Professional Documents
Culture Documents
Anu K Lekshmy Mca B5
Anu K Lekshmy Mca B5
MCA B5
08/30/08 1
STARTING
• It was in 1990 that (Internet Engineering Task Force) IETF
started working on a new version of Internet Protocol (IP),
one which would never run out of address, would solve a
variety of other problems, and be more flexible and efficient
as well. Its major goals were to:-
08/30/08 3
MAIN IPv6 HEADER • The Version field is always 6 for
IPv6 and 4 for IPv4.
• The Next header field tells which of the currently 6 extension header
follows this one. If this header is the last IP header, the next header field
tells which transport protocol handler (e.g. TCP,UDP) to pass the packet
to.
• The Hop limit field is used to keep packets from living forever. It is same
as the Time to live field in IPv4 a field that is decremented on each hop..
• Next is the Source address and Destination address fields.fields In the original
proposal, SIP used 8-byte address. But during many process reviews it
was felt that with 8-byte address IPv6 would run out of address within a
span of time and 16-byte address would never. So the latter was fixed.
08/30/08 6
IPv6 ADDRESS SPACES
Prefix (Binary) Usage Fraction
0000 0000 Reserved (Including IPv4) 1/256
08/30/08 9
COMPARISON OF IPv4 HEADER & IPv6
HEADER
08/30/08 10
• Purpose of comparing the IPv4 header with the IPv6 Header is to see what
has been left out of IPv6.:-
☻ The IHL Field in IPv4 is gone as the Next Header field in IPv6 tells what
follows the last IP header.
☻ All the fields relating to fragmentation in IPv4 were removed bcoz IPv6
takes a different approach to fragmentation. All IPv6 hosts and routers
must support packets of 576 bytes. This rule makes fragmentation less
likely to occur.
☻ Finally the Checksum field in IPv4 is gone bcoz it greatly reduces
performance. Removing all these features has resulted in lean and mean
network layer protocol which is IPv6…
08/30/08 11
EXTENSION HEADERS
• Each of the extension headers are optional, but if more than one is present,
they must appear directly after the fixed header. Some of the headers have
a fixed format while others contain a variable number of variable length
fields. Each item is encoded as a tuple (Type, Length, Value)…
• The Type is a 1-byte field telling which option is chosen. Its values have
been chosen so that the first 2 bits tell the routers how to process the
options when they do not know. The choices are skip the option, discard
the packet and send back an ICMP packet, discard the packet and do not
send back an ICMP packet, to multicast addresses.
• The Length is a 1-byte field. It tells how long the value is (0 to 255
bytes).
• The Value is any information required upto 255 bytes…
• The different kinds of extension headers defined at present are listed in
detail below….
08/30/08 12
Extension header Description
08/30/08 13
HOP-BY-HOP
• Used for information that all routers along the path must examine.
• Format
•Like all extension headers, this one starts out with a byte telling
what kind of header comes the next. This byte is then followed by
another one which tells the duration for which the hop-by-hop header is
in bytes. The next 2 bytes defines the datagram size as a 4-byte number.
The last 4-byte gives the size of the datagram. Sizes less than 65,536 are
not permitted and will Result in router discarding the packet and sending
back an ICMP error message. The datagram's using this header are called
Jumbograms. Its use is important for supercomputer applications…
08/30/08 14
ROUTING HEADER
• It lists one or more routers that must be visited on the way to the
destinations. Two types of routing are available.
• Strict routing
routing The full path is supplied
• Loose routing
routing Only selected routers are supplied
• Format
Bit Map
1-24 Addresses
08/30/08 15
CONTD…
• The first 4 bytes contains four 1-byte integers: the next header type, the
routing type (currently 0), the number of addresses present in the header (1
to 24) and the index of the next address to visit. The latter field starts at 0
and is incremented as each address is visited.
• Then comes a reserved byte followed by the bit map with bits which tells
whether each address must follow strict source routing or loose source
routing.
• The fragment header deals with fragmentation. In IPv6 only the source
host can fragment a packet.
• The Authentication header provides a mechanism by which the receiver
of a packet can be sure of who send it. These headers use cryptographic
techniques to accomplish their missions. It contains 3 parts. First part has
4-bytes holding the next header number, length of authentication header
and 16 zero bits. Then comes the 32-bit key number. Finally the checksum.
The payload of authentication header is sent unencrypted.
08/30/08 16
• Encrypted security payload extension header is used for packets that
must be sent secretly. It starts out with a 32-bit key number followed by the
encrypted payload.
• The Destination option header is intended for fields that needs to be
interpreted at the destination host.
08/30/08 17
08/30/08 18