Friday, August 3, 2012

Review of Article :- IPv6 Tunneling Over IPV4



National Institute of Industrial Engineering
Industrial Engineering (PGDIE-42)





Review Paper Summary on

 IPv6 Tunneling Over IPV4






Submitted to                                                       Submitted by
Dr. KVSS Narayan Rao                                          Abhinav Gautam (Roll no-03)
                                   














Article Details:

Title:

IPv6 Tunneling Over IPV4

Authors:

  1. Sankara Narayanan
  2. M.Syed Khaja Mohideen
  3. M.Chithik Raja
Department of Information Technology
Salalah College of Technology
Sultanate of Oman

Published in:

IJCSI International Journal of Computer Science Issues,
 Vol. 9, Issue 2, No 2,
March 2012

Abstract


Due to the huge growth of the internet users, mobile users using internet connection makes development and implementation of IPv6 as an alternate solution. IPv6 is a long anticipated upgrade to the internet's main communication protocol, which is called IPv4. The current address space provided by IPv4, with only4, 294, 967, 296 addresses. Nowadays IPv6 tunneling over IPv4 are widely used to form the global IPv6 Internet. The IPv6 128-bit address scheme it should provide enough addresses for everyone's computer. Tunneling provides a path to use an existing IPv4 to IPv6. This paper describes typical IPv6 tunneling and tunnel broker's deployment in real IP networks.

Review

A next-generation Internet Protocol [1] , known first as IPng and then as IPv6, has been under development by the Internet Engineering Task Force (IETF) for several years to replace the current Internet Protocol known as IPv4.

Of major importance during the development of IPv6 has been how to do the transition away from IPv4, and towards IPv6. The work on transition strategies, tools, and mechanisms has been part of the basic IPv6 design effort from the beginning

These transition design efforts resulted in a basic Transition Mechanisms specification for IPv6 hosts and routers [4] that specifies the use of a Dual IP layer providing complete support for both IPv4 and IPv6 in hosts and routers, and IPv6-over-IPv4 tunneling , encapsulating IPv6 packets within IPv4 headers to carry them over IPv4 routing infrastructures.
Of great concern to transition strategy planners is how to provide connectivity between IPv6-enabled end-user sites (also known as routing domains ) when they do not yet have a reasonable (or any) choice of Internet Service Provider (ISP) that provides native IPv6 transport services. One way to provide IPv6 connectivity between end-user sites (when native IPv6 service does not exist) is to use IPv6-over-IPv4 encapsulation (tunneling) between them, similar to the technique currently used in the 6bone [5] IPv6 testbed network. This requires complexity for both end-user sites, and the networks providing the tunneling service (for instance, the 6bone backbone ISPs), in creating, managing, and operating manually configured tunnels.
Simplest Use of 6to4
The simplest scenario for 6to4 is when several sites start to use IPv6 alongside IPv4, and have no native IPv6 ISP service available. Thus each site identifies a router to run dual stack (that is, IPv4 and IPv6 together) and 6to4 tunneling, ensuring that this router has a globally routable IPv4 address (that is, not in private IPv4 address space).
Sending and Receiving Rules for 6to4 Routers
When the requesting site's 6to4 router sees that it must send a packet to another site (that is, there is a nonlocal destination), and that the next hop destination prefix contains the special 6to4 Top Level Aggregation (TLA) value of 2002::/16, the IPv6 packet is encapsulated in an IPv4 packet using an IPv4 protocol type of 41, as defined in the Transition Mechanisms.

A Video explaining IPv6 Tunneling Over IPV4.

Conclusion

Network industry expects a gradual transition to IPv6 in near future. The IPv6 addressing protocol solves the problem of IP address exhaustion, because IPv4 and IPv6 are incompatible, the general public, businesses of all size and federal agencies will eventually need to replace or upgrade every element in their communications scheme.

1 comment:

  1. Dear Abhinav Gautam,

    Thanks for your review.

    Regards,

    A.Sankara Narayanan
    http://sankar-information-security.blogspot.com/p/publications_9.html

    ReplyDelete