0% found this document useful (0 votes)
16 views34 pages

3 7-Ipv6

Uploaded by

SUDHAN R CSE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views34 pages

3 7-Ipv6

Uploaded by

SUDHAN R CSE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 34

Computer Networks (R19EC253)

Session by

1
cussion about the previous sessions

• Multicast Routing
• Taxonomy of multicast
protocols
• Source based Tree
• DVMRP
• MOSPF
• Group Shared Tree
2
Agenda of the session

• IPV6 Addressing
• Transition from IPv4 to IPv6

3
4
IPv6 Addressing

An IPv6 address is 128 bits or 16 bytes (octets) long, four times the address length in
IPv4.
Advantages of IPv6
 Larger address space.
 Better header format
 New options
 Allowance for extension
 Support for resource allocation
 Support for more security.

5
Representation

A computer normally stores the address in binary.

It is clear that 128 bits cannot easily be handled by humans.


The following shows two of these notations: binary and colon
hexadecimal.

6
IPv6 Representation

7
8
9
6 address in binary and hexadecimal colon notation

10
Abbreviated IPv6 addresses

11
Example

Expand the address 0:15::1:12:1213 to its original.

Solution
We first need to align the left side of the double colon to the left of the original
pattern and the right side of the double colon to the right of the original pattern
to find how many 0s we need to replace the double colon.

This means that the original address is.

12
Packet Format

The IPv6 packet is shown in Figure 22.6.


Each packet is composed of base header followed by payload.
The base header occupies 40 bytes.
Payload can be up to 65,535 bytes of information.

13
Figure 22.6: IPv6 datagram

14
Version.- 4-bit version field defines version number of the IP - value is 6.

Traffic class.
 8-bit traffic class field is used to distinguish different payloads with different delivery
requirements.
It replaces the type-of-service field in IPv4.

Flow label.
20-bit field designed to provide special handling for a particular flow of data.

Payload length
 2-byte payload length field defines the length of the IP datagram excluding the header.
Note that IPv4 – defines header length and total length, IPv6 – only length of the payload
needs to be defined.

Next header. 8-bit field defining type of first extension header or the type of the data that
follows the base
header in the datagram.

Hop limit. 8-bit hop limit field serves the same purpose as the TTL field in IPv4.

Source and destination addresses. 16-byte (128-bit) Internet address that identifies the
15
original source and
Figure 22.7: Payload in an IPv6 datagram

16
Extension Header

IPv6 packet - made of base header and some extension headers.


The length of the base header is fixed at 40 bytes.
Base header can be followed by up to six extension headers.
Many of these headers are options in IPv4.
Six types of extension headers have been defined.
 hop-by-hop option
 source routing
 fragmentation
 authentication
 encrypted security payload
 destination option
17
Figure 22.8: Extension Header Types

18
Comparison of network layer in version 4 and version 6

19
Categories of ICMPv6 messages

20
Error-Reporting Messages

Four types of errors are handled:


Destination unreachable
Packet too big
Time exceeded
Parameter problems.
Note - source-quenched message - used to control congestion in version 4.
 It is eliminated in IPV6 - because the priority and flow label fields in IPv6 are supposed
to take care of congestion.

21
Informational Messages

Two messages can be categorized as informational messages:


 echo request and echo reply messages.
echo-request and echo-reply messages - designed to check whether two devices in the
internet can communicate with each other.
host or router - send an echo-request message to another host;
Receiving computer or router can reply using the echo-reply message.

22
Neighbor-Discovery Messages
Some new messages have been added to provide extension.
 Two new protocols clearly define the functionality of these group messages:

 Neighbor-Discovery (ND) protocol


 Inverse-Neighbor-Discovery (IND) protocol.

Two protocols are used by nodes on same link (network) for three main purposes:
1. Hosts use ND protocol - find routers in neighborhood that will forward packets for them.
2. Nodes use ND protocol - find link-layer addresses of neighbors.
3. Nodes use IND protocol - find IPv6 addresses of neighbors.

23
Group Membership Messages
In IPv6, - this responsibility is given to Multicast Listener Delivery
protocol(MLDV)
MLDv1 - counterpart to IGMPv2;
MLDv2 - counterpart to IGMPv3.
MLDv2 has two types of messages:
membership-query message
membership-report message.

Membership-Query Message
A membership-query message - sent by router to find active group members in
network.
 maximum response code field - size has been changed from 8 bits to 16 bits.

Membership-Report Message
 format of the membership report in MLDv2 is exactly the same as IGMPv3
24
TRANSITION FROM IPv4 TO IPv6

Because of the huge number of systems on Internet, the transition from IPv4 to IPv6
cannot happen suddenly.
It takes a considerable amount of time before every system in the Internet.
Transition must be smooth to prevent any problems between IPv4 and IPv6 systems.

25
26
Three transition strategies

27
Dual Stack

It is recommended that all hosts, before migrating completely to version 6, have a dual
stack of protocols during the transition.
 station must run IPv4 and IPv6 simultaneously until all Internet uses IPv6.

To determine which version to use when sending a packet to destination, the source
host queries the DNS.

 If the DNS returns an IPv4 address, the source host sends an IPv4 packet.

 If the DNS returns an IPv6 address, the source host sends an IPv6 packet.

28
Figure Dual stack

29
Tunnelling

strategy :- when two computers using IPv6 want to communicate with


each other
and the packet must pass through a region that uses IPv4.

 To pass through this region, the packet must have an IPv4 address.
 IPv6 packet is encapsulated in an IPv4 packet when it enters the
region.
 It leaves its capsule when it exits the region.
 It seems as if the IPv6 packet enters a tunnel at one end and emerges
at the other end.

30
Figure Tunneling strategy

31
Header Translation

 Header translation - necessary when the majority of Internet has moved to IPv6 but
some systems still
use IPv4.

 sender wants to use IPv6, but the receiver does not understand IPv6.

 Tunneling does not work in this situation because the packet must be in IPv4 format
to be understood by
the receiver.

 In this case, the header format must be totally changed through header translation.

 The header of the IPv6 packet is converted to an IPv4 header

32
33
Session Handler Details

34

You might also like