The Future IP IPv6 - PowerPoint PPT Presentation

1 / 35
About This Presentation
Title:

The Future IP IPv6

Description:

ADSL, Cable, WI-FI. New devices. Cell phone, PDAs, Cars. New Users ... ADSL, Cable, WI-FI. IPv4 was the first version of Internet Protocol. IPv4 is 32 bits IP address ... – PowerPoint PPT presentation

Number of Views:123
Avg rating:3.0/5.0
Slides: 36
Provided by: okant8
Category:
Tags: future | ipv6

less

Transcript and Presenter's Notes

Title: The Future IP IPv6


1
The Future IP (IPv6)
  • Bilal Demirci Ilker Acar Okan Topuz

2
Agenda
  • Why a New IP?
  • IPv4 Limitations
  • IPv6 Features
  • IPv4 to IPv6 What's the difference?
  • IPv6 Addressing
  • Multicasting in IPv6?
  • Neighbor Discovery Auto configuration?
  • The future of Mobile IPv6
  • IPv6 Security
  • IPv6 Transition

3
What is Internet Protocol?
  • Internet Protocol is a set of technical rules
    that defines how computers communicate over a
    network. There are currently two versions
  • IP version 4 (IPv4)
  • IP version 6 (IPv6)

4
Why a New IP?
  • New devices
  • Cell phone, PDAs, Cars
  • New Users
  • Billions of new people (China, India)
  • Always-on access
  • ADSL, Cable, WI-FI

?
5
Why a New IP?
  • New devices
  • Cell phone, PDAs, Cars
  • New Users
  • Billions of new people (China, India)
  • Always-on access
  • ADSL, Cable, WI-FI

6
IPv4
  • IPv4 was the first version of Internet Protocol.
  • IPv4 is 32 bits IP address
  • For example 192.168.8.1, 10.3.4.5 or other 32
    bits IP addresses.
  • IPv4 can support up to 232 addresses

7
IPv4 Limitations
  • The recent exponential growth of the Internet and
    Address Space
  • The need for simpler configuration
  • The requirement for security at the IP level
  • The need for better support for real-time
    delivery of data

8
IPv6
  • IPv6 is a replacement for IPv4.
  • 128 bits IP address
  • IPv6 can support up to 2128 addresses to fulfil
    future needs with better security and network
    related features.
  • 340 trillion unique addresses.

9
(No Transcript)
10
IPv6 Features
  • Large Address Space
  • New Header Format
  • Lack of a checksum
  • Built-in Security
  • Autoconfiguration
  • Better Support for QoS
  • Mobility

11
IPv4 to IPv6 Whats the difference?
12
IPv6 Addressing
  • 128-bit length IP address
  • IPv4 addresses are 32 bits where the IPv4
    address space contains roughly 4 billion
    addresses, IPv6 has enough room for 3.41038
    unique addresses.
  • Notation
  • IPv6 addresses are normally written as eight
    groups of four hexadecimal digits.
  • For example, 20010db885a308d313198a2e037073
    34 is a valid IPv6 address.

13
IPv6 Addressing (contd.)
  • Literal IPv6 addresses in URLs
  • In a URL the IPv6-Address is enclosed in
    brackets. Example
  • http//20010db885a308d313198a2e03707344/
  • This notation allows parsing a URL without
    confusing the IPv6 address and port number
  • https//20010db885a308d313198a2e03707344
    443/

14
Multicasting in IPv6
  • Multicast is communication between a single
    sender and multiple receivers on a network.
  • Together with anycast and unicast, multicast is
    one of the packet types in the Internet Protocol
    Version 6 (IPv6).
  • There are three types of addresses
  • Unicast An identifier for a single interface.
  • Anycast An identifier for a set of interfaces
    and is delivered to one of the interfaces
    identified by that address.
  • Multicast An identifier for a set of interfaces
    and is delivered to all interfaces identified by
    that address.
  • Note -gt There are no broadcast addresses in
    IPv6, their function being superseded by
    multicast addresses.

15
Multicasting in IPv6 (contd)
  • In IPv6 multicasting it is possible to send one
    packet to multiple receivers by sending to a
    special address.
  • In IPv6 multicast groups have the left most 8
    bits set, giving a prefix of ff00/8.
  • The next 3 bits are not used currently and must
    be unset, while the next bit specifies whether
    the group is transitory or permanent.
  • The next 4 bits can be used to specify the scope
    of the multicast group.
  • Multicast addresses always start with (xx is the
    scope value)
  • ffxy
  • Multicast addresses are split into scopes and
    types

16
Multicasting in IPv6 (contd)
  • ffx1 node-local
  • ffx2 link-local
  • ffx5 site-local
  • ffx8 organization-local
  • ffxe global scope
  • others are reserved
  • By setting the scope, it is possible to limit how
    far a packet can go in a far
  • more reliable way.
  • To implement this properly routers must know when
    links cross scope
  • boundaries.
  • This is fairly obvious in the cases of node-local
    and link-local
  • scope but for site-local and organization-local,
    it requires configuration.

17
Multicasting in IPv6 (contd)
  • Multicast addresses format

18
Multicasting in IPv6 (contd)
  • 11111111 at the start of the address identifies
    the address as being a multicast address.
  • The high-order 3 flags are reserved.
  • T 0 indicates a permanently-assigned
    ("well-known") multicast address, assigned by the
    global internet numbering authority.
  • T 1 indicates a non-permanently-assig
    ned ("transient") multicast address.

19
IPv6 and Auto-configuration
  • IPv6 auto-configuration is the automatic
    process by which hosts obtain and configure
    addresses with greater than link-local scope, a
    default route, and other information.
  • stateless auto-configuration
  • stateful auto-configuration
  • Combined Stateless and Stateful

20
IPv6 and auto-configuration (contd)
  • Stateless auto-configuration
  • Allows an IPv6 host to obtain a unique address
    using the IEEE 802 MAC address.
  • Stateful auto-configuration
  • An IPv6 host uses a DHCPv6 server which keeps a
    record of the IP address and other configuration
    information for the host.
  • Combined Stateless and Stateful
  • Used with the Managed Address Configuration and
    Other Stateful
  • Configuration flags in the ICMPv6 Router
    Advertisement messages

21
IPv6 and auto-configuration (contd)
In the figure, a router is sending an RA onto an
Ethernet link on the F0/0 interface in response
to RS messages that have been sent by Node E and
Node F, which have apparently both just
initialized their IPv6 interfaces. Node E has
then auto-configured a global-scope address and
has also auto-configured a privacy address (note
the interface MAC address is not embedded in the
privacy address). Node F has auto-configured only
a global-scope address.
22
Mobile IPv6
  • Mobile IPv6 is a version of Mobile IP - a network
    layer IP standard used by electronic devices to
    exchange data across a packet-switched
    internetwork. Mobile IPv6 allows an IPv6 node to
    be mobileto arbitrarily change its location on
    an IPv6 networkand still maintain existing
    connections.
  • Goals of IPv6 mobility
  • Always on IP connectivity
  • Roaming between different L2 technologies WLAN,
    WiMAX, GSRP ,?xed
  • Roaming between different (sub) networks Huge
    WLAN deployments mostly use different L3 subnets
  • Application continuity (Session persistence)
  • Static IP Addresses for mobile nodes
  • Mobile devices may act as servers

23
Mobile IPv6 (contd)
  • Even though the mobile node changes locations and
    addresses, the existing connections through which
    the mobile node is communicating are
  • maintained.
  • Connections to mobile nodes are made with a
    specific address that is always assigned to the
    mobile node.
  • Mobile IPv6 provides Transport layer connection
    survivability when a node moves from one link to
    another by performing address maintenance for
    mobile nodes at the Internet layer.

24
IPv6 Security
  • The IPSEC framework
  • A formally defined standard (RFC 2401)
  • Contains 6 distinct elements
  • Security element for encryption (RFC 2406)
  • Security element for authentication (RFC 2402)
  • Description of security requirements and
    mechanisms on the network layer
  • Concrete cryptographic algorithms for encryption
    and authentication
  • Definition of Security policy and Security
    associations between partners
  • IPSEC key management

25
IPv6 Security (contd)
  • The IPSEC FRAMEWORK

26
IPv6 Security (contd)
  • Authentication in IPv6
  • Extension Header type 51 provides integrity and
    authentication for end to end data

27
IPv6 Security (contd)
  • Encryption in IPv6
  • Extension Header type 50 provides integrity and
    confidentiality

28
IPv6 and Transition Mechanisms
  • Transition mechanisms are needed to enable
    IPv6-only hosts to reach IPv4
  • services and to allow isolated IPv6 hosts and
    networks to reach the IPv6
  • Internet over the IPv4 infrastructure.
  • There are five transition mechanisms
  • Dual Stack It is relatively easy to write a
    network stack that supports both IPv4 and IPv6
    while sharing most of the code. Such an
    implementation is called a dual stack
  • Tunnelling In order to reach the IPv6 Internet,
    an isolated host or network must be able to use
    the existing IPv4 infrastructure to carry IPv6
    packets. This is done using a technique somewhat
    misleadingly known as tunnelling which consists
    of encapsulating IPv6 packets within IPv4, in
    effect using IPv4 as a link layer for IPv6.

29
IPv6 and Transition Mechanisms (contd)
  • Automatic tunnelling Automatic tunnelling refers
    to a technique where the tunnel endpoints are
    automatically determined by the routing
    infrastructure.
  • ISATAP This protocol treats the IPv4 network as
    a virtual IPv6 local link, with mappings from
    each IPv4 address to a link-local IPv6 address.
  • TEREDO It is an automatic tunnelling technique
    that uses UDP encapsulation and is claimed to be
    able to cross multiple NAT boxes.
  • Configured tunnelling Configured tunnelling is a
    technique where the tunnel endpoints are
    configured explicitly, either by a human operator
    or by an automatic service known as a tunnel
    broker.

30
IPv6 and Transition Mechanisms (contd)
  • Proxying and translation When an IPv6-only host
    needs to access an IPv4-only service (for example
    a web server), some form of translation is
    necessary. One form of translation that actually
    works is the use of a dual-stack
    application-layer proxy, for example a web proxy.
  • NAT-like techniques for application-agnostic
    translation at the lower layers have also been
    proposed. Most have been found to be too
    unreliable in practice due to the wide range of
    functionality required by common
    application-layer protocols, and are considered
    by many to be obsolete.

31
Summary
  • IPv6 solves the address depletion problem
  • IPv6 solves the international address allocation
    problem
  • IPv6 restores end-to-end communication
  • IPv6 uses scoped addresses and address selection
  • IPv6 has more efficient forwarding
  • IPv6 has built-in security and mobility

32
Questions
  • Why Do We Need IPv6?
  • Do any operating systems already support IPv6?
  • What benefits that Mobile IPv6 provides?

33
  • 1. Why Do We Need IPv6?
  • Internet protocol employs a series of hosts that
    collaborate to transmit data via the Internet.
    Devices connected to a
  • Network, whether a local area network (LAN) or
    the Internet itself, receive Internet protocol
    numbersessentially a kind
  • Of virtual address that uniquely identifies each
    device.
  • In its current form, Internet protocol (IPv4) can
    accommodate four billion unique addresses. While
    that sounds Substantial, the practical number of
    usable addresses is actually much lower. This
    restriction is quickly becoming an unacceptable
    burden for todays applications. In fact, none of
    the information packets transmitted today are
    guaranteed to reach their specific destinations
    in original condition. To account for that
    shortcoming, other protocols are often
    simultaneously used to augment the transmission
    and ensure data integrity often with limited
    success.
  • IPv6, on the other hand, would support unique
    addresses well beyond the trillions, two to the
    one-hundred twenty-eighth power. To get a sense
    of the actual amount, imagine a three with 39
    zeroes behind it. IPv6 will not only eliminate
    the shortcomings of IPv4, but unlock new products
    and services that were previously unthinkable.
  • The appeal of an Internet protocol with
    essentially limitless addresses is that it will
    easily support the inevitable proliferation of
    personal wireless devices. Four billion addresses
    were once enough because they were intended for
    computers alone. Today, and in the years ahead,
    there will be dozens, if not hundreds of devices
    for each and every potential Internet user. That
    explosive growth demands the effectively
    incalculable depth of addresses only available
    from the improved Internet protocol, IPv6.
  • 2. Do any operating systems already support IPv6?
  • Most major operating systems already support
    IPv6, including recently launched Microsoft
    Vista, as well as popular business products
    including cameras, printers and cell phones.
  • 3. What happens if there are no routers in a
    network?
  • If there is no router, the interface identifier
    is self-sufficient to allow the PC to generate
    the link local address.
  • The link local address is sufficient to allow the
    communication between several nodes connected to
    the same link (the same local network).

34
References
  • http//en.wikipedia.org/wiki/IPv6
  • http//cisco.com/univercd/cc/td/doc/cisintwk/ito_d
    oc/ipv6.htm
  • IPv6 _at_ Cisco Systems, Patrick Grossetete, Cisco
    System inc, 2001
  • Understanding IPv6, Joseph Davies, Microsoft,
    2003
  • IPv6 Essentials, Silvia Hagen,OReilly,2002

35
Thank You
Write a Comment
User Comments (0)
About PowerShow.com