Vous êtes sur la page 1sur 33

: CE00382-2 Hardware, Software, Systems and Networks II

CE00382-2 Hardware, Software, Systems and Networks II

Internet Protocol version 6


Hand-in Date Hand-out date 14th February 2012 10th April 2012

Submitted By Binit Kumar PT0981122

Submitted To Mrs.Shakti Arora (Module Lecturer)

Internet Protocol version 6

Page 1

: CE00382-2 Hardware, Software, Systems and Networks II


Assessment Criteria

Research and Investigation Documentation Presentation Critical Analysis Citation and Referencing Product TOTAL

20 % 10 % 20 % 20 % 10 % 20 % 100 %

: CE00382-2 Hardware, Software, Systems and Networks II


Contents
Gantt Chart ..................................................................................................................................... 5 Introduction ..................................................................................................................................... 6 Description of IPv6 ......................................................................................................................... 7 IPv6 Address Representation ...................................................................................................... 8 Core Component of IPv6 and its Working ................................................................................... 10 IPv6 Header ............................................................................................................................... 10 Extension Headers ..................................................................................................................... 11 Routing .................................................................................................................................. 11 Fragment ................................................................................................................................ 11 Authentication ....................................................................................................................... 12 Encapsulating......................................................................................................................... 12 Destination options ................................................................................................................ 12 Hop by hop ............................................................................................................................ 12 ICMPv6 ..................................................................................................................................... 13 IPv6 Address Management ....................................................................................................... 15 IPv6 Transition Strategies ......................................................................................................... 16 Strength of IP v6 ........................................................................................................................... 18 Weakness of IPv6 ......................................................................................................................... 20 Network Management ................................................................................................................... 21 Security ......................................................................................................................................... 24 IPv6 and multimedia Devices ....................................................................................................... 25 Conclusion .................................................................................................................................... 29 References ..................................................................................................................................... 30 Appendices .................................................................................................................................... 32

: CE00382-2 Hardware, Software, Systems and Networks II

: CE00382-2 Hardware, Software, Systems and Networks II


Gantt Chart

: CE00382-2 Hardware, Software, Systems and Networks II


Introduction

Internet Protocol version 6 (IPv6) is the addressing scheme as IPv4 required but the packets to specify the source and destination address. Each host on the internet requires an IP address in order to communicate. IPv4 was developed by IETF to deal with the problems associated with IPv4.It is basically an internet-layer protocol for packet-switched internetworking provides end to end datagram transmission. It uses 128 bit address i.e.2128 , (approximately 3.41038) addresses. The general Format of IPv6 is 8 blocks of 16 bits which is written in hexadecimal. 3ffe:2a00:100:7020:0:0:dead:beef 2001:700:700:1:0:0:0:2 It eliminates the need of NAT which is an effort to alleviate IPv4 address exhaustion. In additional features it has stateless address auto configuration, network renumbering and router announcement The Ipv6 subnet size has been standardized by fixing the size of the host identifier portion of an address to 64 bits to facilitate an automatic mechanism for forming the host identifier from MAC address. Network security is integrated into the design of IPv6, including the option of IPsec. For networking traffic, the quality refers to data loss, latency (jitter) or bandwidth. In order to implement QOS marking, IPv6 provides a traffic-class field (8 bits) in the IPv6 header. It also has a 20-bit flow label. But the deployment of this protocol is difficult migrating from IPv4.The Internet Society is taking the lead in organizing world IPv6 Launch on June 6, 2012 i.e. world IPv6 day Google, Yahoo, Bing, Facebook and Cisco will enable IPv6 for real. The elimination of NAT, the enabling of peer-to-peer communication, the emergence of numerous new applications and the connection of billions of new devices are all advantages associated with IPv6.

: CE00382-2 Hardware, Software, Systems and Networks II


Description of IPv6

IPv6 is within the protocol suite TCP/IP which is connectionless network layer protocol. Previously it was also known as IPng or IP next Generation. The design of IPv6 is greatly influenced by IPv4. Properties of IPv6: Simple Header Format Flow labelling The support for extensions and options has been improved Authentication and Security Extensions The size of the IP address is increased to 128 bits. Simpler auto configuration of IP address Multicast routing has been improved by adding a scope field to the multicast addresses Any cast addressing has been added

340,282,366,920,938,463,463,374,607,431,768,211,456 There are so many IPv6 addresses available that many trillions of addresses could be assigned to every human being on the planet .There are approximately 665,570,793,348,866,943,898,599 addresses per square meter of the surface of the planet Earth.

Enhanced IP addressing and features:

Global Reachability and flexibility Aggregation Multihoming Auto configuration Plug and Play End-to-end without NAT Renumbering

: CE00382-2 Hardware, Software, Systems and Networks II


Mobile and Security Mobile IP RFC-compliant IPsec mandatory (or native ) for IPv6

Simple Header

Routing efficiency Performance scalability No broadcasts No Checksums Extension headers Flow labels and forwarding rate

Transition Richness:

Dual-Stack 6to4 and manual tunnels Translation

IPv6 Address Representation

IPv6 Format 16-bit hexadecimal field Case insensitive for hexadecimal A,B,C,D,E and F Leading Zeros in a field are optional Successive Fields of zeros can be represented as :: only once per address Example 2043:0000:140F:0000:0000:09C0:876A:128B o Can be represented as 2043:0:140f::09c0:876a:128b FF01:0:0:0:0:0:0:1 is 0:0:0:0:0:0:0:1 0:0:0:0:0:0:0:0 is is FF01::1 ::1 ::

: CE00382-2 Hardware, Software, Systems and Networks II


IPv6 is further divided into different categories:

Reserved Address Private Address Loopback Address Unspecified address

Reserved Address - The IETF reserves 1/256th of the total IPv6 address block for various use both present and future. Private Address Address related to local access to a particular link and never routed outside a particular enterprise network .The first octet value of FE in hexadecimal notation, with the next hexadecimal digit being a value from 8 to F. e.g. FEC, FED .FEE. These addresses are further classified as site- local addresses (C to F) and link-local address (8 to B). Loopback Address In IPv6 there is just one address , not a whole block like in IPv4 , the address is 0:0:0:0:0:0:0:1 also expressed as ::1. Unspecified Address- the all zero address (::) . Its is typically used in the source field of a datagram that is sent by a device that seeks to have its IP address configured.

Subnets and IP classification[1]

: CE00382-2 Hardware, Software, Systems and Networks II


Core Component of IPv6 and its Working

IPv6 Header
IPv6 packet consists of two main parts header and the payload .IPv6 header occupies fixed size of 40 bytes. From these 40 bytes, 32 bytes are given to source and destination IP addresses, so compared to IPv4 the header is very clean and small, another advantage with IPv6 header is its fixed size. With Fixed offset , router speed substantially increase.

IPv6 Header format [2] Version : Version 6 (4bits) Traffic class : (8bits) Differentiate between traffic class and prioritization Flow Label: (20 bits) Distinguishes packets that require same treatment Payload length: (2byte) length of data after IP header Next header : (1 byte) like protocol in IPv4 Hop Limit : (1byte) like TTL Source Address (16 bytes) Destination Address(16 bytes)

: CE00382-2 Hardware, Software, Systems and Networks II


Extension Headers

Extension header [3] In IPv6, optional internet-layer information is encoded in separate headers that may be placed between the IPv6 header and the upper- layer header in a packet. Distinct value is assigned to each header may carry one or more Extension headers are not examined or processed by any node along a packet's delivery path, until the packet reaches the node (or each of the set of nodes, in the case of multicast) identified in the Destination Address field of the IPv6 header. Extension headers must be processed strictly in the order they appear in the packet. The main extension headers we will discuss are: Routing The Routing header is used by an IPv6 source to list one or more intermediate nodes to be "visited" on the way to a packet's destination. A Routing header is not examined or processed until it reaches the node identified in the Destination Address field of the IPv6 header. Fragment The Fragment header is used by an IPv6 source to send a packet larger than would fit in the path MTU to its destination. For every packet that is to be fragmented, the source node generates an Identification value. If a Routing

: CE00382-2 Hardware, Software, Systems and Networks II


header is present, the Destination Address of concern is that of the final destination. At the destination, fragment packets are reassembled into their original, un fragmented sizes. Authentication "IPng Authentication Header", is an extension header, which provides authentication and integrity (without confidentiality) to IPng datagrams. The receiver of a packet can be sure who sent it, unlike in IPv4 in which no guarantee is present. The payload of the authenticated packet is sent unencrypted. The extension is algorithm- independent and will support many different authentication techniques. Encapsulating "IPng Encapsulating Security Header" - This mechanism provides integrity and confidentiality to IPv6 datagrams using encrypted security payload extension headers. It is simpler than some similar security protocols (e.g., SP3D, ISO NLSP) but remains flexible and algorithm-independent.

Destination options The Destination Options header is used to carry optional information that need be examined only by a packet's destination nodes. Optional destination information could also be encoded as a separate extension header.

Hop by hop

Information must be examined and processed by every node along a packet's delivery path, including the source and destination nodes. The Hop-by-Hop Options header, when present, must immediately follow the IPv6 header and its presence is indicated by the value zero in the Next Header field of the IPv6 header.

: CE00382-2 Hardware, Software, Systems and Networks II


ICMPv6
The internet control message protocol version 6 (ICMPv6) is a new version of the ICM protocol that forms an integral part of IPv6 architecture. It is transported within packets and extended header It is subdivided into ICMP, ARP(address resolution protocol) and IGMP ( internet group member ship protocol version 3). This multitasking protocol used for error reporting in packet processing, diagnostic activities ,neighbour discovery process and IPv6 multicast membership reporting

The 8-bit type field indicates the type of the message .If the high order has value zero (range 1 to 127),it indicates an error message; if the high-order bit has value 1 ( range from 128 to 255),it indicate an information message ICMPv6 Message types Type 1 2 3 4 128 129 130 131 132 133 134 135 Meaning Destination Unreachable Packet Too Big Time Exceeded Parameter problem Echo Request Echo Reply Group Membership Query Group Membership Report Group Membership Reduction Router Solictation Router Advertisement Neighbour Solicitation

: CE00382-2 Hardware, Software, Systems and Networks II


136 137 138 Neighbour Advertisement Redirect Router Renumbering

ICMPv6 Advantages : If wrong IP address is used for configuring client to DNS server and ICMP message is sent by the destination device indication the error Error reported if the router undertaking the fragmentation of the packet if program doesnot allow fragmentation for communication Router responds in the form of an ICMP message to other router if best route is with the router and provides a better route . Router cannot decrement the TTL(time to live) value from 1 ,here ICMP message to indicate the expiry of the packet . The ICMPv6 provide testing and diagnostics services like ICMP echo is used by Internet Protocol Packet Internet Gopher(PING) utility. Trace router utility gets to know the IP address of the first router through ICMP message as echo reply is sent by the router when TTL value decremented to 1 and this manner router manages its table. Utility Commands : ping ::1/128 ( checking the localhost n functioning of NIC)

tracert www.apiit.edu.in ( in windows machine )

: CE00382-2 Hardware, Software, Systems and Networks II


IPv6 Address Management

IPv6 use interface identifiers to identify interfaces on a link. Think if them as the host portion of an IPv6 address. Interface identifiers are required to be unique on a specific link. Interface identifiers are always 64 bits and ca n be dynamically derived from a layer 2 address (MAC). We can assign an IPv6 address ID statically or dynamically: Static assignment using a manual interface ID

Command :

RouterX(config-if)#ipv6 address 2001:DB8:2222:7272::72/64

Static assignment using EUI-64 interface ID Command : RouterX(config-if)#ipv6 address 2001:DB8:2222:7272::/64 eui-64

Stateless auto configuration The auto configuration mechanism was introduced to enable plug and play networking of the devices to help reduce administration overhead.

DHCP for IPv6 (DHCPv6) DHCPv6 enables DHCP servers to pass configuration parameters, such as IPv6 network addresses to IPv6 nodes. It offers the capability of automatic allocation of reusable network address and additional configuration flexibility.

: CE00382-2 Hardware, Software, Systems and Networks II


IPv6 Transition Strategies

The transition from IPv4 doesnt required upgrades of all nodes at the same time but these mechanisms provide smooth integration between IPv4 and IPv6 and allow communication between different versions. The two most commons techniques we use are Dual Stacking: This is an integration method in which node has implementation and connectivity to both versions at the same time Routers and Switches are configures to support both protocols, with IPv6 preferred protocol. A dual-stack node chooses which stack to use based on the destination address of the packet.

Dual Stacking IPv4 and IPv6[4]

Tunnelling: Manual IPv6-over-IPv4 tunnelling : Ipv6 packet is encapsulated within the IPv4 protocol

: CE00382-2 Hardware, Software, Systems and Networks II


Dynamic 6 to 4 tunnelling are two methods: dynamically applies a valid, unique IPv6 prefix to each IPv6 island.

Three types of transition [5]

: CE00382-2 Hardware, Software, Systems and Networks II


Strength of IP v6
Larger address space

Better header format

New Options

Allowance for extension

Support for resource allocation

Support for more security

1. More Efficient Routing

IPv6 reduces the size of routing tables and makes routing more efficient and hierarchical. IPv6 allows ISPs to aggregate the prefixes of their customers' networks into a single prefix and announce this one prefix to the IPv6 Internet. In addition, in IPv6 networks, fragmentation is handled by the source device, rather than the router, using a protocol for discovery of the path's maximum transmission unit (MTU).

2. More Efficient Packet Processing

IPv6's simplified packet header makes packet processing more efficient. Compared with IPv4, IPv6 contains no IP-level checksum, so the checksum does not need to be recalculated at every router hop. Getting rid of the IP-level checksum was possible because most link-layer technologies already contain checksum and error-control capabilities. In addition, most transport layers, which handle end-to-end connectivity, have a checksum that enables error detection.

: CE00382-2 Hardware, Software, Systems and Networks II


3. Directed Data Flow

IPv6 supports multicast rather than broadcast. Multicast allows bandwidth-intensive packet flows (like multimedia streams) to be sent to multiple destinations simultaneously, saving network bandwidth. Disinterested hosts no longer must process broadcast packets. In addition, the IPv6 header has a new field, named Flow Label, that can identify packets belonging to the same flow.

4. Simplified Network Configuration

Address auto-configuration (address assignment) is built in to IPv6. A router will send the prefix of the local link in its router advertisements. A host can generate its own IP address by appending its link-layer (MAC) address, converted into Extended Universal Identifier (EUI) 64bit format, to the 64 bits of the local link prefix.

5. Support For New Services

By eliminating Network Address Translation (NAT), true end-to-end connectivity at the IP layer is restored, enabling new and valuable services. Peer-to-peer networks are easier to create and maintain, and services such as VoIP and Quality of Service (QoS) become more robust.

6. Security IPSec, which provides confidentiality, authentication and data integrity, is baked into in IPv6. Because of their potential to carry malware, IPv4 ICMP packets are often blocked by corporate firewalls, but ICMPv6, the implementation of the Internet Control Message Protocol for IPv6, may be permitted because IPSec can be applied to the ICMPv6 packets.

: CE00382-2 Hardware, Software, Systems and Networks II


Weakness of IPv6

Security Flaws listed

IPv4 domain and IPv6 domain[6] The disadvantages: Currently there is no support to LVS in the Linux Kernel. You need to port applications to IPv6 You need tunnels when working against IPv4 machines Transition is a complex task result in more computation and bandwidth misuse Less network management support can be lead to default settings Its deployment time is too huge, One year is extended from last of 8th July for global testing. New to the developers and network administrators, so need a lots of supports and training all over the world.

: CE00382-2 Hardware, Software, Systems and Networks II


Network Management

Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems.IPv6 relates with network management as its used with the routing and IP datagram, routing protocols (RIPng , EIGRPv6, OSPFv3), network configuration and addressing of the internetworking devices. Network Management have 5 subparts -

Configuration Accounting Performance Fault Security

Configuration
Routing Configuration: Enabling IPv6 on a router starts it control plane. IPv6 address size, multiple IPv6 node address, IPv6 routing protocols and routing table size are basic process in control plane. Another is data plane forward the relevant IP packets and does lookup to match the policies with control plane. Control Plane IPv6 address Size Multiple Ipv6 node Addresses Ipv6 Routing Protocols Routing table size Data Plane Parsing IPv6 Extension Headers IPv6 Address Lookup

: CE00382-2 Hardware, Software, Systems and Networks II


RIPng (routing information protocol next generation) is a distance vector routing protocol provides a simple way to bring up IPv6. It uses split horizon and poison reverse update and limit of 15 hops to prevent routing loops. The updates are send to the neighbouring router exchange local message does not require global knowledge of network. RIPng features: Distance vector, radius of 15 hops ,split horizon and poison reverse Based on RIPv2 (IPv4) IPv6 prefix, next-hop IPv6 address Uses the multicast group FF02::9, the all rip router multicast group Sends update on UDP port 521 Support by Cisco IOS release 12.2 and late

EIGRPv6 works as a advanced distance vector protocol that has some link-state features. The neighbour discovery process using hellos still happens, and its still provides reliable communication with reliable transport that gives us loop-free convergence using the diffusing update algorithm (DUAL). OSPFv6 a link state routing protocol that divides an entire internetworks or autonomous system into area , making a hierarchy, In version 3 ,RID, area ID and link-state ID which are all still 32bit values are not found because IPv6 address is 128 bits . Removal of IP address information from OSPF packet header makes the new version of OSPF capable of being routed over almost any Network Layer protocol. IPv6 Autoconfiguration An important feature of IPv6 that it does not require and human

intervention and allows plug and play option allow mobile devices. Stateful-Autoconfiguration : requires some human intervention as it makes use (DHCPv6) for installation and administration of nodes over a network Stateless-Autoconfiguration: It makes use of the IEEE EUI-64 standard to define the network ID portion of the address suitable. It allows each host to determine its address from the contents of received user advertisements.

: CE00382-2 Hardware, Software, Systems and Networks II


DHCPv6 The dynamic host configuration is made possible with the automatic assignment of IP addresses, default gateway, subnet masks and other IP parameters. A DHCP configured node sends a broadcast query to the DHCP server requesting for necessary information. Upon receipt of a valid request, the DHCP server assigns an IP address from its pool of IP addresses and other TCP/IP configuration parameters such as the default gateway and subnet mask. DHCP allocates IP addresses to the network devices in three different modes: dynamic mode, automatic mode and manual mode.

Accounting

There are extensions that instrument RADIUS accounting client functions. These extensions represent a portion of the Management Information Base (MIB) for use with network management protocols .Using these extensions, IP-based management stations can manage RADIUS accounting clients.

Performance
IPv6 will be installed on 400 giants company on 8th July ,2012 of IT field for measuring performance , but on experimenting its give performance similar to IPv4 with the additional overhead of NAT and network administration and excellent plug and play facility.

Fault
In the proposed approach, if a failure is detected in the home agent (HA) of a mobile node, a preferable survival HA is selected to continuously serve the mobile node. The preferable survival HA is the HA that does not incur failure and is neighbouring the current location of the mobile node. The proposed approach is based on the preference of each mobile node to achieve the fault tolerance of the HA

: CE00382-2 Hardware, Software, Systems and Networks II


Security
Security in IPv6 is from IPsec, Authentication header, Encrypted security payload, key management, private virtual network, application level security and routing security IPsec IPSec is to provide interoperable, high quality, cryptographically-based security for IPv4 and IPv6. It offers various security services at the IP layer and therefore, offers protection at this (i.e. IP) and higher layers. IPsec is a mandatory component for IPv6, and therefore, the IPsec security model is required to be supported for all IPv6 implementations in near future. In IPv6, IPsec is implemented using the AH authentication header and the ESP extension header The security services are access control, connectionless integrity, data origin authentication, protection against replays (a form of partial sequence integrity), confidentiality (encryption), and limited traffic flow confidentiality.

Security at every layer [7]

: CE00382-2 Hardware, Software, Systems and Networks II


IPv6 and multimedia Devices
Each device has its own global IP address and NAT is no longer required, peer-to-peer communication will become much easier. Two way applications such as IP telephony ,video conferencing and gaming will much simpler to develop .routing table will become far less complex ,which enable higher performance for internet traffic and allows various multimedia and other device to connect. VoIP (voice over internet protocol) is a telephony that sends conversations in packets over internet. IPv6 proved QoS to telephony with carrier-grade service level and ensure reliable VoIP infrastructure. Skype and IP PBX will revolutionize the telecommunication industry in personal and enterprise level. Sensor networks are also applied with ad-hoc deployment, auto-configuration, mobility and security. Various applications such as inventory disaster management can work on full potential by establishing connectivity with internet Biosensors and RFID can be easily integrated with IPv6. RFID can also be easily integrated with IPv6 and work remotely with real time tracking .Its a device that helps monitoring of biological change can revolutionize the medical Industry. IMS ( IP Multimedia Subsystem) specifies the QoS within IP network allows implementation of various applications e.g. Push to talk over Cellular (PoC), Multiple and simultaneous Ringing/find-me, follow-me, Multimedia Push, Push Ringtone, real Time video sharing , interactive gaming ,shared folders , voice messaging conferencing messaging service ,media ,instant ,video streaming

,enhanced policy controller etc. Different components in future [8]

: CE00382-2 Hardware, Software, Systems and Networks II


IPv4 and IPv6
IPv4
Addresses are 32 bits (4 bytes) in length. length Address (A) resource records in DNS to map host names to IPv4 addresses. Address (AAAA) resource records in DNS to map host names to IPv6 addresses. IPSec is optional and should be supported externally Header does not identify packet flow for QoS handling by routers Header contains Flow Label field, which Identifies packet flow for QoS handling by router. Both routers and the sending host Routers packets Header includes a checksum. Header includes options. <-> Header does not include a checksum. Optional data is supported as extension headers. ARP uses broadcast ARP request to resolve IP to MAC/Hardware address. Multicast addresses. Internet (IGMP) Group manages Management membership Protocol in local Multicast Listener Discovery (MLD) Neighbour Solicitation do not support packet IPSec support is not optional

IPv6
Addresses are 128 bits (16 bytes) in

fragment packets.

fragmentation. Sending host fragments

messages resolve IP addresses to MAC

messages manage membership in local subnet groups. IPv6 uses a link-local scope all-nodes multicast address.

subnet groups. Broadcast addresses are used to send traffic to all nodes on a subnet. Configured DHCP. Must support a 576-byte packet size either manually or through

Does not require manual configuration or DHCP. Must support a 1280-byte packet size (without fragmentation).

(possibly fragmented).

: CE00382-2 Hardware, Software, Systems and Networks II


Demonstration of IPv6 in Packet Tracer 5.3
IPv6 auto configuration

Enabling the IPv6 global unicast-routing on both interfaces fa0/0 n fa0/1 of the router IPv6 . Providing address 2001:470:1:1::1/64 in fa0/0 and link-local address FE80::1 for both of the computers. The auto configuration mechanism was introduced to enable plug and play networking of the devices to help reduce administration overhead.
Interface /Device Fa0/0 (Router) Fa0/1 (Router) PC0 PC1 IPv6 address 2001:470:1:1::1/64 2001:471:1:1::1/64 2001:470:1:1:201:97FF:FE98:6CED/64 Address Assigned in router Assigned in router Auto-configured random address

2001:471:1:1:2D0:BAFF:FE22:8A68/64 Auto-configured random address

Result : New IPv6 address are auto-assigned to the device and new connecting device enable plug n play and less network overhead

: CE00382-2 Hardware, Software, Systems and Networks II


RIPng configuration between different network

By Enabling IPv6 unicastrouting at the interface on Fa0/1 and Fa0/0 interface of routerA and routerB respectively. To determine the different network and there network address , here both router is using common RIPng technique names as ciscorip. To enable RIPng at the interface we used <ipv6 rip ciscorip enable> command. All the gateway are assigned in the LAN for default path and interfaces are activates for unicast-routing . /48 to /64 is common subnet prefix and upper and lower limit used .
Interface/Device Server-PT PC-PT Fa0/1 routerA Fa0/0 routerB Fa0/0 routerA Fa0/1 routerB IPv6 Address FFe:001::10/48 FF:002::10/48 FF:001::1/48 FF:002::1/48 2001:410:1:10::2/64 2001:410:1:10:1/65 Address LAN assigned address LAN assigned address Default Gateway Default Gateway Assigned Assigned

Result : Successful transmission between different network with different subnet mask using RIPng in router

: CE00382-2 Hardware, Software, Systems and Networks II


Conclusion

IPv6 is excellent addressing scheme with unending address with following the path of IPv4 in terms of reliability and scalability. With the Fixed size of packet and extension header techniques, its allow better handling of configuration in different path and just perfect in the scenario based on the exact requirement. The new feature of autoconfig make it portable with plug n play support can be used anywhere from mobile to multimedia device , medical industry to RFIDs. Also , its reduces the overhead of network administration along with fulfilling requirement and other administration parameters. IPv6 is finally going to implement with 400 major companies of IT ,like Google ,Microsoft ,Cisco etc on 8th July 2012 . This will be a major day in the field of networking as all the working and methodology will change gradually but surely. All the hardware as well as software device needs it support , installation and compatibility . All the user can a unique IP identification in the modern world as even a Fridge now require IP to connect to the internet .

: CE00382-2 Hardware, Software, Systems and Networks II


References
Books Behrouz A Forouzan. (2009). Network Layer. In: Sophia Chung Fegan Data Communication and Networking. 4th Ed. New Delhi: Tata McGraw-Hill Publishing Company Limited. p579 - 607.

Pat Warner. (2001). Router Table. In: The Router Book: A Complete Guide to the Machine and its Accessories . Newtown: The Taunton Press. p84 - 100. Websites 1 . Joe Davies. (2011). Introduction to IPv6. Available: http://technet.microsoft.com/enus/library/bb726944.aspx. [ Last accessed 18th Feb 2012]. Iljitsch van Beijnum. (2012). World IPv6 Launch: this time it's for real.Available: http://arstechnica.com/business/news/2012/01/world-ipv6-launch-this-time-its-for-real.ars. [Last accessed 24th Feb 2012.] Anonymous. (2011). Private IPv6 address range. Available:

http://www.simpledns.com/private-ipv6.aspx. [ Last accessed 28th Feb ] Jenn-Wei Lin. (2012). Fault Tolerance. Available:

http://dl.acm.org/citation.cfm?id=1596026 . [Last accessed 01th March ] Martin Levy . ( 2011). Six Benefits of IPv6. Available:

http://www.networkcomputing.com/ipv6/230500009. [Last accessed 08th March ] D. Nelson. (2012). RADIUS Accounting Client MIB for IPv6 . Available:

http://tools.ietf.org/html/rfc4670.

Last accessed 15th March 2012.

: CE00382-2 Hardware, Software, Systems and Networks II


Citation
http://netacad.net CCNA exploration [1] http://www.tcpipguide.com/free/t_IPv6DatagramMainHeaderFormat.htm [2] http://www.zytrax.com/tech/protocols/ipv6.html [3] http://netacad.net CCNA exploration 4 -7.3.4.1[4] http://www.us.ntt.net/products/internet-access/ipv6.cfm[5] http://arstechnica.com/apple/news/2010/11/apple-fixes-broken-ipv6-by-breaking-it-somemore.ars . [6] http://ipv6.com/articles/general/IPv6-The-Future-of-the-Internet.htm [7] http://ipv6.com/articles/general/Next-Generation-Networking.htm [8]

: CE00382-2 Hardware, Software, Systems and Networks II


Appendices

AH : Authentication header ARP :Address Resolution Protcol CIDR:Classless Inter-domain routing DHCP: Dynamic Host Configuration Protocol DoS : Denial of Service DNS :Domain Name System EUI: Extended Unique Identifier IPsec : Internet Protocol Security IETF : Internet Enginnering Task force ICMP: Internet Control Message Protocol IGRP: Interior gateway routing protocol MAC: Media Access Control MTU: Maximum Transmission Unit NAT: Network Address Translation OSPF: Open Shortest Path First PING: Packet InterNet Groper QoS: Quality of Service RFC: Request for Comments RIPng: Routing information Protcol next generation

: CE00382-2 Hardware, Software, Systems and Networks II


RFID : Radio Frequency Identification Device TTL : Time to Live UDP: User Datagram Protocol VoIP: Voice Over Internet Protocol

Vous aimerez peut-être aussi