Professional Documents
Culture Documents
SEIS 645-01
Research by:
Ed Grams
Eric Hunsberger
Jayesh Naithani
Jess Walczak
12/7/2010
IPv6 Overview
IPv6 is the new version of the Internet Protocol and has been designed as an evolutionary rather that a
revolutionary step-up from the IPv4 standard. Certain IPv4 functionality that worked well was
preserved, certain functionality that was either under used or did not work efficiently was removed
and/or made optional, and some new, improved, and necessary functionality was added [A1].
IPv6 can be installed as a normal software upgrade in most Internet devices today, and is interoperable
with the IPv4 standard. It is designed to run well on high performance networks such as Gigabit
Ethernet, ATM, Frame Relay, and others, as well as on low bandwidth networks, such as wireless
networks. And it provides a starting point for some new Internet functionality such as extended
addressing, improved security, and better quality of service (QoS) capabilities. [A2]
[A4]
Simplified header format: The IPv6 header has a fixed length of 40 bytes. Some fields of the
IPv4 header have been removed or made optional leading to faster packet handling and lower
processing costs.
Physical Layer
Transmission media
The transmission media, be it air, copper, fiber optic or some other type of media used for
communication has no impact on the IPv6 protocol. By the time the IPv6 communication has traversed
the layers of the network it is bits and signals, and transmission across the media essentially process the
same. When the discussion grows to include the fact that IPv6 allows for more devices to connect to a
network, and utilize the transmission media, there will likely be bandwidth concerns. For example, a
network with 10 devices connected and transmission media of copper has a certain speed per user.
Convert it to IPv6 and now there are 1000 devices on that same copper media, the speed per user may
be impacted.
Connecting devices such as routers and three-layer switches operate at the Network layer, while
gateways operate on all five layers. These devices route data packets that contain source and
destination logical addresses. These devices cannot route packets unless they understand the IPv6
protocol. Older hardware designed for the efficient forwarding of just the IPv4 packets will not be
suitable for supporting IPv6, and will require a complete hardware update or a firmware update at the
least. Also, as a result of larger address size for IPv6, routing tables and caches on routers now need to
be bigger and re-structured to be optimized for IPv6. Routers need to use better routing protocols such
as Open Shortest First Protocol (OSFP) and Routing Information Protocol (RIP) and be able to support
the optional IPv6 header extensions, such as the Routing Header, for streamlining the packet forwarding
process.
VLANS create broadcast domains, and can be used in networks for the purpose of traffic segregation.
Enterprises migrating from IPv4 can utilize the VLAN technique to provide a gradual approach to
introducing IPv6 capable switch-router equipment into their networks, without requiring changes to
their existing IPv4 configuration. [D1]
An application level gateway operates in the application layer and acts as an intermediate system
between two internetworks. The application level gateway converts the network layer address
information found inside the application payload between two hosts exchanging information. They are
often used as a translating technology to connect host nodes between IPv4 and IPv6.
In this section we describe IPv6 over Ethernet, a common wired Local Area Network (LAN) technology;
IPv6 over Bluetooth a wireless LAN technology; and IPv6 over Frame Relay and Asynchronous Transfer
Mode (ATM), two common virtual-circuit Wide Area Network (WAN) technologies
Ethernet
[A3]
The transmission of IPv6 over Ethernet is quite straightforward. The IPv6 packet is transmitted as a
payload of the Ethernet frame. The default Maximum Transmission Unit (MTU) size is 1500 bytes. A
data link node is autoconfigured by concatenating the link local prefix FE80::/64 with the the 64 bit
Extended Unique Identifier of the node interface. The identifier is based on the MAC Ethernet Address
of the interface. Ethernet has protocol field in the frame format to help identify the type of protocol in
the frame payload. IPv6 datagrams are identified with 0x86DD in the protocol field. A neighbor’s
Ethernet address is discovered through the neighbor discovery procedure. Finally IPv6 multicast
addresses are constructed by concatenating the 2-byte prefix 3333 (hex) and the last four bytes of the
IPv6 address [A3].
Bridged
There is no difference between the forwarding of IPv4 packets versus the forwarding of IPv6 packets
specifically in regards to a bridged Ethernet configuration since bridging logic never looks at any IP
addresses contained in the packet. Instead, bridging being a data link protocol is only concerned with
the MAC Ethernet addresses of the source and destination nodes when making its decision to either
drop the packet or to forward the packet on across the bridge. [C2]
Bluetooth
Bluetooth is a wireless LAN technology. The connection of Bluetooth devices to a central device has
been called a Personal Area Network (PAN). A prime example would be that of a BlackBerry and a
laptop that are connected together via Bluetooth. The laptop, in this example, is connected to a WAN
and is using IPv6. There is communication between the WAN and the BlackBerry happen through the
laptop. In an IPv6 world, the BlackBerry and the Laptop could both have connection to the WAN as long
as the WAN had a Bluetooth access point. There is a good presentation on the need for Bluetooth to
support IPv6 to allow for these devices to access the internet [C4]. Since the IPv6 address allows for
unique device identification, it makes sense to have WAN access provide Bluetooth. Network
administrators will have to consider what Bluetooth means to their network and, much like with the
WAN discussion, they will have to determine a model for supporting Bluetooth as the technology and
devices mature.
Frame Relay
Frame Relay is a connection-oriented, high-speed network technology used in WANs. It operates in the
physical and data link layers, and can be used as a backbone network to provide services to protocols
that already have a network layer protocol. [D2]
(source: http://technet.microsoft.com/en-us/library/bb726928.aspx)
- Frame format for the transmission of IPv6 packets over Frame Relay: Frame Relay devices are
configured to have a maximum frame size of at least 1600 octets and the default IPv6 Maximum
Transmission Unit (maximum packet size) is 1592 octets. The IPv6 frame encapsulation format allows a
virtual circuit to carry IPv6 packets. The Frame Relay header has a 1 byte field called the Next Level
Protocol ID (NLPID), which contains the value 0x8E indicating the IPv6 protocol.
- Mapping of IPv6 addresses to Frame Relay addresses: The procedure of mapping IPv6 addresses
to link-layer addresses follows the specification for Neighbor Discovery, which is discussed in more detail
later in this paper.
ATM
ATM is a connection oriented high speed network technology that is used in both LANs and WANs.
An ATM network is used in Permanent Virtual Circuit (PVC) mode to connect exactly two nodes. An
IPv6/ATM interface has only one neighbor on each link. All IPv6 multicast and broadcast operations
collapse down to an ATM level unicast operation. PVCs do not have link-layer addresses, so the link-
layer address option is not used in neighbor discovery messages. All IPv6 unicast and multicast packets
sent over ATM are encapsulated using the LLC/SNAP encapsulation standard by an encapsulating service
called Application Adaption Layer (AAL5), and the Ethertype field is set to the value 0x86DD for IPv6.
The default MTU size for an ATM PVC link is 9180 bytes. [D3]
When an ATM network is used in Switched Virtual Circuit (SVC) mode, unicast packets are transmitted
using the same method as described for PVC. For the transmission of multi cast packets, the OUI field in
the encapsulation header is set to 0x000005E and the Ethertype field to 0x0001.
[D4]
Network Layer
Physical Addresses
The physical address, also known as the MAC address, for any given device can be included in the IPv6
address. The standard physical address has a length of 48 bits and is commonly referred to as the IEEE
802 MAC Address. The Interface identifier of the IPv6 address is 64 bits and is commonly referred to as
the 64 bit Extended Unique Identifier (EUI-64). [D5] To include the MAC address in the interface
identifier portion of the IPv6 address, a few steps have to be taken. The first step is the physical address
has to be split into two 24 bit pieces. The first 24 bit section is the Organizationally Unique Identifier
(OUI) which is given to companies that create network using devices. The second 24 bit section is the
device identifier, which is the particular network using device the company created. The two 24 bit
sections of the MAC address then have a hexadecimal 0xFFFE placed in between them. The final step is
the 7th bit (from the left) is set to a one (1), this makes the identifier a universal identifier. The final
notation is referred to as modified EUI-64. [D6]
This is commonly used in IPv6 autoconfiguration between two devices. This can occur within a local
network or globally depending on the prefix used. IPv6 prefixes will be discussed later.
IP Address
The IPv6 address is 128 bits long whereas IPv4 had a 32 bit address size. An IPv6 address is divided into
eight groups of four hexadecimal digits. Example: 2001:ab49:0987:1120::4011:f542:21f0. The ::
represents contiguous groups of four zeros. The IPv6 address is divided into two parts: a 64 bit network
prefix and a 64 bit interface identifier. The Network Address Translator (NAT) has been traditionally
used to deal with the diminishing number of IPv4 address. In theory, a true IPv6 network would
eliminate the need for the use of NATs, however, as the scope of this document suggests, the
networked world is a long ways from a true and pure IPv6 network. [D8] The Network Address
Translation with Protocol Translation (NAT-PT) has been introduced to assist with the, potentially years
long, transition to a true IPv6 networked world. The actual translation of IPv4 to IPv6 addresses will be
covered in the Interoperability with IPv4 section.
Cast addresses
The IANA is responsible for the address management of IPv6 addresses. Per their address space
allocation, they had defined the following addresses [D9]
Port Address
With IPv4, the port address was identified by using a colon and the port number. Since IPv6 has colons
as part of its address structure, the question comes up of how ports are dealt with. The answer is
surprisingly simple: the same, with a slight exception. Take the IPv6 address of
2001:a3f5:4480:f399:1c5d:7822:ee44:0001 and a port of 80. To represent this notation we simply add
brackets to the IPv6 address and then the colon and the port [D11]. Entered in a browser window, this
would look like: http://[2001:a3f5:4480:f399:1c5d:7822:ee44:0001]:80/
Classless Addressing
Classless addressing in IPv6 is essentially the same as with IPv4. The IP address uses the / notation to
determine the address range. As expected, this can be a large number such as /48 since IPv6 has 128
bits versus the 32 bits with IPv4. One important notation to be aware of is the :: notation. This notation
signifies a series of 0 addresses. For example: 2001:e34f:5591:4739:eedc::2e44/90 is short for
2001:e34f:5591:4739:eedc:0:0:2e44/90. While this example is unlikely, it is still worth noting that it
could occur [D9]. A classless address of /90 would land in the middle of a 0 address range.
Configuring Addresses
There are two ways to configure addresses with IPv6. The first is the nodes automatically create their
local-link addresses. This works with Router Advertisement and Neighbor Discovery messages to avoid
address collision. IPv6 can also automatically configure 6to4 tunnels, Intrasite Automatic Tunnel
Addressing Protocol (ISATAP) and address routes to off-link routers, given the off-link address prefix has
been advertised by a router. The second method for configuring addresses is manually, which according
to Microsoft in their products is not needed due to the local-link scope always being automatically
configured [D12]. It is probably safe to assume that not all software and hardware manufacturers
provide this local-link auto configuration, so it is best to understand the capabilities of the network and
choose an addressing configuration scheme that best fits.
Subnets
Dividing a network into subnets has traditionally been a good way for network administrators to control
traffic between various areas of their networks. With IPv6 there exists the potential to access a device
directly from anywhere on the internet. The question then can be raised: do network administrators
need to segment their networks into subnets if all devices can be resolved down to a single address?
Breaking the IP address into subnets is relatively easy. Per the IPv6 specification, the 16 bits from the
49th to the 64th are for defining subnets [D13]. Given the following IP address, the bytes in red are the
subnet bits: 2001:a3f5:4480:0000:1c5d:7822:ee44:0001. If an administrator had a need for 15 subnets,
the mask for the subnets would be: FFFF:FFFF:FFFF:FFF0 allowing for addresses 1 – F for each subnet.
For example, the first four subnets would look like:
Granted, the 64 bits of unique device identification will most likely far exceed the number of possible
devices in any given subnet. Administrators can mask further into the unique device identification
portion to provide smaller subnet definitions if desired. [D14]
NAT-PT
Network Address Translation –Protocol translation in a pure IPv6 environment is not needed as there
are plenty of addresses to assign out to devices and still have the ability to provide a unique address to
all devices in the world. For networks that have to provide interoperability between IPv4 and IPv6
network devices, a NAT-PT table would be used. The translation table would look much like the NAT
tables that divide and isolate IPv4 networks with the difference that the table would have IPv6
addresses included for those translations. Cisco systems shows the following command line output of a
NAT-PT mapping that illustrates the concept well [D15]:
Line 1 shows the mapping from an IPv4 address to a IPv6 address. Line 2 shows a mapping from IPv6 to
IPv6 and line 3 shows the router prefix.
Inter-networking
The topic of Inter-networking changes depending on the IPv6 implementation context being used for
the discussion. In a pure IPv6 network, the connection from device to device and network to network
adheres to the IPv6 standard and communication happens as it would with any other type of inter-
networking. When the context of inter-networking shifts to an IPv4 and IPv6 blend of device and
network interaction, translation protocols have to be agreed upon so communication can flow from
network to network. This statement of protocol agreement is true for even a pure IPv6 network. To
limit the scope of this discussion, and to avoid a fifty page research paper with great depth on the topic
of inter-networking, the general rule to any kind of inter-networking is to ensure that the boundaries of
the various networks have a defined and agreed upon implementation of the IP protocol. Failure to do
The version for the IPv6 header is 0110 which is binary for a decimal value of 6. The Traffic class relates
to QoS which is discussed later in this research paper. Flow label is used for extended QoS abilities and
to ensure that all routers in the flow path of a datagram network handle the packets the same way,
thereby ensuring proper flow control for different types of network traffic. The payload length contains
the number of bytes in the payload as well as any extension headers that might be included in the
packet. Next header is used in one of two ways. The first is to callout the identity of an extension
header, should one exist. The second use is the same as with IPv4 packets in that specifies the
protocols. Hop limit is self explanatory in that it represents the number of hops allowed before the
packet is dropped. The source address is just as it states, the source address. Finally, the destination
address is the ultimate destination the packet is intended for, not the next intermediate destination or
hop [D17].
The operation of PMTUD goes as follows: the source node sends out packets at the size of the MTU of
the first link and the first packet continues on its route until it reaches the destination or a router that
has an MTU sized smaller than the packet size. Then that router drops the packet and sends back to the
source an ICMPv6 Packet Too Big message. The error message contains in it the MTU size of the next
hop link, and so the source node resizes its packets to comply with this new link MTU. Note that this can
occur multiple times in either a unicast or multicast packet stream. Interestingly, when dealing with
multicast source packets, the routes may be different and the smallest MTU reported back affects the
size for all recipients—the lowest common denominator is the rule in this case [D20].
Fragmentation
As mentioned earlier, the minimum MTU that routers and physical links were required to handle was
576 bytes in IPv4, while in IPv6 all links must handle a packet size of at least 1280 bytes. This doubling in
size improves efficiency by increasing the ratio of maximum payload to header length, and reduces the
frequency with which fragmentation is required. Within IPv6, source nodes are expected to perform
PMTUD to determine the maximum size of packets to send, and the upper-layer protocol is expected to
limit the payload size. However, if the upper-layer protocol is unable to do so, the sending host may use
the Fragment extension header in order to perform end-to-end fragmentation of IPv6 packets if the
packets must be fragmented [D21].
The method of fragmenting begins at the source node when it inserts a fragmentation header into the
optional part of the standard IP packet header—note that there isn’t anything in a standard IP packet
header about fragmentation unless it is required, lessening the overhead all around. The Fragmentation
header contains the following fields: Next Header, Reserved, Fragment Offset, Res, M Flag, and
Identification fields. The design of this Fragment header is interesting since by shifting the Fragment
Offset field to the left and the M flag (which signifies “More packets coming”) it has become easier to
process than its IPv4 equivalent. The Fragment Offset is a value specifying the number of 8-octet words
to be offset; that value is stored in a 13-bit field. Ignoring the low-order 3 bits of that part of the header
(that is, the 2 reserved bits and the more flag) allows the 13-bit Fragment Offset field to be expressed as
a 16-bit value and interpreted as the number of octets specified by the offset [D22].
Each packet contains essentially two parts. The Unfragmentable Part which is the original IPv6 header
and any extension headers that must be processed by nodes rather than the destination (these
extension headers are options). The Fragmentable Part is therefore everything else which includes
those extension headers that are meant for the destination, along with the upper layers headers, and of
course the data payload. Fragments are created by dividing the Unfragmentable Part up, with each
In both IPv4 and IPv6 use cases, the main difference between protocols is the size of the addresses being
stored in the packet (source and destination) and in the routing table (source and next hop) from 32 bits
to 128 bits. To increase the speed of forwarding between routers, the IPv6 protocol has abandoned the
use of header checksums that the IPv4 protocol offers between nodes as well. Routing is still performed
by looking at the IP address to determining which portion is the network ID and which is the host ID,
despite that IPv6 unicast addresses use a special hierarchical format [D24].
Intradomain
Intradomain routing uses two different protocol technologies to to update the routing tables: distance
vector routing and link state routing. In distance vector routing, routing is configured based upon the
least-cost or minimum distance between nodes. The Routing Information Protocol (RIP) is as an
implementation of this protocol and the IPv4 protocol has two different versions; RIPv1 and RIPv2.
RIPv1 was the original protocol used for distance vector routing while RIPv2 was introduced to fix the
inefficiencies of RIPv1 (currently used for IPv4) and it also multicasts its information to adjacent routers
instead of broadcasting for better performance. RIPng was introduced for IPv6, which extends the
Linked state routing uses LSAs (linked state advertisements) throughout an autonomous system to
update routing tables. This routing technology uses the Open Shortest Path First protocol (OSPF).
OSPFv2 is the routing protocol used for IPv4 and OSPFv3 is the routing protocol used for IPv6. The main
difference between these two protocols is that OSPFv3 supports IPv6 addressing and also no longer
supports protocol –internal authentication but instead relies on the IPv6 protocol security.
Interdomain
Interdomain routing uses only the path vector routing technology to handle updates between
autonomous systems within the internet. Path vector routing is very similar to distance vector routing,
except that each autonomous system acts like a node instead of a host or router. The Border Gateway
Protocol (BGP) is an implementation of this technology, and unlike using network IP address as the other
protocols mentioned previously do, this protocol uses assigned 16-bit integers (ASN numbers) within the
network to identity each autonomous system [D26]. Each system keeps track of other autonomous
systems when router table information is shared. Since systems are tracked by ASNs, there is no
difference in implementation for IPv4 and IPv6.
Transport Layer
One of the requirements of the IPv6 protocol is to re-use current UDP and TCP transport protocols as
they are currently defined. The impact to the Transport layer is that it is now mandatory to carry a
transport protocol checksum for both the UDP and TCP transport protocols. This is a direct result of the
removal of the IP packet checksum from the IPv6 message header with the assumption that the layer
above IP must carry and require the checksum.
Checksum requirement
All transport protocols such as UDP, TCP, and ICMP, compute the checksum for IPv6 packets. The
transport protocol checksum is calculated over the following fields: Source Address, Destination
Address, Next Header field, Transport-layer payload length [A3].
The ECN mechanism allows routers to signal early detection of congestion to nodes by modifying the
ECN bits in the traffic class field of the IPv6 header. To avoid congestion which in turn results in packet
ICMPv6
ICMP in IPv6 is used by intermediate and receiving nodes to inform source nodes about errors and
issues related to the delivery of datagrams. It is similar to ICMP in IPv4, but with a few enhancements
[A2]:
Protocols combined
Also, the Internet Group Management Protocol (IGMP) function that manages multicast group
memberships with IPv4 and the Address Resolution Protocol/Reverse Address Resolution Protocol
(ARP/RARP) that is used to map Data Link layer addresses to IP addresses and vice versa, has been
included in ICMP for IPv6 [E1].
Neighbor Discovery
A new protocol, Neighbor Discovery, has been introduced which uses ICMP for IPv6 messages and
allows IPv6 nodes to:
- determine Data Link layer addresses for Neighbors attached to the same link
- find Neighboring routers that can forward their packet
- keep track of Neighbors that are reachable
- detect changes in Data Link layer addresses
Duplicate address detection (DAD) is used to verify the usability of an address by sending a neighbor
solicitation to its own address. If a neighbor advertisement is received, the address is not used.
With IPv4, there is no means to detect whether a neighbor is reachable or not [A2]. Also, NDP in IPv6 is
insecure and susceptible to malicious interference, and an extension of this protocol called SEcure
Traffic Class
The Traffic Class field in the IPv6 header enables a source to identify the desired delivery priority of the
packets. The bits of this field hold two values. The 6 most-significant bits are used for differentiated
services (DS) and the remaining two bits are used for ECN (Explicit Congestion Control). The priority
values are divided into ranges: traffic where the source provides congestion control and non-congestion
control traffic. [E2]
Integrated Services
Integrated services are implemented by having the source node start a RSVP (Resource Reservation
Protocol) reservation through the path to a destination node. Each router along the path processes the
Differentiated services
Differentiated services are identical to IPv4. Differentiated services mark packets so that routers in the
network process packets differently. In IPv6 the packets are marked by setting bits in the IPv6 header
Traffic Class field. The Traffic Class fields directly map to the Diffserv (DS) bits on the Type of Service
(TOS) field in the IPv4 header [A3].
Security
As discussed, the IPv6 protocol has been introduced to replace IPv4 due to the consumption of all
available IPv4 addresses. Part of the design of IPv6 has been geared towards adding security features to
aid in protecting network traffic. IPSEC is a standard that encompasses many of the security features.
This section will discuss IPSEC, the various protocols and modes is supports as well as some overall
security concerns and implementation practices that are recommend for organizations using IPv6
capable hardware and software. The IPv6 protocol addresses many of the security issues with the IPv4
protocol. While not all attacks have been resolved, some of them have been made more difficult to
achieve. A prime example of this is network scans to determine vulnerable addresses. With IPv6 the
sheer number of possible addresses makes this attack a very lengthy process.
IPSEC
As defined by the Internet Engineering Task Force (IETF), “IPSEC is designed to provide interoperability,
high quality, cryptographically-based security for IPv4 and IPv6.” *E3] IPv6 was designed with IPSEC in its
architecture, while it is an optional extension that can be used, if desired, in IPv4. IPSEC provides end-to-
end security and operates in the Internet Layer. Since IPv4 is optional, considerations must be taken
when determining how to connect IPv6 and IPv4 networks together. IPv4 to IPv6 connection points
must be able to assimilate the appropriate packets to traverse through the IPSEC implementation on the
IPv6 network. Similarly, the IPv6 to IPv4 connection points must to be able to either adapt the packets
to the IPv4 IPSEC implementation, if required, or to disassemble the packets and reassemble for the IPv4
network. Regardless of which state exists, measures must be taken to ensure the security level of the
network is maintained through these connections.
AH
The Authentication Header (AH) provides important security features such as authentication and
integrity for the entire packet being sent. [E6] Authentication is important as there is a need to be sure
the sender is both identifiable and verifiable. Integrity is important for ensuring the data being sent, has
not been modified. It is important to note that authentication and integrity are not the same as
confidentiality. The implementation of the AH does not provide any level of data encryption, therefore
the actual data portion of the packet is readable, should it be intercepted. The AH is inserted for use in
the Network layer, and before any headers or information for the Transport layer. Lastly, the AH in IPv6
protects both the header and the payload whereas in IPv4, only the payload is protected.
ESP
Like AH, Encapsulating Security Payload (ESP) provides authentication and integrity. Unlike AH, ESP also
provides confidentiality and anti-replay mechanisms. The ESP, however, does not protect the IP header,
as AH does. This is true with the exception of tunneling where the entire packet is encapsulated in
another packet used for the tunnel. [E7] Similar to the discussion around IPSEC, the use of AH and ESP
between IPv6 and IPv4 requires careful implementation to ensure data integrity and security are
maintained. Ensuring the IPv4 and IPv6 implementations of IPSEC are the same, helps mitigate many of
the concerns. The ESP can be implemented in both cases and remain intact from end to end, providing
that overall data confidentiality. The AH and ESP can be used together which can help protect the traffic
information of the network communication in transit. [E8]
Application Layer
To fully understand the impact the IPv6 protocol has on the TCP/IP Application Layer, we must first
understand (briefly) the Application Layer itself. The Application Layer is highest layer in the TCP/IP
stack, and is solely concerned with the user’s view of a network. Common examples of Application
Layer protocols are FTP, HTTP, POP, SSH and Telnet. Since the Application Layer treats the Transport
Layer as a “black box” to create network communication between devices, information regarding the
connection between the two devices is abstracted away from the Application Layer. Since the IP
protocol is isolated in the Network Layer, any migration made from IPv4 and IPv6 will go unnoticed in
the Application Layer. This means that any change from IPv4 to IPv6 will have no impact on the
Multimedia
The IPv6 protocol does not affect the process of encoding or streaming of multimedia. The multi-media
server software that is responsible for streaming data will need to be updated to support streaming data
over IPv6. A benefit from using IPv6 will be increased network capacity and faster delivery of real time
data since routers no longer need to translate addresses between sub-nets and home networks. Certain
characteristics of IPv6, such as the large addressing space reserved for multicast addresses and the
availability of the Priority field and the Flow Label field on the IPv6 header, will improve the support of
multimedia applications, and especially real-time applications [F2].
With IPv6, DHCP is not required to configure hosts with address information. The stateless
autoconfiguration mode will configure hosts with IPv6 addresses.
Interoperability
The transition from IPv4 to IPv6 will continue to occur gradually, especially with the large number of
systems that exist in the Internet today. It will need to be done smoothly in order to prevent problems
between IPv4 and IPv6 systems. Three common strategies to help with the transition are briefly
described below [E1].
Dual Stack
This technique provides complete support for both protocol versions in hosts and routers. A station
must run IPv4 and IPv6 simultaneously until all the Internet uses IPv6. In this technique, the source host
queries the DNS to determine the version to use when sending a packet. Depending on the version of
the address returned - IPv4 or IPv6 – the source host sends the packet in the corresponding version.
Tunneling
This technique is used for establishing a point-to-point tunnel between a source and destination host
where IPv6 packets are encapsulated within IPv4 headers in order to carry them over IPv4 routing
infrastructures.
[E1]
Header Translation
This technique will be necessary when the majority of hosts on the Internet have moved to IPv6 but
some systems continue to use IPv4. The packet sent to a node within an IPv4 based network has to in
the format that can be understood by it. The header format of the IPv6 packet is converted to an IPv4
format by a combination of Application Level Gateways (ALG), and Network Address Translation and
Protocol Translators (NAT-PT), before being sent to the receiving IPv4 node.
[E1]
With the rapid depletion and eventual exhaustion of the global Internet address space using IPv4,
migration to IPv6 is inevitable. Companies and their IT staffs need to fully understand the impact of
implementing IPv6 on their network infrastructure so that they can plan and choose their migration
strategy wisely, and continue to provide uninterrupted, reliable, and cost efficient service to their end
consumers.