This document discusses the deployment of a next generation telecom transport network. The objectives are to form a network to offer both IPv6 and IPv4 services, successfully deploy an IPv6 network, and configure firewall security. It covers literature on IPv6 migration, routing protocols like OSPF, hardware configurations including routers, switches, and firewalls. It also compares IPv4 and IPv6, and discusses security techniques like DMZ. The references cited papers on IPv6 necessity, distributed firewall systems, IPv6 research and applications, and data security protocols.
3. INTRODUCTION
• Evolution
of
Packet
based
telecom network from circuit
based network.
• Supports voice, video with audio
and data .
• Configuration of
secure network.
an
optimally
• Provides service to a larger
group of internet users at the
4. OBJECTIVE
• The main objective of the project
is to form a network which will
offer IPv6(next generation)
services for new users(IPv6) as
well as the existing users(IPv4) i.e.
there will be co-existence of both
versions of IP.
• Successful deployment of IPv6
network.
• Configuring firewall at network
5. LITERATURE
SURVEY
YEAR OF
PUBLISH
PAPER TITLE
RESEARCHER/
AUTHOR
TECHNIQUES WITH PERFORMANCE
2012
Internationa
l Conference
on
Information
Society (iSociety 2012)
Necessity to
Migrate to
IPv6
Rahathullah Khan
Hussain Fouad Sindi
This paper describes the
migration from the current
Internet Protocol (IPv4) to the
next generation of Internet
Protocol (IPv6) and to adapt
the new technologies which
probably grows into our
networks.
2011
Fourth
Internationa
l Conference
on
Intelligent
Computation
Technology
and
Automation
The Research
and
Application
of Internet
Protocol
Version 6
(IPv6)
Zhenqi Wang, Mei
Yan
North China
Electric Power
University,
Baoding, Hebei,
071003, China
yanmeimm@126.com
With the rapid development of
the applications based on
Internet, the traditional
network of based IPv4
protocol has
been overwhelmed, and IPv6
protocol becomes the
dominant protocol for the
next generation Internet.
6. LITERATURE
SURVEY
YEAR OF
PUBLISH
PAPER TITLE
RESEARCHER/
AUTHOR
TECHNIQUES WITH
PERFORMANCE
2010
Technologies
for Homeland
Security (HST),
2010 IEEE
International
Conference
Securing IPv6
network
infrastructur
e: A new
security
model
Choudhary. A.R.
SEGMA Technol.
Inc., Silver
Spring, MD, USA
Sekelsky, A.
• It briefly presents the new
IPv6 capabilities.
• It presents a analysis of the
security vulnerabilities
arising from these
capabilities
• It presents a new security
model for IPv6 network
infra. that has the potential
to mitigate these
vulnerabilities.
2009
2009
International
Conference on
Communicatio
n Software
and Networks
Design and
Implementati
on of
Distributed
Firewall
System for
IPv6
Yingxu Lai,
Guangzhi Jiang,
Jian Li, Zhen Yang,
Department of
Information
Security Institute
of Computer
Science, Beijing
This paper
introduces the
implementation of
Distributed Firewall System
(DFS) that can be applicable
to the IPv6 network and has
capabilities of processing
encrypted IPSec packet.
7. LITERATURE
SURVEY
YEAR OF
PUBLISH
PAPER TITLE
RESEARCHER/
AUTHOR
TECHNIQUES WITH PERFORMANCE
2011
Network
Protocols
(ICNP), 2011 19th
IEEE
International
Conference on
17-20 Oct. 2011
IPv6
evolution,
stability and
deployment
Xiaoke Jiang
Networking is growing with
Dept. of
rising
exponential
pace.
Comput. Sci.,
Network itself and its routing
Tsinghua Univ.,
system become more and more
Beijing, China
stable. And here they have
Bi, Jun ;
explored special properties
Yangyang Wang ; of this preliminary network,
Zhijie He ; Wei
to provide data which help
Zhang ;
deploy IPv6.
Hongchen Tian
2008
Southeastcon,
2008. IEEE .
3-6 April 2008
An
examination
of IPv4 and
IPv6 networks
: Constraints
and various
transition
mechanisms
Jivika Govil
Maharshi
Dayanand Univ.,
Delhi
Jivesh Govil ;
Kaur, N. Kaur,
H.
• This paper discusses
constraints, various techniques
and standards require for high
level compatibility smooth
transition between IPv4 and
IPv6 by removing the
constraints.
• It is impossible to switch the
entire internet over to IPv6
8. PROBLEM
DEFINITION
• In IPv4 networks IDs allocation is very
critical.
• IPv6 is required because of the fast
depletion of IPv4 addresses.
• Apart from this it is also necessary to
implement an optimal security system
in any network
•
Securing
data
while
they
are
transmitted from server to client.
9. FLOW CHART
Study of various protocols &
applications of the project
Configuring and connecting hardware
peripherals in IPv4
Software configuration of the server
Performing same procedure for IPv6
Implementing data security on packet data
Testing Services & network connectivity
10. ROUTING PROTOCOL
OSPF: Open Shortest Path First
• Is a link-state routing protocol
• Suitable for serving large,
heterogeneous internetworks.
• OSPF can calculate the routes in a
short amount of time.
• Link-state advertisements (LSA)
13. SERVER
CONFIGURATIONS
• DNS SERVER
DNS will assign domain names to each IP
address.
• FTP SERVER
Transfer files from one system to
another system.
• EMAIL SERVER
Used to communicate with clients in a
company.
• WEB SERVER
Web server is use to host websites.
• VOIP SERVER
Used for placing and transmitting
14. HARDWARE CONFIGURATIONS
• ROUTERS
A router is a device that forwards data
packets between
computer networks
It ensures that information doesn't go
where it's not needed.
NETWORK
2
10.1.1.0/ 255.255.255.0
NETWORK 1
ROUTER
NETWORK
10.0.1.0/ 255.255.255.0
3
10.2.1.0/ 255.255.255.0
Fig. 3
Routing
15. HARDWARE CONFIGURATIONS
•
SWITCHES
A switch, keeps a record of the MAC
addresses of all the devices connected to it.
With this information, a switch can identify
which system is sitting on which port. So
when a frame is received, it knows exactly
which port to send it to.
CISCO 2960 SWITCH
Footer Text
Fig.4
Switching
16. Router vs. Switch
ROUTER
SWITCH
Operates at network layer of
OSI model
Operates at data layer of OSI
model
Connect to one or more
network
Connects devices in a LAN
Consist of a combination of
hardware and software
Uses switching table to find the
correct destination
Data is grouped into packets
It has buffer for each link which
which has a physical and logical stores the data until that
address.
particular link is free.
Keeps a tale of IP Addresses
Keeps a table of known MAC
addresses
17. IPv4 vs. IPv6
IPv4
IPv6
Source and destination addresses Source and destination addresses
are 32 bits (4 bytes) in length.
are 128 bits (16 bytes) in length.
IPv6 address is written as
IP address is written as 8.8.8.8
FABC:AC77:7834:2222:FACB:
AB98:5432:4567
Must be configured manually or
through DHCP
Does not require manual
configuration
IPv4 header has checksum which
must be compared by each
router
IPv6 has no header checksum
Security in IPv4 networks is
limited to tunnelling between
two networks
IPv6 has been designed to satisfy
the growing and expanded need
for network security
Classes: Class A B C D E
Classes: Unicast Anycast
18. HARDWARE CONFIGURATIONS
• FIREWALL
•
Used to help keep a network secure.
•
Can be either software-based or
hardware-based.
•
To control the incoming and outgoing
network traffic.
Fig.5
Security
19. SECURITY
DMZ Technique
• DMZ or Demilitarized Zone
• Contains and exposes an organization's
external-facing services to an untrusted
network, usually the Internet.
• Adds an additional layer of security to an
organization's LAN
Fig.6 DMZ Concept
20. REFERENCES
[1] Necessity to Migrate to IPv6,Rahathullah
Khan,Hussain Fouad Sindi,International Conference
on Information Society (i-Society 2012)
[2] Design and Implementation of Distributed Firewall
System for IPv6,Yingxu Lai, Guangzhi Jiang, Jian Li,
Zhen Yang 2009 International Conference on
Communication Software and Networks
[3] The Research and Application of Internet Protocol
Version 6 (IPv6) Zhenqi Wang, Mei Yan 2011,Fourth
International Conference on Intelligent Computation
Technology and Automation
[4]Efficient Security for data using cryptographic
protocol,Vaishnavi .R, Janarthan R INCACEC,2009 IEEE
International Conference
[5]Data Security in packet switched network,
21. REFERENCES
[6]Transition from IPv4 to IPv6: A state of art
survey,IEEE Communication Survey,Third
quarter 2013..
[7] CCNA : Cisco Certified Network Associate Study
Guide (Exam 640802) , 6th Edition, Todd
Lammle, By Wiley Publications,2007, retrieved
on 10th October 2012.
[8]Computers Networks(5th Addition) : Andrew S.
Tanenbaum.
[9]Data Communication And Networking: Behrouz
A Forouzan.