Addressing Flashcards
Advantages of IPv6
1) Scalability and expanded addressing capabilities
2) “Plug-and-play”
3) Security
4) VPN
5) Optimized protocol
6) Real time applications
7) Mobility
8) Multiple IPv6 addresses on same n/w interface
9) Streamlined header and flow identification
10) Extensibility
What is IPv4 and its problems?
- unique addresses at layer 3, 32 bit- host n/w address
- public,registered address-organizations and firms, more than they needed,without control
- dearth of addresses
- renumbering or reallocation- worldwide ordination
- NAT-small number of IPv4 addresses ,for an entire N/W
- Internal Intranet addresses- NAT function maps to public addresses, limitation because number of public addresses are less than devices needing the address.
- Number of protocols cannot pass NAT device and many application cant work efficiently
- Example- multimedia applications,IPsec
types of IPv6 addresses
- Unicast-send to this one specific address
- Multicast-send to all members of this specific group.
- Anycast-send to any one member of this specific group.
IPv6 packet
Vikram Tosanj followed Priyanka Nikam hoping shaadi destination earliest.
What is IPv6 tunneling
IPv6 tunneling as defined as a technique for establishing a “virtual link” between two IPv6 nodes for transmitting data packets as payloads of IPv6 packets.
What is the function of each node in IPv6?
From the perspective of the two nodes, this “virtual link,” called an IPv6 tunnel, appears as a point-to-point link on which IPv6 acts like a link-layer protocol. The two IPv6 nodes support specific roles. One node encapsulates original packets received from other nodes or from itself and forwards the resulting tunnel packets through the tunnel. The other node decapsulates the received tunnel packets and forwards the resulting original packets toward their destinations, possibly itself. The encapsulator node is called the tunnel entry-point node, and it is the source of the tunnel packets. The decapsulator node is called the tunnel exit point, and it is the destination of the tunnel packets.
Modes in IPv6
An IPv6 tunnel is a unidirectional mechanism—
tunnel packet flow takes place in one direction between the IPv6 tunnel entry-point and
exit-point nodes (see Fig. 7.6, top). Bidirectional tunneling is achieved by merging
two unidirectional mechanisms, that is, configuring two tunnels, each in opposite
direction to the other—the entry-point node of one tunnel is the exit-point node of
the other tunnel
Bi directional tunneling
An IPv6 tunnel is a unidirectional mechanism—tunnel packet flow takes place in one direction between the IPv6 tunnel entry-point and exit-point nodes (see Fig. 7.6, top). Bidirectional tunneling is achieved by merging two unidirectional mechanisms, that is, configuring two tunnels, each in opposite direction to the other—the entry-point node of one tunnel is the exit-point node of
the other tunnel.
What is IPv6 tunneling
An IPv6 tunnel is a unidirectional mechanism— tunnel packet flow takes place in one direction between the IPv6 tunnel entry-point and exit-point nodes. Bidirectional tunneling is achieved by merging two unidirectional mechanisms, that is, configuring two tunnels, each in opposite direction to the other—the entry-point node of one tunnel is the exit-point node of the other tunnel
IPv6 decapsulation
IPv6 decapsulation is the opposite process of encapsulation. Upon receiving an
IPv6 packet destined to an IPv6 address of a tunnel exit-point node, its IPv6 protocol
layer processes the tunnel headers. The strict left-to-right processing rules for extension headers are applied.
What is IPsec
IPv6 decapsulation is the opposite process of encapsulation. Upon receiving an IPv6 packet destined to an IPv6 address of a tunnel exit-point node, its IPv6 protocol layer processes the tunnel headers. The strict left-to-right processing rules for extension headers are applied.
IPsec protocols
IPsec itself is a set of two protocols: ESP, which
provides integrity and confidentiality and AH, which provides integrity. IPsec utilizes the AH and/or ESP header to provide security
Modes of ESP and AH
- Tunnel Mode
- Transport Mode
Need of HC
Implementation of IPv6 gives rise to concerns related to expanded packet headers, especially for video and wireless applications. the packet header size doubled from 20 bytes in IPv4 to at least 40 bytes in IPv6. The use of network-layer encryption mechanism nearly doubles IP operational overhead.
What is HC
HC algorithms can reduce the performance and throughput impact of expanded IPv6 packet headers and protocol-imposed overhead.