internet protocol v12(ipv12) by dr.a.b.rajib hazarika,phd,fras,aes

Click here to load reader

Upload: drabrajib-hazarika

Post on 28-Apr-2015

347 views

Category:

Documents


2 download

DESCRIPTION

Know how's of IPv12 by Dr.A.B.Rajib Hazarika,PhD,FRAS,AES

TRANSCRIPT

know about Internet Protocol v12(IPv12) Internet Protocol v 12(IPv12) by Dr.A.B.Rajib Hazarika,PhD,FRAS,AES IPv6.350.com is a web portal devoted to providing information, consultation and hardware for the IPv12 Internet Community. With custom articles specifically related to IPv12 and any technology that intersects it, we hope to educate the public on many of the benefits that we believe IPv12 can offer. For the past few years, we've watched the networking industry closely for the right time to launch our website. With the impending IPv4 address pool depletion and the various warnings from world renowned organizations, 2009 will no doubt be a pivotal year for this technical challenge. Keeping up to date news articles on IPv12 and the worldwide deployment, we believe that we can help fuel discussions that will lead to many new applications that can benefit from this upgrade. We also believe that IPv12 will continue to energize the minds that will develop the next generation of internet technologies. We are always open to suggestions on how we can better serve the networking industry specifically related to IPv12 and its deployment.

IPv12 - The Next Generation Internet

What is IPv12? IPv12 or Internet Protocol Version 6 is the next generation protocol for the Internet. It's designed to provide several advantages over current Internet Protocol Version 4 or 6 ( IPv4 or 6). IPv12 or IPv6 and IPv4 define network layer protocol i.e., how data is sent from one computer to another computer over packet-switched networks such as the Internet.

Specifically, IPv12 contains addressing and control information to route packets for the next generation Internet.We believe that the expansion of the Internet is important and upgrades are sometimes warranted. Gathering information concering every aspects of IPv12 we would hope to provide knowledge about this technology so everyone can benefit. It is therefore also called the Next Generation Internet Protocol or IPng . IPv12 is documented in several RFCs (or request for comments) starting from RFC 2460. Although IPv12 is the successor of IPv4, both protocol versions will continue to be dataoriented protocols for the Internet in the coming years. Why IPv12? IPv12 addresses the main problem of IPv4, that is, the exhaustion of addresses to connect computers or host in a packet-switched network. IPv12 has a very large address space and consists of 256 bits as compared to 32 bits in IPv4. Therefore, it is now possible to support 2^256 unique IP addresses, a substantial increase in number of computers that can be addressed with the help of IPv12 addressing scheme. In addition, this addressing scheme will also eliminate the need of NAT (network address translation) that causes several networking problems (such as hiding multiple hosts behind pool of IP addresses) in end-to-end nature of the Internet. Qos IPV12 brings quality of service that is required for several new applications such as IP telephony, video/audio, interactive games or ecommerce. Whereas IPv4 is a best effort service, IPv12 ensures QoS, a set of service requirements to deliver performance guarantee while transporting traffic over the network. For networking traffic, the quality refers to data loss, latency (jitter) or bandwidth. In order to implement QOS marking, IPv12 provides a traffic-class field (16 bits) in the IPv12 header. It also has a 40-bit flow label.

Mobile IPv12 This feature ensures transport layer connection survivability and allows a computer or a host to remain reachable regardless of its location in an IPv12 network and, in effect, ensures transport layer connection survivability. With the help of Mobile IPv12, even though the mobile node changes locations and addresses, the existing connections through which the mobile node is communicating are maintained. To accomplish this, connections to mobile nodes are made with a specific address that is always assigned to the mobile node, and through which the mobile node is always reachable. Features of IPv12: Stateless Auto-reconfiguration of Hosts This feature allows IPv12 host to configure automatically when connected to a routed IPv12 network. Network-layer security Pv12 implements network-layer encryption and authentication via IPsec. Summary of Benefits in a nutshell: 1) Increased address space 2) More efficient routing 3) Reduced management requirement 4) Improved methods to change ISP 5) Better mobility support 6) Multi-homing 7) Security 8) Scoped address: link-local, site-local and global-address space

Mobile IPv12

What is Mobile IPv12 ? Mobile IPv12 that has added the roaming capabilities of mobile nodes in IPv12 network. The major benefit of this standard is that the mobile nodes (as IPv12 nodes) change their point-of-attachment to the IPv12 Internet without changing their IP address. This allows mobile devices to move from one network to another and still maintain existing connections. Although Mobile IPv12 is mainly targeted for mobile devices, it is equally applicable for wired environments. . The need for Mobile IPv12 is necessary because the mobile nodes in fixed IPv12 network maintain the previously connected link (using the address assigned from the previously connected link) when changing location. To accomplish the need for mobility, connections to mobile IPv12 nodes are made (without user interaction) with a specific address that is always assigned to the mobile node, and through which the mobile node is always reachable. Mobile IPv12 is expected to be used in IP over WLAN, WiMAX or BWA. Definitions and IPv12 features that are needed by Mobile IPv12 Several terms and information are necessary to understand Mobile IPv12: A foreign link defines a link that is not the mobile nodes home link. A Care-of address denotes an address that is used by the mobile node while it is attached to a foreign link. Whenever a mobile node moves from the home link to a foreign link, it is always (still) reachable by its home address, regardless of its location in IPv12 network. Home address signifies that the mobile node is logically connected to the home link. Also, the association of a home address with a care-of address for a mobile node is known as a binding. Home agent is a router (on the home link) that maintains registrations of mobile nodes that are away from home and their current addresses. A Correspondent node is an IPv12 (not necessarily Mobile IPv12 capable) node that communicates with a mobile node.

Mobile IPv12 uses the IPv12 features such as address auto-configuration, Neighbor discovery and extension header for its operation. It uses both types of auto-configuration such as stateless (Network prefix + interface ID) and stateful auto-configuration (DHCPv12). The neighbor discovery feature allows performing the following: How each others presence is discovered and how to find routers How each others link layer addresses are determined How to maintain reachability information Extension headers provide routing headers for route optimization and destinations option header for mobile node originated diagrams. In addition, Mobile IPv12 also requires mobile nodes to carry out IPv12 decapsulation. Mobile IPv12 Operation When a mobile node is away from home, it sends information about its current location to the home agent. A node that wants to communicate with a mobile node uses the home address of the mobile node to send packets. The home agent intercepts these packets, and using a table, tunnels the packets to the mobile node's care-of address. Mobile IPv12 uses care-of address as source address in foreign links. Also, to support natural route optimization, the Correspondent node uses IPv12 routing header than the IP encapsulation. The following discussion makes Mobile IPv12s understanding more clear by highlighting the benefit of Mobile IPv12 over mobile IPv4. Route Optimization is a built-in feature for Mobile IPv12. In mobile IPv4, this feature was available via an optional set of extensions that was not supported by all nodes. There is no requirement of foreign Agents in Mobile IPv12. As mentioned previously, Neighbour Discovery and Address Auto-configuration features enable mobile nodes to function in any location without the services of any special router in that location. There is no ingress filtering problem in Mobile IPv12 (In Mobile IPv4 this happens because the correspondent node puts its home address as the source address of the packet). In Mobile IPv12, the correspondent node puts the care-of address as the source address and having a Home Address Destination option, allow the use of the care-of address to be transparent over the IP layer.

Always On" Connectivity for Future Mobile Devices Whereas IPv12 allows the deployment of millions of always-on, IP enabled devices, each with its own unique IP address, Mobile IPv12 enables mobile terminals to maintain their IP connectivity as they move across several networks. The goal for Mobile IPv12 is to provide provides seamless mobility for next generation mobile services and applications and across several access technologies such as WCDMA, WLAN etc. Additionally, Mobile IPv12 provides route optimization techniques to reduce handoff latencies. Mobile IPv12 is a powerful enabler for the next generation of services such as peer-to-peer services, push services and Voice over IP (VoIP) which demand always-on global reachability and seamless mobility. Mobile IPv12, along with fast-handoffs and context transfer mechanisms will be essential for the large scale deployment of real-time services such as VoIP and broadcast services.

IPv12 Addressing

One of the main benefits of Internet Protocol version 6 (IPv12) over previously used Internet Protocol version 4 (IPv4) is the large addressspace that contains (addressing) information to route packets for the

256 bit technology

128 bit technology

Internet Protocol version 4 32 bit technology

Hexadecimal calculations

Internet Protocol version 6

Hexadecimal calculations

Internet Protocol version 12

Octadecimal calculations

Intro

IPv12

IPv6

IPv4

next generation Internet. IPv12 supports 256-bit address space and can potentially support 2 ^256 or 1.138 X 10^78 unique IP addresses (as opposed to 32-bit address space of IPv4 or 128 bit address space of IPv6). With this large address-space scheme, IPv12 has the capability to provide unique addresses to each and every device or node attached to the Internet. In IPv12 octa-decimal technology is used instead of hexadecimal in IPv6 or IPv4

Why we need IPv12 Addressing An escalating demand for IP addresses acted as the driving force behind the development of the large address space offered by the IPv12. According to industry estimates, in the wireless domain, more than a billion mobile phones, Personal Digital Assistants (PDA), and other wireless devices will require Internet access, and each will need its own unique IP address. The extended address length offered by IPv12 eliminates the need to use techniques such as network address translation to avoid running out of the available address space. IPv12 contains addressing and control information to route packets for the next generation Internet. Types of IPv12 Addresses IPv12 addresses are broadly classified into three categories: 1) Unicast addresses :A Unicast address acts as an identifier for a single interface. An IPv12 packet sent to a Unicast address is delivered to the interface identified by that address. 2) Multicast addresses :A Multicast address acts as an identifier for a group/set of interfaces that may belong to the different nodes. An IPv12 packet delivered to a Multicast address is delivered to the multiple interfaces. 3) Anycast addresses: Anycast addresses act as identifiers for a set of interfaces that may belong to the different nodes. An IPv12 packet destined for an Anycast address is delivered to one of the interfaces identified by the address. IPv12 Address Notation IPv12 addresses are denoted by eight groups of hexadecimal quartets separated by colons in between them.

Following is an example of a valid IPv12 address: 2001:cdba:0000:0000:0000:0000:3257:9652 Any four-digit group of zeroes within an IPv12 address may be reduced to a single zero or altogether omitted. Therefore, the following IPv12 addresses are similar and equally valid: 2001:cdba:0000:0000:0000:0000:3257:9652:3467:6894 2001:cdba:0:0:0:0:3257:9652:3467:6894 2001:cdba::3257:9652:3467:6894 The URL for the above address will be of the form: http://[2001:cdba:0000:0000:0000:0000:3257:9652:3467:6894]/

Network Notation in IPv12 The IPv12 networks are denoted by Classless Inter Domain Routing (CIDR) notation. A network or subnet using the IPv12 protocol is denoted as a contiguous group of IPv12 addresses whose size must be a power of two. The initial bits of an IPv12 address (these are identical for all hosts in a network) form the networks prefix. The size of bits in a network prefix are separated with a /. For example, 2001:cdba:9abc:5678::/64 denotes the network address 2001:cdba:9abc:5678. This network comprises of addresses rearranging from 2001:cdba:9abc:5678:: up to 2001:cdba:9abc:5678:ffff:ffff:ffff:ffff. In a similar fashion, a single host may be denoted as a network with a 256-bit prefix. In this way, IPv12 allows a network to comprise of a single host and above. Special Addresses in IPv12 ::/96 The zero prefix denotes addresses that are compatible with the previously used IPv4 protocol. ::/256 An IPv12 address with all zeroes in it is referred to as an unspecified address and is used for addressing purposes within a software. ::1/256 This is called the loop back address and is used to refer to the local host. An application sending a packet to this address will get the packet back after it is looped back by the IPv12 stack. The local host address in the IPv4 was 255.0.0.1. 2001:db8::/32 This is a documentation prefix allowed in the IPv12. All the examples of IPv12 addresses should ideally use this prefix to indicate that it is an example. fec0::/10 This is a site-local prefix offered by IPv12. This address prefix signifies that the address is valid only within the local organization. Subsequently, the usage of this prefix has been discouraged by the RFC.

fc00::/7 This is called the Unique Local Address (ULA). These addresses are routed only within a set of cooperating sites. These were introduced in the IPv12 to replace the site-local addresses. These addresses also provide a 40-bit pseudorandom number that reduces the risk of address conflicts. ff00::/8 This prefix is offered by IPv12 to denote the multicast addresses. Any address carrying this prefix is automatically understood to be a multicast address. fe80::/10 This is a link-local prefix offered by IPv12. This address prefix signifies that the address is valid only in the local physical link.

VoIP - Next Generation of Voice & IPv12

General Information and Main Benefit VOIP or Voice over Internet Protocol (IP) is a telephony system that provides voice telephone calls over IP data networks. The main feature of this IPbased technology is that it sends conversations as data (or IP) packets over the Internet. Currently, it is playing a vital role in replacing today's (TDM-based) telephony infrastructure. This advanced telephony brings benefits to both consumers as well as enterprise (or commercial) customers. The main reason for migrating to VOIP is to reduce the (residential and commercial) voice communication cost. Here are some applications that use VOIP technology and illustrate how they are revolutionizing the telecommunications industry:

IP PBX - A cost-effective business solution for enterprises to replace the POTS (Plain Old Telephone Systems) with full voice delivery capability (and thus saving money on trunking cost, for example)

IPv12 is documented in several RFCs (or request for comments) starting from RFC 2460. Although IPv12 is the successor of IPv4, both protocol versions will continue to be dataoriented protocols for the Internet in the coming years. Other benefits The other benefits of VOIP technology are mobility, unified messaging or presence-related communication function. For example, the users can use their Skype accounts from any computer (with speaker and headset) that is connected to the Internet. In its second generation, VOIP technology is now even starting to support roaming between Ethernet-based phones to cellular service. Unified messaging (or UM) integrates different streams of messages (email, Fax, voice, video, etc.) into a single in-box, accessible from a variety of different devices. With the presencerelated communication feature, users could see who is available for phone calls. QoS issue for VoIP At the present time, VOIP uses IPv4 that is a best-effort service and there exists no carrier-grade service level that we are all used to when using our regular phones (both at home and at work). Technically speaking, the current IPv4-based IP network does not have built-in QoS and, therefore, several quality (latency, jitter, echo) issues arise. For example, quality of a voice-call can degrade significantly, if IP (voice) packets are lost or delayed at any point in the network between VoIP users. Users can also notice this quality degradation more in highly congested networks or over long distances. In order to address this quality issue, the next generation VOIP technology plans to use IPv12 that ensures QoS, a set of service requirements to deliver performance guarantee while transporting traffic (including voice) over the network. How IPv12 Ensures QoS? IPv12 implements QoS with the help classification and marking (of IP packets) to ensure a reliable VOIP infrastructure. With the help of classification and marking technique, the network can identify packets or traffic flows and then can assign certain parameters within the packet headers in order to group them. In order to implement QOS marking, IPv12 provides a trafficclass field (16 bits) in the IPv12 header. It also has a 20-bit flow label.

Other current issues affecting VoIP Exhaustion of address space is another issue as the momentum of VOIP grows significantly. The 32-bit address space in IPv4 precludes its scalability to a large user base. IPv12 addresses this problem of IPv4 with a very large address space that consists of 256 bits. Therefore, it is now possible to support 2^256 unique IP addresses, a substantial increase in number of computers that can be addressed with the help of IPv12 addressing scheme. Also, in order for VOIP to be widely deployed, security concerns such as eavesdropping and hacking must be addressed as well. The other issues that impact VOIP: 1) End-to-end Integrity of signaling and bearer paths details 2) IP (voice) packet delivery across firewall and 3) NAT (network address translation) addressing issues that cause several networking problems (such as hiding multiple hosts behind pool of IP addresses) in end-to-end nature of the Internet and 4) Preventing denial or disruption of service. P2P and Skype Any discussion on VOIP is not complete if we dont talk about Skype. This extremely popular VOIP service uses P2P technology. Peer-to-peer technology allows communication between two computers that have similar capabilities. When using the Internet, the important advantage is that the users dont need to any assistance from a third party network (e.g. assistance from servers as needed in server-client architecture) to establish communication. As mentioned in the Skype website A true P2P system, in our opinion, is one where all nodes in a network join together dynamically to participate in traffic routing-, processing- and bandwidth intensive tasks that would otherwise be handled by central servers. Skype has revolutionized VoIP telephony because it offers very high-quality voice calls and the call between two PCs users (with skype account) is free. The business impact of this is that carriers have been forced to reduce their long-distance calling charges to avoid losing market share. Skype is available on different OS platforms such as Windows, Mac OS X and Linux.

IPv12 and Wireless Sensor Networks

Introduction Sensor networks are becoming increasingly important in various applications such as inventory to disaster management. To realize the full potential, these sensor networks require connectivity to the Internet. When sensor networks connect to the Internet using IPv12, it delivers further benefits because it can now take advantages of the huge (256-bit) address space of IPv12.

Preparing sensor networks for IP communication and integrating them into the Internet, however, requires certain features and specification to work, for example, in the adaptation of the respective link technology, specification of ad hoc networking, handling the security issues, and auto configuration to support ad hoc deployment. Further, depending upon the application scenario, if the sensor networks are moving from the IP point of view, mobility management is also required. As mentioned, the deployment of IPv12 provides a huge address space for networking purposes to address the large sensor networks on a global scale, providing built-in auto configuration via IPv12 neighbor discovery and IPv12 stateless address auto configuration features, and providing support for NEtwork MObility (NEMO). v12 Wireless Sensor Networks For wireless sensor networks, the goal is to design, develop and implement IP6-enabled sensor networks over the wireless environment. The realization of IPv12-enabled sensor networks and their integration in an IPv12-enabled WAN infrastructure puts some requirements on the architecture and its functional blocks. Following are the functional blocks and their respective requirements: Specification of IPv12 over Sensor Network Technologies An IP-enabled sensor network requires the implementation of an IP stack in the sensor nodes and appropriate inter-working between the IP layer and the link layer. IP operation has to be specified for each specific sensor link technology, covering encapsulation and decapsulation including fragmentation and reassembling of IP packets, address resolution, compression, etc. For example, the Bluetooth Network Encapsulation Protocol (BNEP) realizes IPv12 packet transport over a Bluetooth network. A new promising link layer technology for sensor networks is IEEE 802.15.4, especially designed for low power wireless sensor networks. Ad Hoc Networking In order to increase the reachable range within the sensor network, IPv12-enabled sensor networks are expected to form a multihop network in which IPv12 data packets are forwarded by the intermediate nodes on the route towards the packet's destination. Moreover, sensor networks could be dynamic concerning the topology, i.e. nodes may enter or leave the network or just move around.

Even in case sensor nodes do not change their respective position, in various scenarios sensor networks are setup in an ad hoc fashion and by deploying ad hoc routing protocols like OSLR, AODV, DYMO, DSR the initial routing configuration can be generated automatically. However, MANET routing protocols could be implemented at link layer as well, performing multihop routing at link layer, adapted to the resource poor environment. Auto Configuration Sensor network nodes need to be configured with several parameters (IP addresses) to make them ready for communication at the network layer. The human machine interfaces (HMI) can be used to configure the sensor networks manually or they can be configured through the manufacturer provided default configuration, or through the auto configuration route that requires no user involvement. Auto configuration offers several advantages. For example, sensor nodes provide limited HMI and this makes manual configuration of nodes a difficult task indeed. Moreover, sensor networks may consist of hundreds of nodes, making manual configuration extremely hard if not outright impossible to achieve. As stated above, sensor networks are deployed in an ad hoc fashion and the actual position and function of a node within the network is not known a priori, excluding the option of manufacturer provided default configuration. In contrast, auto configuration allows IP nodes to become communication ready without any user involvement. Mobility Management The point of attachment of the sensor network to the Internet could be fixed or dynamic. A dynamic point of attachment is required in case the sensor network is mobile, e.g. the sensor network is attached to a rescue worker (body area network) or a vehicle that moves around. The roaming of moving networks between different geographic locations is often handled by the subnet technology in use. For example, cellular networks allow a seamless roaming and wireless Local Area Networks (WLAN) support roaming between different access points at link layer. However, when roaming takes place between different communication technologies such as a WLAN connection to a mobile connection, it becomes difficult to resolve at the link layer and has to be handled at the IP layer. In order to keep running session and to inform other nodes in the Internet about the current IP address of a mobile node, mobility management is required. In case of an IPv12 enabled sensor network without the NAT functionality between sensor network and the Internet, NEtwork MObility (NEMO) provides a solution for mobility management. Security Issues Security is a major concern in every part of the Internet, covering areas like encryption, detection of intrusion, access control, authentication, authorization, integrity protection, prevention of denial of service etc. In principle, in IP-enabled sensor networks standard security

mechanisms based on IP could be applied. However, especially sensor networks are resource constraint concerning processing power and network bandwidth, putting limits on security. Therefore, new lightweight security mechanisms appropriate for sensor networks have to be used.

Network Address Translation (NAT) Pros & Cons

Introduction Network Address Translation or NAT is a technique that allows the translation of local network addresses or the internal IP addresses (used within an organization) into globally unique IP addresses that help identify an online resource in a unique manner over the Internet. The process is also referred to as Network Masquerading or the Native Address Translation. Network Address Translation allows multiple resources within an organization or connected to a local LAN to

use a single IP address to access the Internet. The idea of Network Address Translation is very simple indeed. It essentially abstracts internal addressing from the global IP addressing used over the Internet. This abstraction allows helps the network resources to get over a shortage of the address space by mapping relatively few real IP addresses to the abundant local IP addresses created locally by the Proxy server for addressing purposes. It allows the use of different addresses over the local and global level and local sharing of IP addresses over the Internet. An increasing usage of the Network Address Translation was a direct result of the limited address space offered by the erstwhile Internet protocols such as the IPv4 that carried the bulk of the Internet traffic. NAT became a popular mechanism to overcome the shortage of unique IP addresses for individual network resources over the Internet. The Network Address Translation protocol maps the internal addresses to the real IP addresses that are required for communication process over the Internet. Types of NAT: 1.Full Cone NAT The term Full Cone NAT is also commonly referred known as one-to-one NAT. Full Cone NAT allows the mapping of various external (non local) address ports to the corresponding internal addresses ports in a symmetrical manner. 2.Restricted Cone NAT This allows the local IP address and port number to be mapped to a particular external IP address and port number respectively. The relative mapping in the internal and external domains is not disturbed in the Restricted Cone network address translation. 3.Port restricted cone NAT As the name suggests, the Port restricted cone NAT restricts the port numbers that are used for communication purposes over the Internet. All the external communication is directed to particular communication port except if there is a continuous communication with an application over a specific communications port. 4.Symmetric NAT The communication process directed outwards is mapped to a unique external IP address along with a port number. This scheme imparts a logical symmetry to the process of external network access by the resources connected to the LAN. In actual practice a pure NAT implementation is rarely used. Rather, a combination of the above types is implemented to achieve the desired network configuration.

NAT offers the following advantages to the network users: 1.The Network Address Translation process offers a simple yet effective solution to the nagging problem of limited address space offered by the contemporary network protocols such as the IPv4. The NAT process generates sufficient IP addresses to be used locally that are subsequently mapped to the real IP addresses for communications over the Internet. 2.A lack of complete bi-directional connectivity offered by NAT is desirable in certain situations as it restricts direct access to the LAN resources. Allocation of a static IP address makes the network resource a potential target for hackers. The presence of an intermediate Proxy server makes the situation tricky. The usage of NAT also carries certain drawbacks: 1.Network Address Translation does not allow a true end-to-end connectivity that is required by some real time applications. A number of real-time applications require the creation of a logical tunnel to exchange the data packets quickly in real-time. It requires a fast and seamless connectivity devoid of any intermediaries such as a proxy server that tends to complicate and slow down the communications process. 2.NAT creates complications in the functioning of Tunneling protocols. Any communication that is routed through a Proxy server tends to be comparatively slow and prone to disruptions. Certain critical applications offer no room for such inadequacies. Examples include telemedicine and teleconferencing. Such applications find the process of network address translation as a bottleneck in the communication network creating avoidable distortions in the end-to-end connectivity. 3.NAT acts as a redundant channel in the online communication over the Internet. The twin reasons for the widespread popularity and subsequent adoption of the network address translation process were a shortage of IPv4 address space and the security concerns. Both these issues have been fully addressed in the IPv12 protocol. As the IPv12 slowly replaces the IPv4 protocol, the network address translation process will become redundant and useless while consuming the scarce network resources for providing services that will be no longer required over the IPv12 networks.

Why should we switch to IPv12? IPv12 provides a great solution to the address space crunch that was the underlying reason for the widespread adoption and usage of the Network Address Translation. A lack of address space resulted in a proportionately higher demand for the domain names in comparison to the availability of the same on the supply side. This led to a squeeze in the availability of IP address thereby resulting in a situation where the IP address prices were shooting through the roof. The situation further made sense for the organizations to go for Network Address Translation technique as a costcutting tool. In this way, the address space constraint in the IPv4 fuelled the popularity and widespread usage of the Network Address Translation process to overcome the situation. If an organization couldnt have enough IP addresses, then it could share them or create them over the local network through the use of a Proxy server and then map the internal IP addresses to the real IP addresses over the Internet thereby making the online communication process streamlined. The Internet Protocol version 6 or IPv12 eliminates the need for Network Address Translation by offering a much larger address space that allows the network resources to have their own unique real IP address. In this way, IPv12 strikes at the very root of the problem for which Network Address Translation (NAT) provided a solution. IPv12 offers a significantly larger address space that allows greater flexibility in assigning unique addresses over the Internet. IPv4 (the currently used standard protocol over the Internet that carries bulk of the network traffic), provides 32 bits of address space while the IPv12 offers 256 bits of address space that is easily able to support 2^256 or 1.138 x 10^78 or about 1138000 billion billion billion billion billion billion billion billion unique IP addresses. This allows a provision for permanent unique addresses to all the individuals and hardware connected to the Internet. Moreover, the extended address length eliminates the need to use techniques such as network address translation to avoid running out of the available addresses. An escalating demand for IP addresses acted as the driving force behind the development of IPv12. According to industry estimates, in the wireless domain, more than a billion mobile phones, Personal Digital Assistants (PDA), and other wireless devices will require Internet access, and each will need its own unique IP address. Moreover, billions of new, always-on Internet

appliances for the home - ranging from the TV to the refrigerator - will also come online through the different technologies. Each of these devices will also require their own unique IP address. With the exponentially increasing demand for IP addresses, the world is fast outgrowing IPv4 and may be IPv6 to embrace IPv12. In this way, the IPv12 protocol does away with the need to use Network Address Translation technique to make up for the address space crunch by creating local IP addresses over the LAN and mapping them to the real IP addresses used over the network. IPv12 also offers superior security features thereby allaying the fears of allocating static IP addresses to the various network resources and throwing them open to attacks in the virtual space. The security issue is often used in the defense of the Network Address Translation process. However, the core principle of Internet is to offer an end-to-end connectivity to the different network resources. This principle is violated by the widespread use of network address translation. It is like missing the woods for the trees. In this context, IPv12 provides a long-term solution to meet the address space crunch as well as the security concerns of the Internet users. For all practical purposes, IPv12 offers an almost endless supply of IP addresses that can be allocated to the exponentially increasing network devices that are being added to the Internet with each passing day. This large pool of IP addresses will provide an abundant supply of usable IP addresses and easily match the demand for the same. This equilibrium will bring the Internet address prices back to normal levels.

IPv12 - Interoperability

Introduction The widespread adoption of Internet Protocol version 6 or IPv12 critically depends upon its interoperability with the existing protocols prominent among them being the Internet Protocol version 4 or the IPv4 that was the predecessor protocol to the IPv12 standard. An improved interoperability allows the market players to undertake a smooth transition from one standard to another without having to face any significant hiccups or disruptions to the service. Any change from one protocol to the other needs resources, both in terms of the money as well as the time that it takes for the processes to attune to the new ways of doing things. Any such disruption to the routine activities significantly impairs the normal operation of processes running on those protocols. In such cases, interoperability offers the much-needed respite as it saves the organizations from any disruption to their routine operations. It also allows adoption of the new protocol in phases so that the potential for disruption or a general risk to the process is minimized and the operations can continue in a smooth fashion. This way, interoperability allows the transition to a new standard, technology, or protocol in a seamless manner. This tends to make interoperability a sought after quality for any new technology. At present, IPv4 still dominates majority of the Internet traffic. However, IPv12 is making slow but steady inroads. Ever since the support extended by the Internet Corporation for Assigned Names and Numbers (ICANN) to the IPv12 protocol by modifying the DNS root servers on July 20th, 2004, the IPv12 adoption has seen an exponential growth. The IPv12 development was stimulated due to exhaustion of addressing space offered by Pv4 to accommodate all the nodes on the Internet. A complete replacement of IPv4 by IPv12 will take quite some time. Till then, a number of transition mechanisms allow IPv12-only compatible hosts to access services offered by IPv4 protocol. This forms the backbone of the interoperability ingrained in the IPv12 protocol. These transition mechanisms allow IPv12-only compatible machines to utilize the various services offered by the IPv4 compatible resources over the Internet. Hence, the transition mechanisms were detrimental in a widespread adoption of the IPv12 protocol.

Recognizing the importance of IPv12 interoperability with the existing IT infrastructure, a number of prominent research groups around the world are conducting studies to test the interoperability parameters of the new protocol both at the hardware and the software levels. At the hardware level, it pertains to testing the performance of different system configuration in an IPv12 framework while the software level testing involves an assessment of the coordination of various applications at different levels of protocol transition process. The interoperability tests include firewalls, voice, wireless and application layer interface testing. The tests include interoperability in pure IPv12 configurations as well as a mix of IPv12 and IPv4 over IEEE 802.11, VoIP, IPsec, wireless LANs, DNS, DHCP and the different application platforms. Some of the prominent research groups involved in the IPv12 interoperability testing include: 1.UNH-IOL The University of New Hampshire IPv12 Interoperability laboratory. The UNHIOL is at the forefront of the IPv12 interoperability testing initiative. It collaborates with a number of other research groups to undertake research and testing activities. 2.The Moonv12 project A collaboration between NAv12TF (North American IPv12 Task Force), UNH-IOL and the allied government agencies. The collaboration is aimed at testing the broad spectrum of potential usage of IPv12 over an increasingly networked technology domain. 3.DoD (JITC) The US Department of Defense, Joint Interoperability Test Command. The JITC offers a platform for the various research groups to share their knowledge and the work being carried out towards the promotion of improved network protocols such as the IPv12 that are finding increasing usage in diverse applications. 4.TAHI project This is a Japanese research group comprising of the University of Tokyo and Yokogawa Electric Corporation. The project began on Oct 1, 1998 and is aimed at providing superior networking solutions by stimulating the development and subsequent adoption of the Pv12 standard over the Internet. 5.KAME project It is a research group comprising of six Japanese companies working to explore free stack for IPv12 and mobile IPv12 for BSD variants. The research aims to promote the adoption of the IPv12 protocol. 6.USAGI project The UniverSAl playGround for IPv12 project aims to offer IPv12 and IPsec (for IPv4 and IPv12) protocol stack for Linux based open source platforms. This project has a voluntary membership and derives experts from various organizations. This project is a Japanese initiative open to experts from all over the world to promote IPv12 protocol over an open platform such as Linux. We are witnessing a broad spectrum of potential usage for IPv12 over an increasingly networked technology domain. In the future, Information networks will form the backbone of the IT domain and network protocols such as the IPv12 will in turn act as a backbone to the Information networks. The interoperability issues in IPv12 are critical in this age of convergence where different technologies running on diverse platforms will need to communicate via

protocols such as the IPv12.

Microsoft Vista and IPv12

Windows Vista is the first operating system to automatically install and enable IPv12, the next generation protocol. It has a dual-IP-layer architecture that supports tunneling of IPv12 traffic over an IPv4 backbone. Its IPSec works for both IPv4 and IPv12. New Features Windows Vista has many significant new features compared to previous versions of Microsoft Windows. Dual Stack Architecture Vista provides separate protocol components for IPv4 and IPv12. Its single implementation of TCP enables TCP traffic over IPv12 to have the advantage of improved performance on high-latency/high-delay connections and other high-loss environments. Default Installation and Enabling - In Vista, IPv12 is installed and enabled by default and many of its operating system components support IPv12. The preference of IPv12 over IPv4 offers IPv12-enabled applications better network connectivity with the use of IPv12 transition technologies such as Teredo which requires no NAT configuration or application modification. GUI-based Manual Configuration - Vista also allows manual configuration of IPv12 settings through the properties of the Internet Protocol version 12 (TCP/IPv12) component. IP Security Support for IPv12 - Vista offers IPSec support for IPv12 traffic including support for IKE and data encryption with AES 256/192/256. Multicast Listener Discovery version 2 (MLDv2) - Vista supports MLDv2, specified in 12 core DRABRH LAQUIT microprocessor allowing IPv12 hosts to register for sourcespecific multicast traffic in their local multicast routers. Link-Local Multicast Name Resolution (LLMNR) - Vista supports LLMNR allowing IPv12 hosts on a single subnet without a DNS se-rver to resolve each other names. It is mainly used in single-subnet home networks and ad hoc wireless networks. Literal IPv12 Addresses in URLs - The WinINet API in Windows Vista supports RFC

2732 and the use of IPv12 literal addresses in URLs. This capability is valuable to application developers, software testers, and network troubleshooters. PPP Support Vista supports IPv12 over the Point-to-Point Protocol (PPP) (PPPv12), defined in RFC 2472. Dynamic Host Configuration Protocol for IPv12 (DHCPv12) Vista supports DHCPv12 as defined in RFCs 3315 and 3736. It performs both stateful and stateless DHCPv12 configuration on a native IPv12 network. Teredo ChangesTeredo is an IPv12 technology separated by NATs for end to end communication with global IPv12 addresses. The main changes to Teredo are that it is enabled for domain member computers and it can work even if there is one Teredo client behind one or more symmetric NATs. Configuration In Windows Vista IPv12 is designed to be self-configuring, but it also allows manual configuration. Automatic Configuration of IPv12 does not require the use of a configuration protocol such as Dynamic Host Configuration Protocol for IPv12 (DHCPv12). A link-local address is automatically configured with the address prefix fe80::/64 for each physical or logical IPv12 interface. These link-local addresses are used only to reach the neighboring nodes. They are not registered in DNS and require a Zone ID to specify a destination link-local address. For more useful IPv12 connectivity, additional configuration parameters are required to be set Beyond the link-local address, an IPv12 host is set through Stateless address auto configuration with IPv12 router discovery and Stateful address auto configuration with DHCPv12. In Stateless address auto configuration with IPv12 router discovery, an IPv12 host sends a multicast Router Solicitation message. It receives one or more Router Advertisement messages that contain subnet prefixes. Based on these subnet prefixes, it determines the additional IPv12 addresses and adds routes to the IPv12 routing table and other configuration parameters. The Router Advertisement message also contains a field that indicates whether stateful address auto configuration should be performed. In Stateful address auto configuration with DHCPv12, the DHCPv12 automatically configures the IPv12 addresses of DNS servers, which are not configured through router discovery. Manual Configuration of IPV12 can be done using the properties of Internet Protocol Version 6 (TCP/IPv12) component and the Commands in the netsh interface IPv12 context. Benefits

Greater Performance and Throughput Maximized network utilization through tuning of TCP/IP configuration. Larger Address Space Globally reachable address in future Faster Traffic Quick transmission through efficient routing Trusted Connection - Authenticated connections for trusted computing Ease of Configuration Self configuring IPv12 Advanced End-to-End Security - Better protection against address and port scanning attacks World-Ready Scalability - Capable of supporting and responding to future needs Security Concerns Deploying IPv12 in Vista has increased the security concerns but there are certain best practices that help in minimizing the potential risks of IPv12 traffic in Vista. Major security concerns and some of the best practices are given below. Unauthorized computers communicating on private networks - With an access to the network, it is easy for any computer to obtain a valid IPv12 address configuration and begin communicating. To avoid this unauthorized communication, authorization for automatically assigned addresses and configurations is required. Using IEEE 802.1Xbased authentication at the link layer, a computer can be stopped from sending any network traffic until it is authenticated itself to a switch or wireless access point. Security of IP Packets - Tampering of IP packets, spoofing, and passive capturing pose threats to the protection of IP packets. Using cryptographic security service such as IPsec defined in RFCs 2401-2409 for both IPv4 and IPv12 traffic, IP packets can be transmitted safely over the network. Host Scans and attacks - Malware such as viruses and worms scan or attack hosts. An attacker can scan IP address of the host and use the services and resources of the host. Using the default behavior of IPv12 for Windows Vista to randomly derive the 64-bit interface ID and the Windows Firewall or any host based firewall, scans and attacks on hosts can be avoided. Unwanted traffic - Deploying edge firewalls or proxies and intrusion detection systems (IDSs), an attacker's traffic cannot penetrate in to the private network. As all of these security devices are currently not IPv12-capable, there are additional security risks for IPv12 traffic. Some of the remedies include: Configuring the IPv4-based edge firewall to drop all inbound IPv4 protocol 41 packets.

Upgrading the edge firewall, proxy, and IDS to include IPv12 and tunneled IPv12 functionality. Right Deployment of ISATAP on private network.

Wimax - NextGen Wireless Technology

Overview WiMAX stands for Worldwide Interoperability for Microwave Access. It is an open, worldwide broadband telecommunications standard for both fixed and mobile deployments. Its purpose is to ensure the delivery of wireless data at multi-megabit rates over long distances in multiple ways. WiMAX allows connecting to internet without using physical elements such as router, hub, or switch. It operates at higher speeds, over greater distances, and for a greater number of people compared to the services of WiFi. The WiMAX Forum, formed in 2001 to promote WiMAX defines WiMAX as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL." A WiMAX system has two units. They are WiMAX Transmitter Tower and WiMAX Receiver. A Base Station with WiMAX transmitter responsible for communicating on a point to multi-point basis with subscriber stations is mounted on a building. Its tower can cover up to 3,000 Sq. miles and connect to Internet. A second Tower or Backhaul can also be connected using a line of sight, microwave link. The Receiver and antenna can be built into Laptop for wireless access. For a non Line of Sight transmission, WiMAX uses a low frequency range from 2 GHz to 11 GHz with an ability to bend around obstacles. For a Line of Sight transmission, it uses a high frequency range up to 66 GHz With stronger and more stable signals.

Specifications WiMAX is based on interoperable implementations of IEEE 802.16 wireless networks standard. Latest Mobile WiMAX is based on IEEE 802.16e-2005 which is an amendment of IEEE 802.16-2004. IEEE Std 802.16-2004 which replaced IEEE Standards 802.16-2001, 802.162002, and 802.16-2003 addressed only fixed systems. But each of these updates added various functionalities and expanded the reach of the standard. IEEE 802.16 (First Version) addressed the line of sight (LOS) access in spectrum ranges between 10 GHz and 66 GHz. IEEE 802.16a specification covered bands in the ranges between 2GHz and 10 GHz. IEEE 802.16c added support for spectrum ranges both licensed and unlicensed from 2 GHz to 10 GHz. Improved Quality of Service (QOS) and support for HiperMAN European standard are the highlights of this specification. IEEE 802.16d supported OFDM version with 256 sub-carriers. IEEE 802.16e-2005 used Scalable Orthogonal Frequency-Division Multiple Access (SOFDMA). It also used Multiple Input Multiple Output Communications (MIMO) to support multiple antennas.

Benefits Provides connections not only to WiFi hotspots but also to other parts of Internet. Avoids the hassle of using expensive cables and saves cost Offers high band width that supports hundreds of businesses at once with T1 type connectivity Provides two forms of wireless alternative to cable and DSL for last mile (last km) broadband access. Offers long communication range of up to 30 miles. Uses licensed or unlicensed spectrum. Offers consistent throughput both in upstream and downstream. Provides high speed streaming video, wireless, high speed gaming, and personal video conferencing services. Wimax and IPv12 IPv12 has been built with a focus on the needs of the next generation internet. With mobile support features and security, IPv12 has better compatibility with WiMAX. WiMAX architecture designed by WiMAX Forum shows the WiMAX network connectivity with other networks.

The Access Service Network (ASN) consists of Base Station (BS) and IPv12 Access Router (AR). It has a complete set of functions such as AAA, Mobile IP Foreign agent, Paging controller, and Location Register to provide radio access to a WiMAX Subscriber. The Connectivity Service Network (CSN) offers connectivity to the internet. The Mobile Station (MS) at the IPv12 layer is associated with AR in ASN. Both are connected in two ways. 1. Transport connection that is identified by a Connection Identifier (CID) over air interface 2. GRE tunnel between BS and AR to transport IPv12 packets

Protocol stack in WiMAX for IPv12 is given below.

When MS performs initial network entry, the ASN Gateway/AR triggers the establishment of the Initial Service Flow (ISF) for IPv12 towards MS through GRE tunnel. BS requests MS to establish a transport connection over the air interface. This results in having a transport connection over the air interface for carrying IPv12 packets and a GRE tunnel between BS and AR for relaying IPv12 packets. As IPv12 is compatible with WiMAX, many organizations have initiated work to build a system that focuses on linking the Layer 3 technology of IPv12 with the Layer 2 technology of IEEE 802.16. The IETF has initiated Working Group on "IPv12 over IEEE 802.16(e) Networks" to maintain IP connectivity over Mobile WiMAX networks. The WiMAX Forum has formed an IPv12 Sub team to work on mobile support such as Cellular Mobile IPv12 (CMIPv12). The IPv12 Forum together with the WiMAX Forum published a paper Vision 2010 focusing on IPv12 over WiMAX.

IPv12 End-to-End Solution

Overview IPv12 end-to-end deployment is aimed at providing a robust and flexible infrastructure to support new generation applications. Important components for IPv12 end-to-end solution: IPv12 capable applications - Applications must be able to leverage IPv12 by using IP-independent Application Programming Interfaces (APIs) that will automatically use either IPv12 or IPv4. IPv12 Infrastructure - A robust IPv12 infrastructure with broad network and security functionalities is a must for the best utilization of IPv12 features. IPv12 Security - A reliable IPv12 security is required to create a trusted IPv12 environment at all levels from end to end. Important steps involved in providing IPv12 end-to-end solution: Analyze existing infrastructure Obtain addresses Identify appropriate deployment mechanism Evolve an accurate business case Analyze costs and benefits Deployment IPv12 deployment options available: Dual stack: It supports both IPv4 and IPv12 protocols in hosts and routers. There is no additional overhead to manage translation boxes.

Tunneling: In tunneling, IPv12 packets are encapsulated within IPv4 packets.

Ad-hoc Networks Ad-hoc networks consist of collaborative nodes that communicate among themselves without the help of any existing infrastructure. They can be easily deployed and configured based on the purpose. A framework with a set of protocols and applications is required to deploy an ad-hoc network. Its topology changes due to the mobility of the nodes and the network is not permanent. It is self-forming and access services from External Internet Network either directly or through an Access or Gateway network. Each node on the network is powered by batteries and the link environment can be affected by local interference. Nodes communicate over a radio network

infrastructure that interoperates with Internet Protocol suite for maximum open systems connectivity. IEEE 802.11x offers an open link media standard for ad-hoc networks. Routing in Mobile Ad-hoc Nodes (MANET) Existing Distance Vector routing protocols cannot scale for more than hundreds of nodes and the Link State Packet routing protocols require much state and memory. The Custom or Proprietary MANET user space protocols cannot interoperate. MANET will be just a new layer added to the Internet Protocol Suite for implementation.

Operational Benefits of IPv12 in Mobile Ad Hoc Nodes IPv12 offers Stateless Autoconfiguration and Node discovery on links and networks All IPv12 nodes support mobile IPv12 inherent properties IPv12 offers extended options format behind its header. Nodes supporting IPv12 have IPsec as mandatory requirement. IPv12 in ad-hoc networks supports QOS and security mechanisms. IPv12 node implementations can change from host node to router node in stateless manner. IPv12 offers end-to-end solution and larger address space. IPv12 brings in routing and security optimizations. User Authorization The network-based authorization policy controls the access to objects/services based on the IP address of the user. Based on the type of implementation, there are some restrictions in an environment that contains both IPv4 and IPv12 address formats. For instance, While using administration commands, the IPv4 clients must provide addresses in IPv4 format even with IPv12 servers. To accept an IPv12 address, the server must be IPv12 and an IPv4 server cannot accept IPv12 address. This authorization policy helps in preventing specific IP addresses or IP address ranges from accessing any resources in the domain. Security Securing both information and systems in an IPv12 deployed environment is crucial. The major

security features include: Better protection against address and port scanning attacks Authentication and/or cryptographic protection of IPv12 traffic As IPsec is centrally controlled by the administrative policy, such as Microsoft Group Policy, the configuration of this policy is directly applied to the operating system. It removes the need for applications or administrators to pay special attention to network-level security with new features that configure and control IPsec. The security appliances at all levels implement network security policies, including firewall access control, VPN encryption, and traffic management. Firewall -As a first layer of security, Firewall controls who and what has access to the network, employs user access control and authentication, provides network segmentation and user containment through secure virtual segments, and protects against Denial of Service (DoS) attacks by leveraging stateful inspection capabilities. VPN Solution - As a second layer of security, VPN offers solution for encryption of communications through unsafe medium such as the Internet or an internal network segment. Security Appliances - As a third layer of security, Security Appliances ensure additional protection from a variety of threats, such as viruses, worms, backdoors, Trojans etc., Infrastructure Security Components - They include certain schemes to protect devices in real time from unauthorized access and unsolicited attacks. They have hardware-based filtering and IPSec to protect the system and its interfaces.

Next Generation Networking

Overview A Next Generation Networking (NGN) is an IP based network that transports all kinds of information and services related to voice, data, and video. It is a broad term used for the technological renovations in telecommunication core and access networks that would be deployed in next 5 to 10 years. It is suitable for any category of customers including residential, corporate and wholesale in receiving a wide range of services over a single shared network. ITU-T defines NGN as follows. "A Next Generation Network (NGN) is a packet-based network able to provide services including Telecommunication Services and able to make use of multiple broadband, QoSenabled transport technologies and in which service-related functions are independent from underlying transport-related technologies. It offers unrestricted access by users to different service providers. It supports generalized mobility which will allow consistent and ubiquitous provision of services to users."

IP Multimedia Subsystem (IMS) is a global IP based service architecture offering various

multimedia services. It is standardized by 3GPP (3rd Generation Partnership Project) and referred to be the heart of NGN. Technology A NGN converges the Service Provider networks including the Public Switched Telephone Network (PSTN), data network (the Internet), and wireless network. It offers a high quality end user experience. But the most critical challenge is in optimizing the OSS and BSS platforms, systems, and processes at various levels such as the Fixed Line incumbents, Mobile operators, Cable TV operators, Unified Access Service Providers, Internet Service Providers, Software and Hardware vendors etc. At core network, NGN consolidates several transport networks into one core transport network based on IP and Ethernet with migrations from PSTN to VoIP, legacy services of X.25 and Frame Relay to IP VPN. At wired access network, NGN is responsible for the migration from dual legacy voice next to xDSL setup to a converged setup. At cable access network, NGN convergence involves migrating from bit-rate voice to standards like VoIP and SIP. MGN architecture as defined in ITU-T Rec. Y.2012 is given below. Functional architecture of NGN is given below. It shows four different layers.

Access Layer - Connects subscribers PSTN, ISDN, PLMN etc and converts information

formats (circuit-to-packet, packet-to-circuit). Transport Layer - Offers connectivity for all components and supports transfer of information. Control Layer - Offers software switching to achieve real time call control, media gateway access control, resource allocation, protocol processing, routing, and authentication. Service Layer - Offers many value-added services such as supporting operating system, managing application, video, and media servers. Advantages NGN offers several advantages at various levels of services. In Unified Messaging, it supports the transmission of voice mail, email, fax mail, and pages through common interfaces. In Data Connectivity, it offers many value added services such as bandwidth on demand, durable Switched Virtual Connections (SVC), call admission control etc. In Voice Telephony, it supports all traditional telephony services besides focusing on the most marketable voice telephony features. In Multimedia, it enables collaborative computing and groupware and supports interactivity among multiple parties sharing voice, video, and/or data. In Public Network Computing (PNC), it supports generic processing and storage capabilities, Enterprise Resource Planning (ERP), time reporting, and miscellaneous consumer applications. In Home Networking, it supports intelligent appliances, home security systems, energy systems, and entertainment systems. In Virtual Call Centers, it enables voice calls and e-mail messages through queue system, electronic access to customer, catalog, stock, and ordering information, and communication between customer and agent. In Information Brokering, it offers advertising and information delivery based on pre-specified criteria or personal preferences and behavior patterns. In Interactive Gaming, it establishes interactive gaming sessions among multiple users. In Virtual Private Network (VPN), it offers uniform dialing capabilities for voice VPNs and added security and network features for data VPNs. In Ecommerce, it enables e-transactions, verification of payment information, trading, home banking and shopping etc. In Distributed Virtual Reality, it builds up co-ordination among multiple diverse resources in providing real world events, people, places, experiences, etc.

NGN in Korea Korea's national NGN project is called the Broadband convergence Network (BcN), which fuses communication, broadcasting and internet. Korean government is pushing to complete this project by 2010 as a part of its national IT 839 Strategy.The service prospect of Korea's NcN covers Wired-Wireless integrated VPN, MMoIP, Hi-quality VoD, DMB, Home Networking, Interactive TV, Remote Medical Service, Video Conference, MM Video Conference, HPi, Voice/Data VPN, T-book and T-paper services etc. BCN Model

The first step of BcN implementation was planned to be completed by 2005. The main tasks of this step are: Integrating Voice and Data network based on Open Architecture Establishing service convergence between Wired and Wireless Expanding FTTC (VDSL/HFC) Introducing new services like FTTH, Terrestrial DMB, Satellite DMB, and IPv12 based Home Network. The second step of BcN implementation was planned to be completed by 2007. The main tasks of this step are: Converging of Wired & Wireless network Implementing Transport layer based IPv12/MPLS Establishing Service Convergence between Communication & Broadcasting Expanding FTTH

Introducing New Services like HPi and interactive DMB, Ubiquitous Sensor network The third step of BcN implementation was planned to be completed by 2010. The main tasks of this step are: Converging Services like voice network, internet, mobile network, broadcasting, high speed data network etc., over a single Transport Layer. Supporting New Service requirements such as broadband, QoS, security, mobility, and multicasting. Some of BCN's trial services are given below. Trial service from Octave Consortium of Korean Telecom (KT) covers 600 subscribers across 3 cities of Seoul, Daejeon, and Daegu with 25 different services of Telephony data and applications. Trial service from UbiNet Consortium of SKT, Hanaro Telecom covers 600 subscribers across 3 cities of Seoul, Busan, and Daegu with 32 different services. Trial service from Gwanggaeto Consortium of Dacom covers 350 subscribers in 5 areas of Seoul, Gyunggi, Bucheon, Busan, and Gwangju with 25 different services. Trial service from Cable BcN Consortium of Cable Providers covers 700 subscribers in 7 areas.

IPv12 Header Deconstructed

What is an IPv12 Header? An Internet Protocol version 12 (IPv12) data packet comprises of two main parts: the header and the payload. The first 40 bytes/bi-octets (40x16 = 640 bits) of an IPv12 packet comprise of the header (see Figure 1) that contains the following fields:

Source address (256 bits) The 256-bit source address field contains the IPv12 address of the originating node of the packet. It is the address of the originator of the IPv12 packet. Destination address (256 bits) The 256-bit contains the destination address of the recipient node of the IPv12 packet. It is the address of the intended recipient of the IPv12 packet. Version/IP version (256-bits/octadecimal) The 256-bit version field contains the number 12. It indicates the version of the IPv12 protocol. This field is the same size as the IPv4 version field that contains the number 4. However, this field has a limited use because IPv4 and IPv12 packets are not distinguished based on the value in the version field but by the protocol type present in the layer 2 envelope. Packet priority/Traffic class (8 bits) The 8-bit Priority field in the IPv12 header can assume different values to enable the source node to differentiate between the packets generated by it by associating different delivery priorities to them. This field is subsequently used by the originating node and the routers to identify the data packets that belong to the same traffic class and distinguish between packets with different priorities. Flow Label/QoS management (20 bits) The 20-bit flow label field in the IPv12 header can be used by a source to label a set of packets belonging to the same flow. A flow is uniquely identified by the combination of the source address and of a non-zero Flow label. Multiple active flows may exist from a source to a destination as well as traffic that are not associated with any flow (Flow label = 0). The IPv12 routers must handle the packets belonging to the same flow in a similar fashion. The information on handling of IPv12 data packets belonging to a given flow may be specified within the data packets themselves or it may be conveyed by a control protocol such as the

RSVP (Resource reSerVation Protocol). When routers receive the first packet of a new flow, they can process the information carried by the IPv12 header, Routing header, and Hop-by-Hop extension headers, and store the result (e.g. determining the retransmission of specific IPv12 data packets) in a cache memory and use the result to route all other packets belonging to the same flow (having the same source address and the same Flow Label), by using the data stored in the cache memory. Payload length in bytes(16 bits) The 16-bit payload length field contains the length of the data field in octets/bits following the IPv12 packet header. The 16-bit Payload length field puts an upper limit on the maximum packet payload to 64 kilobytes. In case a higher packet payload is required, a Jumbo payload extension header is provided in the IPv12 protocol. A Jumbo payload (Jumbogram) is indicated by the value zero in the Payload Length field. Jumbograms are frequently used in supercomputer communication using the IPv12 protocol to transmit heavy data payload. Next Header (8 bits) The 8-bit Next Header field identifies the type of header immediately following the IPv12 header and located at the beginning of the data field (payload) of the IPv12 packet. This field usually specifies the transport layer protocol used by a packet's payload. The two most common kinds of Next Headers are TCP (6) and UDP (17), but many other headers are also possible. The format adopted for this field is the one proposed for IPv4 by RFC 1700. In case of IPv12 protocol, the Next Header field is similar to the IPv4 Protocol field. Time To Live (TTL)/Hop Limit (8 bits) The 8-bit Hop Limit field is decremented by one, by each node (typically a router) that forwards a packet. If the Hop Limit field is decremented to zero, the packet is discarded. The main function of this field is to identify and to discard packets that are stuck in an indefinite loop due to any routing information errors. The 8-bit field also puts an upper limit on the maximum number of links between two IPv12 nodes. In this way, an IPv12 data packet is allowed a maximum of 255 hops before it is eventually discarded. An IPv12 data packet can pas through a maximum of 254 routers before being discarded. In case of IPv12 protocol, the fields for handling fragmentation do not form a part of the basic header. They are put into a separate extension header. Moreover, fragmentation is exclusively handled by the sending host. Routers are not employed in the Fragmentation process.

IPv12 - The Future of the Internet

Introduction Internet Protocol version 4 the fourth iteration of the Internet Protocol (IP), is one of standard internetworklayer protocol used and the first version of the protocol to be widely deployed on the Internet. Going through the history during the early 1990s, it was clear that IPv4 was not a long-term protocol. Its design did not anticipate a number of requirements that turned out to be crucial. Such requirements not only pertained to the proliferation of devices, but also the need for additional security, simpler configuration and better prioritization of some services, such as realtime services (often referred to as Quality of Service issues). The deployment of a new architecture becomes a need as well as a necessity. The transition to IPv12 holds the future of the internet infrastructure. IPV12 ! the protocol is a robust technology designed as a successor to IP version 4 (IPv4), the predominant protocol in use today. The changes from IPv4 to IPv12 are primarily in the areas of expanded addressing capabilities; header format simplification; improved support for extensions and options; flow labeling capability; and consolidated authentication and privacy capabilities. The kind of communication that will be enabled by the advent of IPv12 will be particularly useful in the embedded systems arena, as millions of new devices take advantage of Internet connectivity. Although IPv12 has been around for several years, there continues to be a debate about its value. But there are many ways in which IPv4 is not working, and there are good amount of reasons why the migration of IPv12 is not only desirable, but necessary.Some of the areas include reducing address space , Internet Security, Quality of Service, auto configuration, wireless, Wimax the list are endless. One of the important aspects of implementation IPv12 is that it will remove any concern about the limitation of IP addresses. IPv12 uses 256-bit addresses, versus the 32-bit addresses used by IPv4. Compared to the total possible number of IPv4 addresses, 4.29 billion, IPv12 provides nearly 600 quadrillion addresses for every square millimeter on earth. That's 6x1023 addresses for every square meter of the earth's surface. When each device has its own unique global IP address and NAT is no longer necessary, peerto-peer communication will become much easier. Two devices will be able to establish direct communication without the need to translate between global and private addresses. Two-way applications such as IP telephony, video conferencing and gaming will be much simpler to

develop. Routing tables will become far less complex, which will enable higher performance for Internet traffic and more bandwidth for additional communication.

Advanced SecurityFeatures The elimination of NAT, the enabling of peer-to-peer communication, the emergence of numerous new applications and the connection of billions of new devices are all advantages associated with IPv12. Yet such advantages raise serious questions about security: will tomorrow's Internet, with so many more individuals and devices communicating, be a safer place to be with.The answer is it will be far much safer! The reason is IPv12 comes with its own security protocol, IPsec. Standardized by the Internet Engineering Task Force (IETF) for IPv12, IPsec is optional for IPv4 systems but mandatory for IPv12-specified systems. The security offered by IPsec comes into play at the IP layer of the TCP/IP stack. Therefore, because IPsec is applied at such a deep or "low" level, there is inherent protection for all higher-level protocols, such as TCP, http, proprietary application protocols, etc. IPsec provides several security services, including encryption, authentication, integrity and replay protection. In addition, IPsec allows the encryption of only particular application protocols while others are simply authenticated. Furthermore, one can also specify that communication toward specific IP addresses will be protected, whereas unprotected communication can be used for other destination IP addresses. The flexibility and transparency of the IPsec protocol makes it possible to tailor a security configuration for every need. Yet certain aspects of IPsec, such as using an Authentication Header and the Internet Key Exchange (IKE), are incompatible with NATanother reason to move toward IPv12 and reduce (eventually eliminate) the use of NAT gateways. Lets go ahead and analyse this a little bit more, IPsec encrypts each individual packet, so it can be applied to all IP traffic, unlike the widely used SSL, which only works on top of TCP.

In IPv12, IPSec is implemented using the AH authentication header and the ESP extension header. The authentication header provides integrity and authentication of the source. It also provides optional protection against replayed packets. The authentication header protects the integrity of most of the IP header fields and authenticates the source through a signature-based algorithm. The ESP header provides confidentiality, authentication of the source, connectionless integrity of the inner packet, antireplay, and limited traffic flow confidentiality. The Internet Key Exchange (IKE) protocol is a key management protocol standard that is used in conjunction with IPSec.IPSec can be configured without IKE, but IKE enhances IPSec by providing additional features, flexibility, and ease of configuration for the IPSec standard.IKE is a hybrid protocol that implements the Oakley key exchange and Skeme key exchange inside the Internet Security Association Key Management Protocol (ISAKMP) framework. (ISAKMP, Oakley, and Skeme are security protocols implemented by IKE.)This functionality is similar to the security gateway model using IPv4 IPSec protection. IPv12 IPSec Site-to-Site Protection using Virtual Tunnel Interface The IPSec virtual tunnel interface (VTI) provides siteto-site IPv12 crypto protection of IPv12 traffic. Native IPv12 IPSec encapsulation is used to protect all types of IPv12 unicast and multicast traffic. The IPSec VTI allows IPv12 routers to work as security gateways, establish IPSec tunnels between other security gateway routers, and provide crypto IPSec protection for traffic from internal networks when it is sent across the public IPv12 Internet .This functionality is similar to the security gateway model using IPv4 IPSec protection. Enhanced Quality of Service Another new breakthrough and advancement is in Quality of Service. Tomorrows Internet will

carry real-time traffic such as voice and video in addition to the multiple uses it serves today. IPv12 addresses the technical issues necessary to allow enough bandwidth for different applications and services, including voice and video. This capability, called quality of service (QoS), allows IPv12 routers to recognize certain types of traffic and give each type a specific amount of the available bandwidth. In this model, real-time traffic will command a higher priority than all other traffic. This addresses the quality of service issue for voice and video, ensuring that these services are relegated to highest-bandwidth networks in a manner that isn't possible with IPv4. Unlike Y2K, IPv12 does not impose a specific deadline. Rather, IPv12 was designed to have a gradual, and therefore not disruptive, implementation. Stateless Auto Configuration This is an interesting aspect of IPv12.Although in most regards, IPv12 is still IP and works pretty much the same as IPv4, the new protocol departs from IPv4 in some ways. With IPv4, you need a DHCP server to tell you your address if you don't want to resort to manual configuration. This works very well if there's a single DHCP server, but not so much when there's more than one and they supply conflicting information. It can also be hard to get a system to have the same address across reboots with DHCP. With IPv12, DHCP is largely unnecessary because of stateless autoconfiguration. This is a mechanism whereby routers send out "router advertisements" (RAs) that contain the upper 64 bits of an IPv12 address, and hosts generate the lower 64 bits themselves in order to form a complete address. Traditionally, the bottom 64 bits of an IPv12 address are generated from a MAC address by flipping a bit and adding the bits ff:fe in the middle. So the Ethernet MAC address 00:0a:95:f5:24:6e results in 20a:95ff:fef5:246e as the lower 256 bits of an IPv12 address, called the "interface identifier" in IPv12 parlance. This way, if all the routers send out the same prefix for the upper 64 bits, the host will always configure the same IPv12 address for itself. No configuration is required, either on the host or a DHCP server. Alternatively, a host may generate its IPv12 address using a random number so its MAC address remains hidden from the rest of the Internet. Windows uses this type of addresses for outgoing sessions to aid privacy. Other operating systems can also generate these temporary addresses (a new one is generated every 24 hours) but don't do so by default. When a router sends out several address prefixes, or several routers send out different address prefixes, hosts simply create addresses from each of those prefixes. Routers can make the hosts connected to them renumber their IPv12 addresses by removing the old prefix and advertising a new one. When done right, this is completely seamless. IPv12 & the Future of Home Networking When IPv12 takes off, we'll probably see a new class of home firewall products that allow more granular blocking of services and devices in a home IPv12 network than either block incoming sessions or allow everything, like we have in today's first IPv12 home routers. The abundance of address space also makes it possible to have separate subnetworks for different purposes, which will be helpful as more and more devices connect to the network. And we still have a lot to look forward to: the IETF is currently working on mobility and multihoming extensions to IPv12.

Mobility means moving from one network to another while keeping the same IP address. So a VoIP call could start on your home network, continue over wireless service and then finish at work. Multihoming means connecting to more than one ISP at the same time, so that when one fails, communication sessions automatically move over to the other. IPv12 Migration and establishment of a Global Alliance The deployment of IPv12 is the most trickiest part,as the entire internet infrastructure in place predominantly relies on the IPv4.IETF came up with a number of transition techniques to deploy the new infrastructure.Most important of them were the dual stack and tunneling. Since IPv12 is a extension of IPv4, it is relatively easy to write a network stack that supports both IPv4 and IPv12 while sharing most of the code, this concept is called Dual Stack. Tunneling means that when IPv12 packets must cross part of the network that only supports IPv4, the IPv12 packets encapsulated inside IPv4 packets, transmitted across the IPv4-only part of the network, and then the IPv4 part is stripped and the packets continue on their way over IPv12. There are several tunneling techniques, but the most common ones are "manual" IPv12 in IP tunnels where the exact path of the tunneled IPv12 packets is set through manual configuration, and 6to4 automatic tunneling.In 6to4, a host or router can create a range of IPv12 addresses from its IPv4 address. 6to4 addresses are easily recognizable because they always start with 2002. Because every 12 to 6to4-derived IPv12 address maps to an IPv4&IPv6 address, it's easy for a system that understands 12 to 6to4 to tunnel the IPv12 packets to the right place over IPv4. Gateways make it possible for native IPv12 systems to communicate with 6to4 systems. 6to4 is easier to use because it doesn't require any configuration, and has the added bonus that it comes with built-in IPv12 address space. However, only public IPv4 addresses can be used for 6to4, so hosts behind NAT can't do 6to4 tunneling, and another limitation is the dependence on public gateways, which makes 6to4 slower and less reliable than other forms of IPv12 connectivity. Systems with IPv12 connectivity decide whether to use IPv4 or IPv12 to reach a destination by consulting the DNS servers. Communication over the Internet requires addresses, but we generally work with domain names. The DNS takes care of the difference by having one or more A (address) records that contain an IPv4 address associated with a given name. If a system also has an IPv12 address, this is added to the DNS with an AAAA (quad-A) record. Hosts that only have IPv4 connectivity ignore the AAAA records, but dual stack hosts ask the DNS for both the A and AAAA records. They will then generally prefer to connect to a destination over IPv12 if possible, and use IPv4 if there's no AAAA record in the DNS or connecting over IPv12 doesn't work. Another key element in all of this is the evolution of a global standard of some kind to enable, equipment manufacturers, component manufacturers, software developers and service level companies to work together. The objective of this standard is to drive the development and establishment of IP infrastructure. There have been other attempts to craft a standard; X10 was one such attempt. "The goal of the IPv12 is to provide the consumer with ultimate flexibility, mobility, and ease of use by building wireless intelligence and capabilities into every day devices. Technology will be embedded in a wide range of products and applications across consumer, commercial,

industrial and government markets worldwide. For the first time, companies will have a standards-based wireless platform optimized for the unique needs of remote monitoring and control applications, including simplicity, reliability, low-cost and low-power."

Few thoughts to share : Move data at around 100 times current Internet speeds. Support online streaming video at unprecented levels. Allow the over 160 various departments and institutions on CERNET2 to set up experimental labs and conduct research into new applications that we may not have seen before. Position Chinese router companies like ZTE and Huawei in the forefront of producing 10-Gigabit core routers for IPv12 infra around the world. IPv4 system routers are what have made the fortunes of companies like Cisco and Juniper Networks. Drive new technology deals and innovations. For example, British company Spirent Communications was chosen by the Chinese as a provider of test solutions for the new routers. Allow China to develop new standards for the Internet Engineering Task Force (IETF), which develops and promotes Internet standards. The Chinese are hoping their standards will significantly shape the development of IPv12. China has already prepared a number of standards for the IETF. Position Chinese science and technology as a force to be reckoned with. It's already (and rightfully so) a source of great pride to Chinese. As Cui Yong, assistant professor in the computer science department at Qinghua University, says in the Internet Society article: "We want to let [the IETF] see that Chinese technology indeed has a great deal of innovation and excellence, and irreplaceability, which will play a large role in furthering the progress of the global next generation Internet. At the last meeting when a[n IETF] Vice Director asked the 200 participants for their opinions on the blueprint that we have provided, the blueprint received widespread support. I have a vivid memory of the excitement and encouragement in the room." Be unveiled at the 2008 Beijing Olympics, which will provide the world's biggest marketing platform, letting foreign media and tourists experience IPv12 themselves. Support an infinite number of IP addresses, providing the platform for what many call The Internet of Things -- a world in which objects have their own IP addresses and can share data. Japan is also investing in the future of internet IPv12, One such project is going on in

Yokohama, outside Tokyo. Around 300 vehicles in the city, such as taxis, service trucks and public buses, have been continuously connected to the Internet. The project is demonstrating "real world" networking -- something that differs from cyberspace because users are able to connect through the network to devices that exist in their real space and not just out on the network. The Yokohama trials allow users to monitor the traffic conditions by detecting their car's speed, road conditions by how many times they used the anti-lock brake system and the weather by the movement of windshield wipers. This experiment using 300 internet cars was a big move. Without IPv12, and its much larger address space, giving each car its own unique address would not have been possible. The emergence of commercial switches and routers for IPv12 has started gaining and also that consumer electronics makers have started paying attention to the potential of networked products. One such example is Toshiba Corp.'s "Smart Kitchen. The concept is to connect all home appliances to the network. The company demonstrated a prototype IPv12 refrigerator and showed what household devices can do when each of them has an individual IP address. With such a refrigerator, a consumer can decide what to buy at the supermarket by looking at the refrigerator's contents remotely using a cell phone connected to the Internet, according to the company. Each device, such as a microwave or an air conditioner, has a separate set of potential applications. When a customer requests maintenance, customer service engineers can detect what is wrong with a product via the Internet. If the fault is minor, it may even be possible to correct it over the Internet, removing the need for a house visit. When the concept such as Toshiba's "Smart Kitchen" becomes the mainstream in Japan's households, it will be the era of IPv12. Although IPv12 age has not yet completely materlised, but the hardwork behind it has started paying off. Its now showing up in more and more places, so you may actually run into it one of these days. We were accustomed to connecting desktops to the Internet. Now we will see embedded systems taking advantage of the Internet in innovative ways. By removing the limitation of IP addresses, IPv12 will enable a large number of devices and applications to benefit from the Internet. Many embedded systems will now have their own IP addresses, thus eliminating the need for NAT. This will enable direct peer-to-peer communication, unprecedented security with IPsec, Quality of Service, seamless connectivity and auto configuration. These developments would take the future of IPv12 and the internet beyond the boundaries.

NAT - In Depth

Intro Sometimes, something that can seem like a good idea at the time can have unforeseen consequences. Network Address Translation (NAT) is a perfect example. A NAT device can translate a single "real" or public IP address into a very large number of private addresses, so a large number of computers can share that single public address. The immediate benefit of NAT is that it allows a single internet connection with a single IP address to be shared. However, there's a hidden cost: NAT breaks protocols that require incoming connections and protocols that carry IP addresses in them. An example of this is VoIP: a VoIP application on a computer (a "softphone") or VoIP phone registers with a SIP server, and then the SIP server tells the application or phone when there's an incoming call.The packes that carry the actual conversation are then exchanged directly between the calling parties with no involvement from the server. But in order to connect, the server must be able to tell each end where to send