SlideShare a Scribd company logo
1/29/2015 1
Shashwat Shriparv
dwivedishashwat@gmail.com
InfinitySoft
1/29/2015 2
STARTING
• It was in 1990 that (Internet Engineering Task Force) IETF
started working on a new version of Internet Protocol (IP),
one which would never run out of address, would solve a
variety of other problems, and be more flexible and efficient
as well. Its major goals were to:-
1) Support billions of hosts
2) Reduce the size of the routing tables
3) Simplify the protocols
4) Provide better security and authentication.
5) Pay more attention to type of services
6) Add multicasting
7) Allow the protocol to evolve in future
8) Permit the old and new protocol to coexist for years…
1/29/2015 3
• From a large number of proposals ,a modified combined version by now
called SIPP (Simple Internet Protocol Plus) was selected and given the
designation IPv6.
• IPv6 meets the goals fairly well. It maintains the good features of IP,
discards the bad ones and add new ones when needed. In general IPv6 is
not compatible with IPv4 but is compatible with all other Internet protocols
including TCP,DNS,UDP etc…
• MAIN FEATURES
 IPv6 has longer address than IPv4.
 Simplification of header.
 Better support for options
 Big advance in security.
 More attention to the type of services
1/29/2015 4
MAIN IPv6 HEADER • The Version field is always 6 for
IPv6 and 4 for IPv4.
• The Priority Field is used to
distinguish between packets
whose sources can be flow
controlled and those that cannot.
Values 0 to 7 are for
transmissions that are capable of
slowing down in view of
congestion. Values 8 to 15 are for
real time traffic whose sending
rate is constant, even if all the
packets are lost. This distinction
allows the router to deal with
packets better in event of
congestion. Within each group,
low-numbered are less important
than high numbered. The IPv6
standard suggests to use
1 News
4 FTP
6 Telnet
1/29/2015 5
CONTD…..
o The Flow label field is under experimentation and will be
used to allow a source and destination to set up a
pseudoconnection with particular properties and connections.
The flow can be set up in advance and given an identifier.
• Each flow is designated by the source address, destination
address and flow numbers. Even if 2 flows coming from
different hosts but with the same flow number pass thru the
same router, the router will be able to tell them apart with the
help of source and destination address. Flow numbers will be
chosen randomly rather than assigned sequentially starting
from 1.
• The Payload length field tells how many bytes follow the 40-
byte header..
1/29/2015 6
FOLLOWED BY…..
• The Next header field tells which of the currently 6 extension header
follows this one. If this header is the last IP header, the next header field
tells which transport protocol handler (e.g. TCP,UDP) to pass the packet to.
• The Hop limit field is used to keep packets from living forever. It is same
as the Time to live field in IPv4 a field that is decremented on each hop..
• Next is the Source address and Destination address fields. In the original
proposal, SIP used 8-byte address. But during many process reviews it was
felt that with 8-byte address IPv6 would run out of address within a span of
time and 16-byte address would never. So the latter was fixed.
1/29/2015 7
IPv6 ADDRESS SPACES
Prefix (Binary) Usage Fraction
0000 0000 Reserved (Including IPv4) 1/256
0000 0001 Unassigned 1/256
0000 001 OSI NSAP addresses 1/128
0000 010 Novell Netware IPX addresses 1/128
0000 011 Unassigned 1/128
0000 1 Unassigned 1/32
0001 Unassigned 1/16
001 Unassigned 1/8
010 Provider based addresses 1/8
011 Unassigned 1/8
1/29/2015 8
Prefix (Binary) Usage Fraction
100 Geographic base address 1/8
101 Unassigned 1/8
110 Unassigned 1/8
1110 Unassigned 1/16
11110 Unassigned 1/32
1111 10 Unassigned 1/64
1111 110 Unassigned 1/128
1111 1110 0 Unassigned 1/512
1111 1110 10 Link Local use address 1/1024
1111 1110 11 Site Local use address 1/1024
1111 1111 Multicast 1/256
1/29/2015 9
DETAILS…
• The IPv6 address space is divided as shown above. Addresses beginning
with 80 zeroes are reserved for IPv4 addresses. Two variants are supported,
distinguished by the next 16 bits. These variants relate to how IPv6 packets
will be tunneled over the existing IPv4 infrastructure…
• Multicast address have a 4 bit flag field and a 4 bit scope field following
the prefix, then a 112-bit group identifier. One of the flag bits in it
distinguishes permanent from transient groups. The scope field allows
multicast to be limited to the current link, site ,organization or planet.
These 4 scopes are spread out over the 16 values to allow new scopes to be
added later…
• In addition to supporting standard unicast (point-to-point) and multicast
addresses, IPv6 also supports new kind of addressing, anycast which is like
multicasting, in that the destination is a group of addresses, but instead of
trying to deliver the packet to all of them, it tries to deliver it to just one,
usually the nearest one…
1/29/2015 10
COMPARISON OF IPv4 HEADER & IPv6
HEADER
1/29/2015 11
• Purpose of comparing the IPv4 header with the IPv6 Header is to see what
has been left out of IPv6.:-
☻ The IHL Field in IPv4 is gone as the Next Header field in IPv6 tells what
follows the last IP header.
☻ All the fields relating to fragmentation in IPv4 were removed bcoz IPv6
takes a different approach to fragmentation. All IPv6 hosts and routers must
support packets of 576 bytes. This rule makes fragmentation less likely to
occur.
☻ Finally the Checksum field in IPv4 is gone bcoz it greatly reduces
performance. Removing all these features has resulted in lean and mean
network layer protocol which is IPv6…
1/29/2015 12
EXTENSION HEADERS
• Each of the extension headers are optional, but if more than one is present,
they must appear directly after the fixed header. Some of the headers have a
fixed format while others contain a variable number of variable length
fields. Each item is encoded as a tuple (Type, Length, Value)…
• The Type is a 1-byte field telling which option is chosen. Its values have
been chosen so that the first 2 bits tell the routers how to process the
options when they do not know. The choices are skip the option, discard
the packet and send back an ICMP packet, discard the packet and do not
send back an ICMP packet, to multicast addresses.
• The Length is a 1-byte field. It tells how long the value is (0 to 255 bytes).
• The Value is any information required upto 255 bytes…
• The different kinds of extension headers defined at present are listed in
detail below….
1/29/2015 13
Extension header Description
Hop-by-hop options Miscellaneous information for routers
Routing Full or partial route to follow
Fragmentation Management of datagram packets
Authentication Verification of sender’s identity
Encrypted security payload Information about the encrypted contents
Destination options Additional information for destination
1/29/2015 14
HOP-BY-HOP
• Used for information that all routers along the path must examine.
• Format
Next Header 0 194 0
Jumbo payload length
•Like all extension headers, this one starts out with a byte telling
what kind of header comes the next. This byte is then followed by
another one which tells the duration for which the hop-by-hop header is
in bytes. The next 2 bytes defines the datagram size as a 4-byte number.
The last 4-byte gives the size of the datagram. Sizes less than 65,536 are
not permitted and will Result in router discarding the packet and sending
back an ICMP error message. The datagram's using this header are called
Jumbograms. Its use is important for supercomputer applications…
1/29/2015 15
ROUTING HEADER
• It lists one or more routers that must be visited on the way to the
destinations. Two types of routing are available.
• Strict routing The full path is supplied
• Loose routing Only selected routers are supplied
• Format
Next Header 0 Number of
address
Next Address
Bit Map
1-24 Addresses
1/29/2015 16
CONTD…
• The first 4 bytes contains four 1-byte integers: the next header type, the
routing type (currently 0), the number of addresses present in the header (1
to 24) and the index of the next address to visit. The latter field starts at 0
and is incremented as each address is visited.
• Then comes a reserved byte followed by the bit map with bits which tells
whether each address must follow strict source routing or loose source
routing.
• The fragment header deals with fragmentation. In IPv6 only the source
host can fragment a packet.
• The Authentication header provides a mechanism by which the receiver
of a packet can be sure of who send it. These headers use cryptographic
techniques to accomplish their missions. It contains 3 parts. First part has 4-
bytes holding the next header number, length of authentication header and
16 zero bits. Then comes the 32-bit key number. Finally the checksum. The
payload of authentication header is sent unencrypted.
1/29/2015 17
• Encrypted security payload extension header is used for packets that
must be sent secretly. It starts out with a 32-bit key number followed by the
encrypted payload.
• The Destination option header is intended for fields that needs to be
interpreted at the destination host.
1/29/2015 18
Shashwat Shriparv
dwivedishashwat@gmail.com
InfinitySoft

More Related Content

PPTX
Dik acn presentation
dikshagupta111
 
PPTX
TCPLS presentation @ietf 109
Olivier Bonaventure
 
PPTX
10 routing-bgp
Olivier Bonaventure
 
PPTX
10 coms 525 tcpip - internet protocol - ip
Palanivel Kuppusamy
 
PPTX
Multipath TCP
Olivier Bonaventure
 
PPTX
IPv6 The Big Move
frenildand
 
PPTX
Making our networking stack truly extensible
Olivier Bonaventure
 
Dik acn presentation
dikshagupta111
 
TCPLS presentation @ietf 109
Olivier Bonaventure
 
10 routing-bgp
Olivier Bonaventure
 
10 coms 525 tcpip - internet protocol - ip
Palanivel Kuppusamy
 
Multipath TCP
Olivier Bonaventure
 
IPv6 The Big Move
frenildand
 
Making our networking stack truly extensible
Olivier Bonaventure
 

What's hot (20)

PDF
Network layer logical addressing
Sri Manakula Vinayagar Engineering College
 
PDF
Ipv6 cheat sheet
balamurugan N
 
PPTX
Part 9 : Congestion control and IPv6
Olivier Bonaventure
 
PPT
Internet innovation with Multipath TCP
Olivier Bonaventure
 
PPTX
Part 7 : HTTP/2, UDP and TCP
Olivier Bonaventure
 
PPTX
Innovation is back in the transport and network layers
Olivier Bonaventure
 
PPTX
Network Layer
Lakshika Rasanjali
 
DOCX
Network interview questions
rajasekar1712
 
PPT
Ipv4 ppt
Sonal Chandel
 
PPTX
0-RTT TCP converters
Olivier Bonaventure
 
PDF
Deploy ipv6 multicast_v0_1
Nguyen Thanh
 
PPTX
IPv6 Segment Routing : an end-to-end solution ?
Olivier Bonaventure
 
PPTX
TCP/IP and UDP protocols
Dawood Faheem Abbasi
 
PPTX
Dynamic Routing Protocol OSPF
Atakan ATAK
 
PPT
BGP Overview
Matt Bynum
 
PPTX
11 bgp-ethernet
Olivier Bonaventure
 
PPTX
Future Internet protocols
Olivier Bonaventure
 
PPT
rip, ospf 13-14
ghulamAbbas228
 
PPTX
IPv6 Entreprise Multihoming
Olivier Bonaventure
 
Network layer logical addressing
Sri Manakula Vinayagar Engineering College
 
Ipv6 cheat sheet
balamurugan N
 
Part 9 : Congestion control and IPv6
Olivier Bonaventure
 
Internet innovation with Multipath TCP
Olivier Bonaventure
 
Part 7 : HTTP/2, UDP and TCP
Olivier Bonaventure
 
Innovation is back in the transport and network layers
Olivier Bonaventure
 
Network Layer
Lakshika Rasanjali
 
Network interview questions
rajasekar1712
 
Ipv4 ppt
Sonal Chandel
 
0-RTT TCP converters
Olivier Bonaventure
 
Deploy ipv6 multicast_v0_1
Nguyen Thanh
 
IPv6 Segment Routing : an end-to-end solution ?
Olivier Bonaventure
 
TCP/IP and UDP protocols
Dawood Faheem Abbasi
 
Dynamic Routing Protocol OSPF
Atakan ATAK
 
BGP Overview
Matt Bynum
 
11 bgp-ethernet
Olivier Bonaventure
 
Future Internet protocols
Olivier Bonaventure
 
rip, ospf 13-14
ghulamAbbas228
 
IPv6 Entreprise Multihoming
Olivier Bonaventure
 
Ad

Viewers also liked (18)

PPTX
My sql
Shashwat Shriparv
 
PPTX
Firewalls
Shashwat Shriparv
 
DOCX
Next generation technology
Shashwat Shriparv
 
PPTX
H base introduction & development
Shashwat Shriparv
 
PPTX
Fundamental programming structures in java
Shashwat Shriparv
 
PDF
Infinitytech
Shashwat Shriparv
 
PPTX
Hadoop migration and upgradation
Shashwat Shriparv
 
PPTX
Dynamic storage allocation techniques
Shashwat Shriparv
 
PPTX
Control statements in java
Shashwat Shriparv
 
PPTX
R language introduction
Shashwat Shriparv
 
PPTX
I mode
Shashwat Shriparv
 
PPTX
Honeypot
Shashwat Shriparv
 
PPTX
Database design concept
Shashwat Shriparv
 
PPTX
Desirable software features simulation & modeling
Shashwat Shriparv
 
PPTX
Graphics processing unit
Shashwat Shriparv
 
Next generation technology
Shashwat Shriparv
 
H base introduction & development
Shashwat Shriparv
 
Fundamental programming structures in java
Shashwat Shriparv
 
Infinitytech
Shashwat Shriparv
 
Hadoop migration and upgradation
Shashwat Shriparv
 
Dynamic storage allocation techniques
Shashwat Shriparv
 
Control statements in java
Shashwat Shriparv
 
R language introduction
Shashwat Shriparv
 
Database design concept
Shashwat Shriparv
 
Desirable software features simulation & modeling
Shashwat Shriparv
 
Graphics processing unit
Shashwat Shriparv
 
Ad

Similar to I pv6 (20)

PDF
Introduction to IPv6
Sara Q. Abedulridha
 
PDF
IPv6 Community Event: IPv6 Protocol Architecture
APNIC
 
PDF
IPv4.pdf
SravanKosaraju1
 
PDF
IPv6 .pdf
niran10
 
PPT
Ipv6up
asimnawaz54
 
PPTX
I pv6
Varsha Kumar
 
PPTX
Unit 2- Next Generation IP-1.pptx
DESTROYER39
 
PPTX
Internet Protocol v6
Harshvardhan Shivhare
 
PPT
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
gopi5692
 
PPTX
Introduction to ipv6 v1.3
Karunakant Rai
 
PPT
Network Layer And I Pv6
Ram Dutt Shukla
 
PPTX
Ipv4 and Ipv6
Rishav Bhurtel
 
PDF
IPv6: Internet Protocol version 6
Ankita Mahajan
 
PPTX
IPv6 - The Next next generation protocol
Mohit Sharma
 
PPTX
CN Unit 4.pptx related to ip network klk;k;hgkjkgkdk
AnupamaPatil27
 
DOCX
i pv6
BishalWosti1
 
PPTX
IPv6
Divye Kapoor
 
DOC
Ipv6 routing
srikrishna mallavarapu
 
PDF
Ipv4 & ipv6
kamran_share
 
PPT
Tlcm513 ipv6
CAL
 
Introduction to IPv6
Sara Q. Abedulridha
 
IPv6 Community Event: IPv6 Protocol Architecture
APNIC
 
IPv4.pdf
SravanKosaraju1
 
IPv6 .pdf
niran10
 
Ipv6up
asimnawaz54
 
Unit 2- Next Generation IP-1.pptx
DESTROYER39
 
Internet Protocol v6
Harshvardhan Shivhare
 
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
gopi5692
 
Introduction to ipv6 v1.3
Karunakant Rai
 
Network Layer And I Pv6
Ram Dutt Shukla
 
Ipv4 and Ipv6
Rishav Bhurtel
 
IPv6: Internet Protocol version 6
Ankita Mahajan
 
IPv6 - The Next next generation protocol
Mohit Sharma
 
CN Unit 4.pptx related to ip network klk;k;hgkjkgkdk
AnupamaPatil27
 
Ipv4 & ipv6
kamran_share
 
Tlcm513 ipv6
CAL
 

More from Shashwat Shriparv (20)

PPTX
Learning Linux Series Administrator Commands.pptx
Shashwat Shriparv
 
PPTX
LibreOffice 7.3.pptx
Shashwat Shriparv
 
PPTX
Kerberos Architecture.pptx
Shashwat Shriparv
 
PPTX
Suspending a Process in Linux.pptx
Shashwat Shriparv
 
PPTX
Kerberos Architecture.pptx
Shashwat Shriparv
 
PPTX
Command Seperators.pptx
Shashwat Shriparv
 
DOCX
Upgrading hadoop
Shashwat Shriparv
 
PPTX
Hive query optimization infinity
Shashwat Shriparv
 
PPTX
Hbase interact with shell
Shashwat Shriparv
 
PPT
H base development
Shashwat Shriparv
 
PPTX
H base
Shashwat Shriparv
 
PPTX
Apache tomcat
Shashwat Shriparv
 
PPTX
Linux 4 you
Shashwat Shriparv
 
PDF
Introduction to apache hadoop
Shashwat Shriparv
 
DOC
Configure h base hadoop and hbase client
Shashwat Shriparv
 
DOCX
Java interview questions
Shashwat Shriparv
 
DOCX
C# interview quesions
Shashwat Shriparv
 
PPTX
Inventory system
Shashwat Shriparv
 
PPTX
Intermediate code generation1
Shashwat Shriparv
 
PPTX
Information system availibility control
Shashwat Shriparv
 
Learning Linux Series Administrator Commands.pptx
Shashwat Shriparv
 
LibreOffice 7.3.pptx
Shashwat Shriparv
 
Kerberos Architecture.pptx
Shashwat Shriparv
 
Suspending a Process in Linux.pptx
Shashwat Shriparv
 
Kerberos Architecture.pptx
Shashwat Shriparv
 
Command Seperators.pptx
Shashwat Shriparv
 
Upgrading hadoop
Shashwat Shriparv
 
Hive query optimization infinity
Shashwat Shriparv
 
Hbase interact with shell
Shashwat Shriparv
 
H base development
Shashwat Shriparv
 
Apache tomcat
Shashwat Shriparv
 
Linux 4 you
Shashwat Shriparv
 
Introduction to apache hadoop
Shashwat Shriparv
 
Configure h base hadoop and hbase client
Shashwat Shriparv
 
Java interview questions
Shashwat Shriparv
 
C# interview quesions
Shashwat Shriparv
 
Inventory system
Shashwat Shriparv
 
Intermediate code generation1
Shashwat Shriparv
 
Information system availibility control
Shashwat Shriparv
 

Recently uploaded (20)

PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Doc9.....................................
SofiaCollazos
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Software Development Methodologies in 2025
KodekX
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 

I pv6

  • 2. 1/29/2015 2 STARTING • It was in 1990 that (Internet Engineering Task Force) IETF started working on a new version of Internet Protocol (IP), one which would never run out of address, would solve a variety of other problems, and be more flexible and efficient as well. Its major goals were to:- 1) Support billions of hosts 2) Reduce the size of the routing tables 3) Simplify the protocols 4) Provide better security and authentication. 5) Pay more attention to type of services 6) Add multicasting 7) Allow the protocol to evolve in future 8) Permit the old and new protocol to coexist for years…
  • 3. 1/29/2015 3 • From a large number of proposals ,a modified combined version by now called SIPP (Simple Internet Protocol Plus) was selected and given the designation IPv6. • IPv6 meets the goals fairly well. It maintains the good features of IP, discards the bad ones and add new ones when needed. In general IPv6 is not compatible with IPv4 but is compatible with all other Internet protocols including TCP,DNS,UDP etc… • MAIN FEATURES  IPv6 has longer address than IPv4.  Simplification of header.  Better support for options  Big advance in security.  More attention to the type of services
  • 4. 1/29/2015 4 MAIN IPv6 HEADER • The Version field is always 6 for IPv6 and 4 for IPv4. • The Priority Field is used to distinguish between packets whose sources can be flow controlled and those that cannot. Values 0 to 7 are for transmissions that are capable of slowing down in view of congestion. Values 8 to 15 are for real time traffic whose sending rate is constant, even if all the packets are lost. This distinction allows the router to deal with packets better in event of congestion. Within each group, low-numbered are less important than high numbered. The IPv6 standard suggests to use 1 News 4 FTP 6 Telnet
  • 5. 1/29/2015 5 CONTD….. o The Flow label field is under experimentation and will be used to allow a source and destination to set up a pseudoconnection with particular properties and connections. The flow can be set up in advance and given an identifier. • Each flow is designated by the source address, destination address and flow numbers. Even if 2 flows coming from different hosts but with the same flow number pass thru the same router, the router will be able to tell them apart with the help of source and destination address. Flow numbers will be chosen randomly rather than assigned sequentially starting from 1. • The Payload length field tells how many bytes follow the 40- byte header..
  • 6. 1/29/2015 6 FOLLOWED BY….. • The Next header field tells which of the currently 6 extension header follows this one. If this header is the last IP header, the next header field tells which transport protocol handler (e.g. TCP,UDP) to pass the packet to. • The Hop limit field is used to keep packets from living forever. It is same as the Time to live field in IPv4 a field that is decremented on each hop.. • Next is the Source address and Destination address fields. In the original proposal, SIP used 8-byte address. But during many process reviews it was felt that with 8-byte address IPv6 would run out of address within a span of time and 16-byte address would never. So the latter was fixed.
  • 7. 1/29/2015 7 IPv6 ADDRESS SPACES Prefix (Binary) Usage Fraction 0000 0000 Reserved (Including IPv4) 1/256 0000 0001 Unassigned 1/256 0000 001 OSI NSAP addresses 1/128 0000 010 Novell Netware IPX addresses 1/128 0000 011 Unassigned 1/128 0000 1 Unassigned 1/32 0001 Unassigned 1/16 001 Unassigned 1/8 010 Provider based addresses 1/8 011 Unassigned 1/8
  • 8. 1/29/2015 8 Prefix (Binary) Usage Fraction 100 Geographic base address 1/8 101 Unassigned 1/8 110 Unassigned 1/8 1110 Unassigned 1/16 11110 Unassigned 1/32 1111 10 Unassigned 1/64 1111 110 Unassigned 1/128 1111 1110 0 Unassigned 1/512 1111 1110 10 Link Local use address 1/1024 1111 1110 11 Site Local use address 1/1024 1111 1111 Multicast 1/256
  • 9. 1/29/2015 9 DETAILS… • The IPv6 address space is divided as shown above. Addresses beginning with 80 zeroes are reserved for IPv4 addresses. Two variants are supported, distinguished by the next 16 bits. These variants relate to how IPv6 packets will be tunneled over the existing IPv4 infrastructure… • Multicast address have a 4 bit flag field and a 4 bit scope field following the prefix, then a 112-bit group identifier. One of the flag bits in it distinguishes permanent from transient groups. The scope field allows multicast to be limited to the current link, site ,organization or planet. These 4 scopes are spread out over the 16 values to allow new scopes to be added later… • In addition to supporting standard unicast (point-to-point) and multicast addresses, IPv6 also supports new kind of addressing, anycast which is like multicasting, in that the destination is a group of addresses, but instead of trying to deliver the packet to all of them, it tries to deliver it to just one, usually the nearest one…
  • 10. 1/29/2015 10 COMPARISON OF IPv4 HEADER & IPv6 HEADER
  • 11. 1/29/2015 11 • Purpose of comparing the IPv4 header with the IPv6 Header is to see what has been left out of IPv6.:- ☻ The IHL Field in IPv4 is gone as the Next Header field in IPv6 tells what follows the last IP header. ☻ All the fields relating to fragmentation in IPv4 were removed bcoz IPv6 takes a different approach to fragmentation. All IPv6 hosts and routers must support packets of 576 bytes. This rule makes fragmentation less likely to occur. ☻ Finally the Checksum field in IPv4 is gone bcoz it greatly reduces performance. Removing all these features has resulted in lean and mean network layer protocol which is IPv6…
  • 12. 1/29/2015 12 EXTENSION HEADERS • Each of the extension headers are optional, but if more than one is present, they must appear directly after the fixed header. Some of the headers have a fixed format while others contain a variable number of variable length fields. Each item is encoded as a tuple (Type, Length, Value)… • The Type is a 1-byte field telling which option is chosen. Its values have been chosen so that the first 2 bits tell the routers how to process the options when they do not know. The choices are skip the option, discard the packet and send back an ICMP packet, discard the packet and do not send back an ICMP packet, to multicast addresses. • The Length is a 1-byte field. It tells how long the value is (0 to 255 bytes). • The Value is any information required upto 255 bytes… • The different kinds of extension headers defined at present are listed in detail below….
  • 13. 1/29/2015 13 Extension header Description Hop-by-hop options Miscellaneous information for routers Routing Full or partial route to follow Fragmentation Management of datagram packets Authentication Verification of sender’s identity Encrypted security payload Information about the encrypted contents Destination options Additional information for destination
  • 14. 1/29/2015 14 HOP-BY-HOP • Used for information that all routers along the path must examine. • Format Next Header 0 194 0 Jumbo payload length •Like all extension headers, this one starts out with a byte telling what kind of header comes the next. This byte is then followed by another one which tells the duration for which the hop-by-hop header is in bytes. The next 2 bytes defines the datagram size as a 4-byte number. The last 4-byte gives the size of the datagram. Sizes less than 65,536 are not permitted and will Result in router discarding the packet and sending back an ICMP error message. The datagram's using this header are called Jumbograms. Its use is important for supercomputer applications…
  • 15. 1/29/2015 15 ROUTING HEADER • It lists one or more routers that must be visited on the way to the destinations. Two types of routing are available. • Strict routing The full path is supplied • Loose routing Only selected routers are supplied • Format Next Header 0 Number of address Next Address Bit Map 1-24 Addresses
  • 16. 1/29/2015 16 CONTD… • The first 4 bytes contains four 1-byte integers: the next header type, the routing type (currently 0), the number of addresses present in the header (1 to 24) and the index of the next address to visit. The latter field starts at 0 and is incremented as each address is visited. • Then comes a reserved byte followed by the bit map with bits which tells whether each address must follow strict source routing or loose source routing. • The fragment header deals with fragmentation. In IPv6 only the source host can fragment a packet. • The Authentication header provides a mechanism by which the receiver of a packet can be sure of who send it. These headers use cryptographic techniques to accomplish their missions. It contains 3 parts. First part has 4- bytes holding the next header number, length of authentication header and 16 zero bits. Then comes the 32-bit key number. Finally the checksum. The payload of authentication header is sent unencrypted.
  • 17. 1/29/2015 17 • Encrypted security payload extension header is used for packets that must be sent secretly. It starts out with a 32-bit key number followed by the encrypted payload. • The Destination option header is intended for fields that needs to be interpreted at the destination host.