You are on page 1of 64

Next Generation: IPv6

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

CONTENTS
IPv6 IPv6 ADDRESSES IPv6 PACKET FORMAT TRANSITION FROM IPv4 TO IPv6

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

IPv6
Larger Address Space Better Header Format New Options Allowance for Extension Support for Resource Allocation Support for More Security

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

IPv6 ADDRESSES

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

IPv6 address

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Abbreviated address

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Abbreviated address with consecutive zeros

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Address structure

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Categories of Addresses

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Provider-based address

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Address hierarchy

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Reserved addresses

Addresses that use the reserved prefix (00000000) can be Unspecified address Loopback address Compatible address (for IPv4) Mapped address (for IPv4)

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Unspecified address

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Loopback address

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Compatible address
It is used when a computer using IPv6 wants to send a message to another computer using IPv6. However, suppose the packet passes through a region where the network is still using IPv4

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Mapped address
It is used when a computer that has migrated to IPv6 wants to send a packet to a computer still using IPv4

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Link local address


These addresses are used if a LAN uses the Internet protocols but is not connected to the Internet for security reasons. The Link Local Address is used in an isolated network and does not have a global effect.

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Site local address


These addresses are used if a site with several networks uses the Internet protocols but is not connected to the Internet, also for security reasons. The Site Local Address is used in isolated networks and does not have a global effect.

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Multicast address

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

IPv6 PACKET FORMAT

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

IPv6 datagram

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Format of an IPv6 datagram

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Extension header format

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Extension header types

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

1. Hop-by-hop option
This option is used when the source needs to pass information to all routers visited by the datagram. For example, perhaps routers must be informed to all certain management, debugging or control functions. If the length of the datagram is more than usual 65535 bytes, routers must have this information.

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Hop-by-hop option header format

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

The format of options in a hop-by-hop option header

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Pad 1

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Pad N

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Jumbo payload

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

2. Source routing
The source routing extension header combines the concepts of the strict source route and the loose source route options of IP4

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Source routing

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Source routing example

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

3. Fragmentation
The concept of fragmentation is the same as that in IPv4. However, In IP4 the source or a router is required to fragment it the size of the datagram is larger that the MTU of the network over with datagram travels. In IPv6, Only the original source can fragment. A source must use a Path MTU Discovery technique to find the smallest MTU supported by any network on the path. The source than fragments using this knowledge.

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Fragmentation

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

4. Authentication
The authentication extension header has a dual purpose: it validates the message sender the ensures the integrity of data. The former is needed so the receiver can be sure that the data is not altered in transition by some hacker.

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Authentication

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Calculation of authentication data

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

5. Encrypted security payload


The encrypted security payload (ESP) is an extension that provides confidentiality and guards against eavesdropping. Encryption can be implemented in two ways : 1. Transport mode 2. Tunnel mode

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Encrypted security payload

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Transport mode encryption


In this mode, a TCP segment or a UDP user datagram is first encrypted and then encapsulated in an IPv6 packet. The transport mode of encryption is used mostly to encrypt data from host to host

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Tunnel-mode encryption
In this mode, the entire IP datagram with its base header and extension headers is encrypted and then encapsulated in a new IP packet using the ESP extension header. Tunnel mode of encryption is mostly used by security gateways to encrypt data.

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

6. Destination Option
The destination option is used when the source needs to pass information to the destination only. Intermediate routers are not permitted access to this information. The format of the destination option is the same as the hop-by-hop option.

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

ICMPv6

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Comparison of network layers in version 4 and version 6

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Categories of ICMPv6 messages

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

TRANSITION FROM IPv4 TO IPv6

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Three transition strategies

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Dual stack

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Automatic tunneling

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Configured tunneling

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Header translation

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

6 Bone
The 6bone was a testbed for Internet Protocol version 6; it was an outgrowth of the IETF IPng project that created the IPv6 protocols intended to eventually replace the current Internet network layer protocols known as IPv4. The 6bone was started outside the official IETF process at the March 1996 IETF meetings, and became a worldwide informal collaborative project, with eventual oversight from the "NGtrans" (IPv6 Transition) Working Group of the IETF. The original mission of the 6bone was to establish a network to foster the development, testing, and deployment of IPv6 using a model to be based upon the experiences from the Mbone (multicast backbone) hence the name 6bone.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000

6 Bone
The 6bone started as a virtual network (using IPv6 over IPv4 tunneling/encapsulation) operating over the IPv4-based Internet to support IPv6 transport, and slowly added native links specifically for IPv6 transport. Although the initial 6bone focus was on testing of standards and implementations, the eventual focus became more on testing of transition and operational procedures, as well as actual IPv6 network usage. At its peak in mid-2003, over 150 6bone top level 3FFE::/16 network prefixes were routed, interconnecting over 1000 sites in more than 50 countries. When it became obvious that the availability of IPv6 top level production prefixes was assured, and that commercial and private IPv6 networks were being operated outside the 6bone using these prefixes, a plan was developed to phase out the 6bone.

The phaseout plan called for a halt to new 6bone prefix allocations on 1 January 2004 and the complete cessation of 6bone operation and routing over the 6bone testing prefixes on 6 June 2006. Addresses within the 6bone testing prefix have now reverted to the IANA, and should no longer be used.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000

ADSL
Asymmetric Digital Subscriber Line

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Introduction
ADSL is a form of DSL, a data communications technology that enables faster data transmission over copper telephone lines ADSL is capable of providing up to 50 Mbps, and supports voice, video and data. ADSL is the #1 Broadband Choice in the World with over 60% market share ADSL is now available in every region of the world

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

What does ADSL mean


Asymmetric - The data can flow faster in one direction than the other. Data transmission has faster downstream to the subscriber than upstream
Digital - No type of communication is transferred in an analog method. All data is purely digital, and only at the end, modulated to be carried over the line. Subscriber Line - The data is carried over a single twisted pair copper loop to the subscriber premises

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

ADSL standards :
Standard name ITU G.992.1 ITU G.992.2 ITU G.992.3/4 ITU G.992.3/4 Annex J ITU G.992.3/4 Annex L ITU G.992.5 ITU G.992.5 Annex L ITU G.992.5 Annex M Common name ADSL (G.DMT) Downstream rate 8 Mbit/s Upstream rate 1.0 Mbit/s 0.5 Mbit/s 1.0 Mbit/s 3.5 Mbit/s 0.8 Mbit/s 1.0 Mbit/s 1.0 Mbit/s 3.5 Mbit/s

ADSL Lite (G.Lite) 1.5 Mbit/s ADSL2 ADSL2 RE-ADSL2 ADSL2+ RE-ADSL2+ ADSL2+ 12 Mbit/s 12 Mbit/s 5 Mbit/s 24 Mbit/s 24 Mbit/s 28 Mbit/s

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

ADSL Speed Comparison


Pure Fibre
Hybrid Fibre/Copper FTT H

Enhanced Copper
ADS L

FTTx, VDSL2, ADSL2plus

ISD Voice band N Modem


McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

ADSL Speed Factors


The distance from the local exchange The type and thickness of wires used The number and type of joins in the wire The proximity of the wire to other wires carrying ADSL, ISDN and other non-voice signals

The proximity of the wires to radio transmitters.

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

ADSL network components


The ADSL modem at the customer premises(ATU-R)
The modem of the central office (ATU-C)

DSL access multiplexer (DSLAM)


Broadband Access Server (BAS)

Splitter - an electronic low pass filter that separates the analogue voice or ISDN signal from ADSL data frequencies DSLAM.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000

ADSL Loop Architecture

DSL
Voice Switch

ISP
Central Office
McGraw-Hill

Subscriber premises
The McGraw-Hill Companies, Inc., 2000

ADSL Requirements

Phone-line, activated by your phone company for ADSL Filter to separate the phone signal from the Internet signal ADSL modem Subscription with an ISP supporting ADSL

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

How does ADSL work


ADSL exploits the unused analogue bandwidth available in the wires

PSTN

Upstream

Downstream

4 25,875

138

1104 KHz

ADSL works by using a frequency splitter device to split a traditional voice telephone line into two frequencies
McGraw-Hill The McGraw-Hill Companies, Inc., 2000

You might also like