SlideShare une entreprise Scribd logo
1  sur  24
Ipv4 Over Ipv6
PRESENTATION BY:

JIGAR M. TARSARIYA
7 TH S E M E S T E R
M.SC(IT) PROGRAMME
ROLL NO: 95
What Is IP?
 Used for communicating data across a packet-switched

internetwork.
 Also referred to as TCP/IP.
 Primary Protocol of delivering distinguished protocol datagrams
(packets).
 The First Major Version is Ipv4.
Ipv4
 The fourth version of the Internet Protocol (IP) and it is the first

version of the protocol to be widely deployed.
 It uses a 32 bit addressing and allows for 4,294,967,296 unique
addresses.
 Version 4 of IP was the first that was widely used in modern
TCP/IP.
 Ipv4 is still the dominant protocol of the Internet.
Ipv6
 Is a version of the Internet Protocol (IP) intended to succeed






IPv4.
Is the protocol currently used to direct almost all Internet
traffic.
Also known as Ipng (IP next generation) is the second version of
the Internet Protocol to be used generally across the virtual
world.
IPng was designed to take an evolutionary step from IPv4.
Functions which work in IPv4 were kept in IPng. Functions
which didn’t work were removed.
Ipv6 Contd…
 Like IPv4, IPv6 is an internet-layer protocol for packet switched






internetworking and provides end-to-end datagram
transmission across multiple IP networks.
IPv6 uses 128-bit addresses, for an address space of 2^128
(approximately 3.4×1038) addresses.
It allows more devices and users then the Ipv4 on the internet.
It also allows extra flexibility in allocating addresses and
efficiency for routing traffic.
It also eliminates the primary need for network address
translation (NAT).
Limitations of Ipv4
 Since the 1980s it has been apparent that the number of available

IPv4 addresses is being exhausted at a rate that was not initially
anticipated in the design of the network.
 IPV4 addresses are being consumed at an alarming rate and it is
estimated that 2010 would be the last year for IPV4, some sources
say they may last until 2012.
 Primary reason for IPV4 exhaustion is huge growth in number of
internet users, mobile devices using Internet connection and always
on devices such as ADSL modems and cable modems. This brings us
to the development and adoption of IPV6 as an alternate solution.
Why not Ipv5?
 IP Version 4 to be called IP Version 5, but as it turned out

Version 5 of the Internet Protocol Family was already taken.
 In the late 1980s the Internet Protocol itself was the topic of a
considerable level of research, as researchers experimented with
different forms of network behavior.
 Version 5 of the Internet Protocol was reserved for use with an
experimental IP protocol, the Internet Stream Protocol, Version
2 (ST-II), written up as RFC 1190 in 1990.
Ipv5 Contd…
 So, When it came time to assign a protocol number of the “next

generation” of IPv4, the next available version number was 6,
hence IPv6.
 So the technical plan to address the address-exhaustion
problem was to perform an upgrade of the Internet and convert
the Internet from IP Version 4 to IP Version 6.
What will Ipv6 do?
 IPv6 is technology with a main focus on changing the structure

of current IP addresses, which will allow for virtually unlimited
IP addresses.
 The current version, IPv4 is a growing concern with the limited
IP addresses, making it a fear that they will run out in the
future.
 IPv6 will also have a goal to make the Internet a more secure
place for browsers, and with the rapid number of identity theft
victims, this is a key feature.
Ipv6 Header
 Data packet comprises of two main parts:

(1) The header and (2) The payload
 The first 40 bytes/octets (40x8 = 320 bits) of an IPv6 packet
comprise of the header (see Figure 1) that contains the following
fields:
Ipv6 Header Contd…
1.
2.
3.

4.
5.
6.
7.
8.

Source address (128 bits)
Destination address (128 bits)
Version/IP version (4-bits)
Packet priority/Traffic class (8 bits)
Flow Label/QoS management (20 bits)
Payload length in bytes(16 bits)
Next Header (8 bits)
Time To Live (TTL)/Hop Limit (8 bits)
Ipv6 Addressing
1. The Ipv6 Address Space:
 The most obvious distinguishing feature of IPv6 is its use of
much larger addresses.
 The size of an address in IPv6 is 128 bits, which is four times
the larger than an IPv4 address.
 A 128-bit address space allows for 2128 or
340,282,366,920,938,463,463,374,607,431,768,211,456 (or
3.4^1038 or 340 undecillion) possible addresses.
 The IPv6 addressing architecture is described in RFC 4291.
Ipv6 Addressing Contd…
2. IPv6 Address Syntax:
 IPv6, the 128-bit address is divided along 16-bit boundaries,
and each 16-bit block is converted to a 4-digit hexadecimal
number and separated by colons.
 The resulting representation is called colon-hexadecimal.
 The following is an IPv6 address in binary form:
001000000000000100001101101110000000000000000000
0010111100111011000000101010101000000000111111111111111
0001010001001110000
Ipv6 Addressing Contd…
 The 128-bit address is divided along 16-bit boundaries:

0010000000000001 0000110110111000
0000000000000000 0010111100111011 0000001010101010
0000000011111111 1111111000101000
1001110001011010
 Each 16-bit block is converted to hexadecimal and delimited
with colons. The result is:
2001:0DB8:0000:2F3B:02AA:00FF:FE28:9C5A
Ipv6 v/s Ipv4
 The following table compares the key characters of IPv6 vs. IPv4:
Subjects

Ipv4

Ipv6

Ipv6 Advantages

Address Space

4 Billion Addresses

2^128

79 Octillion times the
IPv4 address space

Configuration

Manual or use DHCP

Universal Plug and Play
(UPnP) with or without
DHCP

Lower Operation
Expenses and reduce
error

Broadcast / Multicast

Uses both

No broadcast and has
different forms of
multicast

Better bandwidth
efficiency
Ipv6 v/s Ipv4 Contd…
Subject

Ipv4

Ipv6

Ipv6 Advantages

Anycast support

Not part of the original
protocol

Explicit support of
anycast

Allows new applications
in mobility, data center

Network Configuration

Mostly manual and
labor intensive

Facilitate the renumbering of hosts and
routers

Lower operation
expenses and facilitate
migration

QoS support

ToS using DIFFServ

Flow classes and flow
labels

More Granular control
of QoS

Security

Uses IPsec for Data
packet protection

IPsec becomes the key
technology to protect
data and control
packets

Unified framework for
security and more
secure computing
environment
Ipv6 v/s Ipv4 Contd…
Subject

Ipv4

Ipv6

Ipv6 Advantages

Mobility

Uses Mobile IPv4

Mobile IPv6 provides
fast handover, better
router optimization and
hierarchical mobility

Better efficiency and
scalability; Work with
latest 3G mobile
technologies and
beyond.
Difference Between Ipv4 & Ipv6
 Ipv4:
 Source and destination addresses are 32 bits (4 bytes) in length.
 IPSec support is optional.
 IPv4 header does not identify packet flow for QoS handling by routers.
 Both routers and the sending host fragment packets.

 Header includes a checksum.
 Header includes options.
 Address Resolution Protocol (ARP) uses broadcast ARP Request frames

to resolve an IP address to a link-layer address.
Difference Between Ipv4 & Ipv6 Contd…
Ipv4:
 ICMP Router Discovery is used to determine the IPv4 address of the
best default gateway, and it is optional.
 Broadcast addresses are used to send traffic to all nodes on a subnet.
 Must be configured either manually or through DHCP.
 Uses host address (A) resource records in Domain Name System
(DNS) to map host names to IPv4 addresses.
 Uses pointer (PTR) resource records in the IN-ADDR.ARPA DNS
domain to map IPv4 addresses to host names.
 Must support a 576-byte packet size (possibly fragmented).
Difference Between Ipv4 & Ipv6 Contd…
 Ipv6:
 Source and destination addresses are 128 bits (16 bytes) in length.
 IPSec support is required.
 IPv6 header contains Flow Label field, which identifies packet flow





for QoS handling by router.
Only the sending host fragments packets; routers do not.
Header does not include a checksum.
All optional data is moved to IPv6 extension headers.
Multicast Neighbor Solicitation messages resolve IP addresses to
link-layer addresses.
Difference Between Ipv4 & Ipv6 Contd…
Ipv6:
 ICMPv6 Router Solicitation and Router Advertisement messages are
used to determine the IP address of the best default gateway, and
they are required.
 IPv6 uses a link-local scope all-nodes multicast address.
 Does not require manual configuration or DHCP.
 Uses host address (AAAA) resource records in DNS to map host
names to IPv6 addresses.
 Uses pointer (PTR) resource records in the IP6.ARPA DNS domain to
map IPv6 addresses to host names.
 Must support a 1280-byte packet size (without fragmentation).
Potential Benefits and Uses of Ipv6
Increased Address Space
2. Purported Security Improvements
3. End User Application
4. Network Evolution
1.
References

 www.google.com
 www.wikipedia.com

 www.ipv6.com
 www.seminarforyou.com
Ipv4 over ipv6 by Jigar Tarsariya

Contenu connexe

Tendances (20)

Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...
 
Future protocol IP v6
Future protocol IP v6Future protocol IP v6
Future protocol IP v6
 
IPv6
IPv6IPv6
IPv6
 
IPv6
IPv6IPv6
IPv6
 
Introduction to IPv6
Introduction to IPv6Introduction to IPv6
Introduction to IPv6
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
 
IPv6 address
IPv6 addressIPv6 address
IPv6 address
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 
IPV6 Introduction
IPV6 Introduction IPV6 Introduction
IPV6 Introduction
 
IPv6_Quick_Start_Guide
IPv6_Quick_Start_GuideIPv6_Quick_Start_Guide
IPv6_Quick_Start_Guide
 
IPv6 By Vipin
IPv6 By VipinIPv6 By Vipin
IPv6 By Vipin
 
IPv6 next generation protocol
IPv6 next generation protocolIPv6 next generation protocol
IPv6 next generation protocol
 
Internet protocol v6
Internet protocol v6Internet protocol v6
Internet protocol v6
 
IPv6 Address Planning
IPv6 Address PlanningIPv6 Address Planning
IPv6 Address Planning
 
Ipv6 course
Ipv6  courseIpv6  course
Ipv6 course
 
IPv4 vs IPv6
IPv4 vs IPv6IPv4 vs IPv6
IPv4 vs IPv6
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
 
A very good introduction to IPv6
A very good introduction to IPv6A very good introduction to IPv6
A very good introduction to IPv6
 
IPv6 theoryfinalx
IPv6 theoryfinalxIPv6 theoryfinalx
IPv6 theoryfinalx
 
IPv6
IPv6IPv6
IPv6
 

Similaire à Ipv4 over ipv6 by Jigar Tarsariya

Describe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfDescribe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfmayorothenguyenhob69
 
A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6Amber Ford
 
IPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolIPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolMohit Sharma
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdfniran10
 
Ipv6 - Hamzeh Al-Qudah
Ipv6 - Hamzeh Al-QudahIpv6 - Hamzeh Al-Qudah
Ipv6 - Hamzeh Al-QudahHamza Al-Qudah
 
Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6Netwax Lab
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptxJoshuaAnnan5
 
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdf
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdfResearch the IPv4 ns the IPv6 protocols, then prepare a report that .pdf
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdfarcotstarsports
 
IP Address
IP AddressIP Address
IP AddressRahul P
 

Similaire à Ipv4 over ipv6 by Jigar Tarsariya (20)

Describe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfDescribe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdf
 
IPv6
IPv6IPv6
IPv6
 
A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6
 
IPv6.pptx
IPv6.pptxIPv6.pptx
IPv6.pptx
 
IPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolIPv6 - The Next next generation protocol
IPv6 - The Next next generation protocol
 
Introduction of ipv6
Introduction of ipv6Introduction of ipv6
Introduction of ipv6
 
Ip4 vs ip6
Ip4 vs ip6Ip4 vs ip6
Ip4 vs ip6
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdf
 
Ipv6 - Hamzeh Al-Qudah
Ipv6 - Hamzeh Al-QudahIpv6 - Hamzeh Al-Qudah
Ipv6 - Hamzeh Al-Qudah
 
Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptx
 
IP VERSION 6
IP VERSION 6IP VERSION 6
IP VERSION 6
 
14 564
14 56414 564
14 564
 
Ipv6
Ipv6Ipv6
Ipv6
 
ipv4 & ipv6
ipv4 & ipv6ipv4 & ipv6
ipv4 & ipv6
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdf
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdfResearch the IPv4 ns the IPv6 protocols, then prepare a report that .pdf
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdf
 
I.p. protocol
I.p. protocolI.p. protocol
I.p. protocol
 
IP Address
IP AddressIP Address
IP Address
 

Dernier

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Dernier (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Ipv4 over ipv6 by Jigar Tarsariya

  • 1. Ipv4 Over Ipv6 PRESENTATION BY: JIGAR M. TARSARIYA 7 TH S E M E S T E R M.SC(IT) PROGRAMME ROLL NO: 95
  • 2. What Is IP?  Used for communicating data across a packet-switched internetwork.  Also referred to as TCP/IP.  Primary Protocol of delivering distinguished protocol datagrams (packets).  The First Major Version is Ipv4.
  • 3. Ipv4  The fourth version of the Internet Protocol (IP) and it is the first version of the protocol to be widely deployed.  It uses a 32 bit addressing and allows for 4,294,967,296 unique addresses.  Version 4 of IP was the first that was widely used in modern TCP/IP.  Ipv4 is still the dominant protocol of the Internet.
  • 4. Ipv6  Is a version of the Internet Protocol (IP) intended to succeed     IPv4. Is the protocol currently used to direct almost all Internet traffic. Also known as Ipng (IP next generation) is the second version of the Internet Protocol to be used generally across the virtual world. IPng was designed to take an evolutionary step from IPv4. Functions which work in IPv4 were kept in IPng. Functions which didn’t work were removed.
  • 5. Ipv6 Contd…  Like IPv4, IPv6 is an internet-layer protocol for packet switched     internetworking and provides end-to-end datagram transmission across multiple IP networks. IPv6 uses 128-bit addresses, for an address space of 2^128 (approximately 3.4×1038) addresses. It allows more devices and users then the Ipv4 on the internet. It also allows extra flexibility in allocating addresses and efficiency for routing traffic. It also eliminates the primary need for network address translation (NAT).
  • 6. Limitations of Ipv4  Since the 1980s it has been apparent that the number of available IPv4 addresses is being exhausted at a rate that was not initially anticipated in the design of the network.  IPV4 addresses are being consumed at an alarming rate and it is estimated that 2010 would be the last year for IPV4, some sources say they may last until 2012.  Primary reason for IPV4 exhaustion is huge growth in number of internet users, mobile devices using Internet connection and always on devices such as ADSL modems and cable modems. This brings us to the development and adoption of IPV6 as an alternate solution.
  • 7. Why not Ipv5?  IP Version 4 to be called IP Version 5, but as it turned out Version 5 of the Internet Protocol Family was already taken.  In the late 1980s the Internet Protocol itself was the topic of a considerable level of research, as researchers experimented with different forms of network behavior.  Version 5 of the Internet Protocol was reserved for use with an experimental IP protocol, the Internet Stream Protocol, Version 2 (ST-II), written up as RFC 1190 in 1990.
  • 8. Ipv5 Contd…  So, When it came time to assign a protocol number of the “next generation” of IPv4, the next available version number was 6, hence IPv6.  So the technical plan to address the address-exhaustion problem was to perform an upgrade of the Internet and convert the Internet from IP Version 4 to IP Version 6.
  • 9. What will Ipv6 do?  IPv6 is technology with a main focus on changing the structure of current IP addresses, which will allow for virtually unlimited IP addresses.  The current version, IPv4 is a growing concern with the limited IP addresses, making it a fear that they will run out in the future.  IPv6 will also have a goal to make the Internet a more secure place for browsers, and with the rapid number of identity theft victims, this is a key feature.
  • 10. Ipv6 Header  Data packet comprises of two main parts: (1) The header and (2) The payload  The first 40 bytes/octets (40x8 = 320 bits) of an IPv6 packet comprise of the header (see Figure 1) that contains the following fields:
  • 11. Ipv6 Header Contd… 1. 2. 3. 4. 5. 6. 7. 8. Source address (128 bits) Destination address (128 bits) Version/IP version (4-bits) Packet priority/Traffic class (8 bits) Flow Label/QoS management (20 bits) Payload length in bytes(16 bits) Next Header (8 bits) Time To Live (TTL)/Hop Limit (8 bits)
  • 12. Ipv6 Addressing 1. The Ipv6 Address Space:  The most obvious distinguishing feature of IPv6 is its use of much larger addresses.  The size of an address in IPv6 is 128 bits, which is four times the larger than an IPv4 address.  A 128-bit address space allows for 2128 or 340,282,366,920,938,463,463,374,607,431,768,211,456 (or 3.4^1038 or 340 undecillion) possible addresses.  The IPv6 addressing architecture is described in RFC 4291.
  • 13. Ipv6 Addressing Contd… 2. IPv6 Address Syntax:  IPv6, the 128-bit address is divided along 16-bit boundaries, and each 16-bit block is converted to a 4-digit hexadecimal number and separated by colons.  The resulting representation is called colon-hexadecimal.  The following is an IPv6 address in binary form: 001000000000000100001101101110000000000000000000 0010111100111011000000101010101000000000111111111111111 0001010001001110000
  • 14. Ipv6 Addressing Contd…  The 128-bit address is divided along 16-bit boundaries: 0010000000000001 0000110110111000 0000000000000000 0010111100111011 0000001010101010 0000000011111111 1111111000101000 1001110001011010  Each 16-bit block is converted to hexadecimal and delimited with colons. The result is: 2001:0DB8:0000:2F3B:02AA:00FF:FE28:9C5A
  • 15. Ipv6 v/s Ipv4  The following table compares the key characters of IPv6 vs. IPv4: Subjects Ipv4 Ipv6 Ipv6 Advantages Address Space 4 Billion Addresses 2^128 79 Octillion times the IPv4 address space Configuration Manual or use DHCP Universal Plug and Play (UPnP) with or without DHCP Lower Operation Expenses and reduce error Broadcast / Multicast Uses both No broadcast and has different forms of multicast Better bandwidth efficiency
  • 16. Ipv6 v/s Ipv4 Contd… Subject Ipv4 Ipv6 Ipv6 Advantages Anycast support Not part of the original protocol Explicit support of anycast Allows new applications in mobility, data center Network Configuration Mostly manual and labor intensive Facilitate the renumbering of hosts and routers Lower operation expenses and facilitate migration QoS support ToS using DIFFServ Flow classes and flow labels More Granular control of QoS Security Uses IPsec for Data packet protection IPsec becomes the key technology to protect data and control packets Unified framework for security and more secure computing environment
  • 17. Ipv6 v/s Ipv4 Contd… Subject Ipv4 Ipv6 Ipv6 Advantages Mobility Uses Mobile IPv4 Mobile IPv6 provides fast handover, better router optimization and hierarchical mobility Better efficiency and scalability; Work with latest 3G mobile technologies and beyond.
  • 18. Difference Between Ipv4 & Ipv6  Ipv4:  Source and destination addresses are 32 bits (4 bytes) in length.  IPSec support is optional.  IPv4 header does not identify packet flow for QoS handling by routers.  Both routers and the sending host fragment packets.  Header includes a checksum.  Header includes options.  Address Resolution Protocol (ARP) uses broadcast ARP Request frames to resolve an IP address to a link-layer address.
  • 19. Difference Between Ipv4 & Ipv6 Contd… Ipv4:  ICMP Router Discovery is used to determine the IPv4 address of the best default gateway, and it is optional.  Broadcast addresses are used to send traffic to all nodes on a subnet.  Must be configured either manually or through DHCP.  Uses host address (A) resource records in Domain Name System (DNS) to map host names to IPv4 addresses.  Uses pointer (PTR) resource records in the IN-ADDR.ARPA DNS domain to map IPv4 addresses to host names.  Must support a 576-byte packet size (possibly fragmented).
  • 20. Difference Between Ipv4 & Ipv6 Contd…  Ipv6:  Source and destination addresses are 128 bits (16 bytes) in length.  IPSec support is required.  IPv6 header contains Flow Label field, which identifies packet flow     for QoS handling by router. Only the sending host fragments packets; routers do not. Header does not include a checksum. All optional data is moved to IPv6 extension headers. Multicast Neighbor Solicitation messages resolve IP addresses to link-layer addresses.
  • 21. Difference Between Ipv4 & Ipv6 Contd… Ipv6:  ICMPv6 Router Solicitation and Router Advertisement messages are used to determine the IP address of the best default gateway, and they are required.  IPv6 uses a link-local scope all-nodes multicast address.  Does not require manual configuration or DHCP.  Uses host address (AAAA) resource records in DNS to map host names to IPv6 addresses.  Uses pointer (PTR) resource records in the IP6.ARPA DNS domain to map IPv6 addresses to host names.  Must support a 1280-byte packet size (without fragmentation).
  • 22. Potential Benefits and Uses of Ipv6 Increased Address Space 2. Purported Security Improvements 3. End User Application 4. Network Evolution 1.
  • 23. References  www.google.com  www.wikipedia.com  www.ipv6.com  www.seminarforyou.com