delhi.They have also
released roadmaps on IPv6 deployment.
ERNET - The Indian Education and Research Network,
Department of Electronics & IT.
Reliance JIO has deployed and is offering IPv6 services in India.
Current User of IPv6 in India
Thank
You!

More Related Content

What's hot (20)

IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...
 
iP Address ,
 iP Address , iP Address ,
iP Address ,
 
Ip address
Ip address Ip address
Ip address
 
Ip addresses
Ip addressesIp addresses
Ip addresses
 
Ipv6
Ipv6Ipv6
Ipv6
 
IPv6 next generation protocol
IPv6 next generation protocolIPv6 next generation protocol
IPv6 next generation protocol
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
 
IPv6 Fundamentals
IPv6 FundamentalsIPv6 Fundamentals
IPv6 Fundamentals
 
VLAN
VLANVLAN
VLAN
 
Ip address
Ip addressIp address
Ip address
 
Addressing
AddressingAddressing
Addressing
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 

Viewers also liked

Japón recuperado
Japón recuperadoJapón recuperado
Japón recuperadojuanjofuro
 
AN INTERNSHIP ON PATAN ACADEMY OF HEALTH SCIENCES (PAHS) LIBRARY
AN INTERNSHIP ON PATAN ACADEMY OF HEALTH SCIENCES (PAHS) LIBRARYAN INTERNSHIP ON PATAN ACADEMY OF HEALTH SCIENCES (PAHS) LIBRARY
AN INTERNSHIP ON PATAN ACADEMY OF HEALTH SCIENCES (PAHS) LIBRARYArjun Thapa
 
CVE-2015-8562の脆弱性について
CVE-2015-8562の脆弱性についてCVE-2015-8562の脆弱性について
CVE-2015-8562の脆弱性についてYu Iwama
 
Guia de actuación contra el Acoso Escolar en los centros educativos
Guia de actuación contra el Acoso Escolar en los centros educativos Guia de actuación contra el Acoso Escolar en los centros educativos
Guia de actuación contra el Acoso Escolar en los centros educativos Hacer Educación
 
인포그래픽스 Fusion table활용
인포그래픽스 Fusion table활용인포그래픽스 Fusion table활용
인포그래픽스 Fusion table활용SON AH HYUN
 
Jadual Waktu SPM 2017
Jadual Waktu SPM 2017Jadual Waktu SPM 2017
Jadual Waktu SPM 2017ciklaili. com
 
Raport DEV3 net.work - Organizația Segmente
Raport DEV3 net.work - Organizația SegmenteRaport DEV3 net.work - Organizația Segmente
Raport DEV3 net.work - Organizația SegmenteSegmente Organisation
 
인포그래픽스 Fusion table 활용
인포그래픽스 Fusion table 활용인포그래픽스 Fusion table 활용
인포그래픽스 Fusion table 활용SON AH HYUN
 
2.2. clasificación de las tic que se utilizan actualmente en los procesos for...
2.2. clasificación de las tic que se utilizan actualmente en los procesos for...2.2. clasificación de las tic que se utilizan actualmente en los procesos for...
2.2. clasificación de las tic que se utilizan actualmente en los procesos for...rociogonzalezisabelpaz
 
Clean Delhi, Breathe Delhi
Clean Delhi, Breathe DelhiClean Delhi, Breathe Delhi
Clean Delhi, Breathe DelhiRachit Seth
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorialkriz5
 
3Com 3C0EP2100VCX
3Com 3C0EP2100VCX3Com 3C0EP2100VCX
3Com 3C0EP2100VCXsavomir
 

Viewers also liked (19)

33classification (part 1)
33classification (part 1)33classification (part 1)
33classification (part 1)
 
Japón recuperado
Japón recuperadoJapón recuperado
Japón recuperado
 
PPT Efusi Pleura
PPT Efusi Pleura PPT Efusi Pleura
PPT Efusi Pleura
 
AN INTERNSHIP ON PATAN ACADEMY OF HEALTH SCIENCES (PAHS) LIBRARY
AN INTERNSHIP ON PATAN ACADEMY OF HEALTH SCIENCES (PAHS) LIBRARYAN INTERNSHIP ON PATAN ACADEMY OF HEALTH SCIENCES (PAHS) LIBRARY
AN INTERNSHIP ON PATAN ACADEMY OF HEALTH SCIENCES (PAHS) LIBRARY
 
CVE-2015-8562の脆弱性について
CVE-2015-8562の脆弱性についてCVE-2015-8562の脆弱性について
CVE-2015-8562の脆弱性について
 
DevOps on Microsoft Platform
DevOps on Microsoft PlatformDevOps on Microsoft Platform
DevOps on Microsoft Platform
 
Guia de actuación contra el Acoso Escolar en los centros educativos
Guia de actuación contra el Acoso Escolar en los centros educativos Guia de actuación contra el Acoso Escolar en los centros educativos
Guia de actuación contra el Acoso Escolar en los centros educativos
 
인포그래픽스 Fusion table활용
인포그래픽스 Fusion table활용인포그래픽스 Fusion table활용
인포그래픽스 Fusion table활용
 
Jadual Waktu SPM 2017
Jadual Waktu SPM 2017Jadual Waktu SPM 2017
Jadual Waktu SPM 2017
 
Raport DEV3 net.work - Organizația Segmente
Raport DEV3 net.work - Organizația SegmenteRaport DEV3 net.work - Organizația Segmente
Raport DEV3 net.work - Organizația Segmente
 
New york
New yorkNew york
New york
 
Huruf a z
Huruf a zHuruf a z
Huruf a z
 
אגף ספריות ומידע - הצעה
אגף ספריות ומידע -  הצעהאגף ספריות ומידע -  הצעה
אגף ספריות ומידע - הצעה
 
인포그래픽스 Fusion table 활용
인포그래픽스 Fusion table 활용인포그래픽스 Fusion table 활용
인포그래픽스 Fusion table 활용
 
2.2. clasificación de las tic que se utilizan actualmente en los procesos for...
2.2. clasificación de las tic que se utilizan actualmente en los procesos for...2.2. clasificación de las tic que se utilizan actualmente en los procesos for...
2.2. clasificación de las tic que se utilizan actualmente en los procesos for...
 
Clean Delhi, Breathe Delhi
Clean Delhi, Breathe DelhiClean Delhi, Breathe Delhi
Clean Delhi, Breathe Delhi
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorial
 
3Com 3C0EP2100VCX
3Com 3C0EP2100VCX3Com 3C0EP2100VCX
3Com 3C0EP2100VCX
 
Envirotech
EnvirotechEnvirotech
Envirotech
 

Similar to IPv6 - The Next next generation protocol

Similar to IPv6 - The Next next generation protocol (20)

IP Address
IP AddressIP Address
IP Address
 
Network Layer And I Pv6
Network Layer And I Pv6Network Layer And I Pv6
Network Layer And I Pv6
 
I pv4 and ipv6
I pv4 and ipv6I pv4 and ipv6
I pv4 and ipv6
 
I pv6 mechanism
I pv6 mechanismI pv6 mechanism
I pv6 mechanism
 
I.p. protocol
I.p. protocolI.p. protocol
I.p. protocol
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
IP Address
IP AddressIP Address
IP Address
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Networking presentation 9 march 2009
Networking presentation   9 march 2009Networking presentation   9 march 2009
Networking presentation 9 march 2009
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
 
A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Clase 1 Direccionamiento IPv4.pdf
Clase 1 Direccionamiento IPv4.pdfClase 1 Direccionamiento IPv4.pdf
Clase 1 Direccionamiento IPv4.pdf
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Ipv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaIpv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar Tarsariya
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Hardware9
Hardware9Hardware9
Hardware9
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Ipv6
Ipv6Ipv6
Ipv6
 

Recently uploaded

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

IPv6 - The Next next generation protocol

  • 1. Govt. Engineering College, Bikaner Submitted to:- Mrs. Anita Chandel Assistant professor Dept. of Information Technology Submitted by:- Mohit Kumar Sharma Information Technology 13EEBIT031 8th Sem, 4th Year Information Technology Department
  • 3. OUTLINES Introduction What is IPv6 IPv6 features Ipv6 Packet IPv4 vs IPv6 Addressing Security Pros & Cons
  • 5. What is IP? The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet.
  • 6. The current version of the Internet Protocol IPv4 was first developed in the 1970s, and the main protocol standard RFC 791 that governs IPv4 functionality was published in 1981. Internet Engineering Task Force (IETF) initiated as early as in 1994, the design and development of a suite of protocols and standards now known as Internet Protocol Version 6 (IPv6). IPv6 was first formally described in Internet standard document published in December 1998. History
  • 7. Connectionless Protocol Best effort delivery Used on packet-switched network Addressing IPv4 uses 32-bit addresses which limits the address space to 4294967296 (232) addresses. IPv4 reserves special address blocks for private networks(~18 million addresses) and multicast addresses (~270 million addresses). IPv4
  • 10. Subnetting Network Address Translation (NAT) Classless Inter Domain Routing (CIDR) Techniques to reduce address shortage in IPv4
  • 11. Three-level hierarchy: network, subnet, and host. The extended-network-prefix is composed of the classful network-prefix and the subnet-number The extended-network-prefix has traditionally been identified by the subnet mask Subnetting Network-Prefix Subnet-Number Host-Number
  • 12. Subnetting Example Internet G H1 H2 H3 H4 Subnet mask 255.255.255.0 All traffic to 128.10.0.0 128.10.1.1 128.10.1.2 128.10.2.1 128.10.2.2 Sub-network 128.10.1.0 Sub-network 128.10.2.0 Net mask 255.255.0.0
  • 13. Network Address Translation Each organization- single IP address Within organization – each host with IP unique to the orgn., from reserved set of IP addresses
  • 15. Eliminates traditional classful IP routing. Supports the deployment of arbitrarily sized networks Routing information is advertised with a bit mask/prefix length specifies the number of leftmost contiguous bits in the network portion of each routing table entry Example: 192.168.0.0/30 Classless Inter-Domain Routing
  • 16. 1. Internet Users or PC  ~530 million users in 2002, ~945 million by 2004  (Source: Computer Industry Almanac)  Emerging population/geopolitical and Address space 2. PDA, Pen-Tablet, Notepad,…  ~20 million in 2004 3. Mobile phones  Already 1 billion mobile phones delivered by the industry 4. Transportation  1 billion automobiles forecast for 2008  Internet access in Planes 5. Consumer devices  Billions of Home and Industrial Appliances Do We Really Need a Larger Address Space?
  • 19. Network layer protocol for packet switched internet works. Conservative extension of IPv4. Virtually unlimited IP address possible. (Major advantage over IPv4)  IPv6 has a larger 128-bit address space, providing for 340 undecillion addresses. (That is the number 340, followed by 36 zeroes.) Originally called as IP Next Generation (IPng). IPv6
  • 21. Larger address space Stateless auto configuration of host. Multicast Network Layer Security. (encryption and authentication, is an integral part of base protocol) Mobility Supports quality of service (QoS) parameters for realtime audio and video. Features of IPv6
  • 23. Two main parts: Header and Payload Header is in first 40Bytes The payload can be up to 64KB in size in standard mode, or larger with a "jumbo payload" option. IPv6 Packet
  • 26. IPv4 & IPv6 Header Comparison Version IHL Type of Service Total Identification Flags Fragment Offset Time to Live Protocol Header Checksum Source Address Destination Address Options Padding Version Traffic Class Flow Label Payload Length Next Header Hop Limit Source Address Destination Address IPv4 Header IPv6 Header - field’s name kept from IPv4 to IPv6 - fields not kept in IPv6 - Name & position changed in IPv6 - New field in IPv6
  • 27. Difference IPv4 IPv6 Source and destination addresses are 32 bits (4 bytes) in length. Source and destination addresses are 128 bits (16 bytes) in length. IPsec support is optional. IPsec support is required. No identification of packet flow for QoS handling by routers is present within the IPv4 header. Packet flow identification for QoS handling by routers is included in the IPv6 header using the Flow Label field Fragmentation is done by both routers and the sending host. Fragmentation is not done by routers, only by the sending host. Header includes a checksum. Header does not include a checksum. Header includes options. All optional data is moved to IPv6 extension headers. Address Resolution Protocol (ARP) uses broadcast ARP Request frames to resolve an IPv4 address to a link layer address. ARP Request frames are replaced with multicast Neighbor Solicitation messages.
  • 29. Addresses are 128 bit long versus 32 bit in IPv4 Able to support 2128 (about 3.4×1038) addresses, for each of the roughly 6.5 billion people alive today. In most of the cases NAT (Network address translation) is not required. Makes large networks simpler, by avoiding the need for complex sub netting schemes Whats New?
  • 30. 128-bit IPv6 Address 3FFE:085B:1F1F:0000:0000:0000:00A9:1234 8 groups of 16-bit hexadecimal numbers separated by “:” t hexadecimal numbersseparatedby “:” Leading zeros can be removed 3FFE:85B:1F1F::A9:1234 :: = all zeros in one or more group of 16-bit hexadecimal numbers
  • 31. Address Allocation 2001 0410 ISP prefix Site prefix Subnet prefix /32 /48 /64 Registry /23 Interface ID The allocation process was recently updated by the registries: IANA allocates from 2001::/16 to regional registries Each regional registry allocation is a ::/23 ISP allocations from the regional registry is a ::/36 (immediate allocation) or ::/32 (initial allocation) or shorter with justification Policy expectation that an ISP allocates a ::/48 prefix to each customer
  • 32. Addresses have scope Link Local Site Local Global Addresses have lifetime Valid and Preferred lifetime IPv6 - Addressing Model Link-LocalSite-LocalGlobal
  • 33. Unicast  One address on a single interface  Delivery to single interface Multicast  Address of a set of interfaces  Delivery to all interfaces in the set Anycast  Address of a set of interfaces  Delivery to a single interface in the set No broadcast addresses Types of IPv6 Addresses
  • 35. All implementations required to support authentication and encryption headers (“IPsec”) Authentication separate from encryption for use in situations where encryption is prohibited or prohibitively expensive Authentication header  Guarantees authenticity and integrity of data Encryption header  Ensures confidentiality and privacy Encryption modes:  Transport mode  Tunnel mode IPv6 Security
  • 36.  Authentication  Data Integrity  Anti-Reply  It doesn’t provide any data confidentiality(Encryption). Authentication Header
  • 37. All functions of AH(Authentication, Data integrity, Anti-reply) Also support data confidentiality(Encryption) The benifits of using Encapsulating Security Payload (ESP) are listed below. • Confidentiality of Datagrams through encryption. • Traffic flow confidentiality using security gateways. • Authentication of data origin using digital certificates. • Anti-replay services using sequence number mechanism. Encapsulating Security Payload (ESP)
  • 39. Encryption Mode- Transport mode End-to-end data transmission security using Transport Mode IPsec Transport mode protects upper-layer protocols (Ex: TCP or UDP) and Transport mode is used to secure end-to-end (device to device) communications.
  • 40. Encryption Mode- Tunnel mode IPSec tunnel mode is used to secure gateway-to-gateway traffic. IPSec tunnel mode is used to secure network layer packet also.
  • 41. Transport vs Tunnel Mode Transport mode is a good option securing host-to- host communication and Tunnel mode is the option for Virtual Private Network (VPN).
  • 43. Provides more address space ( which is being needed in larger buisness) More powerful internet (128bit versus IPv4's current 32 bit) Offers and overall larger scale internet-which again will be needed in the future Address allocation is done by the device itself Support for security using (IPsec) Internet Protocol Security Pros
  • 44. It will be much harder to remember IP addresses (compared to the addresses now) Creating a smooth transition from IPv4 to IPv6 IPv6 is not available to machines that run IPv4 Any consumer costs in having to replace an IPv4 machine Time to convert over to IPv6 Cons
  • 45. Department of Telecommunications, of Government of India has run workshops on IPv6 on 13 February 2015 at Silvassa & on 11 February 2015, at DoT headquarters,New Delhi.They have also released roadmaps on IPv6 deployment. ERNET - The Indian Education and Research Network, Department of Electronics & IT. Reliance JIO has deployed and is offering IPv6 services in India. Current User of IPv6 in India