Transition Mechanisms for Ipv6 Hosts and Routers RFC2893 By Michael Pfeiffer.

Slides:



Advertisements
Similar presentations
TCP/IP Protocol Suite 1 Chapter 27 Upon completion you will be able to: Next Generation: IPv6 and ICMPv6 Understand the shortcomings of IPv4 Know the IPv6.
Advertisements

Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
IPv6 Overview Brent Frye EECS710. Overview Google Drive Microsoft Cloud Drive Dropbox Paid-for alternatives 2.
EE 545 – BOGAZICI UNIVERSITY. Agenda Introduction to IP What happened IPv5 Disadvantages of IPv4 IPv6 Overview Benefits of IPv6 over IPv4 Questions -
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
1 IPv6. 2 Problem: 32-bit address space will be completely allocated by Solution: Design a new IP with a larger address space, called the IP version.
CE363 Data Communications & Networking Chapter 7 Network Layer: Internet Protocol.
IPv4 & IPv6 Coexistence & Migration Joe Zhao SW2 Great China R&D Center ZyXEL Communications, Inc.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 22 IPv6 (Based on material from Markus Hidell, KTH)
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
IP Version 6 Next generation IP Prof. P Venkataram ECE Dept. IISc.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Examining IP Header Fields
Internet Networking Spring 2003
Internet Command Message Protocol (ICMP) CS-431 Dick Steflik.
Notes for IPv6 Terrance Lee. Transition Mechanisms for IPv6 Hosts and Routers (RFC 2893)
資 管 Lee Lesson 11 Coexistence and Migration. 資 管 Lee Lesson Objectives Coexistence and migration overview Coexistence mechanisms ◦ Dual Stack ◦ Tunneling.
1Group 07 IPv6 2 1.ET/06/ ET/06/ ET/06/ EE/06/ EE/06/ EE/06/6473 Group 07 IPv6.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Coexistence and Migration
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Basic Transition Mechanisms for IPv6 Hosts and Routers -RFC 4213 Kai-Po Yang
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 8 TCP/IP Suite Error and Control Messages.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
TCOM 515 IP Routing. Syllabus Objectives IP header IP addresses, classes and subnetting Routing tables Routing decisions Directly connected routes Static.
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
IPv6 Routing Milo Liu SW2 R&D ZyXEL Communications, Inc.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
IPv4 to IPv6 Group A2 - Roland Hollis - EJ Chambers - Rachit Gupta.
CS 4396 Computer Networks Lab
Error and Control An IP datagram travels from node to node on the way to its destination Each router operates autonomously Failures or problems may occur.
19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 20 Network Layer: Internet Protocol
Network Layer4-1 Datagram networks r no call setup at network layer r routers: no state about end-to-end connections m no network-level concept of “connection”
4: Network Layer4b-1 IPv6 r Initial motivation: 32-bit address space completely allocated by r Additional motivation: m header format helps speed.
Understanding IPv6 Slide: 1 Lesson 12 IPv6 Mobility.
ICMPv6 Error Message Types Informational Message Types.
ZyXEL Confidential ICMPv6 Feng Zhou SW2 ZyXEL Communications Corp. 03/27/2006.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
1 COMP 431 Internet Services & Protocols The IP Internet Protocol Jasleen Kaur April 21, 2016.
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Layer/IP Protocols 1. Outline IP Datagram (IPv4) NAT Connection less and connection oriented service 2.
Introduction to Networks
IP - The Internet Protocol
The New Internet Protocol
IP - The Internet Protocol
The New Internet Protocol
CS 457 – Lecture 10 Internetworking and IP
Internet Protocol (IP)
IP - The Internet Protocol
Chapter 20 Network Layer: Internet Protocol
Chapter 15. Internet Protocol
IP - The Internet Protocol
Networking and Network Protocols (Part2)
IP Forwarding Relates to Lab 3.
IPv4 Addressing By, Ishivinder Singh( ) Sharan Patil ( )
IP - The Internet Protocol
Internet Protocol version 6 (IPv6)
Presentation transcript:

Transition Mechanisms for Ipv6 Hosts and Routers RFC2893 By Michael Pfeiffer

Terminology  IP v4 only node  IP v6 only node  IP v4/IP v6 node  IP v4 compatible IP v6 Address High order 96 bits prefix 0:0:0:0:0:0 High order 96 bits prefix 0:0:0:0:0:0 Low order 32 bits are the IP v4 address Low order 32 bits are the IP v4 address

Techniques Used in the Transition  IP v6-over-IP v4 tunneling  Configured tunneling  Automatic tunneling  IP v4 multicast tunneling

Dual IP Layer Operation  Modes of Operations for IP v4/v6 nodes Both stack enabled Both stack enabled Disabling one or the other stacks Disabling one or the other stacks  Tunneling techniques None None Configured tunneling only Configured tunneling only Both configured and automatic tunneling Both configured and automatic tunneling

Address configuration  IP v4/v6 node an have two addresses IP v4 address IP v4 address 32 bit address32 bit address Acquired using IP v4 addressing mechanismsAcquired using IP v4 addressing mechanisms IP v6 address IP v6 address 128 bit address128 bit address Acquired using IP v6 addressing mechanismsAcquired using IP v6 addressing mechanisms

Domain Name System  Ability to map between both IP versions Example: What happen when IP v6 node requests a record that as been defined with a IP v4 address Example: What happen when IP v6 node requests a record that as been defined with a IP v4 address  The resolver libraries must be capable of handling both IP v6/IP v4 records

DNS  Returning records to IP v4/v6 nodes Filtered Filtered Return only IP v6 addressReturn only IP v6 address Return only IP v4 addressReturn only IP v4 address Ordered Ordered Return both addressesReturn both addresses May change the order of addresses two influence the receiving node. May change the order of addresses two influence the receiving node.

Addressing Addresses in the DNS  Before a IP v4/v6 record is added all of the following should be true: The address is assigned to the interface on the node The address is assigned to the interface on the node The address is configured on the interface. The address is configured on the interface. The interface is on a link which is connected to the IP v6 infastructure. The interface is on a link which is connected to the IP v6 infastructure.

Common Tunneling Mechanisms  Will take a while to build up IP v6 infastructure so we need a means of sending packets  Tunneling is a way to use IP v4 infrastructure to send IP v6 packets  This is done by sticking a IP v6 packet into the body of a IP v4 packet.

Types of tunneling  Configured Tunneling Router to Router Router to Router Host to Router Host to Router  Automatic Tunneling Host to Host Router to Host

Tunneling Configuration  1 st The encapsulating node creates an encapsulating IP v4 header and transmits  2 nd The decapsulating node receives the encapsulated packet, reassmebles the packet (if needed), and removes the IP v4 header.  Note:(The primary diffence in tunneling scheme is how the determine the header packet end address.)

Encapsulation | IP v4 | | Header | | IPv6 || IP v6 | | Header || Header | | Transport | ====>| Transport | | Layer | | Layer | | Header || Header | | || | | Data | | Data | | || |

Handling Fragments  What happens when a IP v6 packet is too big for the payload of IP v4 packet? IP packet is fragmented and two or more packets are send? IP packet is fragmented and two or more packets are send? This can be avoided in when the encapsulating node knows about the tunneling. This can be avoided in when the encapsulating node knows about the tunneling.

Fragmentation Problems  Fragmentation in tunneling not sent by the sending node  Resassembling packets at the router.

Reducing Fragmentation  Making packet small enough for additional IP v4 header  Using a IP v4 Path Discovery Protocal. If you have a large number of tunnels then i might not be able to store all of them. If you have a large number of tunnels then i might not be able to store all of them.  This will not completely elminate fragmentation but will reduce it.

Hop Limit  IP v6-over-IP v4 tunnels are considered as one hop. This means the IP v6 hop limit is decremented by one at the end of each tunnel This means the IP v6 hop limit is decremented by one at the end of each tunnel  This hide the existance of tunneling. IP v6 header only gets used at the beginning and end of the tunnel. IP v6 header only gets used at the beginning and end of the tunnel.

ICMP Errors  Errors are sent to the encapsulating node  ICMP “packet too big” error is handled according to the path dicovery Which will change the packet along the path Which will change the packet along the path  Handling of other errors depend of the size of the “packet in error” field sent back.

IP v4 Header for tunneling  Version field: 4  IP header length in 32 bit words: 5  Type of service: 0 Note (work is underway to redefine the service byte, so this might be different in the future.) Note (work is underway to redefine the service byte, so this might be different in the future.)  Total Length: (Payload + IP v6 header + IP v4 header)

IP v4 Header Cont.  Identification: Generated uniquely as for any IP v4 packet transmitted by the system.  Flags: Don't Fragment flag Don't Fragment flag More Fragmentsd flag More Fragmentsd flag  Fragment offset: set if there is a fragmentation  Time to Live: Set in implementation specific manner

IP v4 Header Cont.  Protocal: 41 (Assigned payload type number for IP v6)  Header checksum: calculated checksum for the IP v4 header  Source address: IP v4 address of encapsulating node  Destination address: IP v4 address at end of tunnel.

Decapsulation  Accurs when a node recieves a packet with it's IP v4 address and the protocal field is set to 41  Reassembles packet if it was fragmented  IP v6 header will be untouched since it had been encapsulated  Hop limit will be decremented by one

Decapsulation  Decapsulating node performs IP v4 reassembly before decapsulating the IP v6 packet Done to preserve all IP v6 options even if fragmented Done to preserve all IP v6 options even if fragmented  Node must not forward on decapsulated packet unless explicitly configured too.

Discarding packets  The IP v4 header should be discarded  Node should silently discard packet with an invalid IP v4 source address (eg. Multicast, broadcast)  The node should also silently discard packets with invalid IP v6 source address

Link-Layer Addresses  Both configured and automatic tunneling must have link-local addresses so routing protocal can operate  The Interface Identifier should be the 32 bit address that is in the IP v4 header.  The IP v6 Link-Local address for IP v4 virtual interface is FE80::IP v4 address

Neighor Discovery  Automatic and unidirectional tunnels are condsider undictional Neighor discovery is only used for formation of link local addresses Neighor discovery is only used for formation of link local addresses  Bidirectional tunnels use Neighbor Unreachability Detection (NUD) Packets to setup a tunnel.

Configured Tunneling  Determination of which tunnel to use is done by routing table Uses prefix mask and match technique Uses prefix mask and match technique  The Default Route

Configured Tunneling with IP v4 Anycast Address  Uses the Anycast Address to forward the IP v6 packet on Receiving node treats the address as if it is it's own Receiving node treats the address as if it is it's own After decapsulated transmits it toward the correct address After decapsulated transmits it toward the correct address Could have problem with fragmentation Could have problem with fragmentation

Automatic Tunneling  Allows IP v6/v4 nodes to communicate without pre-configured tunnels  Nodes using automatic tunneling are assigned IP v4 compatible addresses.  IP v4 address is globally unique as long as address is not for a private network.

Address Configuration  Will serve as both IP v4 and v6 addresses  Will acquire address through IP v4 address configuration protocols and then Map it to IP v6 address DHCP, BOOTP, RARP, Manual, etc. DHCP, BOOTP, RARP, Manual, etc.

Automatic Tunneling Operations  Only used when endpoint address is an IP v4 compatible address  A special static routing table can be setup for automatic tunneling  Must not be sent to IP v4 broadcast or multicast destinations

Source Address cofiguration  Which format: Native IP v6 Native IP v6 IP v4 compatible IP v4 compatible  Determines the type of traffic that will be returned.

Work sited  RFC 2893,