Addressing Flashcards

1
Q

Advantages of IPv6

A

1) Scalability and expanded addressing capabilities
2) “Plug-and-play”
3) Security
4) VPN
5) Optimized protocol
6) Real time applications
7) Mobility
8) Multiple IPv6 addresses on same n/w interface
9) Streamlined header and flow identification
10) Extensibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is IPv4 and its problems?

A
  • unique addresses at layer 3, 32 bit- host n/w address
  • public,registered address-organizations and firms, more than they needed,without control
  • dearth of addresses
  • renumbering or reallocation- worldwide ordination
  • NAT-small number of IPv4 addresses ,for an entire N/W
  • Internal Intranet addresses- NAT function maps to public addresses, limitation because number of public addresses are less than devices needing the address.
  • Number of protocols cannot pass NAT device and many application cant work efficiently
  • Example- multimedia applications,IPsec
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

types of IPv6 addresses

A
  1. Unicast-send to this one specific address
  2. Multicast-send to all members of this specific group.
  3. Anycast-send to any one member of this specific group.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IPv6 packet

A

Vikram Tosanj followed Priyanka Nikam hoping shaadi destination earliest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is IPv6 tunneling

A

IPv6 tunneling as defined as a technique for establishing a “virtual link” between two IPv6 nodes for transmitting data packets as payloads of IPv6 packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the function of each node in IPv6?

A

From the perspective of the two nodes, this “virtual link,” called an IPv6 tunnel, appears as a point-to-point link on which IPv6 acts like a link-layer protocol. The two IPv6 nodes support specific roles. One node encapsulates original packets received from other nodes or from itself and forwards the resulting tunnel packets through the tunnel. The other node decapsulates the received tunnel packets and forwards the resulting original packets toward their destinations, possibly itself. The encapsulator node is called the tunnel entry-point node, and it is the source of the tunnel packets. The decapsulator node is called the tunnel exit point, and it is the destination of the tunnel packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Modes in IPv6

A

An IPv6 tunnel is a unidirectional mechanism—
tunnel packet flow takes place in one direction between the IPv6 tunnel entry-point and
exit-point nodes (see Fig. 7.6, top). Bidirectional tunneling is achieved by merging
two unidirectional mechanisms, that is, configuring two tunnels, each in opposite
direction to the other—the entry-point node of one tunnel is the exit-point node of
the other tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bi directional tunneling

A

An IPv6 tunnel is a unidirectional mechanism—tunnel packet flow takes place in one direction between the IPv6 tunnel entry-point and exit-point nodes (see Fig. 7.6, top). Bidirectional tunneling is achieved by merging two unidirectional mechanisms, that is, configuring two tunnels, each in opposite direction to the other—the entry-point node of one tunnel is the exit-point node of
the other tunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is IPv6 tunneling

A

An IPv6 tunnel is a unidirectional mechanism— tunnel packet flow takes place in one direction between the IPv6 tunnel entry-point and exit-point nodes. Bidirectional tunneling is achieved by merging two unidirectional mechanisms, that is, configuring two tunnels, each in opposite direction to the other—the entry-point node of one tunnel is the exit-point node of the other tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPv6 decapsulation

A

IPv6 decapsulation is the opposite process of encapsulation. Upon receiving an
IPv6 packet destined to an IPv6 address of a tunnel exit-point node, its IPv6 protocol
layer processes the tunnel headers. The strict left-to-right processing rules for extension headers are applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is IPsec

A

IPv6 decapsulation is the opposite process of encapsulation. Upon receiving an IPv6 packet destined to an IPv6 address of a tunnel exit-point node, its IPv6 protocol layer processes the tunnel headers. The strict left-to-right processing rules for extension headers are applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IPsec protocols

A

IPsec itself is a set of two protocols: ESP, which
provides integrity and confidentiality and AH, which provides integrity. IPsec utilizes the AH and/or ESP header to provide security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Modes of ESP and AH

A
  • Tunnel Mode

- Transport Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Need of HC

A

Implementation of IPv6 gives rise to concerns related to expanded packet headers, especially for video and wireless applications. the packet header size doubled from 20 bytes in IPv4 to at least 40 bytes in IPv6. The use of network-layer encryption mechanism nearly doubles IP operational overhead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is HC

A

HC algorithms can reduce the performance and throughput impact of expanded IPv6 packet headers and protocol-imposed overhead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Example of HC

A

Consider the illustrative case where packets with constant 20 byte payloads are transmitted using a 40 byte IPv6 header. Consider a 1 Mbps link. Then during a 1-s period, about 666 kb transmitted over the link is IPv6 overhead, and only about 333 kb transmitted over the link is actual user data. This implies that 66% of data transmitted is overhead. Now consider the case where the same packet of payload is sent with a 2-byte compressed header. Now over a 1-s period, about 90 kb transmitted is IPv6 overhead, and about 910 kb transmitted is actual user data. This implies that only 9% of data transmitted is overhead. This example shows that HC can theoretically decrease header overhead by
95%.

17
Q

Define overhead

A

Overhead is defined as “IP header bytes” divided by “total bytes transmitted.”

18
Q

Where compression is applied?

A

Traditionally, compression is applied to layer 3 (IP) and several layer 4 protocol headers; for example, RTP/UDP/IPv6 headers can be compressed from 60 bytes to 2–4 bytes. See Figure 7.9. HC algorithms can also reduce the additional overhead introduced by network-layer encryption mechanisms (e.g., IPsec). Compression algorithms that address encryption/decryption have the ability to: (i) compress inner headers before encryption and (ii) compress outer ESP/IP headers after encryption. Two compression protocols emerged from the IETF in recent years.

19
Q

two protocols for HC

A

1) Internet protocol header compression (IPHC), a scheme designed for low bit error rate (BER) links Internet protocol header compression (IPHC), a scheme designed for low bit error rate (BER) links.
2) Internet protocol header compression (IPHC), a scheme designed for low bit error rate (BER) links

20
Q

How is compression and decompression done

A

Compression is applied over a link between a source node (i.e., compressor) and a destination node (i.e., decompressor). HC algorithms make use of protocol interpacket header field redundancies to improve overall efficiency. Both compressor and decompressor store header fields of each packet stream and associate each stream with a context identifier (CID). Upon reception of a packet with an associated context, the compressor removes the IPv6 header fields from packet header and appends a CID. Upon reception of a packet with a CID, the decompressor inserts IPv6 header fields back into packet header and transmits packet.

21
Q

Organization requirements before migration to IPv6

A

Ipv4 and IPv6 environments are not directly compatible
There are a number of requirements that are typically applicableto an organization wishing to introduce an IPv6 service.
>The existing IPv4 service should not be adversely disrupted.
>The IPv6 service should perform as well as the IPv4 service.
>The service must be manageable and be able to be monitored
>The security of the network should not be compromised
>An IPv6 address allocation plan must be drawn up

22
Q

Internetworking mechanism

A

> Dual IP layer (also known as dual stack): A technique for providing complete
support for both IPs—IPv4 and IPv6—in hosts and routers;
Configured tunneling of IPv6 over IPv4: Point-to-point tunnels made by encapsulating IPv6 packets within IPv4 headers to carry them over IPv4 routing
infrastructures; and
Automatic tunneling of IPv6 over IPv4: Amechanism for using IPv4-compatible
addresses to automatically tunnel IPv6 packets over IPv4 networks.

23
Q

Tunnelling mechanism

A

IPv6-over-IPv4 tunneling
Configured tunneling
Automatic tunneling
IPv4 multicast tunneling

24
Q

Why it is necessary to have IPv6 connectivity in LoWPAN

A
  • network autoconfiguration and statelessness.
  • Large number of devices calls for large number of address space.
  • Limited packet size of LoWPAN