SlideShare a Scribd company logo
1 of 46
Govt. Engineering College, Bikaner
Submitted to:-
Mrs. Anita Chandel
Assistant professor
Dept. of Information
Technology
Submitted by:-
Mohit Kumar Sharma
Information Technology
13EEBIT031
8th Sem, 4th Year
Information Technology Department
IPV6
The Next Generation
Protocol
OUTLINES
Introduction
What is IPv6
IPv6 features
Ipv6 Packet
IPv4 vs IPv6
Addressing
Security
Pros & Cons
Intorduction
What is IP?
The Internet Protocol (IP) is the method or protocol
by which data is sent from one computer to another
on the Internet. Each computer (known as a host) on
the Internet has at least one IP address that uniquely
identifies it from all other computers on the Internet.
The current version of the Internet Protocol IPv4 was first
developed in the 1970s, and the main protocol standard RFC
791 that governs IPv4 functionality was published in 1981.
Internet Engineering Task Force (IETF) initiated as early as in
1994, the design and development of a suite of protocols and
standards now known as Internet Protocol Version 6 (IPv6).
IPv6 was first formally described in Internet standard
document published in December 1998.
History
Connectionless Protocol
Best effort delivery
Used on packet-switched network
Addressing
IPv4 uses 32-bit addresses which limits the address space to
4294967296 (232) addresses.
IPv4 reserves special address blocks for private networks(~18
million addresses) and multicast addresses (~270 million
addresses).
IPv4
IPv4 Address Classes
IPv4 Packet
Subnetting
Network Address Translation (NAT)
Classless Inter Domain Routing (CIDR)
Techniques to reduce address
shortage in IPv4
Three-level hierarchy: network, subnet, and host.
The extended-network-prefix is composed of the
classful network-prefix and the subnet-number
The extended-network-prefix has traditionally
been identified by the subnet mask
Subnetting
Network-Prefix Subnet-Number Host-Number
Subnetting Example
Internet
G
H1 H2
H3 H4
Subnet mask 255.255.255.0
All traffic
to 128.10.0.0
128.10.1.1 128.10.1.2
128.10.2.1 128.10.2.2
Sub-network 128.10.1.0
Sub-network 128.10.2.0
Net mask 255.255.0.0
Network Address Translation
Each organization- single
IP address
Within organization –
each host with IP unique
to the orgn., from
reserved set of IP
addresses
NAT Example
Eliminates traditional classful IP routing.
Supports the deployment of arbitrarily sized
networks
Routing information is advertised with a bit
mask/prefix length specifies the number of leftmost
contiguous bits in the network portion of each routing table entry
Example: 192.168.0.0/30
Classless Inter-Domain Routing
1. Internet Users or PC
 ~530 million users in 2002, ~945 million by 2004
 (Source: Computer Industry Almanac)
 Emerging population/geopolitical and Address space
2. PDA, Pen-Tablet, Notepad,…
 ~20 million in 2004
3. Mobile phones
 Already 1 billion mobile phones delivered by the industry
4. Transportation
 1 billion automobiles forecast for 2008
 Internet access in Planes
5. Consumer devices
 Billions of Home and Industrial Appliances
Do We Really Need a Larger Address
Space?
Internet Around us
What is IPv6?
Network layer protocol for packet switched internet
works.
Conservative extension of IPv4.
Virtually unlimited IP address possible. (Major advantage over
IPv4)
 IPv6 has a larger 128-bit address space, providing for
340 undecillion addresses. (That is the number 340, followed
by 36 zeroes.)
Originally called as IP Next Generation (IPng).
IPv6
Features
Larger address space
Stateless auto configuration of host.
Multicast
Network Layer Security. (encryption and authentication, is an integral part
of base protocol)
Mobility
Supports quality of service (QoS) parameters for
realtime audio and video.
Features of IPv6
IPv6 Packet
Two main parts: Header and Payload
Header is in first 40Bytes
The payload can be up to 64KB in size in standard
mode, or larger with a "jumbo payload" option.
IPv6 Packet
IPv6 Packet
IPv4 vs IPv6
IPv4 & IPv6 Header Comparison
Version IHL Type of Service
Total
Identification Flags
Fragment
Offset
Time to Live Protocol Header Checksum
Source Address
Destination Address
Options Padding
Version Traffic Class Flow Label
Payload Length
Next
Header
Hop Limit
Source Address
Destination Address
IPv4 Header IPv6 Header
- field’s name kept from IPv4 to IPv6
- fields not kept in IPv6
- Name & position changed in IPv6
- New field in IPv6
Difference
IPv4 IPv6
Source and destination addresses are 32 bits (4
bytes) in length.
Source and destination addresses are 128 bits (16
bytes) in length.
IPsec support is optional. IPsec support is required.
No identification of packet flow for QoS handling by
routers is present within the IPv4 header.
Packet flow identification for QoS handling by
routers is included in the IPv6 header using the
Flow Label field
Fragmentation is done by both routers and the
sending host.
Fragmentation is not done by routers, only by the
sending host.
Header includes a checksum. Header does not include a checksum.
Header includes options. All optional data is moved to IPv6 extension
headers.
Address Resolution Protocol (ARP) uses broadcast
ARP Request frames to resolve an IPv4 address to
a link layer address.
ARP Request frames are replaced with multicast
Neighbor Solicitation messages.
Addressing
Addresses are 128 bit long versus 32 bit in IPv4
Able to support 2128 (about 3.4×1038) addresses, for each
of the roughly 6.5 billion people alive today.
In most of the cases NAT (Network address translation)
is not required.
Makes large networks simpler, by avoiding the need for
complex sub netting schemes
Whats New?
128-bit IPv6 Address
3FFE:085B:1F1F:0000:0000:0000:00A9:1234
8 groups of 16-bit hexadecimal numbers separated by “:”
t hexadecimal numbersseparatedby “:”
Leading zeros can be removed
3FFE:85B:1F1F::A9:1234
:: = all zeros in one or more group of 16-bit hexadecimal numbers
Address Allocation
2001 0410
ISP prefix
Site prefix
Subnet prefix
/32 /48 /64
Registry
/23
Interface ID
The allocation process was recently updated by the registries:
IANA allocates from 2001::/16 to regional registries
Each regional registry allocation is a ::/23
ISP allocations from the regional registry is a ::/36 (immediate
allocation) or ::/32 (initial allocation) or shorter with justification
Policy expectation that an ISP allocates a ::/48 prefix to each
customer
Addresses have scope
Link Local
Site Local
Global
Addresses have lifetime
Valid and Preferred lifetime
IPv6 - Addressing Model
Link-LocalSite-LocalGlobal
Unicast
 One address on a single interface
 Delivery to single interface
Multicast
 Address of a set of interfaces
 Delivery to all interfaces in the set
Anycast
 Address of a set of interfaces
 Delivery to a single interface in the set
No broadcast addresses
Types of IPv6 Addresses
Security
All implementations required to support authentication and
encryption headers (“IPsec”)
Authentication separate from encryption for use
in situations where encryption is prohibited or prohibitively
expensive
Authentication header
 Guarantees authenticity and integrity of data
Encryption header
 Ensures confidentiality and privacy
Encryption modes:
 Transport mode
 Tunnel mode
IPv6 Security
 Authentication
 Data Integrity
 Anti-Reply
 It doesn’t provide any data confidentiality(Encryption).
Authentication Header
All functions of AH(Authentication, Data integrity, Anti-reply)
Also support data confidentiality(Encryption)
The benifits of using Encapsulating Security Payload (ESP) are
listed below.
• Confidentiality of Datagrams through encryption.
• Traffic flow confidentiality using security gateways.
• Authentication of data origin using digital certificates.
• Anti-replay services using sequence number mechanism.
Encapsulating Security Payload (ESP)
Encapsulating Security Payload (ESP)
Encryption Mode- Transport mode
End-to-end data
transmission security using
Transport Mode
IPsec Transport mode
protects upper-layer
protocols (Ex: TCP or UDP)
and Transport mode is used
to secure end-to-end (device
to device) communications.
Encryption Mode- Tunnel mode
IPSec tunnel mode is used to secure gateway-to-gateway
traffic.
IPSec tunnel mode is used to secure network layer packet also.
Transport vs Tunnel Mode
Transport mode is a
good option
securing host-to-
host communication
and Tunnel mode is
the option for
Virtual Private
Network (VPN).
Pros & Cons
Provides more address space ( which is being needed in larger
buisness)
More powerful internet (128bit versus IPv4's current 32 bit)
Offers and overall larger scale internet-which again will be
needed in the future
Address allocation is done by the device itself
Support for security using (IPsec) Internet Protocol Security
Pros
It will be much harder to remember IP addresses (compared to
the addresses now)
Creating a smooth transition from IPv4 to IPv6
IPv6 is not available to machines that run IPv4
Any consumer costs in having to replace an IPv4 machine
Time to convert over to IPv6
Cons
Department of Telecommunications, of Government of India has
run workshops on IPv6 on 13 February 2015 at Silvassa & on 11
February 2015, at DoT headquarters,New Delhi.They have also
released roadmaps on IPv6 deployment.
ERNET - The Indian Education and Research Network,
Department of Electronics & IT.
Reliance JIO has deployed and is offering IPv6 services in India.
Current User of IPv6 in India
Thank
You!

More Related Content

What's hot

What's hot (20)

Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Internet Protocol Version 6
Internet Protocol Version 6Internet Protocol Version 6
Internet Protocol Version 6
 
IPv6 Fundamentals
IPv6 FundamentalsIPv6 Fundamentals
IPv6 Fundamentals
 
Dhcp
DhcpDhcp
Dhcp
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
IPv4 VS IPv6
IPv4 VS IPv6IPv4 VS IPv6
IPv4 VS IPv6
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
DHCP & DNS
DHCP & DNSDHCP & DNS
DHCP & DNS
 
Unit 4 - Network Layer
Unit 4 - Network LayerUnit 4 - Network Layer
Unit 4 - Network Layer
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNS
 
OSPF v3
OSPF v3OSPF v3
OSPF v3
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
IPV6 Addressing
IPV6 Addressing IPV6 Addressing
IPV6 Addressing
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
 

Viewers also liked

Viewers also liked (19)

33classification (part 1)
33classification (part 1)33classification (part 1)
33classification (part 1)
 
Japón recuperado
Japón recuperadoJapón recuperado
Japón recuperado
 
PPT Efusi Pleura
PPT Efusi Pleura PPT Efusi Pleura
PPT Efusi Pleura
 
AN INTERNSHIP ON PATAN ACADEMY OF HEALTH SCIENCES (PAHS) LIBRARY
AN INTERNSHIP ON PATAN ACADEMY OF HEALTH SCIENCES (PAHS) LIBRARYAN INTERNSHIP ON PATAN ACADEMY OF HEALTH SCIENCES (PAHS) LIBRARY
AN INTERNSHIP ON PATAN ACADEMY OF HEALTH SCIENCES (PAHS) LIBRARY
 
CVE-2015-8562の脆弱性について
CVE-2015-8562の脆弱性についてCVE-2015-8562の脆弱性について
CVE-2015-8562の脆弱性について
 
DevOps on Microsoft Platform
DevOps on Microsoft PlatformDevOps on Microsoft Platform
DevOps on Microsoft Platform
 
Guia de actuación contra el Acoso Escolar en los centros educativos
Guia de actuación contra el Acoso Escolar en los centros educativos Guia de actuación contra el Acoso Escolar en los centros educativos
Guia de actuación contra el Acoso Escolar en los centros educativos
 
인포그래픽스 Fusion table활용
인포그래픽스 Fusion table활용인포그래픽스 Fusion table활용
인포그래픽스 Fusion table활용
 
Jadual Waktu SPM 2017
Jadual Waktu SPM 2017Jadual Waktu SPM 2017
Jadual Waktu SPM 2017
 
Raport DEV3 net.work - Organizația Segmente
Raport DEV3 net.work - Organizația SegmenteRaport DEV3 net.work - Organizația Segmente
Raport DEV3 net.work - Organizația Segmente
 
New york
New yorkNew york
New york
 
Huruf a z
Huruf a zHuruf a z
Huruf a z
 
אגף ספריות ומידע - הצעה
אגף ספריות ומידע -  הצעהאגף ספריות ומידע -  הצעה
אגף ספריות ומידע - הצעה
 
인포그래픽스 Fusion table 활용
인포그래픽스 Fusion table 활용인포그래픽스 Fusion table 활용
인포그래픽스 Fusion table 활용
 
2.2. clasificación de las tic que se utilizan actualmente en los procesos for...
2.2. clasificación de las tic que se utilizan actualmente en los procesos for...2.2. clasificación de las tic que se utilizan actualmente en los procesos for...
2.2. clasificación de las tic que se utilizan actualmente en los procesos for...
 
Clean Delhi, Breathe Delhi
Clean Delhi, Breathe DelhiClean Delhi, Breathe Delhi
Clean Delhi, Breathe Delhi
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorial
 
3Com 3C0EP2100VCX
3Com 3C0EP2100VCX3Com 3C0EP2100VCX
3Com 3C0EP2100VCX
 
Envirotech
EnvirotechEnvirotech
Envirotech
 

Similar to IPv6 - The Next next generation protocol

Networking presentation 9 march 2009
Networking presentation   9 march 2009Networking presentation   9 march 2009
Networking presentation 9 march 2009
Kinshook Chaturvedi
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
Amandeep Kaur
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 

Similar to IPv6 - The Next next generation protocol (20)

IP Address
IP AddressIP Address
IP Address
 
Network Layer And I Pv6
Network Layer And I Pv6Network Layer And I Pv6
Network Layer And I Pv6
 
I pv4 and ipv6
I pv4 and ipv6I pv4 and ipv6
I pv4 and ipv6
 
I pv6 mechanism
I pv6 mechanismI pv6 mechanism
I pv6 mechanism
 
I.p. protocol
I.p. protocolI.p. protocol
I.p. protocol
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
IP Address
IP AddressIP Address
IP Address
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Networking presentation 9 march 2009
Networking presentation   9 march 2009Networking presentation   9 march 2009
Networking presentation 9 march 2009
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
 
A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Clase 1 Direccionamiento IPv4.pdf
Clase 1 Direccionamiento IPv4.pdfClase 1 Direccionamiento IPv4.pdf
Clase 1 Direccionamiento IPv4.pdf
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Ipv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaIpv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar Tarsariya
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Hardware9
Hardware9Hardware9
Hardware9
 
Ipv6
Ipv6Ipv6
Ipv6
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

IPv6 - The Next next generation protocol

  • 1. Govt. Engineering College, Bikaner Submitted to:- Mrs. Anita Chandel Assistant professor Dept. of Information Technology Submitted by:- Mohit Kumar Sharma Information Technology 13EEBIT031 8th Sem, 4th Year Information Technology Department
  • 3. OUTLINES Introduction What is IPv6 IPv6 features Ipv6 Packet IPv4 vs IPv6 Addressing Security Pros & Cons
  • 5. What is IP? The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet.
  • 6. The current version of the Internet Protocol IPv4 was first developed in the 1970s, and the main protocol standard RFC 791 that governs IPv4 functionality was published in 1981. Internet Engineering Task Force (IETF) initiated as early as in 1994, the design and development of a suite of protocols and standards now known as Internet Protocol Version 6 (IPv6). IPv6 was first formally described in Internet standard document published in December 1998. History
  • 7. Connectionless Protocol Best effort delivery Used on packet-switched network Addressing IPv4 uses 32-bit addresses which limits the address space to 4294967296 (232) addresses. IPv4 reserves special address blocks for private networks(~18 million addresses) and multicast addresses (~270 million addresses). IPv4
  • 10. Subnetting Network Address Translation (NAT) Classless Inter Domain Routing (CIDR) Techniques to reduce address shortage in IPv4
  • 11. Three-level hierarchy: network, subnet, and host. The extended-network-prefix is composed of the classful network-prefix and the subnet-number The extended-network-prefix has traditionally been identified by the subnet mask Subnetting Network-Prefix Subnet-Number Host-Number
  • 12. Subnetting Example Internet G H1 H2 H3 H4 Subnet mask 255.255.255.0 All traffic to 128.10.0.0 128.10.1.1 128.10.1.2 128.10.2.1 128.10.2.2 Sub-network 128.10.1.0 Sub-network 128.10.2.0 Net mask 255.255.0.0
  • 13. Network Address Translation Each organization- single IP address Within organization – each host with IP unique to the orgn., from reserved set of IP addresses
  • 15. Eliminates traditional classful IP routing. Supports the deployment of arbitrarily sized networks Routing information is advertised with a bit mask/prefix length specifies the number of leftmost contiguous bits in the network portion of each routing table entry Example: 192.168.0.0/30 Classless Inter-Domain Routing
  • 16. 1. Internet Users or PC  ~530 million users in 2002, ~945 million by 2004  (Source: Computer Industry Almanac)  Emerging population/geopolitical and Address space 2. PDA, Pen-Tablet, Notepad,…  ~20 million in 2004 3. Mobile phones  Already 1 billion mobile phones delivered by the industry 4. Transportation  1 billion automobiles forecast for 2008  Internet access in Planes 5. Consumer devices  Billions of Home and Industrial Appliances Do We Really Need a Larger Address Space?
  • 19. Network layer protocol for packet switched internet works. Conservative extension of IPv4. Virtually unlimited IP address possible. (Major advantage over IPv4)  IPv6 has a larger 128-bit address space, providing for 340 undecillion addresses. (That is the number 340, followed by 36 zeroes.) Originally called as IP Next Generation (IPng). IPv6
  • 21. Larger address space Stateless auto configuration of host. Multicast Network Layer Security. (encryption and authentication, is an integral part of base protocol) Mobility Supports quality of service (QoS) parameters for realtime audio and video. Features of IPv6
  • 23. Two main parts: Header and Payload Header is in first 40Bytes The payload can be up to 64KB in size in standard mode, or larger with a "jumbo payload" option. IPv6 Packet
  • 26. IPv4 & IPv6 Header Comparison Version IHL Type of Service Total Identification Flags Fragment Offset Time to Live Protocol Header Checksum Source Address Destination Address Options Padding Version Traffic Class Flow Label Payload Length Next Header Hop Limit Source Address Destination Address IPv4 Header IPv6 Header - field’s name kept from IPv4 to IPv6 - fields not kept in IPv6 - Name & position changed in IPv6 - New field in IPv6
  • 27. Difference IPv4 IPv6 Source and destination addresses are 32 bits (4 bytes) in length. Source and destination addresses are 128 bits (16 bytes) in length. IPsec support is optional. IPsec support is required. No identification of packet flow for QoS handling by routers is present within the IPv4 header. Packet flow identification for QoS handling by routers is included in the IPv6 header using the Flow Label field Fragmentation is done by both routers and the sending host. Fragmentation is not done by routers, only by the sending host. Header includes a checksum. Header does not include a checksum. Header includes options. All optional data is moved to IPv6 extension headers. Address Resolution Protocol (ARP) uses broadcast ARP Request frames to resolve an IPv4 address to a link layer address. ARP Request frames are replaced with multicast Neighbor Solicitation messages.
  • 29. Addresses are 128 bit long versus 32 bit in IPv4 Able to support 2128 (about 3.4×1038) addresses, for each of the roughly 6.5 billion people alive today. In most of the cases NAT (Network address translation) is not required. Makes large networks simpler, by avoiding the need for complex sub netting schemes Whats New?
  • 30. 128-bit IPv6 Address 3FFE:085B:1F1F:0000:0000:0000:00A9:1234 8 groups of 16-bit hexadecimal numbers separated by “:” t hexadecimal numbersseparatedby “:” Leading zeros can be removed 3FFE:85B:1F1F::A9:1234 :: = all zeros in one or more group of 16-bit hexadecimal numbers
  • 31. Address Allocation 2001 0410 ISP prefix Site prefix Subnet prefix /32 /48 /64 Registry /23 Interface ID The allocation process was recently updated by the registries: IANA allocates from 2001::/16 to regional registries Each regional registry allocation is a ::/23 ISP allocations from the regional registry is a ::/36 (immediate allocation) or ::/32 (initial allocation) or shorter with justification Policy expectation that an ISP allocates a ::/48 prefix to each customer
  • 32. Addresses have scope Link Local Site Local Global Addresses have lifetime Valid and Preferred lifetime IPv6 - Addressing Model Link-LocalSite-LocalGlobal
  • 33. Unicast  One address on a single interface  Delivery to single interface Multicast  Address of a set of interfaces  Delivery to all interfaces in the set Anycast  Address of a set of interfaces  Delivery to a single interface in the set No broadcast addresses Types of IPv6 Addresses
  • 35. All implementations required to support authentication and encryption headers (“IPsec”) Authentication separate from encryption for use in situations where encryption is prohibited or prohibitively expensive Authentication header  Guarantees authenticity and integrity of data Encryption header  Ensures confidentiality and privacy Encryption modes:  Transport mode  Tunnel mode IPv6 Security
  • 36.  Authentication  Data Integrity  Anti-Reply  It doesn’t provide any data confidentiality(Encryption). Authentication Header
  • 37. All functions of AH(Authentication, Data integrity, Anti-reply) Also support data confidentiality(Encryption) The benifits of using Encapsulating Security Payload (ESP) are listed below. • Confidentiality of Datagrams through encryption. • Traffic flow confidentiality using security gateways. • Authentication of data origin using digital certificates. • Anti-replay services using sequence number mechanism. Encapsulating Security Payload (ESP)
  • 39. Encryption Mode- Transport mode End-to-end data transmission security using Transport Mode IPsec Transport mode protects upper-layer protocols (Ex: TCP or UDP) and Transport mode is used to secure end-to-end (device to device) communications.
  • 40. Encryption Mode- Tunnel mode IPSec tunnel mode is used to secure gateway-to-gateway traffic. IPSec tunnel mode is used to secure network layer packet also.
  • 41. Transport vs Tunnel Mode Transport mode is a good option securing host-to- host communication and Tunnel mode is the option for Virtual Private Network (VPN).
  • 43. Provides more address space ( which is being needed in larger buisness) More powerful internet (128bit versus IPv4's current 32 bit) Offers and overall larger scale internet-which again will be needed in the future Address allocation is done by the device itself Support for security using (IPsec) Internet Protocol Security Pros
  • 44. It will be much harder to remember IP addresses (compared to the addresses now) Creating a smooth transition from IPv4 to IPv6 IPv6 is not available to machines that run IPv4 Any consumer costs in having to replace an IPv4 machine Time to convert over to IPv6 Cons
  • 45. Department of Telecommunications, of Government of India has run workshops on IPv6 on 13 February 2015 at Silvassa & on 11 February 2015, at DoT headquarters,New Delhi.They have also released roadmaps on IPv6 deployment. ERNET - The Indian Education and Research Network, Department of Electronics & IT. Reliance JIO has deployed and is offering IPv6 services in India. Current User of IPv6 in India