Hssn-2012 Ipv6 Binit Pt0981122

download Hssn-2012 Ipv6 Binit Pt0981122

of 33

Transcript of Hssn-2012 Ipv6 Binit Pt0981122

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    1/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Internet Protocol version 6 Page 1

    CE00382-2 Hardware, Software, Systems and Networks II

    Internet Protocol version 6

    Hand-in Date 14th

    February 2012

    Hand-out date 10th April 2012

    Submitted By Submitted To

    Binit Kumar Mrs.Shakti Arora

    PT0981122 (Module Lecturer)

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    2/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Assessment Criteria

    Research and Investigation 20 %

    Documentation 10 %

    Presentation 20 %

    Critical Analysis 20 %

    Citation and Referencing 10 %

    Product 20 %

    TOTAL 100 %

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    3/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Contents

    Gantt Chart ..................................................................................................................................... 5

    Introduction ..................................................................................................................................... 6

    Description of IPv6 ......................................................................................................................... 7

    IPv6 Address Representation ...................................................................................................... 8

    Core Component of IPv6 and its Working ................................................................................... 10

    IPv6 Header ............................................................................................................................... 10

    Extension Headers ..................................................................................................................... 11

    Routing .................................................................................................................................. 11

    Fragment ................................................................................................................................ 11

    Authentication ....................................................................................................................... 12

    Encapsulating......................................................................................................................... 12

    Destination options ................................................................................................................ 12

    Hop by hop ............................................................................................................................ 12

    ICMPv6 ..................................................................................................................................... 13

    IPv6 Address Management ....................................................................................................... 15

    IPv6 Transition Strategies ......................................................................................................... 16

    Strength of IP v6 ........................................................................................................................... 18

    Weakness of IPv6 ......................................................................................................................... 20

    Network Management ................................................................................................................... 21

    Security ......................................................................................................................................... 24

    IPv6 and multimedia Devices ....................................................................................................... 25

    Conclusion .................................................................................................................................... 29

    References ..................................................................................................................................... 30

    Appendices .................................................................................................................................... 32

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    4/33

    : CE00382-2 Hardware, Software, Systems and Networks II

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    5/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Gantt Chart

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    6/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Introduction

    Internet Protocol version 6 (IPv6) is the addressing scheme as IPv4 required but the packets to

    specify the source and destination address. Each host on the internet requires an IP address in

    order to communicate. IPv4 was developed by IETF to deal with the problems associated with

    IPv4.It is basically an internet-layer protocol for packet-switched internetworking provides end

    to end datagram transmission. It uses 128 bit address i.e.2128

    , (approximately 3.41038

    )

    addresses. The general Format of IPv6 is 8 blocks of 16 bits which is written in hexadecimal.

    3ffe:2a00:100:7020:0:0:dead:beef

    2001:700:700:1:0:0:0:2

    It eliminates the need of NAT which is an effort to alleviate IPv4 address exhaustion. In

    additional features it has stateless address auto configuration, network renumbering and router

    announcement The Ipv6 subnet size has been standardized by fixing the size of the host identifier

    portion of an address to 64 bits to facilitate an automatic mechanism for forming the host

    identifier from MAC address. Network security is integrated into the design of IPv6, including

    the option of IPsec.

    For networking traffic, the quality refers to data loss, latency (jitter) or bandwidth. In order to

    implement QOS marking, IPv6 provides a traffic-class field (8 bits) in the IPv6 header. It also

    has a 20-bit flow label.

    But the deployment of this protocol is difficult migrating from IPv4.The Internet Society is

    taking the lead in organizing world IPv6 Launch on June 6, 2012 i.e. world IPv6 day Google,

    Yahoo, Bing, Facebook and Cisco will enable IPv6 for real.

    The elimination of NAT, the enabling of peer-to-peer communication, the emergence of

    numerous new applications and the connection of billions of new devices are all advantages

    associated with IPv6.

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    7/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Description of IPv6

    IPv6 is within the protocol suite TCP/IP which is connectionless network layer protocol.

    Previously it was also known as IPng or IP next Generation. The design of IPv6 is greatly

    influenced by IPv4. Properties of IPv6:

    Simple Header Format Flow labelling The support for extensions and options has been improved Authentication and Security Extensions The size of the IP address is increased to 128 bits. Simpler auto configuration of IP address Multicast routing has been improved by adding a scope field to the multicast addresses Any cast addressing has been added

    340,282,366,920,938,463,463,374,607,431,768,211,456

    There are so many IPv6 addresses available that many trillions of addresses could be assigned to

    every human being on the planet .There are approximately 665,570,793,348,866,943,898,599

    addresses per square meter of the surface of the planet Earth.

    Enhanced IP addressing and features: Global Reachability and flexibility

    Aggregation

    Multihoming

    Auto configurationPlug and Play

    End-to-end without NAT

    Renumbering

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    8/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Mobile and Security Mobile IP RFC-compliant

    IPsec mandatory (or native ) for IPv6

    Simple Header Routing efficiency

    Performance and forwarding rate

    scalability

    No broadcasts

    No Checksums

    Extension headers

    Flow labels

    Transition Richness: Dual-Stack

    6to4 and manual tunnels

    Translation

    IPv6 Address Representation

    IPv6 Format

    16-bit hexadecimal field Caseinsensitive for hexadecimal A,B,C,D,E and F Leading Zeros in a field are optional Successive Fields of zeros can be represented as :: only once per address

    Example

    2043:0000:140F:0000:0000:09C0:876A:128Bo Can be represented as 2043:0:140f::09c0:876a:128b

    FF01:0:0:0:0:0:0:1 is FF01::1 0:0:0:0:0:0:0:1 is ::1 0:0:0:0:0:0:0:0 is ::

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    9/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    IPv6 is further divided into different categories:

    Reserved Address - The IETF reserves 1/256th of the total IPv6 address block for various use

    both present and future.

    Private AddressAddress related to local access to a particular link and never routed outside a

    particular enterprise network .The first octet value of FE in hexadecimal notation, with the

    next hexadecimal digit being a value from 8 to F. e.g. FEC, FED .FEE. These addresses

    are further classified as site- local addresses (C to F) and link-local address (8 to B).

    Loopback Address In IPv6 there is just one address , not a whole block like in IPv4 , the

    address is 0:0:0:0:0:0:0:1 also expressed as ::1.

    Unspecified Address- the all zero address (::) . Its is typically used in the source field of a

    datagram that is sent by a device that seeks to have its IP address configured.

    Subnets and IP classification[1]

    Reserved Address

    Private Address

    Loopback Address

    Unspecified address

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    10/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Core Component of IPv6 and its Working

    IPv6 Header

    IPv6 packet consists of two main parts header and the payload .IPv6 header occupies fixed size

    of40 bytes. From these 40 bytes, 32 bytes are given to source and destination IP addresses, so

    compared to IPv4 the header is very clean and small, another advantage with IPv6 header is its

    fixed size. With Fixed offset , router speed substantially increase.

    IPv6 Header format[2]

    - Version : Version 6 (4bits)- Traffic class : (8bits) Differentiate between traffic class and prioritization- Flow Label: (20 bits) Distinguishes packets that require same treatment- Payload length: (2byte) length of data after IP header- Next header : (1 byte) like protocol in IPv4- Hop Limit : (1byte) like TTL- Source Address (16 bytes)- Destination Address(16 bytes)

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    11/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Extension Headers

    Extension header[3]

    In IPv6, optional internet-layer information is encoded in separate headers that may be placed

    between the IPv6 header and the upper- layer header in a packet. Distinct value is assigned to

    each header may carry one or more

    Extension headers are not examined or processed by any node along a packet's delivery path,

    until the packet reaches the node (or each of the set of nodes, in the case of multicast) identified

    in the Destination Address field of the IPv6 header. Extension headers must be processed strictly

    in the order they appear in the packet.

    The main extension headers we will discuss are:

    Routing

    The Routing header is used by an IPv6 source to list one or more intermediate

    nodes to be "visited" on the way to a packet's destination. A Routing header is

    not examined or processed until it reaches the node identified in the Destination

    Address field of the IPv6 header.

    Fragment

    The Fragment header is used by an IPv6 source to send a packet larger than

    would fit in the path MTU to its destination. For every packet that is to be

    fragmented, the source node generates an Identification value. If a Routing

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    12/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    header is present, the Destination Address of concern is that of the final destination. At the

    destination, fragment packets are reassembled into their original, un fragmented sizes.

    Authentication

    "IPng Authentication Header", is an extension header, which provides

    authentication and integrity (without confidentiality) to IPng datagrams.

    The receiver of a packet can be sure who sent it, unlike in IPv4 in which

    no guarantee is present. The payload of the authenticated packet is sent

    unencrypted. The extension is algorithm- independent and will support many different

    authentication techniques.

    Encapsulating

    "IPng Encapsulating Security Header" - This mechanism provides integrity

    and confidentiality to IPv6 datagrams using encrypted security payload

    extension headers. It is simpler than some similar security protocols (e.g.,

    SP3D, ISO NLSP) but remains flexible and algorithm-independent.

    Destination options

    The Destination Options header is used to carry optional information thatneed be examined only by a packet's destination nodes. Optional destination

    information could also be encoded as a separate extension header.

    Hop by hop

    Information must be examined and processed by every node along a packet's delivery path,

    including the source and destination nodes. The Hop-by-Hop Options header, when present,

    must immediately follow the IPv6 header and its presence is indicated by the value zero in the

    Next Header field of the IPv6 header.

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    13/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    ICMPv6

    The internet control message protocol version 6 (ICMPv6) is a new version of the ICM protocol

    that forms an integral part of IPv6 architecture. It is transported within packets and extended

    header It is subdivided into ICMP, ARP(address resolution protocol) and IGMP ( internet group

    member ship protocol version 3). This multitasking protocol used for error reporting in packet

    processing, diagnostic activities ,neighbour discovery process and IPv6 multicast membership

    reporting

    The 8-bit type field indicates the type of the message .If the high order has value zero (range 1

    to 127),it indicates an error message; if the high-order bit has value 1 ( range from 128 to 255),it

    indicate an information message

    ICMPv6 Message types

    Type Meaning

    1 Destination Unreachable

    2 Packet Too Big

    3 Time Exceeded

    4 Parameter problem

    128 Echo Request

    129 Echo Reply

    130 Group Membership Query

    131 Group Membership Report

    132 Group Membership Reduction

    133 Router Solictation

    134 Router Advertisement

    135 Neighbour Solicitation

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    14/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    136 Neighbour Advertisement

    137 Redirect

    138 Router Renumbering

    ICMPv6 Advantages :

    If wrong IP address is used for configuring client to DNS server and ICMP message issent by the destination device indication the error

    Error reported if the router undertaking the fragmentation of the packet if programdoesnot allow fragmentation for communication

    Router responds in the form of an ICMP message to other router if best route is with therouter and provides a better route .

    Router cannot decrement the TTL(time to live) value from 1 ,here ICMP message toindicate the expiry of the packet .

    The ICMPv6 provide testing and diagnostics services like ICMP echo is used by InternetProtocol Packet Internet Gopher(PING) utility.

    Trace router utility gets to know the IP address of the first router through ICMP messageas echo reply is sent by the router when TTL value decremented to 1 and this manner

    router manages its table.

    Utility Commands :

    ping ::1/128 ( checking the localhost n functioning of NIC) tracert www.apiit.edu.in ( in windows machine )

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    15/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    IPv6 Address Management

    IPv6 use interface identifiers to identify interfaces on a link. Think if them as the host portion of

    an IPv6 address. Interface identifiers are required to be unique on a specific link. Interface

    identifiers are always 64 bits and ca n be dynamically derived from a layer 2 address (MAC).

    We can assign an IPv6 address ID statically or dynamically:

    Static assignment using a manual interface ID

    Command : RouterX(config-if)#ipv6 address 2001:DB8:2222:7272::72/64

    Static assignment using EUI-64 interface IDCommand : RouterX(config-if)#ipv6 address 2001:DB8:2222:7272::/64 eui-64

    Stateless auto configurationThe auto configuration mechanism was introduced to enable plug and play networking of

    the devices to help reduce administration overhead.

    DHCP for IPv6 (DHCPv6)DHCPv6 enables DHCP servers to pass configuration parameters, such as IPv6 network

    addresses to IPv6 nodes. It offers the capability of automatic allocation of reusable

    network address and additional configuration flexibility.

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    16/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    IPv6 Transition Strategies

    The transition from IPv4 doesnt required upgrades of all nodes at the same time but these

    mechanisms provide smooth integration between IPv4 and IPv6 and allow communication

    between different versions. The two most commons techniques we use are

    Dual Stacking: This is an integration method in which node has implementation andconnectivity to both versions at the same time Routers and Switches are configures to

    support both protocols, with IPv6 preferred protocol. A dual-stack node chooses which

    stack to use based on the destination address of the packet.

    Dual Stacking IPv4 and IPv6[4]

    Tunnelling:- Manual IPv6-over-IPv4 tunnelling : Ipv6 packet is encapsulated within the IPv4

    protocol

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    17/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    - Dynamic 6 to 4 tunnelling are two methods: dynamically applies a valid, uniqueIPv6 prefix to each IPv6 island.

    Three types of transition [5]

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    18/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Strength of IP v6

    1. More Efficient Routing

    IPv6 reduces the size of routing tables and makes routing more efficient and hierarchical. IPv6

    allows ISPs to aggregate the prefixes of their customers' networks into a single prefix and

    announce this one prefix to the IPv6 Internet. In addition, in IPv6 networks, fragmentation is

    handled by the source device, rather than the router, using a protocol for discovery of the path's

    maximum transmission unit (MTU).

    2. More Efficient Packet Processing

    IPv6's simplified packet header makes packet processing more efficient. Compared with IPv4,

    IPv6 contains no IP-level checksum, so the checksum does not need to be recalculated at every

    router hop. Getting rid of the IP-level checksum was possible because most link-layer

    technologies already contain checksum and error-control capabilities. In addition, most transport

    layers, which handle end-to-end connectivity, have a checksum that enables error detection.

    Larger address space

    Better header format

    New Options

    Allowance for extension

    Support for resource allocation

    Support for more security

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    19/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    3. Directed Data Flow

    IPv6 supports multicast rather than broadcast. Multicast allows bandwidth-intensive packet flows

    (like multimedia streams) to be sent to multiple destinations simultaneously, saving network

    bandwidth. Disinterested hosts no longer must process broadcast packets. In addition, the IPv6

    header has a new field, named Flow Label, that can identify packets belonging to the same flow.

    4. Simplified Network Configuration

    Address auto-configuration (address assignment) is built in to IPv6. A router will send the prefix

    of the local link in its router advertisements. A host can generate its own IP address by

    appending its link-layer (MAC) address, converted into Extended Universal Identifier (EUI) 64-

    bit format, to the 64 bits of the local link prefix.

    5. Support For New Services

    By eliminating Network Address Translation (NAT), true end-to-end connectivity at the IP layer

    is restored, enabling new and valuable services. Peer-to-peer networks are easier to create and

    maintain, and services such as VoIP and Quality of Service (QoS) become more robust.

    6. SecurityIPSec, which provides confidentiality, authentication and data integrity, is baked into in IPv6.

    Because of their potential to carry malware, IPv4 ICMP packets are often blocked by corporate

    firewalls, but ICMPv6, the implementation of the Internet Control Message Protocol for IPv6,

    may be permitted because IPSec can be applied to the ICMPv6 packets.

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    20/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Weakness of IPv6

    Security Flaws listed

    IPv4 domain and IPv6 domain[6]

    The disadvantages:

    Currently there is no support to LVS in the Linux Kernel. You need to port applications to IPv6 You need tunnels when working against IPv4 machines Transition is a complex task result in more computation and bandwidth misuse

    Less network management support can be lead to default settings Its deployment time is too huge, One year is extended from last of 8 th July for global

    testing.

    New to the developers and network administrators, so need a lots of supports and trainingall over the world.

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    21/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Network Management

    Network management refers to the activities, methods, procedures, and tools that pertain to

    the operation, administration, maintenance, and provisioning of networked systems.IPv6 relates

    with network management as its used with the routing and IP datagram, routing protocols (RIPng

    , EIGRPv6, OSPFv3), network configuration and addressing of the internetworking devices.

    Network Management have 5 subparts -

    Configuration

    Routing Configuration: Enabling IPv6 on a router starts it control plane. IPv6 address size,

    multiple IPv6 node address, IPv6 routing protocols and routing table size are basic process in

    control plane. Another is data plane forward the relevant IP packets and does lookup to match

    the policies with control plane.

    Control Plane Data Plane

    IPv6 address Size Parsing IPv6 Extension Headers

    Multiple Ipv6 node Addresses IPv6 Address Lookup

    Ipv6 Routing Protocols

    Routing table size

    Configuration

    Accounting

    Performance

    Fault

    Security

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    22/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    RIPng (routing information protocol next generation) is a distance vector routing protocol

    provides a simple way to bring up IPv6. It uses split horizon and poison reverse update and limit

    of 15 hops to prevent routing loops. The updates are send to the neighbouring router exchange

    local message does not require global knowledge of network.

    RIPng features:

    Distance vector, radius of 15 hops ,split horizon and poison reverse Based on RIPv2 (IPv4) IPv6 prefix, next-hop IPv6 address Uses the multicast group FF02::9, the all rip router multicast group Sends update on UDP port 521 Support by Cisco IOS release 12.2 and late

    EIGRPv6 works as a advanced distance vector protocol that has some link-state features. The

    neighbour discovery process using hellos still happens, and its still provides reliable

    communication with reliable transport that gives us loop-free convergence using the diffusing

    update algorithm (DUAL).

    OSPFv6 a link state routing protocol that divides an entire internetworks or autonomous system

    into area , making a hierarchy, In version 3 ,RID, area ID and link-state ID which are all still 32-

    bit values are not found because IPv6 address is 128 bits . Removal of IP address information

    from OSPF packet header makes the new version of OSPF capable of being routed over almost

    any Network Layer protocol.

    IPv6 Autoconfiguration An important feature of IPv6 that it does not require and human

    intervention and allows plug and play option allow mobile devices.

    Stateful-Autoconfiguration :requires some human intervention as it makes use (DHCPv6) forinstallation and administration of nodes over a network

    Stateless-Autoconfiguration: It makes use of the IEEE EUI-64 standard to define the network IDportion of the address suitable. It allows each host to determine its address from the contents of

    received user advertisements.

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    23/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    DHCPv6

    The dynamic host configuration is made possible with the automatic assignment of IP

    addresses, default gateway, subnet masks and other IP parameters. A DHCP configured node

    sends a broadcast query to the DHCP server requesting for necessary information. Upon receipt

    of a valid request, the DHCP server assigns an IP address from its pool of IP addresses and other

    TCP/IP configuration parameters such as the default gateway and subnet mask. DHCP allocates

    IP addresses to the network devices in three different modes: dynamic mode, automatic mode

    and manual mode.

    Accounting

    There are extensions that instrument RADIUS accounting client functions. These extensions

    represent a portion of the Management Information Base (MIB) for use with network

    management protocols .Using these extensions, IP-based management stations can manage

    RADIUS accounting clients.

    Performance

    IPv6 will be installed on 400 giants company on 8th July ,2012 of IT field for measuring

    performance , but on experimenting its give performance similar to IPv4 with the additional

    overhead of NAT and network administration and excellent plug and play facility.

    Fault

    In the proposed approach, if a failure is detected in the home agent (HA) of a mobile node, a

    preferable survival HA is selected to continuously serve the mobile node. The preferable survival

    HA is the HA that does not incur failure and is neighbouring the current location of the mobile

    node. The proposed approach is based on the preference of each mobile node to achieve the fault

    tolerance of the HA

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    24/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Security

    Security in IPv6 is from IPsec, Authentication header, Encrypted security payload, key

    management, private virtual network, application level security and routing security

    IPsec

    IPSec is to provide interoperable, high quality, cryptographically-based security for IPv4 and

    IPv6. It offers various security services at the IP layer and therefore, offers protection at this (i.e.

    IP) and higher layers.IPsec is a mandatory component for IPv6, and therefore, the IPsec securitymodel is required to be supported for all IPv6 implementations in near future. In IPv6, IPsec is

    implemented using the AH authentication header and the ESP extension header The security

    services are access control, connectionless integrity, data origin authentication, protection against

    replays (a form of partial sequence integrity), confidentiality (encryption), and limited traffic

    flow confidentiality.

    Security at every layer[7]

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    25/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    IPv6 and multimedia Devices

    Each device has its own global IP address and NAT is no longer required, peer-to-peer

    communication will become much easier. Two way applications such as IP telephony ,video

    conferencing and gaming will much simpler to develop .routing table will become far lesscomplex ,which enable higher performance for internet traffic and allows various multimedia

    and other device to connect.

    VoIP (voice over internet protocol) is a telephony that sends conversations in packets over

    internet. IPv6 proved QoS to telephony with carrier-grade service level and ensure reliable VoIP

    infrastructure. Skype and IP PBX will revolutionize the telecommunication industry in personal

    and enterprise level.

    Sensor networks are also applied with ad-hoc deployment, auto-configuration, mobility and

    security. Various applications such as inventory disaster management can work on full potential

    by establishing connectivity with internet

    Biosensors and RFID can be easily integrated with IPv6. RFID can also be easily integrated

    with IPv6 and work remotely with real time tracking .Its a device that helps monitoring of

    biological change can revolutionize the medical Industry. IMS ( IP Multimedia Subsystem)

    specifies the QoS within IP network allows implementation of various applications e.g. Push to

    talk over Cellular (PoC), Multiple

    and simultaneous Ringing/find-me,

    follow-me, Multimedia Push, Push

    Ringtone, real Time video sharing ,

    interactive gaming ,shared folders ,

    voice messaging ,instant

    messaging service ,video

    conferencing ,media streaming

    ,enhanced policy controller etc.

    Different components in future[8]

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    26/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    IPv4 and IPv6

    IPv4 IPv6

    Addresses are 32 bits (4 bytes) in length.

    Addresses are 128 bits (16 bytes) in

    length

    Address (A) resource records in DNS to

    map host names to IPv4 addresses.

    Address (AAAA) resource records in

    DNS to map host names to IPv6

    addresses.

    IPSec is optional and should be supported

    externally

    IPSec support is not optional

    Header does not identify packet flow for

    QoS handling by routers

    Header contains Flow Label field, which

    Identifies packet flow for QoS handling

    by router.

    Both routers and the sending host

    fragment packets.

    Routers do not support packet

    fragmentation. Sending host fragments

    packets

    Header includes a checksum. Header does not include a checksum.

    Header includes options. Optional data is supported as extension

    headers.

    ARP uses broadcast ARP request to resolve

    IP to MAC/Hardware address.

    Multicast Neighbour Solicitation

    messages resolve IP addresses to MAC

    addresses.

    Internet Group Management Protocol

    (IGMP) manages membership in local

    subnet groups.

    Multicast Listener Discovery (MLD)

    messages manage membership in local

    subnet groups.

    Broadcast addresses are used to send

    traffic to all nodes on a subnet.

    IPv6 uses a link-local scope all-nodes

    multicast address.

    Configured either manually or through

    DHCP.

    Does not require manual configuration

    or DHCP.

    Must support a 576-byte packet size

    (possibly fragmented).

    Must support a 1280-byte packet size

    (without fragmentation).

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    27/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Demonstration of IPv6 in Packet Tracer 5.3

    IPv6 auto configuration

    Enabling the IPv6 global unicast-routing on both interfaces fa0/0 n fa0/1 of the router IPv6 .

    Providing address 2001:470:1:1::1/64 in fa0/0 and link-local address FE80::1 for both of the

    computers. The auto configuration mechanism was introduced to enable plug and play

    networking of the devices to help reduce administration overhead.

    Interface /Device IPv6 address Address

    Fa0/0 (Router) 2001:470:1:1::1/64 Assigned in router

    Fa0/1 (Router) 2001:471:1:1::1/64 Assigned in router

    PC0 2001:470:1:1:201:97FF:FE98:6CED/64 Auto-configured random address

    PC1 2001:471:1:1:2D0:BAFF:FE22:8A68/64 Auto-configured random address

    Result : New IPv6 address are auto-assigned to the device and new connecting device enable

    plug n play and less network overhead

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    28/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    RIPng configuration between different network

    By Enabling IPv6 unicastrouting at the interface on Fa0/1 and Fa0/0 interface of routerA and

    routerB respectively. To determine the different network and there network address , here both

    router is using common RIPng technique names as ciscorip. To enable RIPng at the interface we

    used command. All the gateway are assigned in the LAN for default

    path and interfaces are activates for unicast-routing . /48 to /64 is common subnet prefix and

    upper and lower limit used .

    Interface/Device IPv6 Address Address

    Server-PT FFe:001::10/48 LAN assigned address

    PC-PT FF:002::10/48 LAN assigned address

    Fa0/1 routerA FF:001::1/48 Default Gateway

    Fa0/0 routerB FF:002::1/48 Default Gateway

    Fa0/0 routerA 2001:410:1:10::2/64 Assigned

    Fa0/1 routerB 2001:410:1:10:1/65 Assigned

    Result : Successful transmission between different network with different subnet mask using

    RIPng in router

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    29/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Conclusion

    IPv6 is excellent addressing scheme with unending address with following the path of IPv4 in

    terms of reliability and scalability. With the Fixed size of packet and extension header

    techniques, its allow better handling of configuration in different path and just perfect in the

    scenario based on the exact requirement. The new feature of autoconfig make it portable with

    plug n play support can be used anywhere from mobile to multimedia device , medical industry

    to RFIDs. Also , its reduces the overhead of network administration along with fulfilling

    requirement and other administration parameters. IPv6 is finally going to implement with 400

    major companies of IT ,like Google ,Microsoft ,Cisco etc on 8th

    July 2012 . This will be a major

    day in the field of networking as all the working and methodology will change gradually butsurely. All the hardware as well as software device needs it support , installation and

    compatibility . All the user can a unique IP identification in the modern world as even a Fridge

    now require IP to connect to the internet .

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    30/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    References

    Books

    Behrouz A Forouzan. (2009). Network Layer. In: Sophia Chung Fegan Data Communication and

    Networking. 4th Ed. New Delhi: Tata McGraw-Hill Publishing Company Limited. p579 - 607.

    Pat Warner. (2001). Router Table. In: The Router Book: A Complete Guide to the Machine and

    its Accessories . Newtown: The Taunton Press. p84 - 100.

    Websites

    1 . Joe Davies. (2011).Introduction to IPv6. Available: http://technet.microsoft.com/en-

    us/library/bb726944.aspx. [ Last accessed 18th Feb 2012].

    Iljitsch van Beijnum. (2012). World IPv6 Launch: this time it's for real.Available:

    http://arstechnica.com/business/news/2012/01/world-ipv6-launch-this-time-its-for-real.ars .

    [Last accessed 24th Feb 2012.]

    Anonymous. (2011). Private IPv6 address range. Available:

    http://www.simpledns.com/private-ipv6.aspx . [ Last accessed 28th Feb ]

    Jenn-Wei Lin. (2012). Fault Tolerance. Available:

    http://dl.acm.org/citation.cfm?id=1596026 . [Last accessed 01th March ]

    Martin Levy . ( 2011). Six Benefits of IPv6. Available:

    http://www.networkcomputing.com/ipv6/230500009 . [Last accessed 08th March ]

    D. Nelson. (2012).RADIUS Accounting Client MIB for IPv6 . Available:

    http://tools.ietf.org/html/rfc4670 . Last accessed 15th March 2012.

    http://technet.microsoft.com/en-us/library/bb726944.aspxhttp://technet.microsoft.com/en-us/library/bb726944.aspxhttp://technet.microsoft.com/en-us/library/bb726944.aspxhttp://arstechnica.com/business/news/2012/01/world-ipv6-launch-this-time-its-for-real.arshttp://arstechnica.com/business/news/2012/01/world-ipv6-launch-this-time-its-for-real.arshttp://www.simpledns.com/private-ipv6.aspxhttp://www.simpledns.com/private-ipv6.aspxhttp://dl.acm.org/citation.cfm?id=1596026http://dl.acm.org/citation.cfm?id=1596026http://www.networkcomputing.com/ipv6/230500009http://www.networkcomputing.com/ipv6/230500009http://tools.ietf.org/html/rfc4670http://tools.ietf.org/html/rfc4670http://tools.ietf.org/html/rfc4670http://www.networkcomputing.com/ipv6/230500009http://dl.acm.org/citation.cfm?id=1596026http://www.simpledns.com/private-ipv6.aspxhttp://arstechnica.com/business/news/2012/01/world-ipv6-launch-this-time-its-for-real.arshttp://technet.microsoft.com/en-us/library/bb726944.aspxhttp://technet.microsoft.com/en-us/library/bb726944.aspx
  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    31/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Citation

    http://netacad.netCCNA exploration[1]

    http://www.tcpipguide.com/free/t_IPv6DatagramMainHeaderFormat.htm[2]

    http://www.zytrax.com/tech/protocols/ipv6.html [3]

    http://netacad.netCCNA exploration 4 -7.3.4.1[4]

    http://www.us.ntt.net/products/internet-access/ipv6.cfm [5]

    http://arstechnica.com/apple/news/2010/11/apple-fixes-broken-ipv6-by-breaking-it-some-

    more.ars .[6]

    http://ipv6.com/articles/general/IPv6-The-Future-of-the-Internet.htm [7]

    http://ipv6.com/articles/general/Next-Generation-Networking.htm [8]

    http://netacad.net/http://netacad.net/http://www.tcpipguide.com/free/t_IPv6DatagramMainHeaderFormat.htm%20%5b2http://www.tcpipguide.com/free/t_IPv6DatagramMainHeaderFormat.htm%20%5b2http://www.tcpipguide.com/free/t_IPv6DatagramMainHeaderFormat.htm%20%5b2http://www.zytrax.com/tech/protocols/ipv6.htmlhttp://www.zytrax.com/tech/protocols/ipv6.htmlhttp://netacad.net/http://netacad.net/http://www.us.ntt.net/products/internet-access/ipv6.cfm%5b5http://www.us.ntt.net/products/internet-access/ipv6.cfm%5b5http://www.us.ntt.net/products/internet-access/ipv6.cfm%5b5http://arstechnica.com/apple/news/2010/11/apple-fixes-broken-ipv6-by-breaking-it-some-more.ars%20.%20%5b6http://arstechnica.com/apple/news/2010/11/apple-fixes-broken-ipv6-by-breaking-it-some-more.ars%20.%20%5b6http://arstechnica.com/apple/news/2010/11/apple-fixes-broken-ipv6-by-breaking-it-some-more.ars%20.%20%5b6http://arstechnica.com/apple/news/2010/11/apple-fixes-broken-ipv6-by-breaking-it-some-more.ars%20.%20%5b6http://ipv6.com/articles/general/IPv6-The-Future-of-the-Internet.htm%20%5b7http://ipv6.com/articles/general/IPv6-The-Future-of-the-Internet.htm%20%5b7http://ipv6.com/articles/general/IPv6-The-Future-of-the-Internet.htm%20%5b7http://ipv6.com/articles/general/Next-Generation-Networking.htmhttp://ipv6.com/articles/general/Next-Generation-Networking.htmhttp://ipv6.com/articles/general/Next-Generation-Networking.htmhttp://ipv6.com/articles/general/IPv6-The-Future-of-the-Internet.htm%20%5b7http://arstechnica.com/apple/news/2010/11/apple-fixes-broken-ipv6-by-breaking-it-some-more.ars%20.%20%5b6http://arstechnica.com/apple/news/2010/11/apple-fixes-broken-ipv6-by-breaking-it-some-more.ars%20.%20%5b6http://www.us.ntt.net/products/internet-access/ipv6.cfm%5b5http://netacad.net/http://www.zytrax.com/tech/protocols/ipv6.htmlhttp://www.tcpipguide.com/free/t_IPv6DatagramMainHeaderFormat.htm%20%5b2http://netacad.net/
  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    32/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    Appendices

    AH : Authentication header

    ARP :Address Resolution Protcol

    CIDR:Classless Inter-domain routing

    DHCP: Dynamic Host Configuration Protocol

    DoS : Denial of Service

    DNS :Domain Name System

    EUI: Extended Unique Identifier

    IPsec : Internet Protocol Security

    IETF : Internet Enginnering Task force

    ICMP: Internet Control Message Protocol

    IGRP: Interior gateway routing protocol

    MAC: Media Access Control

    MTU: Maximum Transmission Unit

    NAT: Network Address Translation

    OSPF: Open Shortest Path First

    PING: Packet InterNet Groper

    QoS: Quality of Service

    RFC: Request for Comments

    RIPng: Routing information Protcol next generation

  • 8/2/2019 Hssn-2012 Ipv6 Binit Pt0981122

    33/33

    : CE00382-2 Hardware, Software, Systems and Networks II

    RFID : Radio Frequency Identification Device

    TTL : Time to Live

    UDP: User Datagram Protocol

    VoIP: Voice Over Internet Protocol