Professional Documents
Culture Documents
WHtepaper On IPv6
WHtepaper On IPv6
Suhasini Tiwari
NPE Data
IPv6: Technology Whitepaper
Table of Contents
IPv6 White Paper....................................................................................................2
Table of Contents....................................................................................................2
Introduction.............................................................................................................5
1 Scope...............................................................................................................6
2 Addressing scheme.........................................................................................6
2.1 Notation for IPv6 addresses.....................................................................7
2.1.1 IPv6 Address Prefix...........................................................................8
2.2 Types of addresses..................................................................................9
2.2.1 IPv6 Unicast Address........................................................................9
2.2.2 Anycast addresses..........................................................................15
2.2.3 Multicast address............................................................................16
2.3 IPv6 Address Assignment......................................................................18
2.4 IPv6 Address Administration..................................................................20
2.4.1 Neighbor Discovery.........................................................................21
2.4.2 Router Discovery.............................................................................22
2.5 IPv6 Address allocation by APNIC.........................................................24
3 Comparing IPv6 with IPv4.............................................................................25
4 Features of IPv6............................................................................................33
4.1 Expanded address space:......................................................................34
4.1.1 Enables global peer-to-peer communication..................................34
4.1.2 Elimination of need for network address translation (NAT) and
applications layered gateway (ALG).............................................................34
a. Introduction of anycast addresses.............................................................35
b. Improved support for multicast..................................................................35
4.1.3 Multicast Scope Address.................................................................35
4.1.4 Routing............................................................................................36
4.1.5 Efficient and Hierarchical addressing and routing infrastructure....36
4.1.6 Support for widely deployed routing protocols................................38
4.1.7 New protocol for neighboring node interaction...............................39
4.2 Simplified header format........................................................................39
4.2.1 Extensibility: Support for extension headers and options...............40
4.2.2 Flow label capability........................................................................40
4.3 Stateless and Stateful address configuration.........................................41
4.3.1 Stateless autoconfiguration:............................................................41
4.3.2 Support for authentication and privacy:..........................................41
4.3.3 Two Security Options......................................................................42
a. IPv6 Authentication Header.......................................................................42
b. Encapsulating Security Header.................................................................42
4.4 Better support for QoS [Quality of service]............................................43
4.5 Embedded mobility support....................................................................43
4.6 Updated Fragmentation and Reassembly Procedures..........................44
5 Drawbacks & bottlenecks..............................................................................44
5.1 Experimental stage.................................................................................45
2
IPv6: Technology Whitepaper
3
IPv6: Technology Whitepaper
Table of Figures
4
IPv6: Technology Whitepaper
Introduction
The unprecedented growth of the Internet is forcing the evolution of one of its
most significant technology enablers, the TCP/IP suite. The compelling reason
behind the formation of IPv6 is lack of address space, especially in the heavily
populated countries of Asia such as India and China. The introduction of patch up
methods, to virtually increase the IPv4 address space, such as network address
translation (NAT), DHCP etc. have to a certain extent alleviated this problem.
NAT, however, makes certain peer-to-peer applications, such as VoIP and certain
multi-user games, impossible or technically difficult and there is a limit to how
long the band-aid approaches like NAT, keep TCP/IP running.
IPv4 will not be able to deliver the network technology transformation necessary
to support Internet in the coming years. The Internet is evolving rapidly towards
the use of mobile devices that must be able to communicate with other mobile
/stationary devices and applications involving entertainment media, conferencing,
home networking etc. The need for more Internet addresses for the many
devices that will be Internet enabled will, at some point in time, exceed the
capability of IPv4. Currently the big drive for IPv6 is new uses, such as mobility,
quality of service and so on. The move from IPv4 to IPv6 enables global
reachability i.e., no hidden networks and hosts, all hosts can be servers, End-
to-End security can be deployed.
IPv6: version 6 of the Internet Protocol was initially called IP Next Generation
(IPng) when it was picked as the winner in the IETF's IPng selection process.
IPv6 is intended to replace the previous standard, IPv4, which only supports up
to about 4 billion (4 109) addresses, whereas IPv6 supports up to about 3.4
1038 (340 undecillion) addresses. This is the equivalent of 4.3 1020 (430
quintillion) addresses per inch (6.7 1017 (670 quadrillion) addresses/mm) of
the Earth's surface. It is expected that IPv4 will be supported until at least 2025,
to allow time for bugs and system errors to be corrected.
IPv6 is the second version of the Internet Protocol to be formally adopted for
general use. There was also an IPv5, but it was not a successor to IPv4; rather, it
5
IPv6: Technology Whitepaper
IPv6, standardized by IETF in 1998, is truly the protocol of the next generation.
Though of course, because there already are millions of IPv4 enabled nodes,
IPv4 and IPv6 protocols will coexist for a long time to come. The IPv6 protocol
ensures a seamless migration with provisions to upgrade hosts and router
incrementally, reducing interruption to network services.
1 Scope
This document aims at explaining the basics of IPv6, the addressing schema with
the latest updates, how different the two Internet protocols, IPv6 and IPv4 are,
how IPv6 is advantageous over IPv4, what are the migration strategies
suggested by the IETF and other implementers of IPv6.
2 Addressing scheme.
The most dramatic change from IPv4 to IPv6 is the length of network addresses.
IPv6 addresses, as defined by RFC 2373 and RFC 2374, are 128 bits long; this
corresponds to 32 hexadecimal digits, which are normally used while writing IPv6
addresses.
It is often argued that 128-bit addresses are an overkill, and that the Internet will
never need that many. It should be noted however, that the rationale for the 128-
bit address space is not only to see to it that addresses never run out, but rather
to ensure that routing can be handled smoothly by keeping the address space
unfragmented, rather than as is with IPv4, where a great number of discrete
netblocks can be, and often are, assigned to one organization.
6
IPv6: Technology Whitepaper
The 128 bits long IPv6 addreses are written as 8 groups of 4 Hexadecimal
digits.
Example: 2001:0DB8:85A3:08D3:1319:8A2E:0370:7334
Example: 2001:0DB8:85A3:1::/64
Example: 2001:0DB8:0000:0000:0000:0000:1428:57ab
Or 2001:0DB8:0::0:1428:57ab
Or 2001:0DB8::1428:57ab
Example: 2001:0DB8:0000:0000:1428:0000:0000:57ab
Or : 2001:0DB8:0000:0000:1428::57ab
7
IPv6: Technology Whitepaper
The IPv6 prefix is the part of the address, which represents the left-most bits that
IPv6 prefix is represented using the IPv6-prefix/prefix-length format just like an
IPv4 address represented in the classless interdomain routing (CIDR) notation.
The IPv6-prefix variable must conform to RFC 2373. Figure 2 illustrates the how
the prefix indicates the address type
8
IPv6: Technology Whitepaper
The /prefix-length variable is a decimal value that indicates the number of high-
order contiguous bits of the address comprising the prefix, which is the network
portion of the address. For example, 1080:6809:8086:6502::/64 is an acceptable
IPv6 prefix. If the address ends in a double colon, the trailing double colon can
be omitted. So, the same address can be written as 1080:6809:8086:6502/64. In
either case, the prefix length is written as a decimal number 64 and represents
the left-most bits of the IPv6 address.
IPv6 addresses can be broadly classified into 3 major types, based on the scope
of the source and destination address. The three types are:
9
IPv6: Technology Whitepaper
Special Addresses:
1. Unspecified Address
The IPv6 global unicast address is the equivalent of the IPv4 global unicast
address. A global unicast address is represented by the global unicast prefix.001
The structure of global unicast addresses enables aggregation of routing prefixes
that limits the number of routing table entries in the global routing table. Global
unicast addresses used on links are aggregated upward through organizations
and eventually to the Internet service providers (ISPs).
10
IPv6: Technology Whitepaper
11
IPv6: Technology Whitepaper
Edge Routers should have a null route for Local IPV6 prefix FC00::/7.
Firewall should block packets with Local IPV6 source and destination
addresses outside of local network to global access.
12
IPv6: Technology Whitepaper
13
IPv6: Technology Whitepaper
Example of usage: Source address field of any IPv6 packet sent by initializing
host before it has learnt its own address.
14
IPv6: Technology Whitepaper
The loopback address must not be used as the source address in IPv6
packets that are sent out of a single node.
For any assigned anycast address, there is a longest prefix P of that address that
identifies the topological region in which all interfaces belonging to that anycast
address reside as seen in figure 8. Within the region identified by P, the anycast
address must be maintained as a separate entry in the routing system
(commonly referred to as a "host route"); outside the region identified by P, the
anycast address may be aggregated into the routing entry for prefix P.
15
IPv6: Technology Whitepaper
anycast sets may be supported. Therefore, it is expected that support for global
anycast sets may be unavailable or very restricted.
16
IPv6: Technology Whitepaper
Within the reserved multicast address range of FF00:: to FF0F::, the following
addresses are assigned to identify specific functions:
FF01::1All Nodes within the node-local scope (that is, only for that host)
Note that the time-to-live (TTL) field is not used in IPv6 multicast.
17
IPv6: Technology Whitepaper
IPv6 nodes, both hosts and routers, are required to join (receive packets
destined for) the following multicast groups:
Additionally, IPv6 routers must also join the all-routers multicast group
FF02:0:0:0:0:0:0:2 (scope is link-local).
18
IPv6: Technology Whitepaper
A router is required to recognize all the addresses the host recognizes, plus
the following addresses as identifying itself:
19
IPv6: Technology Whitepaper
All other anycast addresses with which the router has been
configured.
20
IPv6: Technology Whitepaper
Prefix
advertisement
Prefix discovery
Tentative address
formation
DAD
Address resolution
Flow charts 1 & 2 depict the steps involved in address configuration. A detailed
version of the above flow [figure 11] is given in flow chart 2. [H].
Once the host obtains an address, there are other address related operations to
be performed. Some of them are explained in the following sections.
The neighbor discovery protocol enables IPv6 nodes and routers to:
21
IPv6: Technology Whitepaper
The IPv6 neighbor discovery process uses IPv6 ICMP (ICMPv6) messages and
solicited-node multicast addresses to determine the link-layer address of a
neighbor on the same network (local link), verify the reachability of a neighbor,
and keep track of neighbor routers. Every IPv6 node is required to join the
multicast groups corresponding to its unicast and anycast addresses. The IPv6
neighbor discovery process uses Neighbor solicitation and Neighbor
advertisement mechanisms for its operation
Figure 12: Using neighbour solicitation message to determine the link layer address of a neighbour.
The source node takes the right-most 24 bits of the IPv6 address of the
destination node and sends a neighbor solicitation message, which has a value
of 135 in the Type field of the ICMP packet header, to the solicited-node multicast
group address on the local link. The destination node will respond with its link-
layer address. To send a neighbor solicitation message, the source node must
first identify the IPv6 unicast address of the destination node using a naming
service mechanism such as DNS.
b. Neighbor Advertisement
22
IPv6: Technology Whitepaper
Neighbor advertisement messages are also sent when there is a change in the
link-layer address of node on a local link.
IPv6 router discovery is a process used by IPv6 nodes to discover the routers on
the local link. The IPv6 router discovery process is similar to ICMP router
discovery in IPv4, except for one major difference described later in this section.
a. Router Advertisement
Router advertisement has a value of 134 in the Type field of the ICMP packet
header and contains the following information in the message:
One or more on-link IPv6 prefixes that nodes on the local link could use to
automatically configure their IPv6 addresses.
23
IPv6: Technology Whitepaper
Additional information for hosts, such as the hop limit and maximum
transmission unit (MTU) a host should use in packets that it originates
b. Router Solicitation
When a host does not have a configured unicast address, for example at system
startup, it sends a router solicitation message. A router solicitation is helpful,
because it enables the host to autoconfigure itself quickly without having to wait
for the next scheduled router advertisement message. A router solicitation
message has a value of 133 in the Type field of the ICMP packet header. The
source address used in a router solicitation messages is usually the unspecified
IPv6 address (0:0:0:0:0:0:0:0). If the host has a configured unicast address, the
unicast address of the interface sending the router solicitation message is used
as the source address in the message. The destination address in the router
solicitation messages is the all-routers multicast address (FF02::2) with the link-
local scope. When a router advertisement is sent in response to a router
solicitation, the destination address used in the router advertisement message is
the unicast address of the source of the router solicitation message.
24
IPv6: Technology Whitepaper
Note: A router solicitation is sent at boot time and only three times afterward to
avoid flooding of router solicitation packets in the absence of a router on the
network.
As with IPv4, an IPv6 redirect message is sent by a router only to help with the
reroute of a packet to a better router. The node receiving the redirect message
will then readdress the packet to a better router. Routers send redirect messages
only for unicast traffic, only to the originating nodes, and to be processed by the
nodes.
The registries then allocate an initial /32 prefix to the IPv6 ISPs and the ISPs
allocate a /48 prefix (out of the /32) to each customer or site. The /48 prefix of
site could be further allocated to each LAN using a /64 prefix for a maximum of
64 bits ID hosts in each LAN
25
IPv6: Technology Whitepaper
A site should make an address plan prior to beginning allocation of its /48 space.
In order to receive a /32 prefix address block from a registry, an ISP must have
an exterior routing protocol peering with at least 3 other ISPs and either have at
least 40 customers or demonstrate a clear intent to provide an IPv6 service
within 12 months.
For the latest information about allocation of IPv6 address space to the registries
by IANA, refer to the URL at http://www.iana.org/assignments/IPv6-tla-
assignments. ABCs of I Vrsion 6
26
IPv6: Technology Whitepaper
Address
Address is composed Basic architecture is 64 bits for the
Structure
of a network and a host network number and 64 bits for the
portion, which depend host number. Often, the host portion
on address class. of an IPv6 address (or part of it) will
be a MAC address or other interface
identifier.
Address Class
Various address It is a classless form of addressing.
classes are defined as:
A, B, C, D, or E
Number of
The total number of The total number of IPv4 addresses
Addresses.
IPv4 addresses is 4.2 is 340 undecillion [ 340x10 31]
million.
27
IPv6: Technology Whitepaper
28
IPv6: Technology Whitepaper
29
IPv6: Technology Whitepaper
30
IPv6: Technology Whitepaper
31
IPv6: Technology Whitepaper
32
IPv6: Technology Whitepaper
Protocol
routers to find hosts discovery) protocol for IPv6. Does
(IGMP)
that want traffic for a essentially what IGMP does for IPv4,
particular multicast but uses ICMPv6 by adding a few
group, and used by MLD-specific ICMPv6 type values.
IPv4 hosts to inform
IPv4 routers of existing
multicast group
listeners (on the host).
ICMP Router
Used to determine Function performed via Router
discovery
IPv4 address of best Solicitation & Router Advertisement.
default gateway. It is It is a requirement.
optional
Maximum
Maximum transmission IPv6 has an architected lower bound
Transmission
Unit (MTU) unit of a link is the on MTU of 1280 bytes. That is, IPv6
maximum number of will not fragment packets below this
bytes that a particular limit. To send IPv6 over a link with
link type, such as less than 1280 MTU, the link-layer
Ethernet or modem, must transparently fragment and
supports. For IPv4, 576 defragment the IPv6 packets.
is the typical minimum.
Network
Used when translating Currently, NAT does not support
Address
Translation from a private network IPv6. More generally, IPv6 does not
(NAT)
to the Internet. require NAT. The expanded address
space of IPv6 eliminates the address
shortage problem and enables
easier renumbering.
Packet
In IPv4, tunneling For IPv6, tunneling in IPv4 packets is
tunneling
occurs in VPN for expected to be a major part of its
tunnel-mode VPN evolution. Currently, at least 5
connections (IPv4 different types of 6-in-4 tunneling are
tunneled in IPv4) and defined by IETF, each with different
33
IPv6: Technology Whitepaper
4 Features of IPv6.
IPv6 is so much more than IPv4 with a couple of numbers bolted on the end to
make the address space bigger. It is a ground-up re-think of what will be required
by ip in the future. IPv6 includes modifications that will be needed to cope with
the changing traffic that is already appearing on the global IP networks. The
emphasis will be more on real time traffic carrying large amounts of data,
entertainment and other services.
Routing.
The most celebrated advancement from IPv4 has been the increased address
space. The address space has been increased by a factor of 4 i.e., from 32 bits
to 128 bits, providing support for a greater number of addressable nodes. The
128 bits provide approximately 3.4 undecillion addressable nodes, enough to
allocate about 1030 addresses per person on this planet. Therefore, if necessary,
every device can have its own unique ip address. With a much larger number of
34
IPv6: Technology Whitepaper
The ability to provide a unique address for each network device enables end-to-
end reachability, which is especially important for residential IP telephony.
NAT was introduced as a mechanism to share and reuse the same address
space among different network segments. While it has temporarily eased the
problem of IPv4 address shortage, it has also placed a burden on network
devices and applications to deal with address translation. IPv6s increased
address space eliminates the need for address translation, and with it, the
problems and costs associated with NAT deployment.
The use of anycast addresses allows nodes additional control over the path their
traffic takes. Thus enabling Provider selection. Wherein, special providers can be
selected for routing the packet. This is necessary for commercial usage of the
Internet, making it possible to choose only special providers i.e. trusted
providers.
35
IPv6: Technology Whitepaper
Anycast could be used in many other innovative ways such as DNS requests, to
identify the set of routers providing an entry into a particular routing domain,
identify the set of routers belonging to a service provider etc.
One of the salient features of IPv6 is that it does not use broadcasts at all. The
functions previously supported by IPv4 broadcasts such as router discovery and
router solicitation requests are handled by IPv6 multicast. Multicast allows IP
packets such as a video stream to be sent to multiple destinations at the same
time, saving network bandwidth. Multicast improves the efficiency of a network by
limiting the broadcast requests to a smaller number of only interested nodes.
IPv6 uses specific multicast group addresses for its various functions. Thus, IPv6
multicast prevents the problems caused by broadcast storms in IPv4 networks.
IPv6 uses a 4-bit Scope ID to specify address ranges reserved for multicast
addresses for each scope. Thus, only those hosts in a specified scope address
range configured to listen to a specific multicast address receive the multicast.
However, a host can be a member of several workgroups and can listen to
several multicast addresses at the same time.
4.1.4 Routing
36
IPv6: Technology Whitepaper
IPv6 routing is nearly identical to IPv4 routing. It uses the longest prefix match
routing like in CIDR. A simple extension to the IPv4 routing algorithms is all that is
required for them to work with IPv6. IPv6 includes simple routing extensions,
which support powerful new routing functionality. These capabilities include:
The availability of a very large addressing space and network prefixes provides
flexible network architecture. This flexibility allows an organization to use only
one prefix for the entire network of the organization.
This is the concept of prefix routing. Every address has an associated prefix,
which is simply a mask identifier to indicate how many of the bits, starting from
the left are used for routing and how many bits are used to identify a host. The
routers will use the prefix in order to build routing tables. End stations make the
prefix similar to todays subnet mask.
A larger address space allows the allocation of large address blocks to Internet
service providers (ISP) and to other organizations. This allocation in turn, allows
37
IPv6: Technology Whitepaper
the ISP to aggregate the prefixes of all its customers into a single prefix and
announce this one prefix to the IPv6 Internet.
The larger IPv6 address space also enables the use of multiple levels of
hierarchy inside the address space. Each level helps to aggregate the traffic at
that level and enhance the allocation of addresses in a hierarchical format. The
implementation of multiple levels in the address hierarchy permits flexibility and
new functionalities, such as the scoping of addresses. The hierarchical network
architecture of IPv6 allows the ISPs to use aggregation of network prefixes to
provide efficient and scalable routing. The hierarchical addressing structure is
designed to reduce the size of Internet routing tables.
Without a good hierarchical addressing scheme, routers will have to store large
routing tables. Though classless interdomain routing (CIDR) in IPv4 solves this
problem with the use of route aggregation, it is neither scalable nor efficient.
38
IPv6: Technology Whitepaper
Although most of the algorithms of OSPFv2 are the same in OSPFv3, some
changes have been made in OSPFv3, particularly to handle the increased
address size in IPv6 and the fact that OSPF runs directly over IP. Because
OSPFv2 is heavily dependent on the IPv4 address for its operation, changes
were necessary in OSPFv3 protocol to support IPv6, as outlined in RFC 2740,
OSPF for IPv6. Some of the notable changes include platform independent
implementation, protocol processing per-link rather than per-node processing,
explicit support for multiple instances per link, and changes in authentication and
packet format. IPv6 OSPF is now an IETF proposed standard. Like RIPng, IPv6
OSPFv3 uses IPv6 for transport and uses link-local addresses as source
address.
IS-IS Protocol
The IS-IS routing protocol is an IGP protocol and IPv6 IS-IS is an IETF draft. New
IPv6 routing capability has been added to the existing IS-IS protocol. Internet
Draft draft-ietf-isis-IPv6-02.txt specifies a method for exchanging IPv6 routing
information using the IS-IS routing protocol utilizing the same mechanisms
described in RFC 1195, Use of OSI IS-IS for Routing in TCP/IP and Dual
Environments. This is accomplished by adding 2 new type-length-values (TLVs)
"IPv6 Reachability" (128 bits) and "IPv6 Interface Address" (128 bits)and a
new IPv6 protocol identifier.
39
IPv6: Technology Whitepaper
Multiprotocol BGP in IPv6 is an EGP that functions the same and offers the same
benefits as multiprotocol BGP in IPv4. RFC 2858, Multiprotocol Extensions for
BGP-4 describes multiprotocol extensions for BGP4 defined as new attributes.
RFC 2545, Use of BGP-4 Multiprotocol Extensions for IPv6 Interdomain Routing
describes the enhancements to multiprotocol BGP that include support for an
IPv6 address family and Network Layer Reachability Information (NLRI) and next
hop (the next router in the path to the destination) attributes. These attributes use
IPv6 addresses and scoped addresses. The next hop attribute uses a global IPv6
address and potentially also a link-local address, when a peer is reachable on
the local link.
The Neighbor Discovery protocol for IPv6 is a series of Internet Control Message
Protocol for IPv6 (ICMPv6) messages that manage the interaction of neighboring
nodes (nodes on the same link). Neighbor Discovery replaces the broadcast-
based Address Resolution Protocol (ARP), ICMPv4 Router Discovery, and
ICMPv4 Redirect messages with efficient multicast and unicast Neighbor
Discovery messages.
An interesting note is that although IPv6 addresses are 4 times the size of IPv4
addresses (128-bits as opposed to 32-bits), and each packet carries both source
and destination addresses, v6 headers are only twice the size of v4 headers.
IPv4 packets are variable in size the size of the headers change depending on
what the packet carries, and what special features are used.
IPv4 headers and IPv6 headers are not interoperable. IPv6 is not a superset of
functionality that is backward compatible with IPv4. A host or router must use an
implementation of both IPv4 and IPv6 in order to recognize and process both
header formats.
40
IPv6: Technology Whitepaper
All fields in the IPv6 header are 64-bit aligned, taking advantage of the current
generation of 64-bit processors.
IPv6 packets are a fixed-size, and use extension headers to describe special
features or packet handling. IPv6 headers are also reorganized so that
intermediate routers do not necessarily need to examine extension headers as
is the case with IPv4 headers only those extension headers that pertain to
packet transit. This simple change makes processing and forwarding of packets
through the global network more efficient. Since these efficiencies are gained at
each intermediate hop along a packets path, the benefits will be cumulative and
substantial. This provides greater flexibility for introducing new options in the
future.
41
IPv6: Technology Whitepaper
Obtain correct address prefix for that subnet from subnets router
47CD:1234:4422:AC02:0022:1234:A456:0124
Even in the absence of a router, hosts on the same link can automatically
configure themselves with link-local addresses and communicate without manual
configuration.
IPv4 and IPv6 share a powerful security mechanism called IPsec. IPsec
provides strong encryption (for keeping packet content private), strong
authentication (to ensure the packet really originated at the site specified), non-
repudiation (which keeps the sender from later claiming they did not send the
packet), and message integrity (to ensure the message was not tampered with
on the way).
Optional in IPv4, IPSec is a mandatory part of the IPv6 protocol suite. IPv6
provides security extension headers, making it easier to implement encryption,
authentication, and virtual private networks (VPNs). By providing globally unique
addresses and embedded security, IPv6 can provide end-to-end security
services such as access control, confidentiality, and data integrity with less
impact on network performance.
IPv6 offers two integrated security options. These two options can be used
separately or in conjunction with each other depending on the user's needs.
This option provides authentication and integrity but no confidentiality. The option
is algorithm-independent and will support various authentication techniques. The
purpose for providing all this without the confidentiality is that these mechanism
42
IPv6: Technology Whitepaper
In order to help ensure interoperability within the Internet, the use of keyed MD5
has been proposed. This will also eliminate a number of network attacks,
(including host masquerading attacks).
This Internet layer protection will provide the upper layers with the host origin
authentication that they currently lack.
This option provides the integrity and confidentiality missing from the IPv6
Authentication Header option. It is both flexible and algorithm-independent.
The DES algorithm has been proposed as the standard, again with the aim of
achieving interoperability within the worldwide Internet. This mechanism,
however, probably won't be as exportable as the Authentication Header, but the
use of DES as a standard should help.
QoS in IPv6 is handled in the same way it is currently handled in IPv4. Support
for class of service is available through the Traffic Class field compliant with the
IETF Differentiated Services (DiffServ) model.
The priority field on the other hand, enables a source to identify the desired
delivery priority of its packets, relative to other packets from the same source.
The Priority values are divided into two ranges:
Values 0 through 7: to specify the priority of traffic for which the source is
providing congestion control, i.e., traffic that "backs off" in response to
congestion, such as TCP traffic.
Values 8 through 15: to specify the priority of traffic that does not back off
in response to congestion, e.g., "real-time" packets being sent at a
constant rate.
43
IPv6: Technology Whitepaper
However, IPv6 header has a new field named Flow label which can contain a
label identifying a specific flow, such as video stream or videoconference. The
source node generates this flow label.
Traffic identification using a Flow Label field in the IPv6 header allows routers to
identify and provide special handling for packets belonging to a flow, a series of
packets between a source and destination. Because the traffic is identified in the
IPv6 header, support for QoS can be achieved even when the packet payload is
encrypted through IPSec.
IPv6 supports a more robust and updated version of the Mobile IP specification.
This is the capability by which machines may move about on the network
leaving their home networks and temporarily joining other networks but
operate much as before. Mobile IP is an IETF standard allowing mobile devices
to move around without breaking their existing connections.
IPv6 packets addressed to the home address of a mobile node are transparently
routed to its care-of address through the caching of the binding of its home
address with its care-of address. This binding allows any packets destined for the
mobile node to be directed to it at this care-of address. Mobile IPv6 defines four
new IPv6 destination options: binding update option, binding acknowledgement
option, binding request option, and home address option.
The routing headers in IPv6 make Mobile IPv6 much more efficient for end
devices than Mobile IPv4. The use of the routing header for Mobile IP, rather than
IP encapsulation, enables Mobile IP to avoid triangle routing, making it much
more efficient in IPv6 than in IPv4.
44
IPv6: Technology Whitepaper
router on the near side of the Ethernet link, that router will need to fragment the
packet breaking it into three 1500-byte packets. The router at the far end of the
Ethernet segment will re-assemble the packet and pass it along to the final
destination. The smallest segment through a given path in the network is called
the Path MTU (Path Maximum Transmission Unit).
This is a much more efficient and predictable method to handle packet transport.
As of now, IPv6 is still not mature enough to be deployed without any hiccups.
Hence any hesitation in deploying IPv6 on the provider or the users part is well
founded.
So far, no tools have been developed to keep a track of which IP addresses are
associated with which subnets.
45
IPv6: Technology Whitepaper
hiding the IP addresses of internal devices. There are two schools of thought:
one is that traffic should travel directly from end to end, and the other is to use
NAT and wall off subnets from the public Internet. With NAT there is no need to
go to IPv6 for a long time.
6 Migration Strategies.
IPv6 provides many benefits over legacy IPv4 technology; however, because of
the sheer magnitude of the existing IPv4 infrastructure any successful strategy
for IPv6 deployment requires it to coexist with IPv4, atleast for now. Even if
private networks migrate to IPv6 completely, the Internet as a whole will continue
to function primarily on the current Internet Protocol [IPv4] for another 10-20
years.
The key transition objective is to allow IPv6 and IPv4 hosts to interoperate.
46
IPv6: Technology Whitepaper
A third objective is that the transition should be as easy as possible for end-
users, system administrators, and network operators to understand and carry
out.
IPv6 has been designed in such a way that a smooth transition from IPv4 is
possible. A number of transition tools have been developed by the IETF working
group NGTRANS [IP Next generation Transition Group] for managing this
complex and prolonged transition from IPv4 to IPv6. There are largely three
types of transition mechanisms - dual stack, translation and tunnelling. However
in practice, the distinction between the types is nominal and many tools represent
a hybrid of techniques. The three basic transition strategies are
Dual-Stack systems have both IPv4 and IPv6 addresses and capability. A
machine configured in this manner has complete interoperability with any IP-
based node it simply uses v4 to communicate with v4-only machines, and v6 to
communicate with v6-only nodes. Note that, since a dual-stack node still needs a
routable IPv4-address, this mechanism does nothing to allow rapid expansion of
the Internet.
47
IPv6: Technology Whitepaper
Dual stack tools resolve IPv6 and IPv4 incompatibility issues by combining the
two protocol stacks. Dual stack nodes have the ability to send and receive both
IPv4 and IPv6 packets. They can thus directly interoperate with IPv4-only node
and IPv6-only nodes as seen in figure 15.
The first recommended step is to deploy dual stack routers and servers
to a link on which IPv6 is to be deployed. Once deployed, the servers and
routers will learn IPv6 routes and communicate in IPv6. This must be done
in a way that does not affect IPv4 traffic that is still operating on this link,
and in particular, performance. This necessitates maintaining dual routing
tables on each router. No new hardware should be required at this stage
as most upgrades can be carried out in software.
The next step is to deploy dual stack clients on the IPv6 ready links.
For convenience, stateless auto configuration (a method by which IPv6
hosts can acquire addresses and other network information automatically)
may be used to reduce the management burden. Assigning v4 mapped
v6 addresses to the nodes makes the addressing process simpler and
more convenient. At this point the DNS can be populated with entries.
This again can also be achieved in software.
Apart from this, other network elements such as switches, bridges etc.
also need to be upgraded to deal with both the protocols.
A node that has been configured to support a dual stack system will have to
obtain both IPv4 and IPv6 configuration settings, like;
48
IPv6: Technology Whitepaper
NTP server
DNS server
NIS server
An advantage of the dual stack approach is that it can support gradual migration
of applications as both IPv6 compatible and only-IPv4 compatible applications
are supported on a dual stack host as seen in the figure 16 below.
Figure 16: Dual Stack Supports Both IPv6 Compatible and Incomppatible applications.
6.1.1 D N S query in dual stack
The current 32-bit name DNS servers cannot handle 128-bit addresses used
by IPv6 devices. Dual stacking deals with most of the DNS resolution issues in
the IPv6 DNS standard (RFC 1886, DNS Extensions to Support IP Version 6).
The DNS server must provide resolver libraries capable of dealing with IPv4 A
records as well as IPv6 A6 and AAAA records. When an application request
all available addresses for the destination host name [for example www.x.y] the
default behaviour to be observed is that DNS should attempt to resolve for an
IPv6 address first and, if not available, fall back on an IPv4 address. There are
some implementations wherein dual stack node receives both IP addresses and
decides locally which one is to be used as illustrated in the figure 17.
The dual stack host requests both addresses from the DNS server.
49
IPv6: Technology Whitepaper
The problem with implementing a dual stack scheme is that the number of
nodes is limited to the available IPv4 addresses. Which
6.2 Tunnelling
50
IPv6: Technology Whitepaper
The exit node of the tunnel (the decapsulating node) receives the
encapsulated packet, reassembles the packet if needed, removes the
IPv4 header, updates the IPv6 header, and processes the receivedIPv6
packet.
The encapsulating node MAY need to maintain soft state information for
each tunnel recording such parameters as the MTU of the tunnel in order
to process IPv6 packets forwarded into the tunnel. Since the number of
51
IPv6: Technology Whitepaper
tunnels that any one host or router may be using may grow to be quite
large, this state information can be cached and discarded when not in use.
All tunneling mechanisms require that the endpoints of the tunnel run both
IPv4 and IPv6 protocol stacks, that is, endpoints must run in dual-stack mode.
The dual-stack routers run both IPv4 and IPv6 protocols simultaneously and
thus can interoperate directly with both IPv4 and IPv6 end systems and
routers.
This section discusses the details about the following IPv6 tunneling techniques
to be used over IPv4 networks. In order to accommodate different administrative
needs, IPv6 transition mechanisms basically include two types of tunnelling:
automatic and configured. The two tunneling techniques -- automatic and
configured differ primarily in how they determine the tunnel endpoint address.
52
IPv6: Technology Whitepaper
Configured tunneling is used if the destination host is different from the endpoint
of the tunnel. In this case, the destination address for the IPv4 header, ie the
address of the endpoint of the tunnel, could not be simply mapped from the IPv6
destination address. The endpoint of the tunnel has to be configured in the
IPv6/IPv4-node. In configured tunneling, the tunnel endpoint address is
determined from configuration information in the encapsulating node. For each
tunnel, the encapsulating node must store the tunnel endpoint address. When
an IPv6 packet is transmitted over a tunnel, the tunnel endpoint address
configured for that tunnel is used as the destination address for the
encapsulating IPv4 header.
53
IPv6: Technology Whitepaper
traffic is forwarded with full 128-bit addresses. At the tunnel entry point, a router
table entry is
defined manually to dictate which IPv4 address is used to traverse the tunnel.
This requires a certain amount of manual administration at the tunnel endpoints,
but traffic is routed through the IPv4 topology dynamically, without the knowledge
of IPv4 routers. The 128-bit addresses do not have to align with 32-bit addresses
in any way. Figure 20 shows the configuration of a manually configured tunnel.
IPv6/IPv4 hosts that are connected to datalinks with no IPv6 routers MAY use a
configured tunnel to reach an IPv6 router. This tunnel allows the host to
communicate with the rest of the IPv6 Internet (i.e. nodes with IPv6-native
addresses). If the IPv4 address of an IPv6/IPv4 router bordering the IPv6
backbone is known, this can be used as the tunnel endpoint address. This
tunnel can be configured into the routing table as an IPv6 "default route". That is,
all IPv6 destination addresses will match the route and could potentially traverse
the tunnel. The default-configured tunnel can be used in conjunction with
automatic tunneling, as described in section [7.2.2].
54
IPv6: Technology Whitepaper
address. All of these routers accept packets to this address as their own, and will
decapsulate IPv6 packets tunneled to this address. When an IPv6/IPv4 node
sends an encapsulated packet to this address, it will be delivered to only one of
the border routers, but the sending node will not know which one. The IPv4
routing system will generally carry the traffic to the closest router.
55
IPv6: Technology Whitepaper
56
IPv6: Technology Whitepaper
Automatic tunnels are available when needed, but they may not be necessary in
cases where major backbone routers are upgraded all at once to include the IPv6
stack. This is something that can be achieved quickly and efficiently when
backbone routers support full remote configuration and upgrade capabilities.
57
IPv6: Technology Whitepaper
automatically builds the IPv4 tunnel using a unique routing prefix 2002::/16 in the
IPv6 address with the IPv4 address of the tunnel destination concatenated to the
unique routing prefix. The key requirement is that each site has a 6to4 IPv6
address. Each site, even if it has just one public IPv4 address, has a unique
routing prefix in IPv6. Figure 23 shows the configuration of a 6to4 tunnel
interconnecting 6to4 domains.
As use of native IPv6 becomes more prevalent, the next stage is the use of 6to4
relay routers. These relay routersstandard routers but with both a 6to4 IPv6
address and a normal IPv6 addressprovide a routing service between the
native IPv6 domain, where a routing protocol is expected to be running, and the
6to4 domain, where there is no routing protocol. Communication between 6to4
sites and native IPv6 domains requires at least one relay router. 6to4 enables the
edge router to forward packets to any destination with a 2002::/16 prefix.
However, other IPv6 destinations are unreachable, unless one of the 6to4 edge
routers, specified as a 6to4 relay, offers traffic forwarding to the IPv6 Internet.
6to4 routers continue to run an IPv6 interior routing protocol for the IPv6 routing
within the site, but participate in IPv6 interdomain routing by using a default IPv6
route that points to a specific relay router. Figure 24 shows the use of a 6to4
relay router for interconnecting 6to4 and native IPv6 domains.
58
IPv6: Technology Whitepaper
Figure 24: Shows The Use Of A 6to4 Relay Router For Interconnecting 6to4 And Native
IPv6 Domains.
3. ISATAP
The ISATAP interface identifier can be combined with any 64-bit prefix that is
valid for IPv6 unicast addresses. This includes the link-local address prefix
(FE80::/64) and global prefixes (including 6to4 prefixes).
59
IPv6: Technology Whitepaper
ISATAP is one of the few elements that works with IPv4 private
address space.
4. Tunnel Broker:
The Tunnel Broker [Broker] is a tool that automatically manages tunnel requests
using dedicated servers. This reduces the management load for network
administrators, who have to perform extensive configuration for each configured
60
IPv6: Technology Whitepaper
tunnel maintained. It applies well to isolated IPv6 sites, and especially isolated
IPv6 hosts on the IPv4 Internet who want to connect to an IPv6 network.
Tunnel brokering is very simple from the user's point of view and hence good for
isolated users, but it does have some issues regarding states of tunnels - if the
client does not request the tunnel be torn down before ending a session it will
persist and future users of the same IPv4 address may receive encapsulated
IPv6 packets intended for the first user. Figure 26 illustrates the functioning of a
tunnel broker. For a detailed version refer to appendix B.
IPv6 over MPLS backbones enables isolated IPv6 domains to communicate with
each other over an MPLS IPv4 core network. This implementation requires far
61
IPv6: Technology Whitepaper
The first of these strategies has no impact on and requires no changes to the
MPLS provider (P) or PE routers because the strategy uses IPv4 tunnels to
encapsulate the IPv6 traffic, thus appearing as IPv4 traffic within the network.
The second of these strategies also requires no change to the core routing
mechanisms. The last strategy requires changes to the PE routers to support a
dual-stack implementation, but all the core functions remain IPv4.
Using tunnels on the CE routers is the simplest way of deploying IPv6 over
MPLS networks, having no impact on the operation or infrastructure of MPLS,
and requiring no changes to either the P routers in the core or the PE routers
connected to the customers. Communication between the remote IPv6 domains
uses standard tunneling mechanisms, running IPv6 over IPv4 tunnels in a similar
way that MPLS VPNs support native IPv4 tunnels. The CE routers need to be
upgraded to be dual stack, and configured using manually configured or 6to4
tunnels, but communication with the PE routers is IPv4, and the traffic appears to
the MPLS domain to be IPv4. The dual stack routers use the 6to4 addresses or
an IPv6 prefix assigned from a distant provider, rather than an IPv6 address
supplied by the service provider. Figure 27 shows an example for the deployment
of IPv6 using tunnels on the CE routers.
62
IPv6: Technology Whitepaper
Using any circuit transport for deploying IPv6 over MPLS networks has no impact
on the operation or infrastructure of MPLS. It requires no changes to either the P
routers in the core or the PE routers connected to the customers. Communication
between the remote IPv6 domains runs native IPv6 protocols over a dedicated
link, where the underlying mechanisms are fully transparent to IPv6. The IPv6
traffic is tunneled using Any Transport over MPLS (MPLS/AToM) or Ethernet over
MPLS (EoMPLS), with the IPv6 routers connected through an ATM OC-3 or
Ethernet interface, respectively. Figure 28 shows an example of IPv6 deployment
over any circuit transport over MPLS.
63
IPv6: Technology Whitepaper
Figure 28: IPv6 Deployment Over Any Circuit Transport Over MPLS
c. Deploying IPv6 on the Provider Edge Routers
64
IPv6: Technology Whitepaper
The IPv6 forwarding is done by label switching, eliminating the need for either
IPv6 over IPv4 tunnels or for an additional Layer 2 encapsulation, allowing the
appearance of a native IPv6 service to be offered across the network. Each PE
router that must support IPv6 connectivity needs to be upgraded to be dual stack
(becoming a 6PE router) and configured to run MPLS on the interfaces
connected to the core. Depending on the site requirements, each router can be
configured to forward IPv6 or IPv6 and IPv4 traffic on the interfaces to the CE
routers, thus providing the ability to offer only native IPv6 or both IPv6 and native
IPv4 services. The 6PE router exchanges either IPv4 or IPv6 routing information
through any of the supported routing protocols, depending on the connection,
and switches IPv4 and IPv6 traffic over the native IPv4 and IPv6 interfaces not
running MPLS. The 6PE router exchanges reachability information with the other
6PE routers in the MPLS domain using multiprotocol BGP, and shares a common
IPv4 routing protocol (such as OSPF or integrated IS-IS) with the other P and PE
devices in the domain.
The 6PE routers encapsulate IPv6 traffic using two levels of MPLS labels. The
top label is distributed by a label distribution protocol (LDP) or tag distribution
protocol (TDP) used by the devices in the core to carry the packet to the
destination 6PE using IPv4 routing information. The second or bottom label is
associated with the IPv6 prefix of the destination through multiprotocol BGP4.
6. Teredo
Teredo, also known as IPv4 network address translator (NAT) traversal for IPv6,
provides address assignment and host-to-host automatic tunneling for unicast
IPv6 connectivity across the IPv4 Internet when IPv6/IPv4 hosts are located
behind one or multiple IPv4 NATs. To traverse IPv4 NATs, IPv6 packets are sent
as IPv4-based User Datagram Protocol (UDP) messages as seen in figure 30. It
is important to note that Teredo is designed as a last resort transition technology
for IPv6 connectivity. If native IPv6, 6to4, or ISATAP connectivity is present
between communicating nodes, Teredo is not used. As more IPv4 NATs are
upgraded to support 6to4 and IPv6 connectivity become ubiquitous, Teredo will
65
IPv6: Technology Whitepaper
be used less and less, until eventually it is not used at all. For more information
on Teredo refer to [IPv6 transition technologies by Microsoft]
6.3.3 Translation
66
IPv6: Technology Whitepaper
While IPv4 and IPv6 are not directly compatible it is possible to translate between
them relatively easily. The only problem is that this tends to be inefficient and
slow. Translation between IPv4 and IPv6 can take place at one of three levels:
the IP level, the transport level or the application level.
Translation tools may add extra functionality to basic translation, using caches for
example, to improve performance and keep state information.
1. S I I T:
67
IPv6: Technology Whitepaper
when the IPv4 node sends a packet it will be translated and have the IPv4-
translatable address as a destination.
Due to the stateless nature of SIIT it has several advantages over the other
translation tools currently on offer in that it is simpler and therefore may be
quicker. The techniques defined in SIIT have become the basis for most of the
translator services available and many subsequent translators have used them.
While SIIT is not a complete transition tool specification, it has instead found its
role as a guide for translations. While direct implementations of SIIT could be
developed, tools such as NAT-PT (discussed in section[7.3.2]) offer a better
service by building on SIIT.
SIIT may be deployed on sites that require a simple transition tool but are unable
to deploy dual stack, due to problems like limited IPv4 address space, in such a
case SIIT would offer the ideal solution.
2. N A T P T
68
IPv6: Technology Whitepaper
69
IPv6: Technology Whitepaper
4. B I S
BIS offers a very useful translator service, by making each host perform
translation internally. This may significantly improve the network performance.
BIS is actually an extreme extension of the NAT-PT tool, using the same
methods. BIS
actually makes hosts dual stack but because it does so using translation, it is
included here as an application level translator. The operation of BIS is shown in
figure 32.
5. T R T
TRT (Transport Relay Translator) [TRT] provides a transport level translator that
relays TCP and UDP connections between IPv4 and IPv6 domains. It operates
on the border of the two domains and acts as an intermediary between them.
The TRT device can be implemented as a single server or as a group since no
state is kept on the flows. TRT is a relatively simple tool as it offers only a basic
level of service, which is to translate TCP/UDP flows. TRT is a solid tool and like
all translators is best employed as a service once transition has been completed
and is useful as a temporary measure to allow IPv4 and IPv6 to interoperate.
70
IPv6: Technology Whitepaper
Both TRT and SOCKS64 (discussed in section [7.]) are examples of relay
translators that provide a convenient method of implementation for transport level
translators.
There are no implementations of TRT to date; it seems likely that this is due to
the fact that TRT is still not fully defined. TRT deployment scenarios are very
similar to those of the other translators listed in this report. This means that it
could be deployed either as the primary interface between an IPv6 site and the
IPv4 world or on a sites network as an additional service. More so than others, it
is the second that TRT may be more suited for, due to the translation taking place
at such a high level.
6. SOCKS 64
The basic operation dictates that SOCKS-ified hosts forward the packet in one
protocol to a SOCKS server. The server translates the flow into the outgoing
protocol and vice versa. SOCKS64 offers a good interaction tool for sites only if
already employing SOCKSv5. There is a good technical base available and any
SOCKSv5 enabled site already has the necessary infrastructure to deploy this
tool. However, this may be only a small percentage of users and those without
SOCKS may be reluctant to deploy it solely for this purpose in the face of
competition from other translator tools. The operation of SOCK64 is shown in
figure 7. . SOCKS64 both gains and looses from being based upon existing
technology but in the final analysis is suitable for only a small subset of those
wishing to deploy IPv6 and must therefore be considered of only minor interest.
71
IPv6: Technology Whitepaper
This tool has potentially the same value as any other translator tool listed here
but its deployment will be limited due to it being based on previous SOCKS
technology.
Migrating to IPv6 involves the upgrading of applications, hosts, routers, and DNS
to support IPv6, and then converting IPv6/IPv4 nodes to IPv6-only nodes.
Because this migration might take years, IPv4/IPv6 nodes must be able to
coexist over IPv4 infrastructures such as the Internet and private intranets.
7 Appendix
A. The 6bone
The 6bone is an experimental virtual network of nodes that support IPv6 packets,
tunneled together through the existing IPv4 Internet. Most of the nodes are
workstations or similar machines, with IPv6-capable operating systems. The
theory of tunnelling IPv6 packets over an IPv4 network is outlined in Integration
of IPv4 and IPv6 on page 12. The 6bone is part of the transition to IPv6. Its
purpose is to provide an environment in which IPv6 can be tested and
procedures for IPv6 can be developed. When IPv6 is sufficiently developed and
being used widely, the 6bone will probably disappear.
The IPng Transition (NGTRANS) working group of the IETF is now closed.
While an active working group it was under the Operations and Management
Area, and had as its overall goal assisting the transition to IPv6, the next
generation Internet protocol chosen by the IETF community.
The new IPv6 Operations (v6ops) working group of the IETF has essentially
replaced the NGTRANS effort. The difference being that v6ops is focused on
outlining transition scenarios and identifying the specific tools (many from the
NGTRANS effort) that will be used in a transition.
72
IPv6: Technology Whitepaper
The EUI-64 format interface ID is derived from the 48-bit link-layer (MAC)
address by inserting the hex number FFFE between the upper three bytes (OUI
field) and the lower 3 bytes (serial number) of the link layer address.
Figure 33: Formation of an EUI format Interface ID from 48 bit MAC address.
To ensure that the chosen address is from a unique Ethernet MAC address, the
7th bit in the high-order byte is set to 1 (equivalent to the IEEE G/L bit) to indicate
the uniqueness of the 48-bit address.
73
IPv6: Technology Whitepaper
74
IPv6: Technology Whitepaper
E. MTU size
IPv6 requires that the link layer support a minimum IPv6 packet size of 1280
bytes. Link layers that do not support this must provide a link layer fragmentation
and reassembly scheme that is transparent to IPv6. For link layers that can
support a configurable MTU size, it is recommended that they be configured with
an MTU size of at least 1500 bytes (the Ethernet II encapsulation IPv6 MTU).
MTU path discovery is recommended. Packet segmentation is not done by IPv6
routers so this must be performed by the host.
The sending node assumes that the path MTU is the link MTU of the
interface on which the traffic is being forwarded.
The sending node sends IPv6 packets at the path MTU size.
If a router on the path is unable to forward the packet over a link with a
link MTU that is smaller than the size of the packet, it discards the IPv6
packet and sends an ICMPV6 Packet Too Big message back to the
sending node. The ICMPV6 Packet Too Big message contains the link
MTU of the link on which the forwarding failed.
The sending node sets the path MTU for packets being sent to the
destination to the value of the MTU field in the ICMPv6 Packet Too Big
message.
F. Mobile IPv6
75
IPv6: Technology Whitepaper
MN [Mobile Node]:
CN [Corresponding Node]:
76
IPv6: Technology Whitepaper
One of the HAs responds to the request with a HA address discover reply
message giving a list of HAs.
77
IPv6: Technology Whitepaper
- The packets are encapsulated and delivered to the CoA via tunnel.
- The Source Address for the packet is the CoA, Home Address is carried in
the Home Address Destination Options Header.
The process for acquiring configuration data for a client is similar to that in IPv4.
However, DHCPv6 uses multicast for many of its messages. Initially, the client
must first detect the presence of routers on the link using neighbor discovery
messages. If a router is found, then the client examines the router
advertisements to determine if DHCP should be used. If the router
advertisements enable use of DHCP on that link or if no router is found, then the
client starts a DHCP solicitation phase to find a DHCP server. The following are
the benefits of DHCPv6:
Used for automatic domain name registration of hosts using dynamic DNS
78
IPv6: Technology Whitepaper
H. Address Formation.
79
IPv6: Technology Whitepaper
80
IPv6: Technology Whitepaper
8 GLOSSARY:
6BONEAn IPv6 test bed that consists of IPv6 networks. The 6BONE is a
worldwide informal collaborative project, informally operated with oversight from
the IPv6 Working Group of the IETF. Though it started as a virtual network using
IPv6 tunnels or encapsulation over IPv4 networks, it is slowly migrating to native
links for IPv6 transport.
6to4 tunnelAn IPv6 automatic tunneling technique where the tunnel endpoint
is determined by the globally unique IPv4 address embedded in a 6to4 address.
A 6to4 address is a combination of the prefix 2002::/16 and a globally unique 32-
bit IPv4 address. (IPv4-compatible addresses are not used in 6to4 tunneling.)
6to4 relayA 6to4 border router that offers traffic forwarding to the IPv6 Internet
for other 6to4 border routers. A 6to4 relay forwards packets to any destination
that has a 2002::/16 prefix.
A6 recordA Domain Name System (DNS) record that stores IPv6 numbers
used to represent a 128-bit IPv6 address. When an IPv6-aware application wants
to look up the name of an IPv6 server, it could request an A6 record from the
DNS server. The A6 record is not the preferred record for name resolution with
IPv6, because it has been set aside for experimental purpose.
AAAAA Domain Name System (DNS) record that stores IPv6 numbers used to
represent a 128-bit IPv6 address. The AAAA records are used to resolve host
names. This operation is similar to the process where applications request the A
record in IPv4. The AAAA record is the preferred record for name resolution with
IPv6.
81
IPv6: Technology Whitepaper
82
IPv6: Technology Whitepaper
GRE tunnelA manually configured tunnel, particularly suitable for use with the
IS-IS protocol. The GRE tunnel is not tied to a specific passenger or transport
protocol, but in this case carries IPv6 traffic as the passenger protocol over GRE
as the carrier protocol. Generic routing encapsulation is a network protocol that
allows any arbitrary passenger protocol to be sent over any carrier protocol.
IPv4-compatible IPv6 addressAn IPv6 unicast address that has zeros in the
high-order 96 bits of the address and an IPv4 address in the low-order 32 bits of
the address. The format of an IPv4-compatible IPv6 address is
0:0:0:0:0:0:A.B.C.D or ::A.B.C.D, where A.B.C.D represents the IPv4 address.
The entire 128-bit IPv4-compatible IPv6 address is used as the IPv6 address of a
node, and the IPv4 address embedded in low-order 32-bits is used as the IPv4
address of the node. IPv4-compatible IPv6 addresses are assigned to nodes that
support both the IPv4 and IPv6 protocol stacks, and are used in automatic
tunneling. See also anycast address, automatic IPv6 tunnel, IPv6 multicast
address, link-local address, and site-local address.
83
IPv6: Technology Whitepaper
Link-local addressAn IPv6 unicast address that has a scope limited to the
local link (local network). Link-local addresses are automatically configured on all
IPv6 interfaces by using a specific prefix for link-local addresses (FE80::/10) and
adding the interface ID in the modified EUI-64 format. Link-local addresses are
used by the neighbor discovery protocol and the router discovery protocol. They
are also used by many routing protocols.
Link-local addresses can serve as a way to connect devices on the same local
network without needing global addresses. See also global unicast address,
anycast address, IPv6 multicast address, site-local address, and solicited-node
multicast address.
When using a one-way hash function, one can compare a calculated message
digest against the message digest that is decrypted with a public key to verify
that the message hasn't been tampered with. This comparison is called a
"hashcheck."
84
IPv6: Technology Whitepaper
tunnel destination. The host or router at each end of a configured tunnel must
support both the IPv4 and IPv6 protocol stacks. Manually configured tunnels can
be configured between border routers or between a border router and a host.
See also automatic IPv6 tunnel.
One-Way Hash Function: An algorithm that turns messages or text into a fixed
string of digits, usually for security or data management purposes. The "one way"
means that it's nearly impossible to derive the original text from the string. A one-
way hash function is used to create digital signatures, which in turn identify and
authenticate the sender and message of a digitally distributed message.
85
IPv6: Technology Whitepaper
86
IPv6: Technology Whitepaper
9 References:
RFCs and Drafts
Rationale and Case for IPv6
Protocols
An IPv6 Aggregatable Global Unicast Address Format:[ RFC 2374 / RFC 3587].
87
IPv6: Technology Whitepaper
Web sites:
www.ipv6Style.jp
www.ipv6.org
www.6journal.com
www.ipv6forum.org
www.tcpipguide.com
Transmission of IPv6 over IPv4 Domains without Explicit Tunnels: [RFC 2529]
88