SlideShare a Scribd company logo
Introduction to
IPv6.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– IPv6 address structure.
– IPv6 network transmissions.
Page 4
Introduction to IPv6.
Page 5
IPv6 is the answer to the
question “What do we do
about running out of IPv4
addresses?”
Unlike IPv4, IPv6 will provide enough Internet Protocol (IP)
addresses for the foreseeable future. Shortly after IPv4’s creation
and implementation, the Internet Assigned Numbers Authority
(IANA)—the organization that is tasked with assigning routable
IP addresses—realized that the available IPv4 address space
would not be enough.
The IANA then set about creating the replacement and started
work on IPv5. While working on IPv5, however, the IANA
determined that it was not going to be
Introduction to IPv6.
sufficient for the task. They scrapped IPv5 and began
working on IPv6. The IANA is confident that IPv6 will
function as the replacement for IPv4 for many decades
to come.
Page 6
Introduction to IPv6.
– IPv6 works at Layer 3 of the OSI model.
» Layer 3 of the OSI model is also known as the network layer
and its major focus is logical network and host addressing.
IPv6’s job is to provide logical network and host addresses to
devices.
– IPv6 is a 128-bit binary addressing scheme.
» The 128 bits are grouped together in sets, with each set being
separated by a colon.
• Each set is 2 bytes long (a byte is 8 bits).
» For human readability, the binary IPv6 number is converted to
hexadecimal (base 16) with each hexadecimal number being
equal to 4 bits (which can be referred to as a “nibble” because it
is half of a byte).
• An IPv6 address is eight sets of four hexadecimal numbers
with each set separated by colons.
– There are over 340 undecillion addresses
available to IPv6.
» 2128 is roughly equal to 340 x 1036.
• 340,282,366,920,938,463,463,374,607,431,768,211,456
Page 7
Introduction to IPv6.
– IPv6 local address structure.
» The first 64 bits represent the local network and the last 64 bits
represent the host.
• The local address structure follows the Extended Unique
Identifier (EUI) format—EUI-64. The 48-bit MAC address is
padded with 16 bits to make it 64 bits in length.
» The local address is called the link local address and it always
begins with fe80.
– IPv6 global address structure.
» The host address is always the last 64 bits.
» The network portion is actually composed of the routing prefix
and subnet.
• It follows the Classless Inter-domain Routing (CIDR)
convention with the number that follows the slash denoting the
routing prefix.
• The subnet is composed of the bits between the prefix and the
EUI-64 host address.
» Global IPv6 addresses always begin in the range of 2000 to
3999.
Page 8
In most cases, the need for
Dynamic Host
Configuration Protocol
(DHCP) has been eliminated.
When implemented, IPv6 will auto-configure both the
local and global addresses that are required to be
unique on the networks. When a device first comes
online, it will use Neighbor Discover Protocol (NDP) to
discover what the required network addresses are, both
the local and the global. This allows the device to
configure its own IPv6 addresses.
Introduction to IPv6.
Page 9
Introduction to IPv6.
– IPv6 notation.
» The 128-bit nature of IPv6 makes it cumbersome to write out
and can take up unnecessary space. Because of this, some
rules were developed to ease the burden and to save space.
• Leading 0s in a set can be dropped.
• Any single set of consecutive 0s may be replaced by a double
colon.
– IPv6 notation example.
» Original address = 2001:0db8:0000:0000:0000:ff00:0042:8329
» Drop the leading 0s = 2001:db8:0:0:0:ff00:42:8329
» Remove sets of consecutive 0s = 2001:db8::ff00:42:8329
• Remember, only one set of consecutive 0s may replaced with
the double colon.
• Even this is still difficult for us mere mortals to remember, but
it is easier to write out and it conserves on space.
Page 10
Introduction to IPv6.
Page 11
Introduction to IPv6.
– Unicast.
» One-to-one communication.
• A specific device sending network traffic to another specific
device.
» Unicast can occur on the local network (fe80) or it can occur on
the global network (2000 to 3999).
– Multicast.
» One-to-a-few communication.
• A specific device sending network traffic to a specific group of
devices that have registered to receive that traffic.
» Routers register to receive multicast transmissions that involve
the routing protocols they are programmed to use.
• Multicast addresses always begin with an ff.
– Anycast.
» One-to-the-closest communication.
• A specific device sending network traffic to a specific IPv6
address that has been assigned to multiple devices.
• The router only sends the communication to the closest one.
» Involves implementing DHCPv6.
Page 12
Introduction to IPv6.
– DHCPv6.
» IPv6 is capable of auto-configuring its own local and global
addresses.
• In certain situations, that is not always desirable.
» DHCPv6 can be configured to hand out specific IPv6 addresses
(or duplicate IPv6 addresses) when necessary.
» Useful for when load balancing a network, or for when network
redundancy has been created.
– IPv6 and IPv4.
» Dual stack configuration.
• The network and the devices on the network receive both an
IPv6 configuration and an IPv4 configuration.
» Tunneling.
• 6to4 tunneling is used to encapsulate IPv6 data packets in an
IPv4 datagram, allowing IPv6 packets to travel across or
through all IPv4 networks.
• 6to4 tunneling can also be called Teredo tunneling.
Page 13
Introduction to IPv6.
The IANA developed IPv6 as a long term replacement to IPv4. It is a 128-bit
binary addressing scheme that provides 340 x 1036 possible unique
addresses. It is represented by eight sets of colon separated hexadecimal
numbers (each set representing 16 bits). IPv6 is capable of auto-
configuration through the use of NDP. DHCPv6 is only used in certain
specific network configurations.
Topic
IPv6 address structure.
Summary
Unicast is one-to-one communication (one device sending to a specific
device). Multicast is one-to-a-few communication (one device sending to a
registered group). Anycast is one-to-the-closest communication (one device
sends to a specific IPv6 address, which has been assigned to multiple
devices and the closest one receives the packet). By implementing a dual
stack configuration or using 6to4 tunneling, IPv6 can be used in conjunction
with IPv4.
IPv6 network transmissions.
Page 14
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot

PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Network Cabling (part 1) - N10 006
PACE-IT: Network Cabling (part 1) - N10 006 PACE-IT: Network Cabling (part 1) - N10 006
PACE-IT: Network Cabling (part 1) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Storage Area Networks - N10 006
PACE-IT: Storage Area Networks - N10 006PACE-IT: Storage Area Networks - N10 006
PACE-IT: Storage Area Networks - N10 006
Pace IT at Edmonds Community College
 
Pace IT - Common Ports and Protocols
Pace IT - Common Ports and ProtocolsPace IT - Common Ports and Protocols
Pace IT - Common Ports and Protocols
Pace IT at Edmonds Community College
 
PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006 PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless StandardsPACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless Standards
Pace IT at Edmonds Community College
 
PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Implementing a Basic Network - N10 006 PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Implementing a Basic Network - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006 PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Network Cabling (part 2) - N10 006
PACE-IT: Network Cabling (part 2) - N10 006 PACE-IT: Network Cabling (part 2) - N10 006
PACE-IT: Network Cabling (part 2) - N10 006
Pace IT at Edmonds Community College
 
Pace IT - Basic Network Connections
Pace IT - Basic Network ConnectionsPace IT - Basic Network Connections
Pace IT - Basic Network Connections
Pace IT at Edmonds Community College
 
PACE-IT: Basic Elements of Unified Communications - N10 006
PACE-IT: Basic Elements of Unified Communications - N10 006 PACE-IT: Basic Elements of Unified Communications - N10 006
PACE-IT: Basic Elements of Unified Communications - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: WAN Technologies (part 1) - N10 006
PACE-IT: WAN Technologies (part 1) - N10 006 PACE-IT: WAN Technologies (part 1) - N10 006
PACE-IT: WAN Technologies (part 1) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
Pace IT at Edmonds Community College
 
Pace IT Coax and Fiber
Pace IT Coax and FiberPace IT Coax and Fiber
Pace IT Coax and Fiber
Pace IT at Edmonds Community College
 
PACE-IT: WAN Technologies (part 2) - N10 006
PACE-IT: WAN Technologies (part 2) - N10 006 PACE-IT: WAN Technologies (part 2) - N10 006
PACE-IT: WAN Technologies (part 2) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006
Pace IT at Edmonds Community College
 
Pace IT - Introduction to the Transport Layer
Pace IT - Introduction to the Transport LayerPace IT - Introduction to the Transport Layer
Pace IT - Introduction to the Transport Layer
Pace IT at Edmonds Community College
 
PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006 PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006 PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
Pace IT at Edmonds Community College
 

What's hot (20)

PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
 
PACE-IT: Network Cabling (part 1) - N10 006
PACE-IT: Network Cabling (part 1) - N10 006 PACE-IT: Network Cabling (part 1) - N10 006
PACE-IT: Network Cabling (part 1) - N10 006
 
PACE-IT: Storage Area Networks - N10 006
PACE-IT: Storage Area Networks - N10 006PACE-IT: Storage Area Networks - N10 006
PACE-IT: Storage Area Networks - N10 006
 
Pace IT - Common Ports and Protocols
Pace IT - Common Ports and ProtocolsPace IT - Common Ports and Protocols
Pace IT - Common Ports and Protocols
 
PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006 PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006
 
PACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless StandardsPACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless Standards
 
PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Implementing a Basic Network - N10 006 PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Implementing a Basic Network - N10 006
 
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006 PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
 
PACE-IT: Network Cabling (part 2) - N10 006
PACE-IT: Network Cabling (part 2) - N10 006 PACE-IT: Network Cabling (part 2) - N10 006
PACE-IT: Network Cabling (part 2) - N10 006
 
Pace IT - Basic Network Connections
Pace IT - Basic Network ConnectionsPace IT - Basic Network Connections
Pace IT - Basic Network Connections
 
PACE-IT: Basic Elements of Unified Communications - N10 006
PACE-IT: Basic Elements of Unified Communications - N10 006 PACE-IT: Basic Elements of Unified Communications - N10 006
PACE-IT: Basic Elements of Unified Communications - N10 006
 
PACE-IT: WAN Technologies (part 1) - N10 006
PACE-IT: WAN Technologies (part 1) - N10 006 PACE-IT: WAN Technologies (part 1) - N10 006
PACE-IT: WAN Technologies (part 1) - N10 006
 
PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006
 
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
 
Pace IT Coax and Fiber
Pace IT Coax and FiberPace IT Coax and Fiber
Pace IT Coax and Fiber
 
PACE-IT: WAN Technologies (part 2) - N10 006
PACE-IT: WAN Technologies (part 2) - N10 006 PACE-IT: WAN Technologies (part 2) - N10 006
PACE-IT: WAN Technologies (part 2) - N10 006
 
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006
 
Pace IT - Introduction to the Transport Layer
Pace IT - Introduction to the Transport LayerPace IT - Introduction to the Transport Layer
Pace IT - Introduction to the Transport Layer
 
PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006 PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006
 
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006 PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
 

Viewers also liked

Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12
mlrbrown
 
Networking Chapter 15
Networking Chapter 15Networking Chapter 15
Networking Chapter 15
mlrbrown
 
Networking Chapter 11
Networking Chapter 11Networking Chapter 11
Networking Chapter 11
mlrbrown
 
Networking Chapter 14
Networking Chapter 14Networking Chapter 14
Networking Chapter 14
mlrbrown
 
Chapter 2 Networking
Chapter 2 NetworkingChapter 2 Networking
Chapter 2 Networking
mlrbrown
 
Networking Chapter 10
Networking Chapter 10Networking Chapter 10
Networking Chapter 10
mlrbrown
 
CompTIA Network+ Lesson
CompTIA Network+ LessonCompTIA Network+ Lesson
CompTIA Network+ Lesson
Phoenix TS
 
Networking Chapter 4
Networking Chapter 4Networking Chapter 4
Networking Chapter 4
mlrbrown
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
Pace IT at Edmonds Community College
 
Networking Chapter 8
Networking Chapter 8Networking Chapter 8
Networking Chapter 8
mlrbrown
 
Networking Chapter 9
Networking Chapter 9Networking Chapter 9
Networking Chapter 9
mlrbrown
 
Networking Chapter 5
Networking Chapter 5Networking Chapter 5
Networking Chapter 5
mlrbrown
 
Networking Chapter 13
Networking Chapter 13Networking Chapter 13
Networking Chapter 13
mlrbrown
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16
mlrbrown
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
Pace IT at Edmonds Community College
 
Chapter 3 Networking
Chapter 3 NetworkingChapter 3 Networking
Chapter 3 Networking
mlrbrown
 
Comp tia n+_intro_session
Comp tia n+_intro_sessionComp tia n+_intro_session
Comp tia n+_intro_session
Niit Care
 
Comp tia n+_session_04
Comp tia n+_session_04Comp tia n+_session_04
Comp tia n+_session_04
Niit Care
 
Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02
Niit Care
 
Comp tia n+_session_12
Comp tia n+_session_12Comp tia n+_session_12
Comp tia n+_session_12
Niit Care
 

Viewers also liked (20)

Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12
 
Networking Chapter 15
Networking Chapter 15Networking Chapter 15
Networking Chapter 15
 
Networking Chapter 11
Networking Chapter 11Networking Chapter 11
Networking Chapter 11
 
Networking Chapter 14
Networking Chapter 14Networking Chapter 14
Networking Chapter 14
 
Chapter 2 Networking
Chapter 2 NetworkingChapter 2 Networking
Chapter 2 Networking
 
Networking Chapter 10
Networking Chapter 10Networking Chapter 10
Networking Chapter 10
 
CompTIA Network+ Lesson
CompTIA Network+ LessonCompTIA Network+ Lesson
CompTIA Network+ Lesson
 
Networking Chapter 4
Networking Chapter 4Networking Chapter 4
Networking Chapter 4
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
 
Networking Chapter 8
Networking Chapter 8Networking Chapter 8
Networking Chapter 8
 
Networking Chapter 9
Networking Chapter 9Networking Chapter 9
Networking Chapter 9
 
Networking Chapter 5
Networking Chapter 5Networking Chapter 5
Networking Chapter 5
 
Networking Chapter 13
Networking Chapter 13Networking Chapter 13
Networking Chapter 13
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
 
Chapter 3 Networking
Chapter 3 NetworkingChapter 3 Networking
Chapter 3 Networking
 
Comp tia n+_intro_session
Comp tia n+_intro_sessionComp tia n+_intro_session
Comp tia n+_intro_session
 
Comp tia n+_session_04
Comp tia n+_session_04Comp tia n+_session_04
Comp tia n+_session_04
 
Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02
 
Comp tia n+_session_12
Comp tia n+_session_12Comp tia n+_session_12
Comp tia n+_session_12
 

Similar to PACE-IT: Introduction to IPv6 - N10 006

3hows
3hows3hows
Ipv6
Ipv6Ipv6
Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6
Netwax Lab
 
Simplified IPv6 Subnetting. Understanding What’s What.
Simplified IPv6 Subnetting. Understanding What’s What.Simplified IPv6 Subnetting. Understanding What’s What.
Simplified IPv6 Subnetting. Understanding What’s What.
SolarWinds
 
Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504
Erik Ginalick
 
Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504
Erik Ginalick
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2
srmanjuskp
 
IPv6
IPv6IPv6
Apnic-Training-IPv6_workshop
Apnic-Training-IPv6_workshopApnic-Training-IPv6_workshop
Apnic-Training-IPv6_workshop
Nguyen Minh Thu
 
IPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be IgnoredIPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be Ignored
Rochester Security Summit
 
Performance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition TechniquesPerformance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition Techniques
Andy Juan Sarango Veliz
 
IPv6 on the Interop Network
IPv6 on the Interop NetworkIPv6 on the Interop Network
IPv6 on the Interop Network
Network Utility Force
 
Introduction to IPv6
Introduction to IPv6Introduction to IPv6
Introduction to IPv6
Sara Q. Abedulridha
 
Ipv6 routing
Ipv6 routingIpv6 routing
Ip v4 & ip v6
Ip v4 & ip v6Ip v4 & ip v6
Ip v4 & ip v6
Ronan Dunne, CEH, SSCP
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
suvobgd
 
RASHMI VT REPORT
RASHMI VT REPORTRASHMI VT REPORT
RASHMI VT REPORT
Rashmi kumari
 
Whitepaper: Network transitioning from IPv4 to IPv6 Document - Happiest Minds
Whitepaper: Network transitioning from IPv4 to IPv6 Document - Happiest MindsWhitepaper: Network transitioning from IPv4 to IPv6 Document - Happiest Minds
Whitepaper: Network transitioning from IPv4 to IPv6 Document - Happiest Minds
Happiest Minds Technologies
 
The introduction to_ipv6
The introduction to_ipv6The introduction to_ipv6
The introduction to_ipv6
mnihsanmz
 
Network Configuration Example: Configuring IS-IS Dual Stacking of IPv4 and IP...
Network Configuration Example: Configuring IS-IS Dual Stacking of IPv4 and IP...Network Configuration Example: Configuring IS-IS Dual Stacking of IPv4 and IP...
Network Configuration Example: Configuring IS-IS Dual Stacking of IPv4 and IP...
Juniper Networks
 

Similar to PACE-IT: Introduction to IPv6 - N10 006 (20)

3hows
3hows3hows
3hows
 
Ipv6
Ipv6Ipv6
Ipv6
 
Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6
 
Simplified IPv6 Subnetting. Understanding What’s What.
Simplified IPv6 Subnetting. Understanding What’s What.Simplified IPv6 Subnetting. Understanding What’s What.
Simplified IPv6 Subnetting. Understanding What’s What.
 
Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504
 
Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2
 
IPv6
IPv6IPv6
IPv6
 
Apnic-Training-IPv6_workshop
Apnic-Training-IPv6_workshopApnic-Training-IPv6_workshop
Apnic-Training-IPv6_workshop
 
IPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be IgnoredIPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be Ignored
 
Performance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition TechniquesPerformance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition Techniques
 
IPv6 on the Interop Network
IPv6 on the Interop NetworkIPv6 on the Interop Network
IPv6 on the Interop Network
 
Introduction to IPv6
Introduction to IPv6Introduction to IPv6
Introduction to IPv6
 
Ipv6 routing
Ipv6 routingIpv6 routing
Ipv6 routing
 
Ip v4 & ip v6
Ip v4 & ip v6Ip v4 & ip v6
Ip v4 & ip v6
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
 
RASHMI VT REPORT
RASHMI VT REPORTRASHMI VT REPORT
RASHMI VT REPORT
 
Whitepaper: Network transitioning from IPv4 to IPv6 Document - Happiest Minds
Whitepaper: Network transitioning from IPv4 to IPv6 Document - Happiest MindsWhitepaper: Network transitioning from IPv4 to IPv6 Document - Happiest Minds
Whitepaper: Network transitioning from IPv4 to IPv6 Document - Happiest Minds
 
The introduction to_ipv6
The introduction to_ipv6The introduction to_ipv6
The introduction to_ipv6
 
Network Configuration Example: Configuring IS-IS Dual Stacking of IPv4 and IP...
Network Configuration Example: Configuring IS-IS Dual Stacking of IPv4 and IP...Network Configuration Example: Configuring IS-IS Dual Stacking of IPv4 and IP...
Network Configuration Example: Configuring IS-IS Dual Stacking of IPv4 and IP...
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 

Recently uploaded (20)

writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 

PACE-IT: Introduction to IPv6 - N10 006

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE-IT. – IPv6 address structure. – IPv6 network transmissions.
  • 5. Page 5 IPv6 is the answer to the question “What do we do about running out of IPv4 addresses?” Unlike IPv4, IPv6 will provide enough Internet Protocol (IP) addresses for the foreseeable future. Shortly after IPv4’s creation and implementation, the Internet Assigned Numbers Authority (IANA)—the organization that is tasked with assigning routable IP addresses—realized that the available IPv4 address space would not be enough. The IANA then set about creating the replacement and started work on IPv5. While working on IPv5, however, the IANA determined that it was not going to be Introduction to IPv6. sufficient for the task. They scrapped IPv5 and began working on IPv6. The IANA is confident that IPv6 will function as the replacement for IPv4 for many decades to come.
  • 6. Page 6 Introduction to IPv6. – IPv6 works at Layer 3 of the OSI model. » Layer 3 of the OSI model is also known as the network layer and its major focus is logical network and host addressing. IPv6’s job is to provide logical network and host addresses to devices. – IPv6 is a 128-bit binary addressing scheme. » The 128 bits are grouped together in sets, with each set being separated by a colon. • Each set is 2 bytes long (a byte is 8 bits). » For human readability, the binary IPv6 number is converted to hexadecimal (base 16) with each hexadecimal number being equal to 4 bits (which can be referred to as a “nibble” because it is half of a byte). • An IPv6 address is eight sets of four hexadecimal numbers with each set separated by colons. – There are over 340 undecillion addresses available to IPv6. » 2128 is roughly equal to 340 x 1036. • 340,282,366,920,938,463,463,374,607,431,768,211,456
  • 7. Page 7 Introduction to IPv6. – IPv6 local address structure. » The first 64 bits represent the local network and the last 64 bits represent the host. • The local address structure follows the Extended Unique Identifier (EUI) format—EUI-64. The 48-bit MAC address is padded with 16 bits to make it 64 bits in length. » The local address is called the link local address and it always begins with fe80. – IPv6 global address structure. » The host address is always the last 64 bits. » The network portion is actually composed of the routing prefix and subnet. • It follows the Classless Inter-domain Routing (CIDR) convention with the number that follows the slash denoting the routing prefix. • The subnet is composed of the bits between the prefix and the EUI-64 host address. » Global IPv6 addresses always begin in the range of 2000 to 3999.
  • 8. Page 8 In most cases, the need for Dynamic Host Configuration Protocol (DHCP) has been eliminated. When implemented, IPv6 will auto-configure both the local and global addresses that are required to be unique on the networks. When a device first comes online, it will use Neighbor Discover Protocol (NDP) to discover what the required network addresses are, both the local and the global. This allows the device to configure its own IPv6 addresses. Introduction to IPv6.
  • 9. Page 9 Introduction to IPv6. – IPv6 notation. » The 128-bit nature of IPv6 makes it cumbersome to write out and can take up unnecessary space. Because of this, some rules were developed to ease the burden and to save space. • Leading 0s in a set can be dropped. • Any single set of consecutive 0s may be replaced by a double colon. – IPv6 notation example. » Original address = 2001:0db8:0000:0000:0000:ff00:0042:8329 » Drop the leading 0s = 2001:db8:0:0:0:ff00:42:8329 » Remove sets of consecutive 0s = 2001:db8::ff00:42:8329 • Remember, only one set of consecutive 0s may replaced with the double colon. • Even this is still difficult for us mere mortals to remember, but it is easier to write out and it conserves on space.
  • 11. Page 11 Introduction to IPv6. – Unicast. » One-to-one communication. • A specific device sending network traffic to another specific device. » Unicast can occur on the local network (fe80) or it can occur on the global network (2000 to 3999). – Multicast. » One-to-a-few communication. • A specific device sending network traffic to a specific group of devices that have registered to receive that traffic. » Routers register to receive multicast transmissions that involve the routing protocols they are programmed to use. • Multicast addresses always begin with an ff. – Anycast. » One-to-the-closest communication. • A specific device sending network traffic to a specific IPv6 address that has been assigned to multiple devices. • The router only sends the communication to the closest one. » Involves implementing DHCPv6.
  • 12. Page 12 Introduction to IPv6. – DHCPv6. » IPv6 is capable of auto-configuring its own local and global addresses. • In certain situations, that is not always desirable. » DHCPv6 can be configured to hand out specific IPv6 addresses (or duplicate IPv6 addresses) when necessary. » Useful for when load balancing a network, or for when network redundancy has been created. – IPv6 and IPv4. » Dual stack configuration. • The network and the devices on the network receive both an IPv6 configuration and an IPv4 configuration. » Tunneling. • 6to4 tunneling is used to encapsulate IPv6 data packets in an IPv4 datagram, allowing IPv6 packets to travel across or through all IPv4 networks. • 6to4 tunneling can also be called Teredo tunneling.
  • 13. Page 13 Introduction to IPv6. The IANA developed IPv6 as a long term replacement to IPv4. It is a 128-bit binary addressing scheme that provides 340 x 1036 possible unique addresses. It is represented by eight sets of colon separated hexadecimal numbers (each set representing 16 bits). IPv6 is capable of auto- configuration through the use of NDP. DHCPv6 is only used in certain specific network configurations. Topic IPv6 address structure. Summary Unicast is one-to-one communication (one device sending to a specific device). Multicast is one-to-a-few communication (one device sending to a registered group). Anycast is one-to-the-closest communication (one device sends to a specific IPv6 address, which has been assigned to multiple devices and the closest one receives the packet). By implementing a dual stack configuration or using 6to4 tunneling, IPv6 can be used in conjunction with IPv4. IPv6 network transmissions.
  • 15. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.