This document provides a report on a vocational training in IPV6 that was completed by Rashmi Kumari. It includes an introduction to IPV6 that compares it to IPV4 and highlights its larger address space, built-in multicasting, and network layer security. It also details IPV6's simplified packet format and routing. The report then discusses addressing, OSPF, implementing OSPF for IPV6, and building a simulated network with dual stack transition in GNS3 to test IPV6 functionality.
On the migration of a large scale network from i pv4 to ipv6 environmentIJCNCJournal
This document discusses the design of migrating a large-scale network from IPv4 to a dual-stack IPv4/IPv6 environment. It focuses on using dual-stack mechanisms, which allow both IPv4 and IPv6 protocol stacks to run simultaneously. The design considers aspects such as topology, addressing plans, routing protocols, and performance statistics. A dual-stack approach is proposed that involves transitioning the network core, perimeter routers, and other devices in stages to support both IPv4 and IPv6. Addressing plans are provided for infrastructure, loopbacks, and customer networks that aim to support future growth while allowing for aggregation.
Comparative study of IPv4 and IPv6 on Windows and Linux. Shourya Puri
This document provides a comparative study of IPv4 and IPv6 performance on Windows and Linux operating systems. It introduces IPv4 and IPv6, compares their key differences, and experimentally measures performance metrics like throughput, delay, jitter and CPU usage for IPv4 and IPv6 on Windows and Linux. The results show that for Windows and Linux, IPv4 generally has higher throughput and lower CPU usage than IPv6. However, IPv6 has advantages like a larger address space and increased security. Linux typically shows the highest CPU usage and TCP throughput for IPv6. The document also reviews several related works comparing IPv4 and IPv6 performance on different operating systems.
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTSatish Kumar
MINI PPT
IPv6 (Internet Protocol version 6) is a revision of the Internet Protocol (IP) developed by the Internet Engineering Task Force (IETF). IPv6 is intended to succeed IPv4.
IPv6 implements a new addressing system that allows for far more addresses to be assigned than with Ipv4.
Multiprotocol Label Switching (MPLS) is deployed by many service providers for establishing their backbone networks.
The Cisco implementation of IPv6 provider edge router over MPLS is called 6PE,and it enables IPv6 sites to communicate with each other over an MPLS IPv4 core network using MPLS label switched paths.
1) The document compares the performance of IPv4 and IPv6 networks using the OPNET network simulator.
2) It designs IPv4 and IPv6 networks in OPNET and analyzes parameters like delay, throughput, response time and jitter.
3) The simulation results show that IPv6 has higher delays than IPv4 due to its larger header size, but the difference is small. IPv4 also has slightly higher jitter. However, IPv6 performs better under heavy loads and has higher throughput.
The document discusses IPv6, the next generation Internet Protocol. It introduces IPv6 and describes some key differences from IPv4, including a much larger 128-bit address space compared to 32-bits in IPv4. It also describes some advantages IPv6 has over IPv4 such as built-in support for multicasting and stateless address autoconfiguration. The document outlines various mechanisms for transitioning from IPv4 to IPv6, including dual stack implementations, tunneling protocols, and translation technologies.
The document describes a new transition methodology called BD-SIIT for translating between IPv4 and IPv6. BD-SIIT uses a bidirectional mapping algorithm between IPv4 and IPv6 headers and addresses. It avoids embedding the IPv4 address directly into the IPv6 address. Instead, it uses a new address mapping approach based on identifying corresponding public IPv4 and IPv6 addresses.
The document provides an overview of IPv6 including:
- Limitations of IPv4 that IPv6 addresses such as limited address space and lack of security.
- Key features of IPv6 like a larger 128-bit address space, simpler header format, and built-in security.
- Protocols that support IPv6 functionality like Neighbor Discovery Protocol, Path MTU Discovery, and stateless and stateful address autoconfiguration.
The document describes the headers for IPv4 and IPv6 packets. IPv6 packet headers are simpler than IPv4 headers, with fewer fields but larger source and destination addresses. IPv6 also introduces extension headers to replace IPv4 options and allow additional optional information to be included. The transition from IPv4 to IPv6 will involve dual-stack implementations and tunneling IPv6 packets in IPv4 networks using special address types.
On the migration of a large scale network from i pv4 to ipv6 environmentIJCNCJournal
This document discusses the design of migrating a large-scale network from IPv4 to a dual-stack IPv4/IPv6 environment. It focuses on using dual-stack mechanisms, which allow both IPv4 and IPv6 protocol stacks to run simultaneously. The design considers aspects such as topology, addressing plans, routing protocols, and performance statistics. A dual-stack approach is proposed that involves transitioning the network core, perimeter routers, and other devices in stages to support both IPv4 and IPv6. Addressing plans are provided for infrastructure, loopbacks, and customer networks that aim to support future growth while allowing for aggregation.
Comparative study of IPv4 and IPv6 on Windows and Linux. Shourya Puri
This document provides a comparative study of IPv4 and IPv6 performance on Windows and Linux operating systems. It introduces IPv4 and IPv6, compares their key differences, and experimentally measures performance metrics like throughput, delay, jitter and CPU usage for IPv4 and IPv6 on Windows and Linux. The results show that for Windows and Linux, IPv4 generally has higher throughput and lower CPU usage than IPv6. However, IPv6 has advantages like a larger address space and increased security. Linux typically shows the highest CPU usage and TCP throughput for IPv6. The document also reviews several related works comparing IPv4 and IPv6 performance on different operating systems.
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTSatish Kumar
MINI PPT
IPv6 (Internet Protocol version 6) is a revision of the Internet Protocol (IP) developed by the Internet Engineering Task Force (IETF). IPv6 is intended to succeed IPv4.
IPv6 implements a new addressing system that allows for far more addresses to be assigned than with Ipv4.
Multiprotocol Label Switching (MPLS) is deployed by many service providers for establishing their backbone networks.
The Cisco implementation of IPv6 provider edge router over MPLS is called 6PE,and it enables IPv6 sites to communicate with each other over an MPLS IPv4 core network using MPLS label switched paths.
1) The document compares the performance of IPv4 and IPv6 networks using the OPNET network simulator.
2) It designs IPv4 and IPv6 networks in OPNET and analyzes parameters like delay, throughput, response time and jitter.
3) The simulation results show that IPv6 has higher delays than IPv4 due to its larger header size, but the difference is small. IPv4 also has slightly higher jitter. However, IPv6 performs better under heavy loads and has higher throughput.
The document discusses IPv6, the next generation Internet Protocol. It introduces IPv6 and describes some key differences from IPv4, including a much larger 128-bit address space compared to 32-bits in IPv4. It also describes some advantages IPv6 has over IPv4 such as built-in support for multicasting and stateless address autoconfiguration. The document outlines various mechanisms for transitioning from IPv4 to IPv6, including dual stack implementations, tunneling protocols, and translation technologies.
The document describes a new transition methodology called BD-SIIT for translating between IPv4 and IPv6. BD-SIIT uses a bidirectional mapping algorithm between IPv4 and IPv6 headers and addresses. It avoids embedding the IPv4 address directly into the IPv6 address. Instead, it uses a new address mapping approach based on identifying corresponding public IPv4 and IPv6 addresses.
The document provides an overview of IPv6 including:
- Limitations of IPv4 that IPv6 addresses such as limited address space and lack of security.
- Key features of IPv6 like a larger 128-bit address space, simpler header format, and built-in security.
- Protocols that support IPv6 functionality like Neighbor Discovery Protocol, Path MTU Discovery, and stateless and stateful address autoconfiguration.
The document describes the headers for IPv4 and IPv6 packets. IPv6 packet headers are simpler than IPv4 headers, with fewer fields but larger source and destination addresses. IPv6 also introduces extension headers to replace IPv4 options and allow additional optional information to be included. The transition from IPv4 to IPv6 will involve dual-stack implementations and tunneling IPv6 packets in IPv4 networks using special address types.
Overview of IPv6 protocol along with various transition scenarios for the migration from IPv4 to IPv6
IPv6 is the current and future Internet Protocol standard. As anticipated, IPv4 addresses became exhausted around 2012.
The IP address scarcity is the main driver for IPv6 protocol adoption.
IPv6 defines a much larger address space that should be sufficient for the foreseeable future, even taking into account Internet of Things scenarios with zillions of small devices connected to the Internet.
IPv6 is, however, much more than simply an expansion of the address space. IPv6 defines a clean address architecture with globally aggregatable addresses thus reducing routing table sizes in Internet routers.
IPv6 extension headers provide a standard mechanism for stacking protocols such as IP, IPSec, routing headers and upper layer headers such as TCP.
ICMP (Internet Control Message Protocol) is already defined for IPv4. ICMP was totally revamped for IPv6 and as ICMPv6 provides common functions like IP address and prefix assignment.
Lack of business drivers for migrating to IPv6 is responsible for sluggish adoption of IPv6 in carrier and enterprise networks.
Numerous transition mechanisms were developed to ease the transition from IPv4 to IPv6. Many of these mechanisms are complex and difficult to administer.
The transition mechanisms can be coarsely classified into dual-stack, tunneling and translation mechanisms.
The document discusses IPv4 routing and routing protocols. It begins with an introduction to routing and how data flows between devices on the internet in the form of packets. It then covers routing components like path determination, routing tables, and routing protocols for both intra-domain (RIP, OSPF) and inter-domain (BGP) routing. It concludes with a discussion on the future of routing with IPv6 and a high-level summary of routing and routing protocols.
Basics of IPv6 networking. Addressing, stateless autoconfiguration and other IPv6 features explained. We will introduce features supported by RouterOS and explain how to build dual-stack network. We will also show how to obtain your own IPv6 prefix in case where there no possibility to get IPv6 connectivity natively. Live examples of configuration of IPv6 routing protocols. Presentation will cover the features and differences between IPv4 and IPv6 implementations. Lecture focuses on OSPFv3 but we will also explain RIPng and BGP configuration.
This document discusses the Teredo protocol, which enables IPv6 connectivity for nodes located behind IPv4 NAT devices. It explains how Teredo works by tunneling IPv6 packets over UDP through NATs. While Teredo allows IPv6 connectivity, it also raises security concerns by bypassing security controls and allowing unsolicited traffic. The document analyzes attacks that could exploit vulnerabilities in Teredo tunnels, such as a denial of service attack against a Teredo server using a single packet. It investigates whether Teredo represents a security risk or is a worthwhile transition mechanism from IPv4 to IPv6.
IPv4 uses datagram switching at the network layer and is connectionless. It includes fields for identification, flags, fragmentation offset, and time to live. IPv6 was developed to address IPv4's inefficient address space, lack of security, and inability to support real-time audio/video. IPv6 features a larger 128-bit address space, better header format, extensions, flow labeling, and more security. A smooth transition involves dual stack, tunneling, or header translation methods.
This document provides an introduction and overview of IPv6, including:
- IPv6 is the next generation internet protocol that will replace IPv4, providing a vastly larger address space and additional features.
- The key reasons for adopting IPv6 are that IPv4 addresses are running out due to the exponential growth of internet-connected devices, while IPv6 supports 128-bit addresses providing trillions of times more addresses.
- IPv6 addresses are 128-bit compared to 32-bit IPv4 addresses, written in hexadecimal format divided into eight groups, and features include improved security, mobility, and traffic routing capabilities.
IPv6 Transition Strategies discusses various strategies available to service providers as IPv4 addresses run out, including doing nothing, extending the IPv4 network through NAT, and deploying IPv6 transition technologies. The document defines key terms like dual-stack, NAT, carrier grade NAT, and IPv6 transition methods. It then analyzes the advantages, disadvantages, and applicability of strategies like doing nothing, NAT, dual-stack networks, and IPv6 transition techniques involving tunneling or translation.
IPv4 addresses are running out, so IPv6 was created with a vastly larger 128-bit address space. During the transition, IPv4 and IPv6 will coexist via three main methods: dual-stack, tunneling, and translation. For internet service providers, dual-stack is the best approach as it allows gradual migration while both protocols are supported. The presentation provides details on IPv4 and IPv6 addressing schemes, transition mechanisms, and configuration examples for tunneling dual-stack implementations at an ISP.
Network optimization of ipv6 networks using tunnel header compressioneSAT Journals
Abstract
IPv6 is the successor internet protocol which will eventually replace IPv4. These two protocols are not compatible with each other and it will take time to migrate towards IPv6, until then both the protocols need to coexist for a long time. The main overhead involved with both the protocols is header length of 20 bytes in case of IPv4 and of 40 bytes in case of IPv6. This overhead will affect the network performance specially over tunneling mechanism where one header is encapsulated inside another. Tunneling is widely deployed over the network for various purposes like network security, mobility and transition mechanism. Header compression can be applied to compress the excess protocol headers to improve the performance of network. In this paper we want to use header compression in context of 6 to 4 tunneling transition. Using header compression over 6 to 4 tunnels would result in better response times reduced packet size and reduced packet losses. We want to simulate this algorithm using EXata Cyber 1.1 simulator.
Keywords: Header Compression, IPv4, IPv6, ROHC, 6 to 4 tunneling.
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...Iftikhar Wazir
The document discusses the transition from IPv4 to IPv6. It outlines three main strategies for the transition: dual stacking, tunneling, and header translation. Dual stacking involves running both IPv4 and IPv6 simultaneously on a device. Tunneling encapsulates IPv6 packets inside IPv4 packets to allow IPv6 communication through IPv4 networks. Header translation changes the header format of packets from IPv6 to IPv4 when needed to allow communication with IPv4-only systems. The transition is necessary due to deficiencies in IPv4 like limited address space and lack of security features, while IPv6 improves on areas like larger addresses, better headers, and added security functionality.
This document describes an ISP core routing topology project that was implemented to demonstrate how a company accesses its servers through the internet. The key features of the project include MPLS Layer 3 VPN, an IPv6 network with an IPv6 DNS server, various redundancy protocols like HSRP, VRRP and GLBP, dynamic routing protocols such as BGP, EIGRP and OSPF, and a Linux server providing services like DNS, Apache, FTP and SSH. MPLS is used to eliminate delays and provide a VPN connecting different company branches. The topology also features an IPv6 tunnel over an IPv4 network and dual stacking for IPv6/IPv4 communication.
This document provides an overview of IPv4 and IPv6, including their differences, deficiencies of IPv4, advantages of IPv6, and strategies for transitioning from IPv4 to IPv6. It discusses IPv4 and IPv6 address formats and header formats. It also covers deficiencies of IPv4 like address depletion and lack of security features, advantages of IPv6 like larger address space and better header format. The transition strategies covered are dual stack, tunneling, and header translation.
The document discusses the impending exhaustion of IPv4 addresses and the need to transition to IPv6. It provides background on IPv6 including that it provides 128-bit addresses to solve exhaustion, utilizes extensions to DHCPv6 for home network prefix assignment, and can be implemented via dual stack, tunneling, or translation methods. Charts show the decreasing pool of available IPv4 addresses and acceleration in depletion rates. The document argues for early adoption of IPv6 to avoid risks from delayed transition and outlines a 3-tier strategy using technologies like dual stack, 6rd, NAT64, and Dual-Stack Lite.
IMPROVING IPV6 ADDRESSING TYPES AND SIZEIJCNCJournal
This document discusses proposed modifications to IPv6 addressing types and address size. It suggests that multicast addressing can mimic anycast and limited broadcast addressing, making those types unnecessary. It also proposes reducing the IPv6 address size from 128-bits to decrease packet overhead, while ensuring the new size supports future internet growth. A formula is presented to predict IP address exhaustion dates for different address sizes based on current usage and population projections.
The document discusses IPv6 Neighbor Discovery. It explains that Neighbor Discovery allows nodes on the same link to discover each other, determine link-layer addresses, find routers, and maintain reachability information for active neighbors. It describes the various Neighbor Discovery message types and processes, including address resolution, duplicate address detection, and redirect function. Conceptual data structures for neighbor caches, destination caches, prefix lists, and default router lists are also outlined.
Performance Evaluation of Routing Protocols RIPng, OSPFv3, and EIGRP in an
IPv6 Network
Siti Ummi Masruroh
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
ummi.masruroh@uinjkt.ac.id
Fadly Robby
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
fadly.robby11@mhs.uinjkt.ac.id
Nashrul Hakiem
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
hakiem@uinjkt.ac.id
IPv6 addresses are 128-bit identifiers for interfaces compared to 32-bit in IPv4. The presentation discusses the various address formats and types in IPv6 including unicast, anycast, and multicast. It also covers the changes in IPv6 packet header format versus IPv4 as well as new features like flow labeling and extension headers. Key advantages of IPv6 are larger address space, simplified header format, improved support for extensions, and better mobility and security features.
IPv6 Neighbor Discovery replaces ARP and ICMP redirection in IPv4 to determine relationships between neighboring nodes. It has functions for host-router discovery like router solicitation, prefix discovery, and parameter discovery. Neighbor Discovery also has functions for host-to-host communication like address resolution, next hop determination, neighbor unreachability detection, and duplicate address detection.
A Survey On Next Generation Internet Protocol IPv6Carrie Romero
This document discusses IPv6 and the need to transition from IPv4 to IPv6. It provides an overview of IPv6, including that IPv6 was developed to address the limited address space of IPv4 and improve security. It also discusses some of the key challenges in transitioning to IPv6, such as the need for IPv6 and IPv4 to coexist during transition. The document summarizes various transition techniques between IPv6 and IPv4, including dual stack, tunneling, and translation methods.
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
This paper is focused on the Translator strategy for migration of IPv4 to Ipv6 implemented in Cisco packet
tracer. It describes the design and configuration of network devices and packet transfer between devices of IPv4
and IPv6 networks using NAT-PT as transition mechanism. First major version of IP, IPv4 is the dominant
protocol of internet.IPv6 is developed to deal with long anticipated problem of IPv4 running out of addresses.
The migration from IPv4 to IPv6 must be implemented node by node by using auto-configuration procedures to
eliminate the need to configure IPv6 hosts manually.
Overview of IPv6 protocol along with various transition scenarios for the migration from IPv4 to IPv6
IPv6 is the current and future Internet Protocol standard. As anticipated, IPv4 addresses became exhausted around 2012.
The IP address scarcity is the main driver for IPv6 protocol adoption.
IPv6 defines a much larger address space that should be sufficient for the foreseeable future, even taking into account Internet of Things scenarios with zillions of small devices connected to the Internet.
IPv6 is, however, much more than simply an expansion of the address space. IPv6 defines a clean address architecture with globally aggregatable addresses thus reducing routing table sizes in Internet routers.
IPv6 extension headers provide a standard mechanism for stacking protocols such as IP, IPSec, routing headers and upper layer headers such as TCP.
ICMP (Internet Control Message Protocol) is already defined for IPv4. ICMP was totally revamped for IPv6 and as ICMPv6 provides common functions like IP address and prefix assignment.
Lack of business drivers for migrating to IPv6 is responsible for sluggish adoption of IPv6 in carrier and enterprise networks.
Numerous transition mechanisms were developed to ease the transition from IPv4 to IPv6. Many of these mechanisms are complex and difficult to administer.
The transition mechanisms can be coarsely classified into dual-stack, tunneling and translation mechanisms.
The document discusses IPv4 routing and routing protocols. It begins with an introduction to routing and how data flows between devices on the internet in the form of packets. It then covers routing components like path determination, routing tables, and routing protocols for both intra-domain (RIP, OSPF) and inter-domain (BGP) routing. It concludes with a discussion on the future of routing with IPv6 and a high-level summary of routing and routing protocols.
Basics of IPv6 networking. Addressing, stateless autoconfiguration and other IPv6 features explained. We will introduce features supported by RouterOS and explain how to build dual-stack network. We will also show how to obtain your own IPv6 prefix in case where there no possibility to get IPv6 connectivity natively. Live examples of configuration of IPv6 routing protocols. Presentation will cover the features and differences between IPv4 and IPv6 implementations. Lecture focuses on OSPFv3 but we will also explain RIPng and BGP configuration.
This document discusses the Teredo protocol, which enables IPv6 connectivity for nodes located behind IPv4 NAT devices. It explains how Teredo works by tunneling IPv6 packets over UDP through NATs. While Teredo allows IPv6 connectivity, it also raises security concerns by bypassing security controls and allowing unsolicited traffic. The document analyzes attacks that could exploit vulnerabilities in Teredo tunnels, such as a denial of service attack against a Teredo server using a single packet. It investigates whether Teredo represents a security risk or is a worthwhile transition mechanism from IPv4 to IPv6.
IPv4 uses datagram switching at the network layer and is connectionless. It includes fields for identification, flags, fragmentation offset, and time to live. IPv6 was developed to address IPv4's inefficient address space, lack of security, and inability to support real-time audio/video. IPv6 features a larger 128-bit address space, better header format, extensions, flow labeling, and more security. A smooth transition involves dual stack, tunneling, or header translation methods.
This document provides an introduction and overview of IPv6, including:
- IPv6 is the next generation internet protocol that will replace IPv4, providing a vastly larger address space and additional features.
- The key reasons for adopting IPv6 are that IPv4 addresses are running out due to the exponential growth of internet-connected devices, while IPv6 supports 128-bit addresses providing trillions of times more addresses.
- IPv6 addresses are 128-bit compared to 32-bit IPv4 addresses, written in hexadecimal format divided into eight groups, and features include improved security, mobility, and traffic routing capabilities.
IPv6 Transition Strategies discusses various strategies available to service providers as IPv4 addresses run out, including doing nothing, extending the IPv4 network through NAT, and deploying IPv6 transition technologies. The document defines key terms like dual-stack, NAT, carrier grade NAT, and IPv6 transition methods. It then analyzes the advantages, disadvantages, and applicability of strategies like doing nothing, NAT, dual-stack networks, and IPv6 transition techniques involving tunneling or translation.
IPv4 addresses are running out, so IPv6 was created with a vastly larger 128-bit address space. During the transition, IPv4 and IPv6 will coexist via three main methods: dual-stack, tunneling, and translation. For internet service providers, dual-stack is the best approach as it allows gradual migration while both protocols are supported. The presentation provides details on IPv4 and IPv6 addressing schemes, transition mechanisms, and configuration examples for tunneling dual-stack implementations at an ISP.
Network optimization of ipv6 networks using tunnel header compressioneSAT Journals
Abstract
IPv6 is the successor internet protocol which will eventually replace IPv4. These two protocols are not compatible with each other and it will take time to migrate towards IPv6, until then both the protocols need to coexist for a long time. The main overhead involved with both the protocols is header length of 20 bytes in case of IPv4 and of 40 bytes in case of IPv6. This overhead will affect the network performance specially over tunneling mechanism where one header is encapsulated inside another. Tunneling is widely deployed over the network for various purposes like network security, mobility and transition mechanism. Header compression can be applied to compress the excess protocol headers to improve the performance of network. In this paper we want to use header compression in context of 6 to 4 tunneling transition. Using header compression over 6 to 4 tunnels would result in better response times reduced packet size and reduced packet losses. We want to simulate this algorithm using EXata Cyber 1.1 simulator.
Keywords: Header Compression, IPv4, IPv6, ROHC, 6 to 4 tunneling.
Presentation of ipv4 disadvantage,ipv6 advantage and transation from ipv4 to ...Iftikhar Wazir
The document discusses the transition from IPv4 to IPv6. It outlines three main strategies for the transition: dual stacking, tunneling, and header translation. Dual stacking involves running both IPv4 and IPv6 simultaneously on a device. Tunneling encapsulates IPv6 packets inside IPv4 packets to allow IPv6 communication through IPv4 networks. Header translation changes the header format of packets from IPv6 to IPv4 when needed to allow communication with IPv4-only systems. The transition is necessary due to deficiencies in IPv4 like limited address space and lack of security features, while IPv6 improves on areas like larger addresses, better headers, and added security functionality.
This document describes an ISP core routing topology project that was implemented to demonstrate how a company accesses its servers through the internet. The key features of the project include MPLS Layer 3 VPN, an IPv6 network with an IPv6 DNS server, various redundancy protocols like HSRP, VRRP and GLBP, dynamic routing protocols such as BGP, EIGRP and OSPF, and a Linux server providing services like DNS, Apache, FTP and SSH. MPLS is used to eliminate delays and provide a VPN connecting different company branches. The topology also features an IPv6 tunnel over an IPv4 network and dual stacking for IPv6/IPv4 communication.
This document provides an overview of IPv4 and IPv6, including their differences, deficiencies of IPv4, advantages of IPv6, and strategies for transitioning from IPv4 to IPv6. It discusses IPv4 and IPv6 address formats and header formats. It also covers deficiencies of IPv4 like address depletion and lack of security features, advantages of IPv6 like larger address space and better header format. The transition strategies covered are dual stack, tunneling, and header translation.
The document discusses the impending exhaustion of IPv4 addresses and the need to transition to IPv6. It provides background on IPv6 including that it provides 128-bit addresses to solve exhaustion, utilizes extensions to DHCPv6 for home network prefix assignment, and can be implemented via dual stack, tunneling, or translation methods. Charts show the decreasing pool of available IPv4 addresses and acceleration in depletion rates. The document argues for early adoption of IPv6 to avoid risks from delayed transition and outlines a 3-tier strategy using technologies like dual stack, 6rd, NAT64, and Dual-Stack Lite.
IMPROVING IPV6 ADDRESSING TYPES AND SIZEIJCNCJournal
This document discusses proposed modifications to IPv6 addressing types and address size. It suggests that multicast addressing can mimic anycast and limited broadcast addressing, making those types unnecessary. It also proposes reducing the IPv6 address size from 128-bits to decrease packet overhead, while ensuring the new size supports future internet growth. A formula is presented to predict IP address exhaustion dates for different address sizes based on current usage and population projections.
The document discusses IPv6 Neighbor Discovery. It explains that Neighbor Discovery allows nodes on the same link to discover each other, determine link-layer addresses, find routers, and maintain reachability information for active neighbors. It describes the various Neighbor Discovery message types and processes, including address resolution, duplicate address detection, and redirect function. Conceptual data structures for neighbor caches, destination caches, prefix lists, and default router lists are also outlined.
Performance Evaluation of Routing Protocols RIPng, OSPFv3, and EIGRP in an
IPv6 Network
Siti Ummi Masruroh
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
ummi.masruroh@uinjkt.ac.id
Fadly Robby
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
fadly.robby11@mhs.uinjkt.ac.id
Nashrul Hakiem
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
hakiem@uinjkt.ac.id
IPv6 addresses are 128-bit identifiers for interfaces compared to 32-bit in IPv4. The presentation discusses the various address formats and types in IPv6 including unicast, anycast, and multicast. It also covers the changes in IPv6 packet header format versus IPv4 as well as new features like flow labeling and extension headers. Key advantages of IPv6 are larger address space, simplified header format, improved support for extensions, and better mobility and security features.
IPv6 Neighbor Discovery replaces ARP and ICMP redirection in IPv4 to determine relationships between neighboring nodes. It has functions for host-router discovery like router solicitation, prefix discovery, and parameter discovery. Neighbor Discovery also has functions for host-to-host communication like address resolution, next hop determination, neighbor unreachability detection, and duplicate address detection.
A Survey On Next Generation Internet Protocol IPv6Carrie Romero
This document discusses IPv6 and the need to transition from IPv4 to IPv6. It provides an overview of IPv6, including that IPv6 was developed to address the limited address space of IPv4 and improve security. It also discusses some of the key challenges in transitioning to IPv6, such as the need for IPv6 and IPv4 to coexist during transition. The document summarizes various transition techniques between IPv6 and IPv4, including dual stack, tunneling, and translation methods.
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
This paper is focused on the Translator strategy for migration of IPv4 to Ipv6 implemented in Cisco packet
tracer. It describes the design and configuration of network devices and packet transfer between devices of IPv4
and IPv6 networks using NAT-PT as transition mechanism. First major version of IP, IPv4 is the dominant
protocol of internet.IPv6 is developed to deal with long anticipated problem of IPv4 running out of addresses.
The migration from IPv4 to IPv6 must be implemented node by node by using auto-configuration procedures to
eliminate the need to configure IPv6 hosts manually.
The document describes a new transition methodology for the BD-SIIT IPv4/IPv6 translation technique using forward and feedback address mapping algorithms. The methodology aims to reduce packet size and traffic overhead compared to tunneling algorithms, and reduce the cost of IPv6 networks by avoiding the need to upgrade all edge nodes. It proposes using a new address mapping that identifies two public addresses instead of the IPv4 mapped IPv6 address method.
The document describes a new transition methodology called BD-SIIT (Bi-Directional Stateless Internet Protocol/Internet Control Messaging Protocol Translation) for translating between IPv4 and IPv6. BD-SIIT uses a bidirectional mapping algorithm between IPv4 and IPv6 headers and addresses. It proposes using a new address mapping approach that identifies two public addresses (IPv4 and IPv6) instead of using IPv4-mapped IPv6 addresses. The paper evaluates the performance of BD-SIIT based on metrics like end-to-end delay, throughput, and round-trip time and finds that it outperforms other transition mechanisms like DSTM.
This document provides a 3-paragraph summary of a 10-page project report on IPv6. The report was submitted by Udipto Ghosh to MIT Pune in partial fulfillment of a post-graduate diploma in management. The summary discusses that IPv6 is an evolutionary upgrade to IPv4 designed to allow continued growth of the internet. It also describes some key features of IPv6 like larger address space and auto-configuration. The transition from IPv4 to IPv6 is expected to occur gradually as IPv6 is deployed incrementally for early benefits while coexisting with IPv4 for a long time.
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
Internet Protocol version 6 (IPv6) is the latest version of the
Internet Protocol (IP), the communications protocol that
provides an identification and location system for computers
on networks and routes traffic across the Internet.
IPv4 & IPv6 are not designed to be interoperable, complicating
the transition to IPv6. However, several IPv6 transition
mechanisms have been devised to permit communication
between IPv4 and IPv6 hosts.
IPv6 is the latest version of the Internet Protocol that provides identification and location for computers on networks. It was developed to address the problem of IPv4 address exhaustion, as IPv4 addresses were running out. IPv6 is intended to eventually replace IPv4 and provides a vastly larger 128-bit address space compared to IPv4's 32-bit addresses. Key features of IPv6 include new header format, large address space, built-in security, prioritized traffic delivery, autoconfiguration, and mobility support.
This document compares the performance of IPv4, IPv6, and tunneling (6to4) networks using computer simulations in OPNET 17.5. The simulation analyzed delay, throughput, and packet loss over 1 hour. The results showed that IPv6 had higher delay than IPv4 due to its larger header, while tunneling had the highest delay. Throughput was highest for IPv6 and lowest for IPv4. Packet loss was lowest for IPv4 and highest for IPv6. In conclusion, the network performance varied between the different addressing schemes and tunneling technique.
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...IOSR Journals
This document compares the performance of IPv4, IPv6, and tunneling (6to4) networks using computer simulations in OPNET 17.5. The simulation analyzed delay, throughput, and packet loss over 1 hour. The results showed that IPv6 had higher delay than IPv4 due to its larger header, while tunneling had the highest delay. Throughput was highest for IPv6 and lowest for IPv4. Packet loss was lowest for IPv4 and highest for IPv6. In conclusion, the network performance varied between the different addressing schemes and tunneling in terms of delay, throughput, and packet loss.
The aim of this dissertation project was to investigate and improve the performance of the two most popular link-state routing protocols when configured in IPv4/IPv6 dual-stack enterprise networks. The thesis intended to make the first step of scientific research in performance comparison of different routing protocols in IPv4-IPv6 coexistence dual stack ipv4 and ipv6 coexistence
Review of IPv4 and IPv6 and various implementation methods of IPv6IRJET Journal
This document compares IPv4 and IPv6 and reviews various implementation methods of IPv6. It finds that while IPv6 provides many advantages over IPv4 like a vastly larger address space and improved security features, full deployment of IPv6 requires complete network participation which has hindered adoption. Various transition techniques allow IPv6 networks to communicate over existing IPv4 infrastructure to facilitate gradual deployment, including tunneling which encapsulates IPv6 packets in IPv4 packets to traverse IPv4 networks. Dual stack backbones that support both protocols and protocol translation mechanisms also help transition. Global IPv6 deployment continues to progress with over 30% user support currently.
Non symbolic base64 an effective representation of ipv6 addressIAEME Publication
The document discusses the transition from IPv4 to IPv6 due to the depletion of IPv4 addresses. It proposes a new scheme called Effective and flexible representation Of IPv6 with Base64 to represent IPv6 addresses in a more compact notation of 28 bytes instead of the standard 39 bytes. This is done using the period as a delimiter instead of the colon in IPv6 addresses and using Base64 in a non-symbolic way. The scheme aims to address issues with long IPv6 addresses like memory usage, bandwidth and latency. Cloud computing will benefit from the more compact and user-friendly representation of IPv6 addresses.
Routing protocols have been redefined to support IPv6. There are two types of routing protocols: distance vector protocols which advertise routes to neighbors (e.g. RIPng), and link-state protocols which advertise link states (e.g. OSPFv3). Routing protocols can be interior (within an autonomous system) or exterior (between autonomous systems). Common interior protocols are RIPng and OSPFv3, while BGPv4 is commonly used as the exterior protocol.
1.What is IP address
2.When & how it was devised
3.IPV4 Features & its functionality
4.Benefits of IPV4 & Devices supporting IPV4
5.Problems of IPV4 & What happened to IPV5
6.What led to IPV6
7.IPV6 Features & Functionality
8.Benefits of IPV6 & supporting devices
9.How transition from IPV4 to IPV6 will happen
10.Problems & challenges that are anticipated & Conclusion
IPv4 and IPv6 are internet protocols that assign unique addresses to devices connected to the internet or private networks to enable communication and routing. IPv4 is the older protocol that uses 32-bit addresses, limiting the number of available addresses. IPv6 was developed as its successor to solve this problem by using 128-bit addresses, vastly increasing the available number. Some key differences are that IPv6 uses automatic configuration to avoid problems with manual address assignment and subnetting, and utilizes multicast addressing instead of broadcasts to conserve bandwidth.
This document discusses the transition from IPv4 to IPv6. It provides background on why IPv6 was developed, noting that IPv4 addresses were being depleted and IPv6 expands the address space from 32 to 128 bits. It summarizes three main transition strategies: dual stack, tunneling, and translation. The document warns that tunneling IPv6 packets inside IPv4 packets could allow hidden IPv6 traffic and security issues if deep packet inspection is not used. Overall it emphasizes that a gradual transition combining techniques will be needed to migrate from the current IPv4 internet to an IPv6 internet.
This document provides an overview of Internet Protocol version 6 (IPv6). It discusses some of the key features and advantages of IPv6, including its larger 128-bit address space that supports up to 3.4×1038 addresses compared to the 4.3 billion addresses supported by IPv4. The document also compares IPv6 to IPv4, noting they are not interoperable but that most transport and application protocols can operate over both with little change. Transition mechanisms have been developed to allow communication between IPv4 and IPv6 networks.
The document outlines an agenda for a 3HOWs event discussing IPv6 and MPLS technology. The morning sessions will cover how to deal with IPv6, including why it is important now due to limited IPv4 addresses, IPv6 addressing details, and how to connect to IPv6. The afternoon will discuss how to connect with MPLS technology, the benefits it provides for interconnecting offices, and actual customer case studies. Questions from attendees will conclude the event.
Ieee Transition Of I Pv4 To I Pv6 Network Applicationsguest0215f3
This document discusses transitioning IPv4 network applications to IPv6. It begins with an introduction to the need for IPv6 due to IPv4 address depletion. It then discusses IPv6 architecture and some key benefits of IPv6 like increased address space and built-in security. The document outlines three primary considerations for transitioning applications: using IPv6 multicast instead of IPv4 broadcast, enabling multicast reception, and ensuring dual stack compatibility. It categorizes transition complexity and provides examples of changes needed, such as replacing IPv4 data structures and function calls with IPv6 equivalents. Related work on transitioning applications is also discussed.
Ieee Transition Of I Pv4 To I Pv6 Network Applications
RASHMI VT REPORT
1. 1
A
Report on Vocational Training
In
“IPV6”
Submitted in partial fulfillment of requirement for the award of degree
Of
Bachelor of Engineering
In
“Electronics and Telecommunications”
To
Chhattisgarh Swami Vivekanand Technical University, Bhilai
In Session: 2013-2014
Submitted By:
Rashmi Kumari
7TH/ETC
2. 2
A C K N O W L E D G E M E N T
I have completed my vocational training on routing and switching from Rooman Technologies and I
am thankful to the trainers. Especially to Mr. Ajit Singh for providing us valuable knowledge and
information about the”RoutingAndSwitching”. I extend my thanks to respected Mr. KSHITIJ
SINGHAI (Director) for his support, encouragement and facilitation. I highly thankful to”ROOMAN
TECHNOLOGIES” for their valuable guidance that they shared with us through our project during
the training session.
I also Grateful to Mr. AJAYPRAKASH VERMA (Chairman) ,Dr. ANURAG VERMA (Director)
and Dr. MAHESH P. (Principal) for their support & permission for the training. I also thankful to
Dr. AMIT AGRAWAL (professor & H.O.D Electronics & Telecommunication Department) for
the valuable guidance.
I express my sincere gratitude to all the faculty members and supporting staff members of Electronics
& Telecommunication Engineering Department.
(Signature of the Student)
Rashmi Kumari
CHHATRAPATI SHIVAJI INSTITUTE OF TECHNOLOGY, DURG
Shivaji Nagar, Balod Road, Kolihapuri, Post Pisegaon – Durg
(C.G.) 491001
3. 3
CERTIFICATE
This is to certify that Shri/Ku Rashmi Kumari Roll No. 50 Semester 7th Branch Electronics
& Telecommunications student of Chhatrapati Shivaji Institute of Technology, Durg has
undergone his/her Vocational Training on Routers & Switches at ROOMAN Technologie
From July To August
Mr. Rahul Sinha Dr. Amit Agrawal
Assistant Professor Professor & Head
Department of Elex.& Telecom. Department of Elex.& Telecom.
Date:18/09/2014
Place: Durg
4. 4
Table of Contents
Sr. No. Topic Page No.
1 Introduction 5
1.1 Comparison with IPV4 6
2
3
3.1
3.2
3.3
4
5
6
7
8
9
Packet format
Addressing
Link local address
Address representation
Create a global address
OSPF
Area Types
Implementing OSPF for IPv6
Result
Conclusion
References
10
11
11
11
12
13
16
18
21
23
23
5. 5
1. Introduction
IPv6 is one of the most significant network and technology upgrades in history. It will slowly
grow into your existing IPv4 infrastructure and positively impact your network. Reading this
book will prepare you for the next step of networking technology evolution. IPv6 product
development and implementation efforts are already underway all over the world. IPv6 is
designed as an evolutionary step from IPv4. It is a natural increment to IPv4, can be installed
as a normal software upgrade in most Internet devices, and is interoperable with the current
IPv4. IPv6 is designed to run well on high performance networks like Gigabit Ethernet, ATM,
and others, as well as low bandwidth networks (e.g., wireless). In addition, it provides a
platform for new Internet functionality that will be required in the near future, such as
extended addressing, better security, and quality of service (QoS) features.
IPv6 includes transition and interoperability mechanisms that are designed to allow users to
adopt and deploy IPv6 step by step as needed and to provide direct interoperability between
IPv4 and IPv6 hosts. The transition to a new version of the Internet Protocol (IP) must be
incremental, with few or no critical interdependencies, if it is to succeed. The IPv6 transition
allows users to upgrade their hosts to IPv6 and network operators to deploy IPv6 in routers
with very little coordination between the two groups.
The rapid growth of IP devices today have led to a shortage of IP addresses. IPv6 will solve
this problem, along with some other improvements as well. It is important to understand the
fundamentals of IPv6 and how to configure complex and well working networks with this
new protocol. How to make the transition from IPv4 to IPv6 in a network can be made with
different solutions. The authors of this report have, in the network simulation tool GNS3, built
a network consisting of four routers running both IPv4 and IPv6, using dual stack as the
transition method. The reason for choosing dual stack is to simulate a situation where a
network wants to be prepared for the future transition to IPv6, while still maintaining the
function of the current IPv4 network. The routing protocol used is OSPF version 2 and 3,
using multiple areas and virtual links. The network also includes a DHCP server which
distributes IPv4 addresses to nodes connected to the four different routers. The nodes are
simulated using Microsoft loopback adapters. The reason for using GNS3 simulation program
is that you can run the real router images in it, meaning that the results are exactly the same as
with real equipment.
6. 6
1.1 Comparison with IPV4
On the Internet, data is transmitted in the form of network packets. IPv6 specifies a
new packet format, designed to minimize packet header processing by routers. Because the
headers of IPv4 packets and IPv6 packets are significantly different, the two protocols are not
interoperable. However, in most respects, IPv6 is a conservative extension of IPv4. Most
transport and application-layer protocols need little or no change to operate over IPv6;
exceptions are application protocols that embed internet-layer addresses, such as FTP
and NTPv3, where the new address format may cause conflicts with existing protocol syntax.
1.1.1 Larger address space
The main advantage of IPv6 over IPv4 is its larger address space. The length of an IPv6
address is 128 bits, compared with 32 bits in IPv4. The address space therefore has 2128or
approximately 3.4×1038 addresses. This would be about 100 addresses for every atom on the
surface of the earth and almost four /64s per square centimetre of the planet. In addition, the
IPv4 address space is poorly allocated, with approximately 14% of all available addresses
utilized. While these numbers are large, it was not the intent of the designers of the IPv6
address space to assure geographical saturation with usable addresses. Rather, the longer
addresses simplify allocation of addresses, enable efficient route aggregation, and allow
implementation of special addressing features. In IPv4, complex Classless Inter-Domain
Routing (CIDR) methods were developed to make the best use of the small address space.
The standard size of a subnet in IPv6 is 264 addresses, the square of the size of the entire IPv4
address space. Thus, actual address space utilization rates will be small in IPv6, but network
management and routing efficiency is improved by the large subnet space and hierarchical
route aggregation. Renumbering an existing network for a new connectivity provider with
different routing prefixes is a major effort with IPv4. With IPv6, however, changing the prefix
announced by a few routers can in principle renumber an entire network, since the host
identifiers (the least-significant 64 bits of an address) can be independently self-configured by
a host
1.1.2 Multicasting
Multicasting, the transmission of a packet to multiple destinations in a single send operation,
is part of the base specification in IPv6. In IPv4 this is an optional although commonly
implemented feature. IPv6 multicast addressing shares common features and protocols with
IPv4 multicast, but also provides changes and improvements by eliminating the need for
7. 7
certain protocols. IPv6 does not implement traditional IP broadcast, i.e. the transmission of a
packet to all hosts on the attached link using a special broadcast address, and therefore does
not define broadcast addresses. In IPv6, the same result can be achieved by sending a packet
to the link-local all nodes multicast group at address ff02::1, which is analogous to IPv4
multicast to address 224.0.0.1. IPv6 also provides for new multicast implementations,
including embedding rendezvous point addresses in an IPv6 multicast group address, which
simplifies the deployment of inter-domain solutions In IPv4 it is very difficult for an
organization to get even one globally routable multicast group assignment, and the
implementation of inter-domain solutions is arcane. Unicast address assignments by a local
Internet registry for IPv6 have at least a 64-bit routing prefix, yielding the smallest subnet size
available in IPv6 (also 64 bits). With such an assignment it is possible to embed the unicast
address prefix into the IPv6 multicast address format, while still providing a 32-bit block, the
least significant bits of the address, or approximately 4.2 billion multicast group identifiers.
Thus each user of an IPv6 subnet automatically has available a set of globally routable source-
specific multicast groups for multicast applications
1.1.3 Network-layer security
Internet Protocol Security (IPsec) was originally developed for IPv6, but found widespread
deployment first in IPv4, for which it was re-engineered. IPsec was a mandatory specification
of the base IPv6 protocol suite, but has since been made optional
Simplified processing by routers :-
In IPv6, the packet header and the process of packet forwarding have been simplified.
Although IPv6 packet headers are at least twice the size of IPv4 packet headers, packet
processing by routers is generally more efficient, thereby extending the end-to-end
principle of Internet design. Specifically:
The packet header in IPv6 is simpler than that used in IPv4, with many rarely used fields
moved to separate optional header extensions.
IPv6 routers do not perform fragmentation. IPv6 hosts are required to either perform path
MTU discovery, perform end-to-end fragmentation, or to send packets no larger than the
IPv6 default MTU size of 1280 octets.
The IPv6 header is not protected by a checksum; integrity protection is assumed to be
assured by both link-layer and higher-layer (TCP, UDP, etc.) error detection. UDP/IPv4
8. 8
may actually have a checksum of 0, indicating no checksum; IPv6 requires UDP to have
its own checksum. Therefore, IPv6 routers do not need to recomputed a checksum when
header fields (such as the time to live (TTL) or hop count) change. This improvement
may have been made less necessary by the development of routers that perform checksum
computation at link speed using dedicated hardware, but it is still relevant for software-
based routers.
The TTL field of IPv4 has been renamed to Hop Limit in IPv6, reflecting the fact that
routers are no longer expected to compute the time a packet has spent in a queue.
1.1.4 Mobility
Unlike mobile IPv4, mobile IPv6 avoids triangular routing and is therefore as efficient as
native IPv6. IPv6 routers may also allow entire subnets to move to a new router connection
point without renumbering.
1.1.5 Privacy
Like IPv4, IPv6 supports globally unique IP addresses by which the network activity of each
device can potentially be tracked. The design of IPv6 intended to re-emphasize the end-to-end
principle of network design that was originally conceived during the establishment of the
early Internet. In this approach each device on the network has a unique address globally
reachable directly from any other location on the Internet.
Network prefix
Network prefix tracking is less of a concern if the user's ISP assigns a dynamic
network prefix via DHCP. Privacy extensions do little to protect the user from
tracking if the ISP assigns a static network prefix. In this scenario, the network prefix
is the unique identifier for tracking and the Interface identifier is secondary.
Interface identifier
In IPv4 the effort to conserve address space with network address translation (NAT)
obfuscates network address spaces, hosts, and topologies. In IPv6 when using address
auto-configuration, the Interface Identifier (MAC address) of an interface port is used
to make its public IP address unique, exposing the type of hardware used and
providing a unique handle for a user's online activity. It is not a requirement for IPv6
hosts to use address auto-configuration, however. Yet, even when an address is not
based on the MAC address, the interface's address is globally unique, in contrast to
9. 9
NAT-masqueraded private networks. Privacy extensions for IPv6 have been defined to
address these privacy concerns, although Silvia Hagen describes these as being largely
due to "misunderstanding". When privacy extensions are enabled, the operating
system generates random host identifiers to combine with the assigned network prefix.
These ephemeral addresses are used to communicate with remote hosts making it
more difficult to track a single device. Privacy extensions are enabled by default in
Windows (since XP SP1), OS X (since 10.7), and iOS (since version 4.3). Some Linux
distributions have enabled privacy extensions as well. Privacy extensions do not
protect the user from other forms of activity tracking, such as tracking
cookies or browser fingerprinting.
1.1.6 Options extensibility
The IPv6 packet header has a fixed size (40 octets). Options are implemented as additional
extension headers after the IPv6 header, which limits their size only by the size of an entire
packet. The extension header mechanism makes the protocol extensible in that it allows future
services for quality of service, security, mobility, and others to be added without redesign of
the basic protocol.
1.1.7 Jumbo grams
IPv4 limits packets to 65535 (216−1) octets of payload. An IPv6 node can optionally handle
packets over this limit, referred to as jumbo grams, which can be as large
as4294967295 (232−1) octets. The use of jumbo grams may improve performance over high-
MTU links. The use of jumbo grams is indicated by the Jumbo Payload Option header.
10. 10
2. Packet Format
An IPv6 packet has two parts: a header and payload. The header consists of a fixed portion
with minimal functionality required for all packets and may be followed by optional
extensions to implement special features. The fixed header occupies the first 40 octets (320
bits) of the IPv6 packet. It contains the source and destination addresses, traffic classification
options, a hop counter, and the type of the optional extension or payload which follows the
header. This Next Header field tells the receiver how to interpret the data which follows the
header. If the packet contains options, this field contains the option type of the next option.
The "Next Header" field of the last option, points to the upper-layer protocol that is carried in
the packet's payload. Extension headers carry options that are used for special treatment of a
packet in the network, e.g., for routing, fragmentation, and for security using
the IPsec framework. Without special options, a payload must be less than 64KB. With a
Jumbo Payload option (in a Hop-By-Hop Options extension header), the payload must be less
than 4 GB. Unlike for IPv4, routers never fragment a packet. Hosts are expected to use Path
MTU Discovery to make their packets small enough to reach the destination without needing
to be fragmented. See IPv6 packet fragmentation.
11. 11
3. Addressing
Compared to IPv4, the most obvious advantage of IPv6 is its larger address space. IPv4
addresses are 32 bits long and number about 4.3×109 (4.3 billion). IPv6 addresses are 128 bits
long and number about 3.4×1038 (340 undecillion). IPv6's addresses are deemed enough for
the foreseeable future. IPv6 addresses are written in eight groups of four hexadecimal digits
separated by colons, such as 2001:0db8:85a3:0000:0000:8a2e:0370:7334. IPv6 unicast
addresses other than those that start with binary 000 are logically divided into two parts: a 64-
bit (sub-) network prefix, and a 64-bit interface identifier
3.1 Link local address
The first step a host takes on startup or (re)initialization is to form a link-local address from
its MAC address and the link-local prefix FE80::/10. This is done by putting the prefix into
the leftmost bits and the MAC address (in EUI-64 format) into the rightmost bits, and if there
are any bits left in between, those are set to zero. When the host has formed an address it will
test if it is unique on the subnet. This is done with an algorithm called Duplicate Address
Detection (DAD)
3.2 Address representation
The 128 bits of an IPv6 address are represented in 8 groups of 16 bits each. Each group is
written as 4 hexadecimal digits and the groups are separated by colons (:). The address
2001:0db8:0000:0000:0000:ff00:0042:8329 is an example of this representation. For
convenience, an IPv6 address may be abbreviated to shorter notations by application of the
following rules, where possible.
One or more leading zeroes from any groups of hexadecimal digits are removed; this is
usually done to either all or none of the leading zeroes. For example, the group 0042 is
converted to 42.
Consecutive sections of zeroes are replaced with a double colon (::). The double colon
may only be used once in an address, as multiple use would render the address
indeterminate. RFC 5952 recommends that a double colon must not be used to denote an
omitted single section of zeroes.
12. 12
An example of application of these rules:
Initial address: 2001:0db8:0000:0000:0000:ff00:0042:8329
After removing all leading zeroes: 2001:db8:0:0:0:ff00:42:8329
After omitting consecutive sections of zeroes: 2001:db8::ff00:42:8329
The loopback address, 0000:0000:0000:0000:0000:0000:0000:0001, may be abbreviated
to ::1 by using both rules. As an IPv6 address may have more than one representation, the
IETF has issued a proposed standard for representing them in text
3.3 Create a global address
This is done in the same fashion as the link-local address, but instead of the link-local prefix
FE80:: it will use the prefix supplied by the router and put it together with its identifier (which
by default is the MAC address in EUI-64 format). There is no need to perform a DAD check
because the identifier is already unique on the link, and the subnet prefix specifies a specific
link. If the information from the router contained several subnet prefixes, the host will create
one address for each one. For stateless address autoconfiguration (SLAAC) to work, subnets
require a /64 address block, as defined in RFC 4291 section 2.5.1. Local Internet registries get
assigned at least /32 blocks, which they divide among ISPs. The obsolete RFC
3177 recommended the assignment of a /48 to end-consumer sites. This was replaced by RFC
6177, which "recommends giving home sites significantly more than a single /64, but does not
recommend that every home site be given a /48 either". /56s are specifically considered. It
remains to be seen if ISPs will honor this recommendation. For example, during initial
trials, Comcast customers were given a single /64 network. IPv6 addresses are classified by
three types of networking methodologies: unicast addresses identify each network
interface, anycast addresses identify a group of interfaces, usually at different locations of
which the nearest one is automatically selected, and multicast addresses are used to deliver
one packet to many interfaces. The broadcast method is not implemented in IPv6. Each IPv6
address has a scope, which specifies in which part of the network it is valid and unique. Some
addresses are unique only on the local (sub-)network. Others are globally unique. Some IPv6
addresses are reserved for special purposes, such as loopback, 6to4 tunneling, and Teredo
tunneling, as outlined in RFC 5156. Also, some address ranges are considered special, such as
link-local addresses for use on the local link only, Unique Local addresses (ULA), as
described in RFC 4193, and solicited-node multicast addresses used in the Neighbor
Discovery Protocol.
13. 13
4. OSPF
Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It
uses a link state routing algorithm and falls into the group of interior routing protocols,
operating within a single autonomous system (AS). It is defined as OSPF Version 2 in RFC
2328 (1998) for IPv4. The updates for IPv6 are specified as OSPF Version 3 in RFC
5340 (2008). OSPF is perhaps the most widely used interior gateway protocol (IGP) in large
enterprise networks. IS-IS, another link-state dynamic routing protocol, is more common in
large service provider networks. The most widely used exterior gateway protocol is
the Border Gateway Protocol (BGP), the principal routing protocol between autonomous
systems on the Internet. IPv6 supports many routing protocols, one of which is Open Shortest
Path First (OSPF). OSPF is a link-state routing protocol, which means that every router in the
area has the same link-state database. The database contains the paths to every other router in
the area. The information stored in the database is received from advertisements that are sent
over the network. Using Dijkstra's algorithm, the shortest path to different destinations is then
calculated on each router from the information in the database. The shortest path is stored in
the routing table. The new version of OSPF, version 3, is based on OSPFv2 that runs over
IPv4. Some similarities exist between the two versions, but some changes had to be made to
support the increased address space in IPv6 and other changes in the protocol. OSPF is
an interior gateway protocol (IGP) for routing Internet Protocol (IP) packets solely within a
single routing domain, such as an autonomous system. It gathers link state information from
available routers and constructs a topology map of the network. The topology is presented as
a routing table to the Internet Layer which routes datagrams based solely on the destination IP
address found in IP packets. OSPF supports Internet Protocol Version 4 (IPv4) and Internet
Protocol Version 6 (IPv6) networks and features variable-length subnet masking (VLSM)
and Classless Inter-Domain Routing (CIDR) addressing models. OSPF detects changes in the
topology, such as link failures, and converges on a new loop-free routing structure within
seconds. It computes the shortest path tree for each route using a method based on Dijkstra's
algorithm, a shortest path first algorithm. The OSPF routing policies for constructing a route
table are governed by link cost factors (external metrics) associated with each routing
interface. Cost factors may be the distance of a router (round-trip time), data throughput of a
link, or link availability and reliability, expressed as simple unitless numbers. This provides a
dynamic process of traffic load balancing between routes of equal cost. An OSPF network
may be structured, or subdivided, into routing areas to simplify administration and optimize
14. 14
traffic and resource utilization. Areas are identified by 32-bit numbers, expressed either
simply in decimal, or often in octet-based dot-decimal notation, familiar from IPv4 address
notation. By convention, area 0 (zero), or 0.0.0.0, represents the core or backbone area of an
OSPF network. The identifications of other areas may be chosen at will; often, administrators
select the IP address of a main router in an area as area identification. Each additional area
must have a direct or virtual connection to the OSPF backbone area. Such connections are
maintained by an interconnecting router, known as area border router (ABR). An ABR
maintains separate link state databases for each area it serves and maintains summarized
routes for all areas in the network. OSPF does not use a TCP/IP transport protocol, such as
UDP or TCP, but encapsulates its data in IP datagrams with protocol number 89. This is in
contrast to other routing protocols, such as the Routing Information Protocol (RIP) and
the Border Gateway Protocol (BGP). OSPF implements its own error detection and correction
functions. OSPF uses multicast addressing for route flooding on a broadcast domain. For non-
broadcast networks, special provisions for configuration facilitate neighbor discovery. OSPF
multicast IP packets never traverse IP routers (never traverse Broadcast Domains), they never
travel more than one hop. OSPF is therefor a Link Layer protocol in the Internet Protocol
Suite. OSPF reserves the multicast addresses 224.0.0.5 (IPv4) and FF02::5 (IPv6) for all
SPF/link state routers (AllSPFRouters) and 224.0.0.6 (IPv4) and FF02::6 (IPv6) for all
Designated Routers (AllDRouters), as specified in RFC 2328 and RFC 5340. For routing
multicast IP traffic, OSPF supports the Multicast Open Shortest Path First protocol (MOSPF)
as defined in RFC 1584. Cisco does not include MOSPF in their OSPF implementations. PIM
(Protocol Independent Multicast) in conjunction with OSPF or other IGPs, is widely
deployed. The OSPF protocol, when running on IPv4, can operate securely between routers,
optionally using a variety of authentication methods to allow only trusted routers to
participate in routing. OSPFv3, running on IPv6, no longer supports protocol-internal
authentication. Instead, it relies on IPv6 protocol security (IPsec). OSPF version 3 introduces
modifications to the IPv4 implementation of the protocol. Except for virtual links, all
neighbor exchanges use IPv6 link-local addressing exclusively. The IPv6 protocol runs per
link, rather than based on the subnet. All IP prefix information has been removed from the
link-state advertisements and from the Hello discovery packet making OSPFv3 essentially
protocol-independent. Despite the expanded IP addressing to 128-bits in IPv6, area and router
Identifications are still based on 32-bit values.
15. 15
4.1 Router Relationships
OSPF supports complex networks with multiple routers, including backup routers, to balance
traffic load on multiple links to other subnetworks. Neighboring routers in the samebroadcast
domain or at each end of a point-to-point telecommunications communicate with each other
via the OSPF protocol. Routers form adjacencies when they have detected each other. This
detection is initiated when a router identifies itself in a Hello protocol packet. Upon
acknowledgment, this establishes a two-way state and is the most basic relationship. The
routers in an Ethernet or Frame Relay network select a Designated Router (DR) and a Backup
Designated Router (BDR) which act as a hub to reduce traffic between routers. OSPF uses
both unicast and multicast transmission modes to send "Hello" packets and link state updates.
As a link state routing protocol, OSPF establishes and maintains neighbor relationships for
exchanging routing updates with other routers. The neighbor relationship table is called
anadjacency database. An OSPF router forms neighbor relationships only with the routers
directly connected to it. For forming a neighbor relationship between, the interfaces used to
form the relationship must be in the same OSPF area. Generally an interface is only
configured in a single area, however, an interface may be configured to belong to multiple
areas. In the second area, such an interface must be configured as a secondary interface.
16. 16
5. Area Types
An OSPF network is divided into areas that are logical groupings of hosts and networks. An
area includes its router having interfaces connected to the network. Each area maintains a
separate link state database whose information may be summarized towards the rest of the
network by the connecting router. Thus, the topology of an area is unknown outside of the
area. This reduces the routing traffic between parts of an autonomous system. Area are
uniquely identified with 32-bit numbers. The area identifiers are commonly written in the dot-
decimal notation, familiar from IPv4 addressing. However, they are not IP addresses and may
duplicate, without conflict, any IPv4 address. The area identifiers for IPv6 implementations
(OSPFv3) also use 32-bit identifiers written in the same notation. When dotted formatting is
omitted, most implementations expand area 1 to the area identifier 0.0.0.1, but some have
been known to expand it as 1.0.0.0.
OSPF defines several special area types:
5.1 Backbone area
The backbone area (also known as area 0 or area 0.0.0.0) forms the core of an OSPF
network. All other areas are connected to it, and inter-area routing happens via routers
connected to the backbone area and to their own associated areas. It is the logical and physical
structure for the 'OSPF domain' and is attached to all nonzero areas in the OSPF domain. Note
that in OSPF the term Autonomous System Boundary Router (ASBR) is historic, in the sense
that many OSPF domains can coexist in the same Internet-visible autonomous system,
RFC1996 (ASGuidelines 1996, p. 25). The backbone area is responsible for distributing
routing information between nonbackbone areas. The backbone must be contiguous, but it
does not need to be physically contiguous; backbone connectivity can be established and
maintained through the configuration of virtual links. All OSPF areas must connect to the
backbone area. This connection, however, can be through a virtual link. For example, assume
area 0.0.0.1 has a physical connection to area 0.0.0.0. Further assume that area 0.0.0.2 has no
direct connection to the backbone, but this area does have a connection to area 0.0.0.1. Area
0.0.0.2 can use a virtual link through the transit area 0.0.0.1 to reach the backbone. To be a
transit area, an area has to have the transit attribute, so it cannot be stubby in any way.
5.2 Backbone area
The backbone area (also known as area 0 or area 0.0.0.0) forms the core of an OSPF network.
All other areas are connected to it, and inter-area routing happens via routers connected to the
17. 17
backbone area and to their own associated areas. It is the logical and physical structure for the
'OSPF domain' and is attached to all nonzero areas in the OSPF domain. Note that in OSPF
the term Autonomous System Boundary Router (ASBR) is historic, in the sense that many
OSPF domains can coexist in the same Internet-visible autonomous system, RFC1996
(ASGuidelines 1996, p. 25). The backbone area is responsible for distributing routing
information between nonbackbone areas. The backbone must be contiguous, but it does not
need to be physically contiguous; backbone connectivity can be established and maintained
through the configuration of virtual links. All OSPF areas must connect to the backbone area.
This connection, however, can be through a virtual link. For example, assume area 0.0.0.1 has
a physical connection to area 0.0.0.0. Further assume that area 0.0.0.2 has no direct
connection to the backbone, but this area does have a connection to area 0.0.0.1. Area 0.0.0.2
can use a virtual link through the transit area 0.0.0.1 to reach the backbone. To be a transit
area, an area has to have the transit attribute, so it cannot be stubby in any way.
5.3 Stub area
A stub area is an area which does not receive route advertisements external to the autonomous
system (AS) and routing from within the area is based entirely on a default route. An ABR
deletes type 4, 5 LSAs from internal routers, sends them a default route of 0.0.0.0 and turns
itself into a default gateway. This reduces LSDB and routing table size for internal routers.
Modifications to the basic concept of stub areas exist in the not-so-stubby area (NSSA). In
addition, several other proprietary variations have been implemented by systems vendors,
such as the totally stubby area (TSA) and the NSSA totally stubby area, both an extension
in Cisco Systems routing equipment.
5.4 Transit area
A transit area is an area with two or more OSPF border routers and is used to pass network
traffic from one adjacent area to another. The transit area does not originate this traffic and is
not the destination of such traffic.
18. 18
6. Implementing OSPF for IPv6
6.1 How OSPF for IPv6 Works
OSPF is a routing protocol for IP. It is a link-state protocol, as opposed to a distance-vector
protocol. Think of a link as being an interface on a networking device. A link-state protocol
makes its routing decisions based on the states of the links that connect source and destination
machines. The state of a link is a description of that interface and its relationship to its
neighboring networking devices. The interface information includes the IPv6 prefix of the
interface, the network mask, the type of network it is connected to, the routers connected to
that network, and so on. This information is propagated in various type of link-state
advertisements (LSAs). A router’s collection of LSA data is stored in a link-state database.
The contents of the database, when subjected to the Dijkstra algorithm, result in the creation
of the OSPF routing table. The difference between the database and the routing table is that
the database contains a complete collection of raw data; the routing table contains a list of
shortest paths to known destinations via specific router interface ports. OSPF version 3, which
is described in RFC 2740, supports IPv6.
6.2 Force SPF in OSPF for IPv6
When the process keyword is used with the clear ipv6 ospf command, the OSPF database is
cleared and repopulated, and then the SPF algorithm is performed. When the force-spf
keyword is used with the clear ipv6 ospf command, the OSPF database is not cleared before
the SPF algorithm is performed.
6.3 Fast Convergence—LSA and SPF Throttling
The OSPF for IPv6 LSA and SPF throttling feature provides a dynamic mechanism to slow
down link-state advertisement updates in OSPF during times of network instability. It also
allows faster OSPF convergence by providing LSA rate limiting in milliseconds. Previously,
OSPF for IPv6 used static timers for rate-limiting SPF calculation and LSA generation.
Although these timers are configurable, the values used are specified in seconds, which poses
a limitation on OSPF for IPv6 convergence. LSA and SPF throttling achieves subsecond
convergence by providing a more sophisticated SPF and LSA rate-limiting mechanism that is
able to react quickly to changes and also provide stability and protection during prolonged
periods of instability.
6.4 Load Balancing in OSPF for IPv6
When a router learns multiple routes to a specific network via multiple routing processes (or
routing protocols), it installs the route with the lowest administrative distance in the routing
19. 19
table. Sometimes the router must select a route from among many learned via the same
routing process with the same administrative distance. In this case, the router chooses the path
with the lowest cost (or metric) to the destination. Each routing process calculates its cost
differently and the costs may need to be manipulated in order to achieve load balancing.
OSPF performs load balancing automatically in the following way. If OSPF finds that it can
reach a destination through more than one interface and each path has the same cost, it installs
each path in the routing table. The only restriction on the number of paths to the same
destination is controlled by the maximum-paths command. The default maximum paths is 16,
and the range is from 1 to 64.
6.5 Importing Addresses into OSPF for IPv6
When importing the set of addresses specified on an interface on which OSPF for IPv6 is
running into OSPF for IPv6, users cannot select specific addresses to be imported. Either all
addresses are imported, or no addresses are imported.
6.6 Enabling OSPF for IPv6 on an Interface
This task explains how to enable OSPF for IPv6 routing and configure OSPF for IPv6 on each
interface. By default, OSPF for IPv6 routing is disabled and OSPF for IPv6 is not configured
on an interface.
6.7 SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 ospf process-id area area-id [instance instance-id]
6.8 Defining an OSPF for IPv6 Area Range
The cost of the summarized routes will be the highest cost of the routes being summarized.
For example, if the following routes are summarized:
OI 2001:0DB8:0:0:7::/64 [110/20] via FE80::A8BB:CCFF:FE00:6F00, Ethernet0/0
OI 2001:0DB8:0:0:8::/64 [110/100] via FE80::A8BB:CCFF:FE00:6F00, Ethernet0/0
OI 2001:0DB8:0:0:9::/64 [110/20] via FE80::A8BB:CCFF:FE00:6F00, Ethernet0/0
They become one summarized route, as follows:
OI 2001:0DB8::/48 [110/100] via FE80::A8BB:CCFF:FE00:6F00, Ethernet0/0
This task explains how to consolidate or summarize routes for an OSPF area.
6.9 Defining Authentication in an OSPF Area
This task explains how to define authentication in an OSPF area.
20. 20
6.8 SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router ospf process-id
4. area area-id authentication ipsec spi spi md5 [key-encryption-type] key
Defining Encryption in an OSPF Area
This task describes how to define encryption in an OSPF area.
6.9 SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router ospf process-id
4. area area-id encryption ipsec spi spi esp encryption23
23. 23
8. Conclusion
Our simulations show that is possible and quite simple to implement a OSPF routing with
IPv6 in a network. The network is scalable and will work well in a larger scale as well. This
project shows that the possibility to work and easiness with features of OSPF and IPv6 as
well.
9. Reference
[1] CCNA Routing and Switching Study Guide - Lammle, Todd
[2] Cisco IOS IPv6 Configuration Guide
[3] Skibbz.com