There have been many predictions over the years
about IPv6 migration, but the fact is that the IPv4
workarounds that have been developed in the
meantime have been pretty good. It could be that
despite being a superior solution to the address
scarcity issue, IPv6 may never displace IPv4 and its
work-arounds. To underscore this point, look back
at the chart at the beginning of this section. Here
we are in 2007, with only limited deployments of
IPv6, and with many more devices on the Internet
than anticipated back in the late 1990s, but IPv4
keeps chugging along.
Several factors may finally cause the transition—
first as IPv6 “islands” connected with IPv4 networks,
and then finally into end-to-end IPv6 networks.
These factors include the U.S. federal government
mandating that its networks must be IPv6-capable
by a certain date, Microsoft adopting IPv6 into
Windows starting with Vista, and Japan adopting
IPv6 as its country network addressing standard.
At a minimum, it is important for network administrators
and companies to understand IPv6 and its
potential impacts so that they are prepared if and
when the transition occurs. 40
IT Certification CCIE,CCNP,CCIP,CCNA,CCSP,Cisco Network Optimization and Security Tips
IPv6 Mobility
IPv6 supports a greater array of features for the
mobile user, whether the mobile device is a cell
phone, PDA, laptop computer, or moving vehicle.
Mobile IPv6 (MIPv6) supports a more streamlined
approach to routing packets to and from the
mobile device. It also supports IPsec between the
mobile device and other network devices and hosts.
mobile user, whether the mobile device is a cell
phone, PDA, laptop computer, or moving vehicle.
Mobile IPv6 (MIPv6) supports a more streamlined
approach to routing packets to and from the
mobile device. It also supports IPsec between the
mobile device and other network devices and hosts.
IPv6 Security
IPv6 has embedded support for IPsec (a common
protocol for encryption). Currently the host operating
system (OS) can configure an IPsec tunnel
between the host and any other host that has IPv6
support. With IPv4 the vast majority of IPsec
deployments are network-based and unknown to
host devices. With IPv6 IPsec, the host could create
an encrypted data connection between itself and
another device on the network. This means that
network administrators do not need to set up the
encryption, because hosts can do it themselves on
demand.
protocol for encryption). Currently the host operating
system (OS) can configure an IPsec tunnel
between the host and any other host that has IPv6
support. With IPv4 the vast majority of IPsec
deployments are network-based and unknown to
host devices. With IPv6 IPsec, the host could create
an encrypted data connection between itself and
another device on the network. This means that
network administrators do not need to set up the
encryption, because hosts can do it themselves on
demand.
IPv6 Autoconfiguration
IPv4 deployments use one of two methods to
assign IP addresses to a host: static assignment
(which is management-intensive) or DHCP/
BOOTP, which automatically assigns IP addresses
to hosts upon booting onto the network.
IPv6 provides a feature called stateless autoconfiguration,
which is similar to DHCP. Unlike DHCP,
however, stateless autoconfiguration does not
require the use of a special DHCP application or
server when providing addresses to simple network
devices that do not support DHCP (such as robotic
arms used in manufacturing).
Using DHCP, any router interface that has an IPv6
address assigned to it becomes the “provider” of IP
addresses on the network to which it is attached.
Safeguards are built into IPv6 that prevent duplicate
addresses. This feature is called Duplicate
Address Detection. With the IPv4 protocol, nothing
prevents two hosts from joining the network
with identical IP addresses. The operating system
or application may be able to detect the problem,
but often unpredictable results occur.
assign IP addresses to a host: static assignment
(which is management-intensive) or DHCP/
BOOTP, which automatically assigns IP addresses
to hosts upon booting onto the network.
IPv6 provides a feature called stateless autoconfiguration,
which is similar to DHCP. Unlike DHCP,
however, stateless autoconfiguration does not
require the use of a special DHCP application or
server when providing addresses to simple network
devices that do not support DHCP (such as robotic
arms used in manufacturing).
Using DHCP, any router interface that has an IPv6
address assigned to it becomes the “provider” of IP
addresses on the network to which it is attached.
Safeguards are built into IPv6 that prevent duplicate
addresses. This feature is called Duplicate
Address Detection. With the IPv4 protocol, nothing
prevents two hosts from joining the network
with identical IP addresses. The operating system
or application may be able to detect the problem,
but often unpredictable results occur.
IPv6 Notation
The first figure demonstrates the notation and
shortcuts for IPv6 addresses.
An IPv6 address uses the first 64 bits in the
address for the network ID and the second 64 bits
for the host ID. The network ID is separated into
prefix chunks. The next figure shows the address
hierarchy.
shortcuts for IPv6 addresses.
An IPv6 address uses the first 64 bits in the
address for the network ID and the second 64 bits
for the host ID. The network ID is separated into
prefix chunks. The next figure shows the address
hierarchy.
IPv6 Addresses
The 128-bit address used in IPv6 allows for a
greater number of addresses and subnets (enough
space for 1015 endpoints—340,282,366,920,938,
463,463,374,607,431,768,211,456 total!).
IPv6 was designed to give every user on Earth multiple
global addresses that can be used for a wide
variety of devices, including cell phones, PDAs, IPenabled
vehicles, consumer electronics, and many
more. In addition to providing more address space,
IPv6 has the following advantages over IPv4:
• Easier address management and delegation
• Easy address autoconfiguration
• Embedded IPsec (short for IP Security—
encrypted IP)
• Optimized routing
• Duplicate Address Detection (DAD)
greater number of addresses and subnets (enough
space for 1015 endpoints—340,282,366,920,938,
463,463,374,607,431,768,211,456 total!).
IPv6 was designed to give every user on Earth multiple
global addresses that can be used for a wide
variety of devices, including cell phones, PDAs, IPenabled
vehicles, consumer electronics, and many
more. In addition to providing more address space,
IPv6 has the following advantages over IPv4:
• Easier address management and delegation
• Easy address autoconfiguration
• Embedded IPsec (short for IP Security—
encrypted IP)
• Optimized routing
• Duplicate Address Detection (DAD)
What Problems Need to Be Solved?
Network Address Translation (NAT) and Port
Address Translation (PAT) were developed as
solutions to the diminishing availability of IP
addresses. NAT and PAT, as implemented today in
many network routers, allow a company or user to
share a single or a few assigned public IP addresses
among many private addresses (which are not
bound by an address authority).
Although these schemes preserve address space
and provide anonymity, the benefits come at the
cost of individuality. This eliminates the very reason
for networking (and the Internet): allowing peer-topeer
collaboration through shared applications.
IP version 6 (IPv6) provides an answer to the
problem of running out of address space. It also
allows for the restoration of a true end-to-end
model in which hosts can connect to each other
unobstructed and with greater flexibility. Some of
the key elements of IPv6 include allowing each
host to have a unique global IP address, the ability
to maintain connectivity even when in motion and
roaming, and the ability to natively secure host
communications.
Address Translation (PAT) were developed as
solutions to the diminishing availability of IP
addresses. NAT and PAT, as implemented today in
many network routers, allow a company or user to
share a single or a few assigned public IP addresses
among many private addresses (which are not
bound by an address authority).
Although these schemes preserve address space
and provide anonymity, the benefits come at the
cost of individuality. This eliminates the very reason
for networking (and the Internet): allowing peer-topeer
collaboration through shared applications.
IP version 6 (IPv6) provides an answer to the
problem of running out of address space. It also
allows for the restoration of a true end-to-end
model in which hosts can connect to each other
unobstructed and with greater flexibility. Some of
the key elements of IPv6 include allowing each
host to have a unique global IP address, the ability
to maintain connectivity even when in motion and
roaming, and the ability to natively secure host
communications.
Why Should I Care About IPv6?
The addressing scheme used for the TCP/IP protocols
is IP version 4 (IPv4). This scheme uses a 32-
bit binary number to identify networks and end
stations. The 32-bit scheme yields about 4 billion
addresses, but because of the dotted-decimal system
(which breaks the number into four sections of
8 bits each) and other considerations, there are
really only about 250 million usable addresses.
When the scheme was originally developed in the
1980s, no one ever thought that running out of
addresses would be a possibility. However, the
explosion of the Internet, along with the increased
number of Internet-capable devices, such as cell
phones and PDAs (which need an IP address), has
made running out of IPv4 addresses a serious concern.
The chart shows the trend of address space,
starting in 1980. It shows the address space running
out sometime before 2010.
is IP version 4 (IPv4). This scheme uses a 32-
bit binary number to identify networks and end
stations. The 32-bit scheme yields about 4 billion
addresses, but because of the dotted-decimal system
(which breaks the number into four sections of
8 bits each) and other considerations, there are
really only about 250 million usable addresses.
When the scheme was originally developed in the
1980s, no one ever thought that running out of
addresses would be a possibility. However, the
explosion of the Internet, along with the increased
number of Internet-capable devices, such as cell
phones and PDAs (which need an IP address), has
made running out of IPv4 addresses a serious concern.
The chart shows the trend of address space,
starting in 1980. It shows the address space running
out sometime before 2010.
Subscribe to:
Posts (Atom)