Internet Protocol version 6 (IPv6) is the latest version of the
Internet Protocol (IP), the communications protocol that
provides an identification and location system for computers
on networks and routes traffic across the Internet.
IPv4 & IPv6 are not designed to be interoperable, complicating
the transition to IPv6. However, several IPv6 transition
mechanisms have been devised to permit communication
between IPv4 and IPv6 hosts.
10 IP VERSION SIX (6) WEEK TEN notes.pptxJoshuaAnnan5
IPV6 addressing solution was announced in the mid 1990s (RFC 2460) and was task in solving IPv4’s shortcomings
NB: Version 5 was already assigned to another developing protocol, this is the reason for the jump from version 4 to 6.
Although both versions function similarly, version 4 and version 6 use different types of packet header formatting and addressing lengths. Meanwhile IPV6 header are more efficient and greatly simplified compared to IPV4 header information . This helps to reduce processing overhead during transmission.
Larger address space:
The main limitations with IPv4 are the imposed address space limitations and eventual complete loss of addressing capability. IPv6 was designed to overcome IPv4’s 32-bit limitations by introducing much larger 128-bit addresses and providing an address pool that is virtually inexhaustible.
Stateless autoconfiguration:
A feature used to issue and generate an IP address without the need for a Dynamic Host Configuration Protocol
(DHCP) server:
• Routers send router advertisements (RAs) to network hosts containing the first half, or first 64 bits, of the 128-bit network address.
• The second half of the address is generated exclusively by the host and is known as the interface identifier. The interface identifier uses its own MAC address, or it may use a randomly generated number.
This allows the host to keep hardware addresses hidden for security reasons and helps an administrator mitigate security risks.
More efficient packet headers: IPv6 uses a simpler header design than IPv4. The enhanced design allows routers to analyze and forward packets faster. Fewer header fields must be read, and header checksums are completely discarded in IPv6. More efficient packet headers improve network performance and save valuable router resources
Changes in multicast operation: Support for multicasting in IPv6 is now mandatory instead of optional, as with IPv4. The multicasting capabilities in IPv6 completely replace the broadcasting functionality found in IPv4. IPv6 replaces broadcasting with an “all-host” multicasting group.
Increased security: Another optional feature found in IPv4, IP Security (IPsec) measures are now considered mandatory and implemented natively in IPv6.
What all this numbers translate into is, flexibility of assigning different functions on the network, without facing address exhaustion. It also allows for an improved network design and troubleshooting efficiency.
The hexadecimal address look like
Components of Computer Networks
In this tutorial, we will cover the components of Computer Networks.
A Computer Network basically comprises multiple computers that are interconnected to each other in order to share information and other resources. Multiple computers are connected either with the help of cables or wireless media.
So basically with the help of a computer network two or more devices are connected in order to share a nearly limitless range of information and services whic
8-Lect_8 Addressing the Network.tcp.pptxZahouAmel1
Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing
Internet Protocol version 6 (IPv6) is the latest version of the
Internet Protocol (IP), the communications protocol that
provides an identification and location system for computers
on networks and routes traffic across the Internet.
IPv4 & IPv6 are not designed to be interoperable, complicating
the transition to IPv6. However, several IPv6 transition
mechanisms have been devised to permit communication
between IPv4 and IPv6 hosts.
10 IP VERSION SIX (6) WEEK TEN notes.pptxJoshuaAnnan5
IPV6 addressing solution was announced in the mid 1990s (RFC 2460) and was task in solving IPv4’s shortcomings
NB: Version 5 was already assigned to another developing protocol, this is the reason for the jump from version 4 to 6.
Although both versions function similarly, version 4 and version 6 use different types of packet header formatting and addressing lengths. Meanwhile IPV6 header are more efficient and greatly simplified compared to IPV4 header information . This helps to reduce processing overhead during transmission.
Larger address space:
The main limitations with IPv4 are the imposed address space limitations and eventual complete loss of addressing capability. IPv6 was designed to overcome IPv4’s 32-bit limitations by introducing much larger 128-bit addresses and providing an address pool that is virtually inexhaustible.
Stateless autoconfiguration:
A feature used to issue and generate an IP address without the need for a Dynamic Host Configuration Protocol
(DHCP) server:
• Routers send router advertisements (RAs) to network hosts containing the first half, or first 64 bits, of the 128-bit network address.
• The second half of the address is generated exclusively by the host and is known as the interface identifier. The interface identifier uses its own MAC address, or it may use a randomly generated number.
This allows the host to keep hardware addresses hidden for security reasons and helps an administrator mitigate security risks.
More efficient packet headers: IPv6 uses a simpler header design than IPv4. The enhanced design allows routers to analyze and forward packets faster. Fewer header fields must be read, and header checksums are completely discarded in IPv6. More efficient packet headers improve network performance and save valuable router resources
Changes in multicast operation: Support for multicasting in IPv6 is now mandatory instead of optional, as with IPv4. The multicasting capabilities in IPv6 completely replace the broadcasting functionality found in IPv4. IPv6 replaces broadcasting with an “all-host” multicasting group.
Increased security: Another optional feature found in IPv4, IP Security (IPsec) measures are now considered mandatory and implemented natively in IPv6.
What all this numbers translate into is, flexibility of assigning different functions on the network, without facing address exhaustion. It also allows for an improved network design and troubleshooting efficiency.
The hexadecimal address look like
Components of Computer Networks
In this tutorial, we will cover the components of Computer Networks.
A Computer Network basically comprises multiple computers that are interconnected to each other in order to share information and other resources. Multiple computers are connected either with the help of cables or wireless media.
So basically with the help of a computer network two or more devices are connected in order to share a nearly limitless range of information and services whic
8-Lect_8 Addressing the Network.tcp.pptxZahouAmel1
Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing
Internet Protocol version 6 (IPv6) is what you are going to discover onwards. Here, you will get format, features and related required information of IPv6 addresses and its related protocols.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Internet Protocol version 6 (IPv6) is what you are going to discover onwards. Here, you will get format, features and related required information of IPv6 addresses and its related protocols.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
2. prepared by J.A.Suthar 2
IPv4 IPv6
IPv4 addresses are 32 bit length. IPv6 addresses are 128 bit length.
IPv4 addresses are binary numbers represented in
decimals.
IPv6 addresses are binary numbers represented
in hexadecimals.
IPSec support is only optional. Inbuilt IPSec support.
Fragmentation is done by sender and forwarding
routers.
Fragmentation is done only by sender.
No packet flow identification.
Packet flow identification is available within the IPv6
header using the Flow Label field.
Checksum field is available in IPv4 header No checksum field in IPv6 header.
Options fields are available in IPv4 header.
No option fields, but IPv6 Extension headers are
available.
Address Resolution Protocol (ARP) is available to
map IPv4 addresses to MAC addresses.
Address Resolution Protocol (ARP) is replaced with a
function of Neighbor Discovery Protocol (NDP).
Internet Group Management Protocol (IGMP) is used to
manage multicast group membership.
IGMP is replaced with Multicast Listener Discovery
(MLD) messages.
Broadcast messages are available.
Broadcast messages are not available. Instead a link-
local scope "All nodes" multicast IPv6 address (FF02::1)
is used for broadcast similar functionality.
Manual configuration (Static) of IPv4 addresses or
DHCP (Dynamic configuration) is required to
configure IPv4 addresses.
Auto-configuration of addresses is available.
3. • IPv4 Advantages
• Connectionless Protocol and Best effort based.
• Addresses are easier to remember.
• Existing networks are already using it.
• Classfull and classless addressing.
• Millions of addresses are wasted.
• Planning for excessive growth was not foreseen, addresses are running out.
• IPv6 Advantages:
• No more NAT (Network Address Translation)
• Auto-configuration
• No more private address collisions
• Better multicast routing
• Simpler header format
• Simplified, more efficient routing
• Built-in authentication and privacy support
• Flexible options and extensions
• Easier administration (say good-bye to DHCP)
• Large address space.
• Enhanced QoS.
• Efficient routing
• Built in security.
• Larger addresses harder to remember.
• Transition takes time and is not always smooth.
• Not always usable some machines have to be replaced.
19.3
4. 19.4
Why IPv6? IPv4 IPv6
IPv6 has more
addresses 4.3 billion addresses 340 trillion trillion trillion addresses
IPv6 networks are
easier and cheaper
to manage
Networks must be configured manually or
with DHCP. IPv4 has had many overlays to
handle Internet growth, which demand
increasing maintenance efforts.
IPv6 networks provide autoconfiguration
capabilities. They are simpler, flatter and
more manageable for large installations.
IPv6 restores end-
to-end
transparency
Widespread use of NAT devices means that
a single NAT address can mask thousands
of non-routable addresses, making end-to-
end integrity unachievable.
Direct addressing is possible due to vast
address space – the need for network
address translation devices is effectively
eliminated.
IPv6 has improved
security features
Security is dependent on applications –
IPv4 was not designed with security in
mind.
IPSEC is built into the IPv6 protocol, usable
with a suitable key infrastructure.
IPv6 has improved
mobility
capabilities
Relatively constrained network topologies
restrict mobility and interoperability
capabilities in the IPv4 Internet.
IPv6 provides interoperability and mobility
capabilities which are already widely
embedded in network devices.
IPv6 encourages
innovation
IPv4 was designed as a transport and
communications medium, and increasingly
any work on IPv4 is to find ways around the
constraints.
Given the numbers of addresses, scalability
and flexibility of IPv6, its potential for
triggering innovation and assisting
collaboration is unbounded.
5. 19.5
IPv6 ADDRESSES
Despite all short-term solutions, address depletion is
still a long-term problem for the Internet. This and other
problems in the IP protocol itself have been the
motivation for IPv6.
Structure
Address Space
Topics discussed in this section:
9. 19.9
Expand the address 0:15::1:12:1213 to its original.
Example 19.11
Solution
We first need to align the left side of the double colon to the
left of the original pattern and the right side of the double
colon to the right of the original pattern to find how many
0s we need to replace the double colon.
This means that the original address is.
18. ADDRESS SPACE ALLOCATION
• Like the address space of IPv4 , the address
space of IPv6 is divided into several blocks of
varying size and each block allocated for
special purpose.
prepared by J.A.Suthar 18
19. IPv6 Addressing 19
Global Unicast Addresses
• Equivalent to public IPv4 addresses.
• Globally routable and reachable on the IPv6 portion of the Internet.
• Unlike the current IPv4-based Internet, which is a mixture of both flat and
hierarchical routing, the IPv6-based Internet has been designed from its
foundation to support efficient, hierarchical addressing and routing.
• The scope, the portion of the IPv6 internetwork over which the address is
unique, of a global unicast address is the entire IPv6 Internet.
• Global scoped communication are identified by high-level 3 bits set to 001
(2000::/3)
21. IPv6 Addressing 21
Global Unicast Address
• Each aggregatable global unicast IPv6 address has three parts:
• Fixed portion set to 001 – The three high-order bits are set to 001. The
address prefix for currently assigned global addresses is 2000::/3.
• Global Routing Prefix – Site Prefix
– Site prefix assigned to an organization (leaf site) by a provider should
be at least a /48 prefix = 45 + high-order bits (001).
– /48 prefix represents the high-order 48-bit of the network prefix.
– prefix assigned to the organization is part of the provider’s prefix.
• Subnet-id - Site
– With one /48 prefix allocated to an organization by a provider, it is
possible for that organization to enable up to 65,535 subnets
(assignment of 64-bit’s prefix to subnets).
– The organization can use bits 49 to 64 (16-bit) of the prefix received
for subnetting.
• Interface-id – Host
– The host part uses each node’s interface identifier.
– This part of the IPv6 address, which represents the address’s low-
order 64-bit, is called the interface ID.
22. IPv6 Addressing 22
Special IPv6 Addresses
• The following are special IPv6 addresses:
• Unspecified address
– unspecified address (0:0:0:0:0:0:0:0 or ::) is only used to indicate the
absence of an address.
– equivalent to the IPv4 unspecified address of 0.0.0.0.
– used as a source address for packets attempting to verify the
uniqueness of a tentative address.
– never assigned to an interface or used as a destination address.
• Loopback address
– The loopback address (0:0:0:0:0:0:0:1 or ::1) is used to identify a
loopback interface, enabling a node to send packets to itself.
– It is equivalent to the IPv4 loopback address of 127.0.0.1.
– Packets addressed to the loopback address must never be sent on a
link or forwarded by an IPv6 router.
24. • Compatible address is an address of 96 bits
of zero followed by 32bits of IPv4 address. It is
used when computer using IPv6 wants to send
a message to another computer using IPv6.
• Mapped address is used when a computer
already migrated to version 6 wants to send
an address to computer still using version 4.
prepared by J.A.Suthar 24
25. AUTOCONFIGURATION
• In IPv6, DHCP protocol can still be used to
allocate an IPv6 address to a host, but a host
can also configure itself.
prepared by J.A.Suthar 25
26. • Process:
1. Host create link local address for it self.
• this is done by 10 bit prefix(1111 1110 10 ) adding 54
zeros, adding 64 bit interface identifier.
2. Host then test to see this link local address is unique
and not used by other host.
• If any host using this address the process fail and
DHCP auto configure host by itself.
3. If process 2 is passed, but still needs a global unicast
address. Host sends router solicitation message to
local router and got the address.
prepared by J.A.Suthar 26
27. RENUMBERING
• To allow sites to change the service provider,
renumbering of prefix(n) was built in to ipv6
addressing.
• A router to which site is connected can
advertise a new prefix and let the sites use the
old prefix for short time. So, site have two
prefix.
prepared by J.A.Suthar 27
28. 20.28
IPv6
The network layer protocol in the TCP/IP protocol suite
is currently IPv4. Although IPv4 is well designed, data
communication has evolved since the inception of IPv4
in the 1970s. IPv4 has some deficiencies that make it
unsuitable for the fast-growing Internet.
Advantages
Packet Format
Extension Headers
Topics discussed in this section:
29. • Better header format: options are separated
by based header.
• New Options: allow additional functionalities
• Allowance for Extension: if new technologies
or applications are there.
• Support for resource allocation: Two new
fields are added, traffic class and flow label
• Support for more security: Encryption and
authentication provided .
prepared by J.A.Suthar 29
53. • Hop by Hop Option: used when source
need to pass information to all routers visited
by datagram
• Pad1 : (1 byte) designed for alignment
purpose. If an options falls short of
requirement of exactly 1 byte.
• PadN: similar to Pad1 , when 2 or more bytes
are needed.
• Jumbo Payload : maximum size of payload is
65,535bytes but any longer payload is
required, we can use this payload.
prepared by J.A.Suthar 53
54. • Destination option: is used when source
needs to pass information to the destination
only.
• Source Routing : combines concepts of
strict source route and loose source options of
IPV4.
• Fragmentations: packet size >= MTU then
source must use a Path MTU Discovery
technique to find the smallest MTU supported
by n/w , or it fragment datagram into a size of
1280 bytes or smaller.
prepared by J.A.Suthar 54
55. • Encrypted Security Payload: It is an
extension that provides confidentiality and
guards against eavesdropping.
• Authentication: it validates the messages
and ensure the integrity of data.
prepared by J.A.Suthar 55
58. 21.58
ICMPv6
We discussed IPv6 in Chapter 20. Another protocol that
has been modified in version 6 of the TCP/IP protocol
suite is ICMP (ICMPv6). This new version follows the
same strategy and purposes of version 4.
Error Reporting
Query
Topics discussed in this section:
61. • Informational Messages: Echo request - reply
messages.
• This messages designed to check whether two
devices in the internet can communicate with
each other.
prepared by J.A.Suthar 61
62. • Neighbor-Discovery Messages:
• ND and IND used by node for three main
purposes:
• 1. Hosts uses the ND protocol to find routers
in neighborhood that will forward packets for
them.
• 2. Nodes use the ND protocol to find the link-
layer addresses of neighbors(same network).
• 3. Nodes use the Inverse neighbor discovery
protocol to find the IPv6 addresses of
neighbors.
prepared by J.A.Suthar 62
63. • Group Membership Messages:
• Multicast listener protocol v2:
Membership query message: general, group –
specific and group and source specific.
-this message is sent by router to find active
group member in the network.
Membership report message
-the format of message in MLDv2 is exactly
same as the one IGMPv3 expect size of fields.
prepared by J.A.Suthar 63
65. 20.65
TRANSITION FROM IPv4 TO IPv6
Because of the huge number of systems on the Internet,
the transition from IPv4 to IPv6 cannot happen
suddenly. It takes a considerable amount of time before
every system in the Internet can move from IPv4 to
IPv6. The transition must be smooth to prevent any
problems between IPv4 and IPv6 systems.
Dual Stack
Tunneling
Header Translation
Topics discussed in this section:
68. • To determine which version to use when
sending a packet to a destination, the source
host queries the DNS.
• If DNS returns an IPv4 address, the source
host sends IPv4 packet and if DNS returns an
IPv6 address, the source host sends an IPv6
packet.`
prepared by J.A.Suthar 68
70. • Tunneling is a strategy used when two
computers using IPv6 want to communicate
with each other and the packet must pass
through a region that uses IPv4.
• To pass through region , IPv6 packet must
have encapsulated in IPv4 packet when it
enters into region, and it leaves its capsule
when it exits the region.
prepared by J.A.Suthar 70
72. • Header translation is necessary when the
majority of the internet has moved to IPv6 but
some systems still use IPv4.
• The sender want to use IPv6, but the receiver
does not understand IPv6.
• In this case, header format must be totally
changed through header translation. The
header of IPv6 packet is converted to an IPv4
header.
prepared by J.A.Suthar 72
74. USE OF IP ADDRESS
• During transition a host may need to use two
addresses, IPv4 and IPv6.
• When the transition is complete, IPV4
addresses should disappear.
• The DNS servers need to be ready to map a
host name to either address type during the
transition, but the IPv4 directory will
disappear after all hosts in the world have
migrated IPv6.
prepared by J.A.Suthar 74