Ipv6 Tutorial

Total Page:16

File Type:pdf, Size:1020Kb

Ipv6 Tutorial IPv6 Tutorial Gianluca Reali 1 IPv6 - Important changes • Expanded Address Space – Address length quadrupled to 16 bytes • Header Format Simplification – Fixed length, optional headers are daisy-chained – IPv6 header is twice as long (40 bytes) as IPv4 header without options (20 bytes) • No checksumming at the IP network layer • No hop-by-hop segmentation – Path MTU discovery •Authentication and Privacy Capabilities – IPsec is mandated • No more broadcast 2 IPv4- Datagram 0 15 16 31 Version (4) IHL (4) Type of Service (8) Total Length (16) •Version = 4 • IHL - Internet Header Length = 5 with Identifier (16) Flag(3) Fragment Offset (13) no header options [min = 160 bits] [max = 512 bits] Protocol (8) Header Checksum (16) Time To Live (8) • Type of service , desired quality service Source Address (32) Prec. D T R 0 0 Destination Address (32) 0 1 2 3 4 5 6 7 0- 2 Precedence 3 Normal delay low delay Options & Padding (multiple of 32) 4 Normal throughput High throughput 5 Normal Reliability High reliability Data 6- 7 Reserved . •Option and Padding - additional info to control functions such as routing and •Identification, Flags, Fragmentation Offset- use to segmentation and security reassembly packet Bit 0 = Reserved; must be 0 Bit 1 = DF ( 0 = May fragment; 1 = do not fragment ) Bit 2 = MF (0 = last fragment; 1 = more fragments ) 3 Issue on header format vers hlen TOS total length identification flag frag offset TTL protocol header checksum source address destination address options and padding • Checksum in header format will calculate only the header checksum. Computation will be done if there are changes in header value. TTL value is decrement at every hop. Therefore, computation will be done at every router hop. • Options and Padding Field will be checked at every router hop and this use up router processing time which will degrade router performance. 4 Address space • IPv4 with only 32 bits gave approximately 4.3 x109 • More connected devices • More management costs • More demanding applications - Communications appliances (e.g. phone, pager) - Information appliances(e.g. electronic books) - Entertainment appliances (e.g. set-top boxes) LARGE ADDRESS SPACE NEEDED Facts : With current world populations 2 persons need to share an IP address 5 Limitation to IPv4 addressing • Decision to stick with 32-bit address space meant that there were only 232 (4,294,967,296) IPv4 addresses available • Classful A, B, and C octet boundaries are easy to understand but inefficient to deploy in the real world. A /24 is too small for an average organization, while a /16 is too big! IP 4 Internet gowth 6 Fragmentation flag vers hlen TOS total length identification flag frag offset TTL protocol header checksum source address destination address • Identification Number options and padding 16 bits integer value used to identify all fragments. This id is not a sequence number! • Flags - 3 bits control fragmentation 0=may fragment 1=don’t fragment R DF MF 0=last fragment 1=more fragment reserved, must be 0 • Fragment offset - indicate the distance of fragment data from the start of the original datagram, measure in 8 octets unit 7 Problems in fragmentation • The end node has no way to know how many fragments there be. • Every node will travel independently.If any fragment lost, all datagram must be discarded • If any fragment fails to arrive (timer) all datagram must be discarded • IP will make no attempt to recover these situations (connectionless). Only give ICMP error e.g “Packet too big” • Security problems! 8 Routing problems • Large Backbone Routing Table backbone routing table explosion ~ 90K routes . Problem with legacy IPv4 • Routing Performance At every hop router will need to check and verify header checksum.This will increase processing time and degrade routing performance. Fragmentation of packets are also done by router. Might need to be fragmented several times. This will also effect routing performance. Hierarchical addressing scheme should be adopted and simplified header field can ease router burden. 9 IP layer security • Security at Network Layer. • Confidentiality, Integrity, and Authentication are key services used to protect against these threats • If data is encrypted while in transit, it is impossible for a perpetrator to observe or modify. • Security in IPv4 is not mandated. We have to run IPSec on top of IP. Strong Network-Layer authentication, identity spoofing and denial-of service can be prevented 10 Host auto-configuration Stateful Server Mode Via DHCP DHCP request DHCP host Server DHCP respond Stateless Server mode will be a better solution and can save cost 11 Quality of Service • Quality of Service in IPv4 is using best effort delivery services, for data to arrive its destination as soon as possible. • No reservation for bandwidth. This is adequate for traditional applications such as Telnet and FTP. But nowadays, multimedia applications need real-time and sensitive data transfer to the network. Therefore, better QOS is needed. An improved Quality of service need to be implemented. 12 What are IPv6 advantages? • scalable IP address with streamlined IP header • optimized routing table size (<10K routes) • better real time support • self-configuration of workstations • security features Note: IPv6 was designed to re-build and re-engineer IPv4; thus still inherit some IPv4’s characteristics but rejects its flaws 13 Header comparison 0 15 16 31 Removed (6) vers hlen TOS total length • ID, flags, frag offset 20 identification flags frag offset • TOS, hlen bytes TTL protocol header checksum • header checksum source address destination address Changed (3) options and padding • total length=> payload IPv4 • protocol=>next header • TTL=>hop limit vers traffic class flow label Added (2) payload length next header hop limit • traffic class 40 bytes source address • flow label destination address Expanded • address 32 to 128 bits IPv6 14 Major improvement 1- No Options. Options field is replaced with extension header. The removal of the options results in a fixed length, 40 byte IP header. 2- No header checksum. Transport and data link layer have already performed checksumming.The removal of this feature leads to fast IP packet’s processing. 3- No segmentation procedure by routers. With path MTU discovery in IPv6, only source host performs fragmentation process. Removal of this procedure will speed up IP forwarding in routers. 4- Eliminated IPv4’s 40-octet limit on options in IPv6, limit is total packet size, or Path MTU in some cases. 15 Packet size issues IPv6 requires that every link in the internet have an MTU of 1280 octets or greater. On any link that cannot convey a 1280-octet packet in one piece, link-specific fragmentation and reassembly must be provided at a layer below IPv6. Links that have a configurable MTU (for example, PPP links) must be configured to have an MTU of at least 1280 octets; it is recommended that they be configured with an MTU of 1500 octets or greater, to accommodate possible encapsulations (i.e., tunneling) without incurring IPv6-layer fragmentation. From each link to which a node is directly attached, the node must be able to accept packets as large as that link's MTU. 16 Fragmentation • IPv6 fragmentation & reassembly is an end-to-end function • Routers do not fragment packets BUT only send the ICMP “message too big”(with the new MTU size) using the Path MTU Discovery feature • Advantage: - better router performance; that is intermediate routers don’t have to check for the fragmentation fields (identification + flags + fragment offset fields) every time the packets pass through them 17 Path MTU discovery ICMP “packet too big” Destination Source Ethernet FDDI MTU=1500 FDDI FDDI MTU=4500 MTU=4500 MTU=4500 A B For packets bigger than 1280 bytes, path MTU discovery is expected: • start by assuming MTU of the first-hop link • if a packet reaches a link which couldn’t fit, an ICMP “packet too big” is generated and sent back to the source • then the source will fragmentize the packet into smaller chunks (following this new MTU size) and start this process all over again 18 IPv6 packet structure IPv6 Extension Higher-level protocol header Header Headers + application content header payload IPv6 packet Definitions: IP header provides addressing and control IP payload carries information and error/control protocols • Extension headers(optional): In IPv6, optional internet-layer information is encoded in separate headers that may be placed between the IPv6 header and the upper- layer header in a packet. There are a small number of such extension headers, each identified by a distinct Next Header value (RFC 2460). • Higher-level protocol header: ICMPv6, UDP & TCP 19 Higher-level protocol header Extension Headers Extension headers IPv6 Header + application content IPv6 packet IPv6 header TCP header + data next header=TCP IP header IP Payload IPv6 header Routing header TCP header + data next header=routing next header=TCP IP header Extension header IP Payload IPv6 header Routing header Fragment header fragment of next header=routing next header=fragment next header=TCP TCP header + data IP header Extension headers IP Payload Each extension header is an integer multiple of 8 octets long, in order to retain 8-octet alignment for subsequent headers. A full implementation of IPv6 includes implementation of the following extension headers: Hop-by-Hop, Options Routing, Fragment Destination, Options, Authentication Encapsulating Security Payload 20 Extension headers • Processed only by node identified in IPv6
Recommended publications
  • IPV6 MIGRATION and ADOPTION in INDIA by Shweta Satao
    Episteme: an online interdisciplinary, multidisciplinary & multi-cultural journal Bharat College of Arts and Commerce, Badlapur, MMR, India Volume 8, Issue 3 December 2019 IPV6 MIGRATION AND ADOPTION IN INDIA By Shweta Satao Abstract One of the major reasons for the IPv6 transition is because the allocation of IPv4 address space is running out of control and is gradually being exhausted. Though the Regional Internet Registries of all the continents are still allocating IPv4 addresses. Annually hundreds of millions of new smart phones that require internet connectivity are being sold. These demands for mobile phone have made the demand for internet connectivity to be increasing exponentially. We are in the age of smart mobile devices, social networking, and cloud computing and other new internet developments that are linked to the internet. There is need for Service Providers to ensure there is good, smooth and reliable internet connectivity via IP addresses. These makes IP addresses critical resources that sustain the business growth of service providers and also sustains an exponential economic growth generated through the internet. As hundreds of millions of mobile users are connected to the internet, there is need for a network that is ready for an internet that have both IPv4 and IPv6 addresses “IPv4 and IPv6 networks are not directly interoperable but the technologies used in the transition mechanisms allow hosts on either network to be involved in networking with opposing networks”. The transition mechanisms include: - Dual Stack Techniques - IPv6 over IPv4 tunneling techniques: 6to4 tunnel, Tunnel broker, Manually Configured Tunnel, ISATAP tunnels, IPv6 over IPv4 GRE tunnel.
    [Show full text]
  • Ipv6, a Passport to the Future Internet
    AFNIC’s Issue Papers IPv6, A Passport For The Future Internet 1 - Background 2 - Specification for the new version of IP (v6) Executive 3 - What’s new with IPv6? summary 4 - What "exhaustion of IPv4 space" After a historical review situating the means, and what lies behind it? exhaustion of the IPv4 address space, this paper underlines the real issues involved 5 - The integration of IPv6: how, who in this phenomenon and in the inevitable and where? transition from IPv4 to IPv6. It then briefly highlights the contributions of IPv6, recalls 6 - IPv6 integration: communication the roles of the various Internet stakeholders models, classification and describes the communication models for which IPv6 integration should be prioritized. 7 - A few examples of transition A set of illustrative but non-limitative mechanisms examples of transition mechanisms are given in order to show IPv6 integration in practice 8 - A few practical recommendations within various technical contexts. Finally, this for IPv6 integration paper makes operational recommendations to support the deployment of IPv6 and 9 - Seize the IPv6 opportunity – now! launches an appeal for stakeholders to seize – immediately – the opportunities provided 10 - Useful references by IPv6, in order to make the "The Future Internet" an open field for innovation. 1/10 IPv6, A Passport For The Future Internet Copyright AFNIC 2011 Reproduction of the texts authorized subject to acknowledgement of source: www.afnic.fr 1 Background The Internet was invented in the early 1970s in exceptional allocation of "Class B"1, address blocks, the United States and grew quite slowly until the the reuse of Class C blocks2, then the abolition of late 1980s.
    [Show full text]
  • Ortizjuarezmiguel.Pdf (5.402Mb)
    U N I V E R S I D A D V E R A C R U Z A N A FACULTAD DE INGENIERÍA REGIÓN VERACRUZ P O S G R A D O PROYECTO DE INTERVENCIÓN PROFESIONAL Modalidad Tesis SIMULACIÓN DEL PROTOCOLO IPV6 EN SISTEMAS HETEROGÉNEOS QUE PARA OBTENER EL GRADO DE: MAESTRIA EN INGENIERÍA APLICADA PRESENTA: LIC. MIGUEL ANTONIO ORTIZ JUÁREZ DIRECTOR DE TESIS: MTRO. CARLOS ARTURO CERÓN ÁLVAREZ BOCA DEL RÍO, VERACRUZ JUNIO 2015 AGRADECIMIENTOS A mis padres. Con la mayor gratitud por los esfuerzos realizados para que yo lograra terminar mi carrera profesional siendo para mí la mejor herencia. A mi madre que es el ser más maravilloso de todo el mundo. Gracias por el apoyo moral, tu cariño y comprensión que desde niño me has brindado, por guiar mi camino y estar junto a mí en los momentos más difíciles. A mi padre porque desde pequeño ha sido para mí un gran hombre maravilloso al que siempre he admirado. Gracias por todo. A mis hermanos y abuelo. Por el apoyo moral y el ánimo que siempre he recibido de ustedes y con el cual he logrado culminar mi esfuerzo, terminando así ́ mi maestría. Al Mtro. Carlos Arturo Cerón. Gracias por su asesoría en esta Tesis, por su apoyo en este trabajo, ya que sin su ayuda no hubiera sido posible la realización. A mis amigos y compañeros de la maestría que siempre estuvieron apoyando en todo, en especial a mi amigo Antonio, que siempre fue el compañero de proyectos. ÍNDICE RESUMEN ............................................................................................................................ 1 CAPITULO 1.
    [Show full text]
  • Guidelines for the Secure Deployment of Ipv6
    Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks NIST Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 December 2010 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Dr. Patrick D. Gallagher, Director GUIDELINES FOR THE SECURE DEPLOYMENT OF IPV6 Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-119 Natl. Inst. Stand. Technol. Spec. Publ. 800-119, 188 pages (Dec. 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately.
    [Show full text]
  • Ipv6 Tunneling Ipv6 Host Ipv4/V6
    Business Service Management for Performance I’m Running IPv6: How Do I Access??? Share Session 12150 Laura Knapp WW Business Consultant [email protected] 01/15/2013 © Applied Expert Systems, Inc. 2013 1 Business Service Management for Performance What is IPv6 Updated version of the Internet Protocol (IPv4) Defined in RFC 1752 New features Larger address space Encapsulation Class of service for audio, video, etc. Multicast support Authentication Encryption Automatic configuration/reconfiguration Support for non-IP protocols 01/15/2013 © Applied Expert Systems, Inc. 2013 2 Business Service Management for Performance IPv6 Technology Scope IP Service IPv4 Solution IPv6 Solution 32-bit, Network Addressing Range 128-bit, Multiple Address Translation Scopes Serverless, Auto configuration DHCP Reconfiguration, DHCP Security IPSec IPSec Mandated, works End-to-End Mobile IP with Direct Mobility Mobile IP Routing Differentiated Service, Differentiated Service, Quality-of-Service Integrated Service Integrated Service IP Multicast IGMP/PIM/Multicast MLD/PIM/Multicast BGP BGP,Scope Identifier 01/15/2013 © Applied Expert Systems, Inc. 2013 3 Business Service Management for Performance IPv6 Transition Paths – ISP Focus 01/15/2013 © Applied Expert Systems, Inc. 2013 4 Business Service Management for Performance IPv6 in the Enterprise 01/15/2013 © Applied Expert Systems, Inc. 2013 5 Business Service Management for Performance Types of IPv6 Node Types IPv4 only node – a node running only IPv4 IPv6/IPv4 node – a node running dual stack IPv6 only node – a node running only IPv6 IPv6 node – node running IPv6 and it may also run IPv4 IPv4 node – node running IPv4 and it may also run IPv6 01/15/2013 © Applied Expert Systems, Inc.
    [Show full text]
  • ETSI White Paper on Ipv6 Best Practices, Benefits, Transition
    ETSI White Paper No. 35 IPv6 Best Practices, Benefits, Transition Challenges and the Way Forward First edition – August 2020 ISBN No. 979-10-92620-31-1 ETSI 06921 Sophia Antipolis CEDEX, France Tel +33 4 92 94 42 00 [email protected] www.etsi.org Contributing organizations and authors CAICT Zhiruo Liu China Telecom Chongfeng Xie, Cong Li Cisco Patrick Wetterwald, Pascal Thubert, Francois Clad Hewlett-Packard Enterprise Yanick Pouffary Huawei Giuseppe Fioccola, Xipeng Xiao, Georgios Karagiannis, Shucheng(Will) Liu KPN Eduard Metz Luxembourg University Latif Ladid PT Telecom Jose Cananao, Jose Palma Post Luxembourg Sébastien Lourdez Telefonica Luis M. Contreras IPv6 Best Practices, Benefits, Transition Challenges and the Way Forward 2 Contents Contributing organizations and authors 2 Contents 3 Executive Summary 6 1 Background 8 1.1 Why should IPv6 become a priority again? 8 1.2 Goals of this White Paper 9 2 IPv6 progress in the last 5 years 10 2.1 Devices supporting IPv6 10 2.2 Content (web sites, cloud services) supporting IPv6 11 2.3 Networks supporting IPv6 12 2.4 Number of IPv6 users 12 2.5 Amount of IPv6 traffic 13 2.6 IPv6 standardization progress 14 3 IPv6 service design for Mobile, Fixed broadband and enterprises 14 3.1 IPv6 transition solutions from operator perspective 15 3.1.1 For IPv6 introduction 16 3.1.2 For IPv6-only service delivery 17 3.2 IPv6 prefix and address assignment at the CPEs 22 3.2.1 For MBB UEs 23 3.2.2 For FBB RGs 23 3.2.3 For Enterprise CPEs 23 3.3 IPv6 Packet Transport 24 3.4 IPv6 deployment inside enterprise
    [Show full text]
  • Bipac 8900X R3
    BiPAC 8900X R3 3G/4G LTE VDSL2/ADSL2+ VPN Firewall Router User Manual Version Released: 2.50a.d16 Last revised date: December 18, 2017 Table of Contents Chapter 1: Introduction .................................................................................................................................. 1 Introduction to your Router..................................................................................................................... 1 Features ................................................................................................................................................... 3 VDSl2/ADSL2+ Compliance ............................................................................................................... 3 Network Protocols and Features ...................................................................................................... 4 Firewall.............................................................................................................................................. 4 Quality of Service Control ................................................................................................................. 4 ATM, PTM and PPP Protocols ........................................................................................................... 5 IPTV Applications .............................................................................................................................. 5 USB Application Server ....................................................................................................................
    [Show full text]
  • Migration to a New Internet Protocol in Operator Network
    Jarkko Mäntysaari Migration to a New Internet Protocol in Operator Network Aalto University School of Electrical Engineering Thesis submitted for examination for the degree of Master of Science in Technology Espoo 14.01.2013 Supervisor: Professor Raimo Kantola Instructor: M.Sc. (Tech.) Zahed Iqbal Abstract AALTO YLIOPISTO MASTER’S THESIS SÄHKÖTEKNIIKAN ABSTRACT KORKEAKOULU Author: Jarkko Mäntysaari Title of the Thesis: IPv4 to IPv6 Migration in Operator Network Date: 14.01.2013 Number of pages: 56 Department of Communications and Networking Professorship: S-38 Networking Technology Supervisor: Professor Raimo Kantola Instructor: M.Sc. (Tech.) Zahed Iqbal This thesis explains the differences between IPv4 and IPv6. Another important part of the thesis is to review the current readiness of IPv6 for worldwide production use. The status (in terms of readiness, adaptability, compatibility and co-existence) of IPv6 in TeliaSonera is discussed in more detail. The most important reason for migrating to IPv6 is the address exhaustion of IPv4. This may not be a big problem in the developed countries but in developing countries the growth of Internet is fast and lots of more addresses are needed. The need for addresses is not only from computers but from many devices connected to the Internet. Attempts to slow down the exhaustion of free addresses have been made but current solutions are not enough. IPv6 will solve the problem by using much longer addresses. It will also add security features and simplify headers to speed up routing. TeliaSonera has started to roll out IPv6 services. At the beginning the corporate customers will receive IPv6 connectivity and consumers will follow later.
    [Show full text]
  • NIST SP 800-119, Guidelines for the Secure Deployment of Ipv6
    Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks NIST Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 December 2010 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Dr. Patrick D. Gallagher, Director GUIDELINES FOR THE SECURE DEPLOYMENT OF IPV6 Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-119 Natl. Inst. Stand. Technol. Spec. Publ. 800-119, 188 pages (Dec. 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately.
    [Show full text]
  • [::] Ipv6 Para Operadores De Red
    [::] IPv6 para operadores de Red Alejandro Acosta Santiago Aggio Guillermo Cicileo Tomas Lynch Antonio M. Moreiras Mariela Rocha Arturo Servin Sofía Silva Berenguer :: Agradecimientos A Internet Society (www.isoc.org.) por haber donado los fondos que han permitido la realización de este Proyecto y su constante apoyo para estimular la continuidad y relevancia de los Capítulos. A LACNIC (www.lacnic.net) por sus aportes al contenido de este libro así como también por las tareas de capacitación orientadas a la toma de conciencia, que en torno a IPv6 vienen desarrollando en Latinoamérica y Caribe. A todos los autores y colaboradores que han posibilitado con su dedicación y trabajo la concreción de este Proyecto, que tiene por objeto contribuir a la Comunidad de Internet en la adopción e implementación del nuevo Protocolo IPv6. La Comisión Directiva ISOC-AR Capítulo Argentina de Internet Society IPv6 para Operadores de Red, 1ª Edición. 2014 Ebook ISBN 978-987-45725-0-9 IPv6 para Operadores de Red por ISOC-Ar Asociación Civil de Argentinos por Internet se distribuye bajo una Licencia Creative Commons Atribución- NoComercial-CompartirIgual 4.0 Internacional. 2014. ISOC-Ar Asociación Civil de Argentinos en Internet (Capítulo Argenti- na de ISOC) Suipacha 128 3° piso F Ciudad de Buenos Aires, Argentina Diseño Integral: Transversal Branding Comité Editor: Christian O’Flaherty y Carlos M. Martínez :: Indice de contenidos :: Plan de direccionamiento .1 Alejandro Acosta y Arturo Servin pag_15 :: Monitoreo en IPv6 .2 Mariela Rocha pag_37 :: Centros de datos y virtualización en IPv6 .3 Santiago Aggio y Arturo Servin pag_49 :: Ruteo externo en IPv6 .4 Guillermo Cicileo pag_87 :: IPv6 en redes móviles .5 Tomas Lynch pag_103 :: Mecanismos de transición .6 Antonio M.
    [Show full text]
  • Network Performance Metrics for Transition From
    NETWORK PERFORMANCE METRICS FOR TRANSITION FROM IPv4 TO IPv6 NETWORKS Samuel Wafula Barasa A thesis submitted in partial fulfilment for the requirements of the award of degree of Doctor of Philosophy in Information Technology of Kibabii University November 2019 DECLARATION This thesis is my original work prepared with no other than indicated sources support and has not been presented for a degree or any other award. Signature ……………………………………. Date………………………………… Samuel W. Barasa PhD/IT/011/14 CERTIFICATION The undersigned certify that we have read and hereby recommend for acceptance of Kibabii University a thesis entitled “Network Performance Metrics for Transition from IPv4 to IPv6 Networks”. Signature ……………………………………. Date………………………………… Prof. Samuel Mbugua, PhD Department of Information Technology (IT) Kibabii University Signature ……………………………………. Date………………………………… Prof. Simon Karume, PhD Department of Computing and Informatics Laikipia University ii COPYRIGHT This thesis is copyright materials protected under the Berne Convection, the copyright act 2001 and other international and national enactments in that behalf, on intellectual property. It may not be reproduced by any means in full or in part except for short extracts in fair dealing for research or private study, critical scholarly review or discourse with acknowledgement, with written permission of the Dean School of Graduate Studies on behalf of both the author and Kibabii University. iii DEDICATION I dedicate this work to my loving wife Isabella Tabani and my son Macmorris Muyonga. iv ACKNOWLEDGEMENT First of all, the glory be to the Almighty God who has made it possible for me to come this far. I wish to thank my supervisors Prof. Samuel Mbuguah and Prof.
    [Show full text]
  • Ipv4-In-Ipv6: Una Nuova Strategia Per La Transizione a Ipv6
    IPv4-in-IPv6: una nuova strategia per la transizione a IPv6 Massimo Vellucci2, Massimo Bernaschi1, Luca Vollero2 1 CNR-IAC, Istituto per la Applicazioni del Calcolo 2 Università Campus Bio-Medico di Roma Abstract. IPv4 è il protocollo di comunicazione adottato dalla maggioranza dei dispositivi collegati a Internet. Tut- tavia, essendo un protocollo definito nelle prime fasi dello sviluppo di Internet, il suo utilizzo pone problemi legati all’esaurimento degli indirizzi IPv4 disponibili e ad altre sue limitazioni costitutive. IPv6 è la nuova versione del protocollo Internet, definita con l’obiettivo di superare i limiti di IPv4. La sfida principale nella diffusione di IPv6 è data dalla disponibilità di meccanismi efficaci per l’integrazione dei servizi attivi in reti IPv4 su reti IPv6, minimizzando i costi ed i rischi connessi alla migrazione. Il presente lavoro propone un nuovo meccanismo basato sul tunneling dinamico di pacchetti IPv4 in IPv6 e deno- minato, per questo, IPv4-in-IPv6. L’approccio proposto è rivolto agli operatori di rete che vogliono semplificare la configurazione e la gestione del loro backbone IPv6, mantenendo il pieno supporto di IPv4 sulle reti di accesso. 1. Introduzione nuovo meccanismo basato sul tunneling dinamico IPv4, (1) è il protocollo di comunicazione adottato di pacchetti IPv4 in IPv6 e denominato, per que- dalla maggioranza dei dispositivi collegati a Inter- sto, IPv4-in-IPv6. Tale meccanismo si aggiunge net. Tuttavia, essendo un protocollo definito nelle a quelli disponibili nel suddetto “transition tool- prime fasi dello sviluppo di Internet, il suo utilizzo box”. L’approccio proposto è rivolto agli operatori pone dei problemi legati all’esaurimento degli in- di rete che vogliono semplificare la configurazione dirizzi IPv4 disponibili e ad altre sue limitazioni e la gestione del loro backbone IPv6, mantenendo costitutive in ambito di mobilità e sicurezza.
    [Show full text]