Title: The Future IP IPv6
1The Future IP (IPv6)
- Bilal Demirci Ilker Acar Okan Topuz
2Agenda
- Why a New IP?
- IPv4 Limitations
- IPv6 Features
- IPv4 to IPv6 What's the difference?
- IPv6 Addressing
- Multicasting in IPv6?
- Neighbor Discovery Auto configuration?
- The future of Mobile IPv6
- IPv6 Security
- IPv6 Transition
3What is Internet Protocol?
- Internet Protocol is a set of technical rules
that defines how computers communicate over a
network. There are currently two versions - IP version 4 (IPv4)
- IP version 6 (IPv6)
4Why a New IP?
- New devices
- Cell phone, PDAs, Cars
- New Users
- Billions of new people (China, India)
- Always-on access
- ADSL, Cable, WI-FI
?
5Why a New IP?
- New devices
- Cell phone, PDAs, Cars
- New Users
- Billions of new people (China, India)
- Always-on access
- ADSL, Cable, WI-FI
6IPv4
- IPv4 was the first version of Internet Protocol.
- IPv4 is 32 bits IP address
- For example 192.168.8.1, 10.3.4.5 or other 32
bits IP addresses. - IPv4 can support up to 232 addresses
7IPv4 Limitations
- The recent exponential growth of the Internet and
Address Space - The need for simpler configuration
- The requirement for security at the IP level
- The need for better support for real-time
delivery of data
8IPv6
- IPv6 is a replacement for IPv4.
- 128 bits IP address
- IPv6 can support up to 2128 addresses to fulfil
future needs with better security and network
related features. -
- 340 trillion unique addresses.
9(No Transcript)
10IPv6 Features
- Large Address Space
- New Header Format
- Lack of a checksum
- Built-in Security
- Autoconfiguration
- Better Support for QoS
- Mobility
11IPv4 to IPv6 Whats the difference?
12IPv6 Addressing
- 128-bit length IP address
- IPv4 addresses are 32 bits where the IPv4
address space contains roughly 4 billion
addresses, IPv6 has enough room for 3.41038
unique addresses. - Notation
- IPv6 addresses are normally written as eight
groups of four hexadecimal digits. - For example, 20010db885a308d313198a2e037073
34 is a valid IPv6 address.
13IPv6 Addressing (contd.)
- Literal IPv6 addresses in URLs
- In a URL the IPv6-Address is enclosed in
brackets. Example - http//20010db885a308d313198a2e03707344/
- This notation allows parsing a URL without
confusing the IPv6 address and port number - https//20010db885a308d313198a2e03707344
443/
14Multicasting in IPv6
- Multicast is communication between a single
sender and multiple receivers on a network. - Together with anycast and unicast, multicast is
one of the packet types in the Internet Protocol
Version 6 (IPv6). -
- There are three types of addresses
- Unicast An identifier for a single interface.
- Anycast An identifier for a set of interfaces
and is delivered to one of the interfaces
identified by that address. - Multicast An identifier for a set of interfaces
and is delivered to all interfaces identified by
that address. - Note -gt There are no broadcast addresses in
IPv6, their function being superseded by
multicast addresses.
15Multicasting in IPv6 (contd)
- In IPv6 multicasting it is possible to send one
packet to multiple receivers by sending to a
special address. - In IPv6 multicast groups have the left most 8
bits set, giving a prefix of ff00/8. - The next 3 bits are not used currently and must
be unset, while the next bit specifies whether
the group is transitory or permanent. - The next 4 bits can be used to specify the scope
of the multicast group. -
- Multicast addresses always start with (xx is the
scope value) - ffxy
- Multicast addresses are split into scopes and
types
16Multicasting in IPv6 (contd)
- ffx1 node-local
- ffx2 link-local
- ffx5 site-local
- ffx8 organization-local
- ffxe global scope
- others are reserved
- By setting the scope, it is possible to limit how
far a packet can go in a far - more reliable way.
- To implement this properly routers must know when
links cross scope - boundaries.
- This is fairly obvious in the cases of node-local
and link-local - scope but for site-local and organization-local,
it requires configuration.
17Multicasting in IPv6 (contd)
- Multicast addresses format
18Multicasting in IPv6 (contd)
- 11111111 at the start of the address identifies
the address as being a multicast address. - The high-order 3 flags are reserved.
- T 0 indicates a permanently-assigned
("well-known") multicast address, assigned by the
global internet numbering authority. - T 1 indicates a non-permanently-assig
ned ("transient") multicast address.
19IPv6 and Auto-configuration
- IPv6 auto-configuration is the automatic
process by which hosts obtain and configure
addresses with greater than link-local scope, a
default route, and other information. - stateless auto-configuration
- stateful auto-configuration
- Combined Stateless and Stateful
-
20IPv6 and auto-configuration (contd)
- Stateless auto-configuration
- Allows an IPv6 host to obtain a unique address
using the IEEE 802 MAC address. - Stateful auto-configuration
- An IPv6 host uses a DHCPv6 server which keeps a
record of the IP address and other configuration
information for the host. - Combined Stateless and Stateful
- Used with the Managed Address Configuration and
Other Stateful - Configuration flags in the ICMPv6 Router
Advertisement messages
21IPv6 and auto-configuration (contd)
In the figure, a router is sending an RA onto an
Ethernet link on the F0/0 interface in response
to RS messages that have been sent by Node E and
Node F, which have apparently both just
initialized their IPv6 interfaces. Node E has
then auto-configured a global-scope address and
has also auto-configured a privacy address (note
the interface MAC address is not embedded in the
privacy address). Node F has auto-configured only
a global-scope address.
22Mobile IPv6
- Mobile IPv6 is a version of Mobile IP - a network
layer IP standard used by electronic devices to
exchange data across a packet-switched
internetwork. Mobile IPv6 allows an IPv6 node to
be mobileto arbitrarily change its location on
an IPv6 networkand still maintain existing
connections. - Goals of IPv6 mobility
- Always on IP connectivity
- Roaming between different L2 technologies WLAN,
WiMAX, GSRP ,?xed - Roaming between different (sub) networks Huge
WLAN deployments mostly use different L3 subnets - Application continuity (Session persistence)
- Static IP Addresses for mobile nodes
- Mobile devices may act as servers
23Mobile IPv6 (contd)
- Even though the mobile node changes locations and
addresses, the existing connections through which
the mobile node is communicating are - maintained.
- Connections to mobile nodes are made with a
specific address that is always assigned to the
mobile node. - Mobile IPv6 provides Transport layer connection
survivability when a node moves from one link to
another by performing address maintenance for
mobile nodes at the Internet layer.
24IPv6 Security
- The IPSEC framework
- A formally defined standard (RFC 2401)
- Contains 6 distinct elements
- Security element for encryption (RFC 2406)
- Security element for authentication (RFC 2402)
- Description of security requirements and
mechanisms on the network layer - Concrete cryptographic algorithms for encryption
and authentication - Definition of Security policy and Security
associations between partners - IPSEC key management
25IPv6 Security (contd)
26IPv6 Security (contd)
- Authentication in IPv6
- Extension Header type 51 provides integrity and
authentication for end to end data -
27IPv6 Security (contd)
- Encryption in IPv6
- Extension Header type 50 provides integrity and
confidentiality -
28IPv6 and Transition Mechanisms
- Transition mechanisms are needed to enable
IPv6-only hosts to reach IPv4 - services and to allow isolated IPv6 hosts and
networks to reach the IPv6 - Internet over the IPv4 infrastructure.
- There are five transition mechanisms
- Dual Stack It is relatively easy to write a
network stack that supports both IPv4 and IPv6
while sharing most of the code. Such an
implementation is called a dual stack - Tunnelling In order to reach the IPv6 Internet,
an isolated host or network must be able to use
the existing IPv4 infrastructure to carry IPv6
packets. This is done using a technique somewhat
misleadingly known as tunnelling which consists
of encapsulating IPv6 packets within IPv4, in
effect using IPv4 as a link layer for IPv6.
29IPv6 and Transition Mechanisms (contd)
- Automatic tunnelling Automatic tunnelling refers
to a technique where the tunnel endpoints are
automatically determined by the routing
infrastructure. - ISATAP This protocol treats the IPv4 network as
a virtual IPv6 local link, with mappings from
each IPv4 address to a link-local IPv6 address. - TEREDO It is an automatic tunnelling technique
that uses UDP encapsulation and is claimed to be
able to cross multiple NAT boxes. - Configured tunnelling Configured tunnelling is a
technique where the tunnel endpoints are
configured explicitly, either by a human operator
or by an automatic service known as a tunnel
broker.
30IPv6 and Transition Mechanisms (contd)
- Proxying and translation When an IPv6-only host
needs to access an IPv4-only service (for example
a web server), some form of translation is
necessary. One form of translation that actually
works is the use of a dual-stack
application-layer proxy, for example a web proxy. - NAT-like techniques for application-agnostic
translation at the lower layers have also been
proposed. Most have been found to be too
unreliable in practice due to the wide range of
functionality required by common
application-layer protocols, and are considered
by many to be obsolete.
31Summary
- IPv6 solves the address depletion problem
- IPv6 solves the international address allocation
problem - IPv6 restores end-to-end communication
- IPv6 uses scoped addresses and address selection
- IPv6 has more efficient forwarding
- IPv6 has built-in security and mobility
32Questions
- Why Do We Need IPv6?
- Do any operating systems already support IPv6?
- What benefits that Mobile IPv6 provides?
33- 1. Why Do We Need IPv6?
- Internet protocol employs a series of hosts that
collaborate to transmit data via the Internet.
Devices connected to a - Network, whether a local area network (LAN) or
the Internet itself, receive Internet protocol
numbersessentially a kind - Of virtual address that uniquely identifies each
device. - In its current form, Internet protocol (IPv4) can
accommodate four billion unique addresses. While
that sounds Substantial, the practical number of
usable addresses is actually much lower. This
restriction is quickly becoming an unacceptable
burden for todays applications. In fact, none of
the information packets transmitted today are
guaranteed to reach their specific destinations
in original condition. To account for that
shortcoming, other protocols are often
simultaneously used to augment the transmission
and ensure data integrity often with limited
success. - IPv6, on the other hand, would support unique
addresses well beyond the trillions, two to the
one-hundred twenty-eighth power. To get a sense
of the actual amount, imagine a three with 39
zeroes behind it. IPv6 will not only eliminate
the shortcomings of IPv4, but unlock new products
and services that were previously unthinkable. - The appeal of an Internet protocol with
essentially limitless addresses is that it will
easily support the inevitable proliferation of
personal wireless devices. Four billion addresses
were once enough because they were intended for
computers alone. Today, and in the years ahead,
there will be dozens, if not hundreds of devices
for each and every potential Internet user. That
explosive growth demands the effectively
incalculable depth of addresses only available
from the improved Internet protocol, IPv6. - 2. Do any operating systems already support IPv6?
- Most major operating systems already support
IPv6, including recently launched Microsoft
Vista, as well as popular business products
including cameras, printers and cell phones. - 3. What happens if there are no routers in a
network? - If there is no router, the interface identifier
is self-sufficient to allow the PC to generate
the link local address. - The link local address is sufficient to allow the
communication between several nodes connected to
the same link (the same local network).
34References
- http//en.wikipedia.org/wiki/IPv6
- http//cisco.com/univercd/cc/td/doc/cisintwk/ito_d
oc/ipv6.htm - IPv6 _at_ Cisco Systems, Patrick Grossetete, Cisco
System inc, 2001 - Understanding IPv6, Joseph Davies, Microsoft,
2003 - IPv6 Essentials, Silvia Hagen,OReilly,2002
35Thank You