SlideShare a Scribd company logo
1 of 13
Presented by
Pina Chhatrala
(MCA – 5C)
IPV6
Why We Need IPv6 ?
 Internet Protocol Version 6(IPv6) is the latest revision of the Internet Protocol,
the communication protocol that provides an identification and location system
for computers on networks and routes traffic across the internet.
 IPv6 was developed by IETF to deal with the long-anticipated problem of IPv4
address exhaustion.
 IPv6 was intended to replace IPv4, which still carries the vast majority of Internet
traffic.
 In contrast to IPv4, which defined an IP address as a 32-bit value, IPv6 addresses
have a size of 128 bits. Therefore, IPv6 has a vastly enlarged address space
compared to IPv4.
INTRODUCTION
 New Header Format
 Large Address Space
 Efficient and Hierarchical addressing and routing infrastructure
 Stateless and stateful address configuration
 Built-in Security
 Better support for Quality of Service
 New support for neighbouring node interaction
 Extansibility
FEATURES OF IPV6
 The size of the IPv6 address is four times longer than 32-bit IPv4 address.
 The number of possible address in IPv6 is 2^128(3.4*10^38) addresses.
 340,282,366,920,938,463,463,374,607,431,768,211,456 to be exact.
 Such a large amount of available IP addresses ensure that we will never again run
out of IP addresses.
IPV6 ADDRESSING
 The IPv6 address size is 128-bit which is represented in hexadecimals.
 The 128-bit address is divided into 16-bits, and each 16-bit block is converted into 4-
digit hexadecimal number and separated by colons. This type of representation is called
colon hexadecimal.
 The format of IPv6 address is xxxx: xxxx: xxxx: xxxx: xxxx: xxxx: xxxx: xxxx where each x
is a hexadecimal representing 4 bits or a nibble.
 IPv6 address range from 0000:0000:0000:0000:0000:0000:0000:0000 to ffff: ffff: ffff:
ffff: ffff: ffff: ffff: ffff.
IPV6 ADDRESSING
 IPv6 address can be simplified by following two methods :
 Omit Leading Zeros
For Example, 4FDE:0000:0000:0002:0022:F376:FF3B:AC99 may be written as
4FDE:0:0:2:22:F376:FF3B:AC99.
 Double Colon
For Example, 4FDE:0000:0000:0002:0022:F376:FF3B:AC99 can be further
simplified as 4FDE::2:22:F376:FF3B:AC99.
IPV6 ADDRESSING
 There are three types of IPv6 address :
 Unicast
Unicast transmission is the sending of messages to a single network
destination identified by a unique address.
 Multicast
Multicast is the delivery of a message or information to a group of
destination computers simultaneously in a single transmission from the source.
 Anycast
Anycast is a network addressing and routing methodology in which
datagrams from a single sender are routed to the topologically nearest node in
a group of potential receiver, though it may be sent to a several nodes, all
identified by the same destination address.
IPV6 ADDRESSING
 Header
 Version (4 bits)
 Traffic class (8 bits)
 Flow Label (20 bits)
 Payload Length (16 bits)
 Next Header(8 bits)
 HOP Limit (8 bits)
 Source Address (128 bits)
 Destination Address (128 bits)
 Payload
IPV6 PACKET
 IPSec Security Association
 Security Protocols
 AH (Authentication Header)
 ESP (Encapsulating Security Payload)
 IPSec Algorithm
 Key Exchange Algorithm
 Deffiee – Hellman(DH)
 Elliptic Curve Deffiee – Hellman(ECDH)
 Integrity Algorithm
 Message Digest 5 (MD5)
 Secure Hash Algorithm (SHA)
 Advanced Encryption Standard Galois Message Authentication Code
 Advanced Encryption Standard Galois/Counter Mode
IPSEC IN IPV6
 IPSec Algorithm
 Encryption Algorithm
 Data Encryption Standard (DES)
 Advanced Encryption Standard (AES)
 Authentication Method
 Preshared Key
 Kerberos V5
 NT LAN Manager (NTLM) etc.
IPSEC IN IPV6
IPV4 V/S IPV6
IPv4 IPv6
• 32- bit length. • 128-bit length.
• IPSec support is only optional. • Inbuilt IPSec support.
• Fragmentation is done by sender
and forwarding routers.
• Fragmentation is only done by
sender.
• No packet flow identification. • Packet flow identification is
available using flow label field.
• Checksum field is available in
header.
• No checksum field in header.
• Option fields are available in
header.
• No option fields, but extension
headers are available.
• Broadcast messages are possible. • Broadcast messages are not
possible.
THANK

YOU

More Related Content

What's hot

What's hot (20)

Internet Protocol Version 6
Internet Protocol Version 6Internet Protocol Version 6
Internet Protocol Version 6
 
IPv6 next generation protocol
IPv6 next generation protocolIPv6 next generation protocol
IPv6 next generation protocol
 
IPv6
IPv6IPv6
IPv6
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
 
IPv6: Internet Protocol version 6
IPv6: Internet Protocol version 6IPv6: Internet Protocol version 6
IPv6: Internet Protocol version 6
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
A very good introduction to IPv6
A very good introduction to IPv6A very good introduction to IPv6
A very good introduction to IPv6
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
Ipv4 presentation
Ipv4 presentationIpv4 presentation
Ipv4 presentation
 
Internet protocol v6
Internet protocol v6Internet protocol v6
Internet protocol v6
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
IPv6 Addressing
IPv6 AddressingIPv6 Addressing
IPv6 Addressing
 
Ip address
Ip addressIp address
Ip address
 
Ethernet
EthernetEthernet
Ethernet
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorial
 

Similar to IPv6 address

IPV6 , ipv6 ,TCP/IP, TCP ,IP
IPV6 , ipv6 ,TCP/IP, TCP ,IPIPV6 , ipv6 ,TCP/IP, TCP ,IP
IPV6 , ipv6 ,TCP/IP, TCP ,IPRamkrishna bhagat
 
Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...Adii Shah
 
Ipv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaIpv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaJigar Tarsariya
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptxJoshuaAnnan5
 
IPv6 Addressing Architecture
IPv6 Addressing ArchitectureIPv6 Addressing Architecture
IPv6 Addressing ArchitectureShreehari Dhat
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6mithilak
 
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATIONIPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATIONgopi5692
 
Describe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfDescribe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfmayorothenguyenhob69
 
Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Karunakant Rai
 
COMPARISON OF IPV4 AND IPV6 presentation
COMPARISON OF IPV4 AND IPV6 presentationCOMPARISON OF IPV4 AND IPV6 presentation
COMPARISON OF IPV4 AND IPV6 presentationMuhammadAsif969462
 

Similar to IPv6 address (20)

IPV6 , ipv6 ,TCP/IP, TCP ,IP
IPV6 , ipv6 ,TCP/IP, TCP ,IPIPV6 , ipv6 ,TCP/IP, TCP ,IP
IPV6 , ipv6 ,TCP/IP, TCP ,IP
 
Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...
 
Introduction to IPv6
Introduction to IPv6Introduction to IPv6
Introduction to IPv6
 
IPv4.pdf
IPv4.pdfIPv4.pdf
IPv4.pdf
 
Ipv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar TarsariyaIpv4 over ipv6 by Jigar Tarsariya
Ipv4 over ipv6 by Jigar Tarsariya
 
Ipv6
Ipv6Ipv6
Ipv6
 
IPv6.pptx
IPv6.pptxIPv6.pptx
IPv6.pptx
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptx
 
IPv6 Addressing Architecture
IPv6 Addressing ArchitectureIPv6 Addressing Architecture
IPv6 Addressing Architecture
 
Network Layer And I Pv6
Network Layer And I Pv6Network Layer And I Pv6
Network Layer And I Pv6
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
 
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATIONIPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
 
I pv6
I pv6I pv6
I pv6
 
Describe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdfDescribe the similarities and differences between IPv4 & IPv6.So.pdf
Describe the similarities and differences between IPv4 & IPv6.So.pdf
 
Introduction to ipv6 v1.3
Introduction to ipv6 v1.3Introduction to ipv6 v1.3
Introduction to ipv6 v1.3
 
nat.ppt
nat.pptnat.ppt
nat.ppt
 
Ip v4
Ip v4Ip v4
Ip v4
 
IPv6
IPv6IPv6
IPv6
 
IP VERSION 6
IP VERSION 6IP VERSION 6
IP VERSION 6
 
COMPARISON OF IPV4 AND IPV6 presentation
COMPARISON OF IPV4 AND IPV6 presentationCOMPARISON OF IPV4 AND IPV6 presentation
COMPARISON OF IPV4 AND IPV6 presentation
 

More from Pina Parmar

Test case techniques
Test case techniquesTest case techniques
Test case techniquesPina Parmar
 
Object oriented programming concept
Object oriented programming conceptObject oriented programming concept
Object oriented programming conceptPina Parmar
 
Types of firewall
Types of firewallTypes of firewall
Types of firewallPina Parmar
 
Secure Shell(ssh)
Secure Shell(ssh)Secure Shell(ssh)
Secure Shell(ssh)Pina Parmar
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerPina Parmar
 

More from Pina Parmar (6)

Test case techniques
Test case techniquesTest case techniques
Test case techniques
 
Object oriented programming concept
Object oriented programming conceptObject oriented programming concept
Object oriented programming concept
 
Firewall Basing
Firewall BasingFirewall Basing
Firewall Basing
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Secure Shell(ssh)
Secure Shell(ssh)Secure Shell(ssh)
Secure Shell(ssh)
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 

Recently uploaded

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

IPv6 address

  • 2. Why We Need IPv6 ?
  • 3.  Internet Protocol Version 6(IPv6) is the latest revision of the Internet Protocol, the communication protocol that provides an identification and location system for computers on networks and routes traffic across the internet.  IPv6 was developed by IETF to deal with the long-anticipated problem of IPv4 address exhaustion.  IPv6 was intended to replace IPv4, which still carries the vast majority of Internet traffic.  In contrast to IPv4, which defined an IP address as a 32-bit value, IPv6 addresses have a size of 128 bits. Therefore, IPv6 has a vastly enlarged address space compared to IPv4. INTRODUCTION
  • 4.  New Header Format  Large Address Space  Efficient and Hierarchical addressing and routing infrastructure  Stateless and stateful address configuration  Built-in Security  Better support for Quality of Service  New support for neighbouring node interaction  Extansibility FEATURES OF IPV6
  • 5.  The size of the IPv6 address is four times longer than 32-bit IPv4 address.  The number of possible address in IPv6 is 2^128(3.4*10^38) addresses.  340,282,366,920,938,463,463,374,607,431,768,211,456 to be exact.  Such a large amount of available IP addresses ensure that we will never again run out of IP addresses. IPV6 ADDRESSING
  • 6.  The IPv6 address size is 128-bit which is represented in hexadecimals.  The 128-bit address is divided into 16-bits, and each 16-bit block is converted into 4- digit hexadecimal number and separated by colons. This type of representation is called colon hexadecimal.  The format of IPv6 address is xxxx: xxxx: xxxx: xxxx: xxxx: xxxx: xxxx: xxxx where each x is a hexadecimal representing 4 bits or a nibble.  IPv6 address range from 0000:0000:0000:0000:0000:0000:0000:0000 to ffff: ffff: ffff: ffff: ffff: ffff: ffff: ffff. IPV6 ADDRESSING
  • 7.  IPv6 address can be simplified by following two methods :  Omit Leading Zeros For Example, 4FDE:0000:0000:0002:0022:F376:FF3B:AC99 may be written as 4FDE:0:0:2:22:F376:FF3B:AC99.  Double Colon For Example, 4FDE:0000:0000:0002:0022:F376:FF3B:AC99 can be further simplified as 4FDE::2:22:F376:FF3B:AC99. IPV6 ADDRESSING
  • 8.  There are three types of IPv6 address :  Unicast Unicast transmission is the sending of messages to a single network destination identified by a unique address.  Multicast Multicast is the delivery of a message or information to a group of destination computers simultaneously in a single transmission from the source.  Anycast Anycast is a network addressing and routing methodology in which datagrams from a single sender are routed to the topologically nearest node in a group of potential receiver, though it may be sent to a several nodes, all identified by the same destination address. IPV6 ADDRESSING
  • 9.  Header  Version (4 bits)  Traffic class (8 bits)  Flow Label (20 bits)  Payload Length (16 bits)  Next Header(8 bits)  HOP Limit (8 bits)  Source Address (128 bits)  Destination Address (128 bits)  Payload IPV6 PACKET
  • 10.  IPSec Security Association  Security Protocols  AH (Authentication Header)  ESP (Encapsulating Security Payload)  IPSec Algorithm  Key Exchange Algorithm  Deffiee – Hellman(DH)  Elliptic Curve Deffiee – Hellman(ECDH)  Integrity Algorithm  Message Digest 5 (MD5)  Secure Hash Algorithm (SHA)  Advanced Encryption Standard Galois Message Authentication Code  Advanced Encryption Standard Galois/Counter Mode IPSEC IN IPV6
  • 11.  IPSec Algorithm  Encryption Algorithm  Data Encryption Standard (DES)  Advanced Encryption Standard (AES)  Authentication Method  Preshared Key  Kerberos V5  NT LAN Manager (NTLM) etc. IPSEC IN IPV6
  • 12. IPV4 V/S IPV6 IPv4 IPv6 • 32- bit length. • 128-bit length. • IPSec support is only optional. • Inbuilt IPSec support. • Fragmentation is done by sender and forwarding routers. • Fragmentation is only done by sender. • No packet flow identification. • Packet flow identification is available using flow label field. • Checksum field is available in header. • No checksum field in header. • Option fields are available in header. • No option fields, but extension headers are available. • Broadcast messages are possible. • Broadcast messages are not possible.