Internet Protocol V6

Authors Avatar

                

Internet Protocol V6

Page

  1. Introduction.
  2. Internet Communication.
  1.       Ipv4 Addressing and its Limitations.

8          Ipv6 In Detail.

Ipv6 datagram Format.

                The Ipv6 Address Structure.

11        The Move to Ipv6.

13        Other Advantages of Ipv6.

                Security Issues.

                Autoconfiguration.

  1. Conclusion.        

16        Bibliography.

Introduction

In the early 1970s the U.S. Department of Defence challenged and sponsored the Advanced Research Projects Agency (ARPA) to create an indestructible network. ARPA rose to the challenge and produced a network that became known as the ARPAnet. The network was designed to share resources, send and receive information to/from anywhere, and operate without any central control, so that if any portion of the network should fail, the remaining portions would be unaffected.

The ARPAnet has grown into what we now know as the ' Internet'.

The word 'Internet' stands for: 'network of networks', and it is precisely that: a network that comprises of thousands of smaller regional networks which are scattered world-wide.

Initially, the Internet was confined to academy, research and the government, but eventually the government decided to allow access to the Internet for commercial purposes. The business world soon came to realise that the Internet offered opportunities never before thought possible. They could offer a better service to their customers, improve operational efficiency, and perhaps more exciting was that their wares could be offered world-wide on what would be largely a virtual shop front.

 Since the mid 1990s, the Internet has seen a phenomenal growth rate. This is largely due to an increasing interest in the world wide web (WWW), the dramatic rise of modem speeds, and the decreasing cost of getting onto the Internet. As a result most schools, colleges and many homes and businesses now have connection to the Internet, and this growth is expected to increase with the introduction of Internet phones, Internet television, and other future potential products which may emerge with Internet interfaces.

Every system that has connectivity to the Internet is assigned a unique Internet address number. Today's Ipv4 uses a 32-bit addressing structure, which gives just over 4 billion addresses. A few years ago this was thought to be more than enough, but with the increasing growth of the Internet, these addresses are shortly to run out.

The IETF(Internet Engineering Task Force) has already defined and is in fact using a new version of IP, known as Ipv6, which provides a large increase in the number of IP addresses by using a 128-bit addressing scheme. 128-bit addressing will

theoretically offer 340,282,366,920,938,463,463,374,607,431,768,211,456 or (2128) addresses.

The developers of Ipv6 say that the new addressing structure will make available an address for every proton on earth, and as such, is therefore expected to meet the predicted growth rates of the Internet.

This report details this new addressing scheme, explains how it will be introduced along-side v4, and outlines other future advantages of Ipv6,

Internet Communication

In order to achieve an understanding of the Ipv6 addressing structure, and the benefits that will be gained from its' introduction, it is first necessary to take a general look at how computers communicate with each other.

The Internet is a worldwide internetwork which comprises of a great number of access networks, such as ISP(Internet Service Provider) networks, site LAN's, Intranets, etc. All of these networks are connected together with leased lines and devices known as 'gateway's or 'routers'.

The Internet operates using a technique called 'packet switching', in which digital data is sent over communication paths, (e.g. Telephone lines), in small 'packets'. These packets or 'datagrams', as they are also called, consist of two sections; a 'header' section and a 'payload' section. The payload section contains the data itself, and the header contains the information necessary to route the packets to their destination and reconstruct the data to its original form for presentation to the recipient.

Ipv4 packet/datagram format

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32

The 'version field' contains the IP version, which was used to create the datagram, e.g. Ipv4.

The 'IHL' (intermediate header length) field specifies the actual length of the header in multiples of 32-bit words.

The 'TOS'' (type of service) field specifies the priority level of the data being transmitted.

The 'total length' field defines the total length of the datagram before being broken down into smaller packets, this value can then be used to reassemble the data into its original form.

The 'identification' field contains a value, which is the same in all related packets, and is used to determine that they are related.

The next three bits are flag bits, the first of which is not used at the moment. The second is called the 'don't fragment' bit, or sometimes D-bit. If the D-bit is set, it indicates that the packet should be sent in its entirety or not at all. The third bit is the 'more fragments' bit, sometimes known as the M-bit, and is used in transmissions of more than one packet. It is set to 1 in all but the last packet to indicate that there are more packets.

Join now!

The 'fragment offset' is also used for reassembly of the packets, and indicates where the data within a small packet belongs in relation to the original packet payload.

The 'time-to-live' field defines the maximum amount of time in seconds that a packet can be in motion on the Internet.

The 'protocol' field defines the protocol being used, e.g. TCP, UDP.

The 'header checksum' field is used for error detection, and ensures that packets that have become corrupted, do not get sent to the wrong destination.

The 'source address' and 'destination address' fields contain the IP addresses of the source ...

This is a preview of the whole essay