SlideShare uma empresa Scribd logo
1 de 24
Ipv4 Over Ipv6
PRESENTATION BY:

JIGAR M. TARSARIYA
7 TH S E M E S T E R
M.SC(IT) PROGRAMME
ROLL NO: 95
What Is IP?
 Used for communicating data across a packet-switched

internetwork.
 Also referred to as TCP/IP.
 Primary Protocol of delivering distinguished protocol datagrams
(packets).
 The First Major Version is Ipv4.
Ipv4
 The fourth version of the Internet Protocol (IP) and it is the first

version of the protocol to be widely deployed.
 It uses a 32 bit addressing and allows for 4,294,967,296 unique
addresses.
 Version 4 of IP was the first that was widely used in modern
TCP/IP.
 Ipv4 is still the dominant protocol of the Internet.
Ipv6
 Is a version of the Internet Protocol (IP) intended to succeed






IPv4.
Is the protocol currently used to direct almost all Internet
traffic.
Also known as Ipng (IP next generation) is the second version of
the Internet Protocol to be used generally across the virtual
world.
IPng was designed to take an evolutionary step from IPv4.
Functions which work in IPv4 were kept in IPng. Functions
which didn’t work were removed.
Ipv6 Contd…
 Like IPv4, IPv6 is an internet-layer protocol for packet switched






internetworking and provides end-to-end datagram
transmission across multiple IP networks.
IPv6 uses 128-bit addresses, for an address space of 2^128
(approximately 3.4×1038) addresses.
It allows more devices and users then the Ipv4 on the internet.
It also allows extra flexibility in allocating addresses and
efficiency for routing traffic.
It also eliminates the primary need for network address
translation (NAT).
Limitations of Ipv4
 Since the 1980s it has been apparent that the number of available

IPv4 addresses is being exhausted at a rate that was not initially
anticipated in the design of the network.
 IPV4 addresses are being consumed at an alarming rate and it is
estimated that 2010 would be the last year for IPV4, some sources
say they may last until 2012.
 Primary reason for IPV4 exhaustion is huge growth in number of
internet users, mobile devices using Internet connection and always
on devices such as ADSL modems and cable modems. This brings us
to the development and adoption of IPV6 as an alternate solution.
Why not Ipv5?
 IP Version 4 to be called IP Version 5, but as it turned out

Version 5 of the Internet Protocol Family was already taken.
 In the late 1980s the Internet Protocol itself was the topic of a
considerable level of research, as researchers experimented with
different forms of network behavior.
 Version 5 of the Internet Protocol was reserved for use with an
experimental IP protocol, the Internet Stream Protocol, Version
2 (ST-II), written up as RFC 1190 in 1990.
Ipv5 Contd…
 So, When it came time to assign a protocol number of the “next

generation” of IPv4, the next available version number was 6,
hence IPv6.
 So the technical plan to address the address-exhaustion
problem was to perform an upgrade of the Internet and convert
the Internet from IP Version 4 to IP Version 6.
What will Ipv6 do?
 IPv6 is technology with a main focus on changing the structure

of current IP addresses, which will allow for virtually unlimited
IP addresses.
 The current version, IPv4 is a growing concern with the limited
IP addresses, making it a fear that they will run out in the
future.
 IPv6 will also have a goal to make the Internet a more secure
place for browsers, and with the rapid number of identity theft
victims, this is a key feature.
Ipv6 Header
 Data packet comprises of two main parts:

(1) The header and (2) The payload
 The first 40 bytes/octets (40x8 = 320 bits) of an IPv6 packet
comprise of the header (see Figure 1) that contains the following
fields:
Ipv6 Header Contd…
1.
2.
3.

4.
5.
6.
7.
8.

Source address (128 bits)
Destination address (128 bits)
Version/IP version (4-bits)
Packet priority/Traffic class (8 bits)
Flow Label/QoS management (20 bits)
Payload length in bytes(16 bits)
Next Header (8 bits)
Time To Live (TTL)/Hop Limit (8 bits)
Ipv6 Addressing
1. The Ipv6 Address Space:
 The most obvious distinguishing feature of IPv6 is its use of
much larger addresses.
 The size of an address in IPv6 is 128 bits, which is four times
the larger than an IPv4 address.
 A 128-bit address space allows for 2128 or
340,282,366,920,938,463,463,374,607,431,768,211,456 (or
3.4^1038 or 340 undecillion) possible addresses.
 The IPv6 addressing architecture is described in RFC 4291.
Ipv6 Addressing Contd…
2. IPv6 Address Syntax:
 IPv6, the 128-bit address is divided along 16-bit boundaries,
and each 16-bit block is converted to a 4-digit hexadecimal
number and separated by colons.
 The resulting representation is called colon-hexadecimal.
 The following is an IPv6 address in binary form:
001000000000000100001101101110000000000000000000
0010111100111011000000101010101000000000111111111111111
0001010001001110000
Ipv6 Addressing Contd…
 The 128-bit address is divided along 16-bit boundaries:

0010000000000001 0000110110111000
0000000000000000 0010111100111011 0000001010101010
0000000011111111 1111111000101000
1001110001011010
 Each 16-bit block is converted to hexadecimal and delimited
with colons. The result is:
2001:0DB8:0000:2F3B:02AA:00FF:FE28:9C5A
Ipv6 v/s Ipv4
 The following table compares the key characters of IPv6 vs. IPv4:
Subjects

Ipv4

Ipv6

Ipv6 Advantages

Address Space

4 Billion Addresses

2^128

79 Octillion times the
IPv4 address space

Configuration

Manual or use DHCP

Universal Plug and Play
(UPnP) with or without
DHCP

Lower Operation
Expenses and reduce
error

Broadcast / Multicast

Uses both

No broadcast and has
different forms of
multicast

Better bandwidth
efficiency
Ipv6 v/s Ipv4 Contd…
Subject

Ipv4

Ipv6

Ipv6 Advantages

Anycast support

Not part of the original
protocol

Explicit support of
anycast

Allows new applications
in mobility, data center

Network Configuration

Mostly manual and
labor intensive

Facilitate the renumbering of hosts and
routers

Lower operation
expenses and facilitate
migration

QoS support

ToS using DIFFServ

Flow classes and flow
labels

More Granular control
of QoS

Security

Uses IPsec for Data
packet protection

IPsec becomes the key
technology to protect
data and control
packets

Unified framework for
security and more
secure computing
environment
Ipv6 v/s Ipv4 Contd…
Subject

Ipv4

Ipv6

Ipv6 Advantages

Mobility

Uses Mobile IPv4

Mobile IPv6 provides
fast handover, better
router optimization and
hierarchical mobility

Better efficiency and
scalability; Work with
latest 3G mobile
technologies and
beyond.
Difference Between Ipv4 & Ipv6
 Ipv4:
 Source and destination addresses are 32 bits (4 bytes) in length.
 IPSec support is optional.
 IPv4 header does not identify packet flow for QoS handling by routers.
 Both routers and the sending host fragment packets.

 Header includes a checksum.
 Header includes options.
 Address Resolution Protocol (ARP) uses broadcast ARP Request frames

to resolve an IP address to a link-layer address.
Difference Between Ipv4 & Ipv6 Contd…
Ipv4:
 ICMP Router Discovery is used to determine the IPv4 address of the
best default gateway, and it is optional.
 Broadcast addresses are used to send traffic to all nodes on a subnet.
 Must be configured either manually or through DHCP.
 Uses host address (A) resource records in Domain Name System
(DNS) to map host names to IPv4 addresses.
 Uses pointer (PTR) resource records in the IN-ADDR.ARPA DNS
domain to map IPv4 addresses to host names.
 Must support a 576-byte packet size (possibly fragmented).
Difference Between Ipv4 & Ipv6 Contd…
 Ipv6:
 Source and destination addresses are 128 bits (16 bytes) in length.
 IPSec support is required.
 IPv6 header contains Flow Label field, which identifies packet flow





for QoS handling by router.
Only the sending host fragments packets; routers do not.
Header does not include a checksum.
All optional data is moved to IPv6 extension headers.
Multicast Neighbor Solicitation messages resolve IP addresses to
link-layer addresses.
Difference Between Ipv4 & Ipv6 Contd…
Ipv6:
 ICMPv6 Router Solicitation and Router Advertisement messages are
used to determine the IP address of the best default gateway, and
they are required.
 IPv6 uses a link-local scope all-nodes multicast address.
 Does not require manual configuration or DHCP.
 Uses host address (AAAA) resource records in DNS to map host
names to IPv6 addresses.
 Uses pointer (PTR) resource records in the IP6.ARPA DNS domain to
map IPv6 addresses to host names.
 Must support a 1280-byte packet size (without fragmentation).
Potential Benefits and Uses of Ipv6
Increased Address Space
2. Purported Security Improvements
3. End User Application
4. Network Evolution
1.
References

 www.google.com
 www.wikipedia.com

 www.ipv6.com
 www.seminarforyou.com
Ipv4 over ipv6 by Jigar Tarsariya

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...
 
Future protocol IP v6
Future protocol IP v6Future protocol IP v6
Future protocol IP v6
 
IPv6
IPv6IPv6
IPv6
 
IPv6
IPv6IPv6
IPv6
 
Introduction to IPv6
Introduction to IPv6Introduction to IPv6
Introduction to IPv6
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
 
IPv6 address
IPv6 addressIPv6 address
IPv6 address
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 
IPV6 Introduction
IPV6 Introduction IPV6 Introduction
IPV6 Introduction
 
IPv6_Quick_Start_Guide
IPv6_Quick_Start_GuideIPv6_Quick_Start_Guide
IPv6_Quick_Start_Guide
 
IPv6 By Vipin
IPv6 By VipinIPv6 By Vipin
IPv6 By Vipin
 
IPv6 next generation protocol
IPv6 next generation protocolIPv6 next generation protocol
IPv6 next generation protocol
 
Internet protocol v6
Internet protocol v6Internet protocol v6
Internet protocol v6
 
IPv6 Address Planning
IPv6 Address PlanningIPv6 Address Planning
IPv6 Address Planning
 
Ipv6 course
Ipv6  courseIpv6  course
Ipv6 course
 
IPv4 vs IPv6
IPv4 vs IPv6IPv4 vs IPv6
IPv4 vs IPv6
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
 
A very good introduction to IPv6
A very good introduction to IPv6A very good introduction to IPv6
A very good introduction to IPv6
 
IPv6 theoryfinalx
IPv6 theoryfinalxIPv6 theoryfinalx
IPv6 theoryfinalx
 
IPv6
IPv6IPv6
IPv6
 

Semelhante a Ipv4 over ipv6 by Jigar Tarsariya

Describe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfDescribe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfmayorothenguyenhob69
 
A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6Amber Ford
 
IPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolIPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolMohit Sharma
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdfniran10
 
Ipv6 - Hamzeh Al-Qudah
Ipv6 - Hamzeh Al-QudahIpv6 - Hamzeh Al-Qudah
Ipv6 - Hamzeh Al-QudahHamza Al-Qudah
 
Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6Netwax Lab
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptxJoshuaAnnan5
 
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdf
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdfResearch the IPv4 ns the IPv6 protocols, then prepare a report that .pdf
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdfarcotstarsports
 
IP Address
IP AddressIP Address
IP AddressRahul P
 

Semelhante a Ipv4 over ipv6 by Jigar Tarsariya (20)

Describe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfDescribe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdf
 
IPv6
IPv6IPv6
IPv6
 
A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6
 
IPv6.pptx
IPv6.pptxIPv6.pptx
IPv6.pptx
 
IPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolIPv6 - The Next next generation protocol
IPv6 - The Next next generation protocol
 
Introduction of ipv6
Introduction of ipv6Introduction of ipv6
Introduction of ipv6
 
Ip4 vs ip6
Ip4 vs ip6Ip4 vs ip6
Ip4 vs ip6
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdf
 
Ipv6 - Hamzeh Al-Qudah
Ipv6 - Hamzeh Al-QudahIpv6 - Hamzeh Al-Qudah
Ipv6 - Hamzeh Al-Qudah
 
Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptx
 
IP VERSION 6
IP VERSION 6IP VERSION 6
IP VERSION 6
 
14 564
14 56414 564
14 564
 
Ipv6
Ipv6Ipv6
Ipv6
 
ipv4 & ipv6
ipv4 & ipv6ipv4 & ipv6
ipv4 & ipv6
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdf
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdfResearch the IPv4 ns the IPv6 protocols, then prepare a report that .pdf
Research the IPv4 ns the IPv6 protocols, then prepare a report that .pdf
 
I.p. protocol
I.p. protocolI.p. protocol
I.p. protocol
 
IP Address
IP AddressIP Address
IP Address
 

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Ipv4 over ipv6 by Jigar Tarsariya

  • 1. Ipv4 Over Ipv6 PRESENTATION BY: JIGAR M. TARSARIYA 7 TH S E M E S T E R M.SC(IT) PROGRAMME ROLL NO: 95
  • 2. What Is IP?  Used for communicating data across a packet-switched internetwork.  Also referred to as TCP/IP.  Primary Protocol of delivering distinguished protocol datagrams (packets).  The First Major Version is Ipv4.
  • 3. Ipv4  The fourth version of the Internet Protocol (IP) and it is the first version of the protocol to be widely deployed.  It uses a 32 bit addressing and allows for 4,294,967,296 unique addresses.  Version 4 of IP was the first that was widely used in modern TCP/IP.  Ipv4 is still the dominant protocol of the Internet.
  • 4. Ipv6  Is a version of the Internet Protocol (IP) intended to succeed     IPv4. Is the protocol currently used to direct almost all Internet traffic. Also known as Ipng (IP next generation) is the second version of the Internet Protocol to be used generally across the virtual world. IPng was designed to take an evolutionary step from IPv4. Functions which work in IPv4 were kept in IPng. Functions which didn’t work were removed.
  • 5. Ipv6 Contd…  Like IPv4, IPv6 is an internet-layer protocol for packet switched     internetworking and provides end-to-end datagram transmission across multiple IP networks. IPv6 uses 128-bit addresses, for an address space of 2^128 (approximately 3.4×1038) addresses. It allows more devices and users then the Ipv4 on the internet. It also allows extra flexibility in allocating addresses and efficiency for routing traffic. It also eliminates the primary need for network address translation (NAT).
  • 6. Limitations of Ipv4  Since the 1980s it has been apparent that the number of available IPv4 addresses is being exhausted at a rate that was not initially anticipated in the design of the network.  IPV4 addresses are being consumed at an alarming rate and it is estimated that 2010 would be the last year for IPV4, some sources say they may last until 2012.  Primary reason for IPV4 exhaustion is huge growth in number of internet users, mobile devices using Internet connection and always on devices such as ADSL modems and cable modems. This brings us to the development and adoption of IPV6 as an alternate solution.
  • 7. Why not Ipv5?  IP Version 4 to be called IP Version 5, but as it turned out Version 5 of the Internet Protocol Family was already taken.  In the late 1980s the Internet Protocol itself was the topic of a considerable level of research, as researchers experimented with different forms of network behavior.  Version 5 of the Internet Protocol was reserved for use with an experimental IP protocol, the Internet Stream Protocol, Version 2 (ST-II), written up as RFC 1190 in 1990.
  • 8. Ipv5 Contd…  So, When it came time to assign a protocol number of the “next generation” of IPv4, the next available version number was 6, hence IPv6.  So the technical plan to address the address-exhaustion problem was to perform an upgrade of the Internet and convert the Internet from IP Version 4 to IP Version 6.
  • 9. What will Ipv6 do?  IPv6 is technology with a main focus on changing the structure of current IP addresses, which will allow for virtually unlimited IP addresses.  The current version, IPv4 is a growing concern with the limited IP addresses, making it a fear that they will run out in the future.  IPv6 will also have a goal to make the Internet a more secure place for browsers, and with the rapid number of identity theft victims, this is a key feature.
  • 10. Ipv6 Header  Data packet comprises of two main parts: (1) The header and (2) The payload  The first 40 bytes/octets (40x8 = 320 bits) of an IPv6 packet comprise of the header (see Figure 1) that contains the following fields:
  • 11. Ipv6 Header Contd… 1. 2. 3. 4. 5. 6. 7. 8. Source address (128 bits) Destination address (128 bits) Version/IP version (4-bits) Packet priority/Traffic class (8 bits) Flow Label/QoS management (20 bits) Payload length in bytes(16 bits) Next Header (8 bits) Time To Live (TTL)/Hop Limit (8 bits)
  • 12. Ipv6 Addressing 1. The Ipv6 Address Space:  The most obvious distinguishing feature of IPv6 is its use of much larger addresses.  The size of an address in IPv6 is 128 bits, which is four times the larger than an IPv4 address.  A 128-bit address space allows for 2128 or 340,282,366,920,938,463,463,374,607,431,768,211,456 (or 3.4^1038 or 340 undecillion) possible addresses.  The IPv6 addressing architecture is described in RFC 4291.
  • 13. Ipv6 Addressing Contd… 2. IPv6 Address Syntax:  IPv6, the 128-bit address is divided along 16-bit boundaries, and each 16-bit block is converted to a 4-digit hexadecimal number and separated by colons.  The resulting representation is called colon-hexadecimal.  The following is an IPv6 address in binary form: 001000000000000100001101101110000000000000000000 0010111100111011000000101010101000000000111111111111111 0001010001001110000
  • 14. Ipv6 Addressing Contd…  The 128-bit address is divided along 16-bit boundaries: 0010000000000001 0000110110111000 0000000000000000 0010111100111011 0000001010101010 0000000011111111 1111111000101000 1001110001011010  Each 16-bit block is converted to hexadecimal and delimited with colons. The result is: 2001:0DB8:0000:2F3B:02AA:00FF:FE28:9C5A
  • 15. Ipv6 v/s Ipv4  The following table compares the key characters of IPv6 vs. IPv4: Subjects Ipv4 Ipv6 Ipv6 Advantages Address Space 4 Billion Addresses 2^128 79 Octillion times the IPv4 address space Configuration Manual or use DHCP Universal Plug and Play (UPnP) with or without DHCP Lower Operation Expenses and reduce error Broadcast / Multicast Uses both No broadcast and has different forms of multicast Better bandwidth efficiency
  • 16. Ipv6 v/s Ipv4 Contd… Subject Ipv4 Ipv6 Ipv6 Advantages Anycast support Not part of the original protocol Explicit support of anycast Allows new applications in mobility, data center Network Configuration Mostly manual and labor intensive Facilitate the renumbering of hosts and routers Lower operation expenses and facilitate migration QoS support ToS using DIFFServ Flow classes and flow labels More Granular control of QoS Security Uses IPsec for Data packet protection IPsec becomes the key technology to protect data and control packets Unified framework for security and more secure computing environment
  • 17. Ipv6 v/s Ipv4 Contd… Subject Ipv4 Ipv6 Ipv6 Advantages Mobility Uses Mobile IPv4 Mobile IPv6 provides fast handover, better router optimization and hierarchical mobility Better efficiency and scalability; Work with latest 3G mobile technologies and beyond.
  • 18. Difference Between Ipv4 & Ipv6  Ipv4:  Source and destination addresses are 32 bits (4 bytes) in length.  IPSec support is optional.  IPv4 header does not identify packet flow for QoS handling by routers.  Both routers and the sending host fragment packets.  Header includes a checksum.  Header includes options.  Address Resolution Protocol (ARP) uses broadcast ARP Request frames to resolve an IP address to a link-layer address.
  • 19. Difference Between Ipv4 & Ipv6 Contd… Ipv4:  ICMP Router Discovery is used to determine the IPv4 address of the best default gateway, and it is optional.  Broadcast addresses are used to send traffic to all nodes on a subnet.  Must be configured either manually or through DHCP.  Uses host address (A) resource records in Domain Name System (DNS) to map host names to IPv4 addresses.  Uses pointer (PTR) resource records in the IN-ADDR.ARPA DNS domain to map IPv4 addresses to host names.  Must support a 576-byte packet size (possibly fragmented).
  • 20. Difference Between Ipv4 & Ipv6 Contd…  Ipv6:  Source and destination addresses are 128 bits (16 bytes) in length.  IPSec support is required.  IPv6 header contains Flow Label field, which identifies packet flow     for QoS handling by router. Only the sending host fragments packets; routers do not. Header does not include a checksum. All optional data is moved to IPv6 extension headers. Multicast Neighbor Solicitation messages resolve IP addresses to link-layer addresses.
  • 21. Difference Between Ipv4 & Ipv6 Contd… Ipv6:  ICMPv6 Router Solicitation and Router Advertisement messages are used to determine the IP address of the best default gateway, and they are required.  IPv6 uses a link-local scope all-nodes multicast address.  Does not require manual configuration or DHCP.  Uses host address (AAAA) resource records in DNS to map host names to IPv6 addresses.  Uses pointer (PTR) resource records in the IP6.ARPA DNS domain to map IPv6 addresses to host names.  Must support a 1280-byte packet size (without fragmentation).
  • 22. Potential Benefits and Uses of Ipv6 Increased Address Space 2. Purported Security Improvements 3. End User Application 4. Network Evolution 1.
  • 23. References  www.google.com  www.wikipedia.com  www.ipv6.com  www.seminarforyou.com