into the future with ipv4 or ipv6?
TRANSCRIPT
-
8/12/2019 Into the Future With IPv4 or IPv6?
1/104
Into the future with IPv4 or IPv6?
Kevin F. Doyle BA (Psychology & Information Technology)
email: [email protected]
web: ie.linkedin.com/in/kdcod
Discipline of Information Technology
College of Engineering and Informatics
NUI Galway
Ireland
2010
-
8/12/2019 Into the Future With IPv4 or IPv6?
2/104
Abstract
In the early 1990s the Internet experienced exponential growth; Internet Protocol version 4
(IPv4) address depletion was first recognised as presenting a serious strategic problem.
Currently the Internet is built on a 32 bit addressing scheme, this allows for a maximum of
4,294,967,296 unique IPv4 addresses to exist, however the number of devices requesting an
IPv4 address will shortly exceed the number of IPv4 addresses available. To remedy this and
other IPv4 issues IP version 6 (IPv6) was conceived and developed. IPv6 boasts a 128 bit
addressing scheme which can cater for up to 3.4x1038IP addresses. IPv6 is being offered as a
fix-all solution for IPv4 issues; however the market is slow to adopt IPv6. Using a literature
review, interviews and a case study based on HEAnet and NUIG-ISS this thesis examined the
technical and commercial pros and cons of IPv4 and IPv6. Results revealed that although
IPv4 is a very robust protocol, IPv6 surpasses IPv4 in orders of magnitude; from technical,
innovation and strategic perspectives there can be no doubt that IPv6 is the Internet Protocol
of the future.
-
8/12/2019 Into the Future With IPv4 or IPv6?
3/104
Acknowledgements
I would like to thank the following people for answering the many questions I had
during the development of this thesis. A special thank you goes to my thesis supervisor Dr.
Hugh Melvin who provided a structured environment in which I had to attain bi-weekly
goals. I would also like to thank the following people Brian Nisbet (HEAnet), Gareth Eason
(HEAnet), Mike Norris (HEAnet), Tom Regan (NUIG ISS) and Will McDermott (HEAnet).
Finally I would like to thank my family (Frank, Joan, Susanne, John and Barbara), and my
friends for providing support when needed.
Dedication
This work is dedicated to my parents Frank & Joan Doyle.
-
8/12/2019 Into the Future With IPv4 or IPv6?
4/104
TABLE OF CONTENTS
PAGE
CHAPTER1-INTRODUCTION
1.0 Thesis Topic - Internet Protocol Version 4 & 6
1.1 Chapter Summary
CHAPTER2-RESEARCHAPPROACHANDRATIONALE
2.0 Introduction
2.1 Literature Review Rationale
2.2 Literature Analysis Rationale
2.3 Case Study Rationale
2.4 Questionnaire Rationale
2.5 Research Hypothesis
2.6 Chapter Summary
CHAPTER3-LITERATUREREVIEW
3.0 Introduction
3.1 Origins of the Internet and Internet Protocol
3.2 The OSI 7-Layer Reference Model
3.21 Layer 1(Physical)
3.22 Layer 2 (Data Link)
3.23 Layer 3 (Network)
3.24 Layer 4 (Transport)
3.25 Layer 5 (Session)
3.26 Layer 6 (Presentation)
3.27 Layer 7 (Application)
3.3 Internet Protocol Version 4 (IPv4)
1
1
2
3
3
3
3
4
4
4
6
7
7
7
8
9
9
10
11
11
12
12
12
-
8/12/2019 Into the Future With IPv4 or IPv6?
5/104
PAGE
3.31 IPv4 Addressing
3.32 IPv4 Address Classification
3.33 IPv4 Encapsulation & Formatting
3.34 IPv4 Datagram Size
3.35 IPv4 Maximum Transmission Unit (MTU)
3.36 IPv4 Fragmentation
3.37 IPv4 Delivery & Routing
3.38 IPv4 Multicasting
3.4 Internet Protocol Version 6 (IPv6)
3.41 IPv6 Addressing
3.42 IPv6 Address Classification
3.43 IPv6 Encapsulation & Formatting
3.44 IPv6 Datagram Size
3.45 IPv6 Maximum Transmission Unit (MTU)
3.46 IPv6 Fragmentation
3.47 IPv6 Delivery & Routing
3.48 IPv6 Multicast
3.5 Future Proofing IPv4
3.51 IPv4 Sub-netting or Fixed-Length Subnet Masks (FLSM)
3.52 IPv4 Variable Length Subnet Mask (VLSM)
3.53 IPv4 Classless Inter-Domain Routing (CIDR)
3.54 Network Address Translation (NAT)
3.55 Network Address, Port Translation (NAPT)
3.6 Parallel Internets IPv4 & IPv6
13
13
13
15
15
16
17
18
19
19
19
20
22
23
23
23
24
25
25
26
26
27
28
29
-
8/12/2019 Into the Future With IPv4 or IPv6?
6/104
PAGE
3.61 Dual Stack IPv4 & IPv6
3.62 IPv6 Tunnelling
3.63 Transmission of IPv6 over IPv4 Domains (6over4)
3.64 Transmission of IPv6 Domains to IPv4 Clouds (6to4)
3.65 ISATAP Intra-Site Automatic Tunnel Addressing Protocol
3.66 Teredo Tunnelling
3.7 Mobile IP
3.71 Mobile IPv4
3.72 Mobile IPv6
3.8 Chapter Summary
CHAPTER4-LITERATUREANALYSIS
4.0 Introduction
4.1 Throughput
4.2 Round Trip Time, Jitter & Packet Loss Rate
4.3 Performance & Operating System (OS) Dependence
4.4 Application Performance (FTP, HTTP, VOIP, IPSec)
4.5 Scalability
4.6 Comparative Summary of Literature Review and Literature Analysis
4.7 Chapter Summary
CHAPTER5-CASESTUDY
5.0 Introduction
5.1 HEAnet
5.2 NUIG ISS
5.3 Chapter Summary
29
30
30
31
31
32
32
32
34
37
38
38
38
40
43
46
47
48
49
50
50
50
55
56
-
8/12/2019 Into the Future With IPv4 or IPv6?
7/104
PAGE
CHAPTER6-QUESTIONNAIREANDINTERVIEWDESIGN
6.0 Introduction
6.1 PESTEL
6.2 SWOT
6.3 BCP
6.4 Questionnaire Structure
6.5 Interview Structure
6.6 Chapter Summary
CHAPTER7-RESULTSANDANALYSIS
7.0 Introduction
7.1 Literature Review Analysis
7.2 Literature Analysis (Analysis)
7.3 Questionnaire Analysis
7.4 Case Study Analysis
7.5 Summary of Questionnaire Results
7.6 Final Result
CHAPTER8-CONCLUSIONS
8.0 Final Conclusion
8.1 Results in Context
8.2 Identifying Future Work
References
APPENDICES
Appendix AQuestionnaire to Gareth Eason of HEAnet
Appendix BQuestionnaire to Tom Regan of NUIG-ISS
58
58
58
58
59
59
60
60
62
62
62
62
62
64
64
67
68
68
69
71
72
76
76
84
-
8/12/2019 Into the Future With IPv4 or IPv6?
8/104
PAGE
Appendix C Thesis Process Evaluation
Appendix D - List of Figures
Appendix E - List of Abbreviations
89
91
92
-
8/12/2019 Into the Future With IPv4 or IPv6?
9/104
P a g e | 1
CHAPTER 1 - INTRODUCTION
1.0 Thesis Topic - Internet Protocol Version 4 & 6
This thesis is all about Internet Protocol where IP is perhaps singly the most important
protocol that drives the Internet as we know it. Princeton (2010) defines a protocol as a set of
rules determining the format and transmission of data (http://wordnetweb.princeton.edu). On
the Internet today there are two versions of this protocol in operation, versions 4 and 6 or
IPv4 and IPv6 respectfully. Every device connected to the Internet requires a unique
identifier or IP address. Currently IPv4 is suffering from a serious lack of IP addresses drivenby an unprecedented and unpredicted number of new electronic devices connecting to the
Internet and requesting an IP address. IPv4 is capable of delivering a technical maximum of
4,294,967,296 IP addresses and currently there are approximately 0.5% of these IP addresses
remaining ("Driving IPv6 Deployment," 2010). In 1996 the Internet Engineering Task Force
(IETF) published the specification of IPv6; this new protocol was designed to deliver
3.4x1038IP addresses, an almost limitless supply for generations of Internet users to come.
Interestingly organisations have been slow to adopt this new IPv6 for many reasons
including but not limited to the following; IT strategy, technical experience, education,
financial restraints, immature technology, lack of consumer demand and lack of vendor
support. There is a lot of anxiety surrounding the adoption of this technology when you
consider that organisations IT and network infrastructure is built on a system (IPv4) that
works perfectly well for now, so why should they try to fix it if it doesnt appear to be
broken? This thesis aims to find out what organisations should do now, stay with IPv4 or bite
the bullet and adopt IPv6.
The remainder of the thesis is structured as follows. Chapter 1 gives a brief introduction
to the thesis topic. Chapter 2 describes the research approach and explains the rationale
behind the literature review; literature analysis, questionnaire and case study. This is then
-
8/12/2019 Into the Future With IPv4 or IPv6?
10/104
P a g e | 2
followed by the research hypothesis. Chapter 3 is the literature review covering the core
topics of IPv4 and IPv6. Chapter 4 covers the literature analysis. Chapter 5 is the case study
which is based on HEAnet and NUIG-(ISS). Chapter 6 explains the design and tools used in
the questionnaire and pre-structured interview. Chapter 7 analyses the results of the literature
review; literature analysis and questionnaire. In the final chapter, Chapter 8, conclusions are
drawn and the results are examined in a wider context. The remaining sections are the
reference section; questionnaire results are in appendix A and B, a personal evaluation of the
process I went through to complete this thesis is given in appendix C, a list of figures andabbreviations comprise appendix D and E respectfully.
1.1 Chapter Summary
This chapter provided a basic introduction to the core issues dealt with in this thesis. A
brief description of each chapter was also given to outline the structure of the thesis. In order
to derive scientific results and establish if IPv4 or IPv6 is the better protocol a research
method must be established, details of this methodology will be outlined in the following
chapter,Research Approach and Rationale.
-
8/12/2019 Into the Future With IPv4 or IPv6?
11/104
-
8/12/2019 Into the Future With IPv4 or IPv6?
12/104
P a g e | 4
literature analysis should not be confused with (literature) review (p. 58). The literature
analysis undertaken in this thesis provided interesting background material but more
importantly it helped to extract valid criteria by which a comparison could be made between
IPv4 and IPv6. Having this comparative data also helped generate questions that eventually
became part of the questionnaire that was administered in the pre-structured interview.
2.3 Case Study Rationale
(Berndtsson, et al., 2008) define a case study as: a study project... undertaken as an in
depth exploration of a phenomenon in its natural setting (p. 62). The case studies chosen forthis thesis turned out to be very interesting and informative. Both NUIG-ISS and HEAnet
were selected for this case study; both of these organisations provide similar services, that
being computer network connectivity and ancillary services. Having a case study will help in
results analysis when data from the literature analysis and review can be qualified by real
world data from the case study and questionnaire.
2.4 Questionnaire Rationale
The questionnaire was delivered in the form of a pre-structured interview and was
chosen as a method to gain real world data from the two interviewees who participated in this
survey. (Berndtsson, et al., 2008) states that this interview technique is: ... characterised by a
fixed set of questions... in its pure form, it does not allow adding or deleting questions
depending on the replies. With respect to repeatability, it has an obvious advantage over the
open interview (p. 60); the list of questions that comprise the questionnaire are available in
appendix A.
2.5 Research Hypothesis
When an electronic device connects to the internet it requires an IP address. Currently
the software designed to implement this IP addressing scheme is at version 4. The original
specification for IP version 4 allotted 32 bits of memory to the IP address size however a 32
-
8/12/2019 Into the Future With IPv4 or IPv6?
13/104
P a g e | 5
bit address can only supply 4,294,967,296 unique IP addresses; this number is based on the
calculation of raising 2 to the power of 32 (232). As it stands there are 240 million IPv4
addresses remaining ("Driving IPv6 Deployment," 2010). The latest implementation of IP
software is at version 6. IPv6 allots 128 bits of memory to the IP address size allowing for
3.4x1038(2128) unique IP addresses to exist.
Judgment Dayor Global IPv4 address exhaustion is predicted to occur in
2013("Driving IPv6 Deployment," 2010). It would be difficult to predict all eventualities
when this event occurs but some of the situations that may occur include:(1) Hoarding of the final block of IP addresses for selling at extortionate rates.
(2) The Internet stops growing; increased use of NAT will striate the Internet even
more and slow down Internet traffic.
(3) Increased traffic congestion.
(4) Increased threat from computer viruses, because calculating what IP addresses to
attack next is no longer required due to every IP address being a valid host
(5) Threats to business and innovation.
In 1996 the IPv6 specification was published. IPv6 was designed to be a long term
solution to the address exhaustion problem. At the same time a short term solution called
Network Address Translation (NAT) was developed to help prolong the life of the remaining
IPv4 address pool. Since then the adoption of NAT has become so widespread and complete
that NAT has now become a dominant technology and is a threat to the adoption of IPv6 due
to the lower costs associated with implementing NAT as opposed to implementing IPv6.
During the course of my research I spent 6 months working at the Irish National
Research and Education Network, HEAnet Ltd which is based in Dublin. My time with
HEAnet coincided with their ongoing rollout of their IPv6 network. It was during the
development of a strategic proposal for HEAnet that I became interested in the IPv4/IPv6
-
8/12/2019 Into the Future With IPv4 or IPv6?
14/104
P a g e | 6
issue. My early research revealed that cost would be a prohibitive factor in the rate at which
organisations adopt IPv6. Subsequent research revealed that IPv6 has a lot more to offer than
just limitless IP addresses, including improved security, connectivity and throughput.
However product vendors and their customers are slow to adopt IPv6 enabled products and
services; the current economic climate is also not helping.
Objectively this thesis will go to the source in relation to technical specifics on IPv4
and IPv6 with the Internet Engineering Task Force (IETF) being the main sources. The IETF
publish all of their technical specifications for both versions of IP in their Request ForComment (RFC) database. A review of academic literature is then carried out and finally an
extensive questionnaire will be given to Gareth Eason of HEAnet and Tom Regan of the
NUIG-(ISS) department. The key outcome will be to discover what Internet Protocol should
be adopted, IPv4 or IPv6 to preserve and uphold the stability of the Internet as we know it.
2.6 Chapter Summary
This chapter outlined the research methodology developed in this thesis. The beginning
of this research process commences in the following chapter theLiterature Review, where
IPv4, IPv6 and associated technologies are described.
-
8/12/2019 Into the Future With IPv4 or IPv6?
15/104
P a g e | 7
CHAPTER3-LITERATUREREVIEW
3.0 Introduction
In order to understand the technology of Internet Protocol, this chapter reviews this
protocol in a historical context and it details how far reaching the effects of Internet Protocol
can be, given the intrinsic relationship between Internet Protocol and the many software
programs and Internet services people use on the Internet every day.
3.1 Origins of the Internet and Internet Protocol
After the launch of the Russian Sputnik satellite in 1957 the U.S. Defence AdvancedResearch Projects Agency (DARPA) established a project to promote research cooperation
between universities, this project became known as Advanced Research Project Agency
NETwork (ARPANET) (Hafner & Lyon, 1996). In 1958 under the initial directorship of Roy
Johnson ARPANET went into business. Their goal was to link together university computing
resources over the existing North American national telephone network. After ten years of
intense research and development two Interface Message Processors (IMPs) were installed,
one at the University of California Los Angeles (UCLA) and the other at Stanford Research
Institute (SRI), communications between these two devices commenced on October 1, 1969
(Hafner & Lyon, 1996).
In 1970 the Network Working Group (NWG) a project team within ARPANET
produced the first host-to-host communications protocol called the Network Control Protocol
(NCP). By 1978 this protocol had evolved in specification and complexity and became
known as the Transmission Control Protocol (TCP). ARPANET was then able to facilitate
Telnet and File Transfer sessions. In the same year during a meeting at the University of
Southern Californias Information Sciences Institute (ISI) a decision was taken to split TCP
into two logical groupings. TCP would be charged with the control, sequencing and error
handling of data packets and Internet Protocol would be used to route IP packets through
-
8/12/2019 Into the Future With IPv4 or IPv6?
16/104
P a g e | 8
each network node. This decision resulted in the creation of the now familiar acronym
Transmission Control Protocol / Internet Protocol (TCP/IP) (Hafner & Lyon, 1996).
Once vendors got wind of the ARPANET project and realised the potential monetary
gains to be had they each started to develop their own proprietary network protocols.
Computer industry players such as IBM, Apple, Novell and DEC each produced their own
implementation of TCP/IP (Hafner & Lyon, 1996). With a view to preventing the striation of
the Internet with a plethora of proprietary network protocols the International Organisation
for Standards (ISO) and the International Telecommunications Union (ITU-T) co-developedthe Open System Interconnection (OSI) reference model (ITU-T, 1994). The OSI model is
the de facto reference model for TCP/IP.
3.2 The OSI 7-Layer Reference Model
Figure: 1 The OSI model showing logical and actual data flows
-
8/12/2019 Into the Future With IPv4 or IPv6?
17/104
P a g e | 9
The OSI reference model is comprised of the following 7 layers: Physical, Data Link,
Network, Transport, Session, Presentation and Application. This model is illustrated in figure
1 where the OSI 7 layer model is a metaphor for the TCP/IP communications stack. Data
flows through each layer in the IP stack as it travels from an application on host A to an
application on host B.
3.21 Layer 1 (Physical)
Layer 1 facilitates the movement of serial binary data over a physical link that joins two
or more network nodes. The physical link can take the form of electrical signals on a coppercable, pulses of light on a fibre-optic cable or pulses of electromagnetic radiation travelling
between radio transceivers.
3.22 Layer 2 (Data Link)
There are many data link layer protocols such as Digital Subscriber Line (DSL),
Ethernet and Point to Point Protocol (PPP). For simplicity this thesis will only talk about the
Ethernet protocol. At layer 2 the OSI specification describes how network nodes should
format their data into frames for transmission and reception. An astute account of how this
mechanism works in an Ethernet network is given by (Anttalainen, 2003):
The data link layer at the transmitting node builds the frames and sends them to the
node on the other end of the Ethernet medium via the physical layer. The data link layer
at the receiving node receives the frames, checks if these frames are error free, and then
delivers error-free frames to the network layer. The data link layer at the receiver may
send acknowledgment of error-free frames to the transmitting node. The transmitter
may retransmit the frame if no acknowledgment is received within a certain time
period. Note that this procedure occurs between each pair of nodes on the network. (p.
245)
-
8/12/2019 Into the Future With IPv4 or IPv6?
18/104
of the
commu
address
the for
the Fra
transmi
frame.
point c
deman
vast di
frame r
payloa
IP con
T
fragme
address
32-bit I
t the heart
thernet fra
nicating tra
of the rece
at of the d
e Check
ssion error
t this stage
mmunicati
that infor
tances. Thi
eaches its d
section, t
ectivity is
3.23 Layer
he Networ
tation of I
size. (Spu
P address a
of Etherne
e as follo
nsceivers,
iver and se
ata carried
equence is
. Figure 2
igure: 2 T
it is impor
on betwee
ation be i
s situation i
estination t
e IP packet
stablished.
3 (Networ
layer of t
packets. I
geon, 2000
nd 48-bit E
is the Ethe
s: (1) The
2) the 48 b
der respec
in the payl
used to car
shows the l
e Ethernet
ant to unde
two netw
telligently
s handled
he receivin
is then pas
)
e OSI mod
Pv4 uses a
) points ou
thernet add
rnet frame;
Preamble
it Destinati
tfully, (3) t
ad field, (4
ry the resul
atest imple
2 frame S
rstand that
rk nodes at
routed thro
y layer 3, t
node extr
sed up to L
el is respon
IP addres
that ...in
ress. Howe
(Spurgeon
ield is used
on and Sou
e Type/Ve
) the actual
t of the FC
mentation (
ource: (Sp
layer 1 and
any one ti
gh many i
he Networ
acts the IP
ayer 3 the
sible for fo
size of 32
given co
ver it does
, 2000) des
to synchro
ce address
rsion field
Payload D
to aid in
Version 2)
rgeon, 200
layer 2 onl
e, practic
termediar
layer. Wh
acket fro
etwork la
matting, a
bits while I
puter it is
't know the
P a
ribes the e
nise
are the Eth
s used to i
ata and fin
etection of
of the Ethe
0)
y facilitate
l situations
nodes and
en an Ether
the frame
er. This is
dressing a
Pv6 uses a
ware of (it
Ethernet
g e | 10
lements
ernet
dicate
lly (5)
rnet
point to
over
et
here
d
128 bit
s own)
-
8/12/2019 Into the Future With IPv4 or IPv6?
19/104
P a g e | 11
addresses of the other stations on the network ... when first send(ing) a packet (p. 37).
(Postel, 1981b) points out that in an Ethernet system the sending and receiving stations must
know each others Ethernet address. For an IPv4 node to discover the Ethernet address of
neighbouring IPv4 nodes the Address Resolution Protocol (ARP) is used. When connecting
to the Ethernet for the first time a node will send out an IPv4 address request to a special IPv4
broadcast address requesting the Ethernet address of a target node, the intended node will be
the only one to reply to the request, the requested IPv4 address and the Ethernet address are
sent back to the requesting node. This is how IPv4 connectivity is established.(Narten, Nordmark, Simpson, & Soliman, 2007) articulate that for an IPv6 node to
discover the Ethernet address of neighbouring IPv6 nodes the Neighbour Discovery Protocol
(NDP) is used; when connected to the Ethernet for the first time an IPv6 node will send out a
Router Advertisement (RA) message until link-layer addresses of other connected nodes are
learned
3.24 Layer 4 (Transport)
The previous three OSI layers examined connectionless unreliable service between IP
nodes. (Comer, 1999) articulates that layer 4, the transport layer builds reliability into the OSI
system by providing the following services to the upper layers of the OSI model Connection
Orientation, Point-to-Point Communication, Complete Reliability, Full Duplex
Communication, Stream Interface, Reliable Connection Start-up and Graceful connection
Shutdown An example of a protocol in this layer include Transmission Control Protocol
(TCP) (p. 310).
3.25 Layer 5 (Session)
Layer 5 the session layer is all about allowing computer applications to communicate
with each other over the network. (Kozierok, 2005) defines OSI layer 5 as having being
designed to allow devices to establish and manage sessions. In general terms, a session is a
-
8/12/2019 Into the Future With IPv4 or IPv6?
20/104
P a g e | 12
persistent logical linking of two software application processes to allow them to exchange
data over a prolonged period of time (p. 177).
3.26 Layer 6 (Presentation)
Layer 6 the Presentation layer of the OSI model is charged specifically with ensuring
that software applications on different types of computers on the network can communicate
with each other transparently even if they represent information in different formats such as
American Standard Code for Information Interchange (ASCII) or Extended Binary Coded
Decimal Interchange Code (EBCDIC). (Kozierok, 2005) highlights three core responsibilitiesof the presentation layer including translation, compression/decompression and
encryption/decryption... Secure Socket Layer (SSL) encryption of connections to secure
websites is carried out in the presentation layer (p. 179). Any function that the presentation
layer carries out is done when requested by the upper most layer in the OSI model the
Application layer.
3.27 Layer 7 (Application)
Layer 7 the Application layer is where many software applications provide a human
interface or Graphical User Interface (GUI) to the services offered at this layer. When we
look at web pages using a web browser such as Internet Explorer we are using the Hyper Text
Transfer Protocol (HTTP), a service offered by the application layer. Other examples of layer
7 protocols include Domain Name System (DNS) and File Transfer Protocol (FTP).
3.3 Internet Protocol Version 4 (IPv4)
Herein specifies the United States Department of Defence Standard Internet Protocol.
This specification is based on six earlier editions of the Advanced Research Project Agency
(ARPA) Internet Protocol (Postel, 1981b, p. iii).
-
8/12/2019 Into the Future With IPv4 or IPv6?
21/104
P a g e | 13
3.31 IPv4 Addressing
An IPv4 address indicates where a particular network node is. Each IPv4 node has a 32
bit binary address, an example being 01011001110011001111001011011111. To make these
addresses more readable the binary numbers are converted to base ten and are also separated
into octets by dots, an example being 89.204.242.223. Having a 32 bit IPv4 address size
allows up to unique IPv4 addresses to exist on the Internet.
3.32 IPv4 Address Classification
To create an IPv4 address space hierarchy, IPv4 addresses have a network and hostaddress encoded into a single address. This technique divides the 32 bit address along three
specified boundaries; these divisions occur at the 24 bit, 16 bit and 8 bit sections of the IPv4
address. These divisions evolved into classes of addresses that are represented clearly in
figure 3.
Figure 3 IPv4 address hierarchy Source:(Postel, 1981a; Sportack, 2002; Wegner & Rockell,
2000)
3.33 IPv4 Encapsulation & Formatting
Starting with OSI layer 2, the Data Link layer and focusing on the Ethernet system,
figure 4 illustrates how an Ethernet frame encapsulates an IP packet in its payload section.
The IP packet in turn encapsulates a TCP segment which in turn encapsulates data from layer
5, 6 and 7.
-
8/12/2019 Into the Future With IPv4 or IPv6?
22/104
P a g e | 14
Figure 4An Ethernet frame encapsulating Layer 3 and above Source:(Spurgeon, 2000)
According to (Spurgeon, 2000) encapsulation: is the mechanism that allows
independent systems to work together, such as network protocols and Ethernet LANs (p.
36).
Figure 5The IPv4 header Source: RFC 791
The IPv4 packet header is comprised of 15 sections which are shown in figure 5. Each
section has the following function as set out by (Postel, 1981b):
The 4 bit Version field indicates the format of the internet header. The 4 bit Internet
Header Length (IHL) indicates the length of the packet header and thus points to the
beginning of the data. The 8 bit Type of Service field provides an indication of the
abstract parameters of the quality of service desired. The 16 bit Total Length field is the
length of the datagram in totality. The 16 bit Identification field is an identifying value
assigned by the sender to aid in assembling the fragments of a datagram. The 3 bit
Flags field facilitates various Control Flags. The 13 bit Fragment Offset field indicates
where in the datagram this fragment belongs. The 8 bit Time to Live field indicates the
maximum time the datagram is allowed to remain in the internet. The 8 bit Protocol
field indicates the next level protocol used in the data portion of the internet datagram.
-
8/12/2019 Into the Future With IPv4 or IPv6?
23/104
P a g e | 15
The 16 bit Header Checksum field is a checksum on the header only. Since some
header fields change (e.g., time to live), this is recomputed and verified at each point
that the internet header is processed. The 32 bit Source Address is used to identify the
sending station at the IP layer. The 32 bit Destination Address is used to identify the
receiving station at the IP layer. The Options field may appear or not in datagrams. (pp.
11-15)
3.34 IPv4 Datagram Size
As articulated in (Postel, 1981b) the smallest legal datagram size is 576 bytes andadditionally:
The number 576 is selected to allow a reasonable sized data block to be transmitted in
addition to the required header information. The largest datagram size that can be
accommodated is 65,535 bytes. The maximum internet header size is 60 bytes, and a
typical internet header is 20 bytes long, allowing a margin for headers of higher level
protocols. (p. 12)
3.35 IPv4 Maximum Transmission Unit (MTU)
Given that an IPv4 datagram can be encapsulated in a multitude of Data Link layer
technologies such as Ethernet, FDDI and Token Ring, the Maximum Transmission Unit or
maximum datagram size will vary depending on the OSI Layer 2 transmission technology.
(Parker & Siyan, 2002, p. 217) bring together a collection of MTUs and their associated
technologies as illustrated in figure 6.
-
8/12/2019 Into the Future With IPv4 or IPv6?
24/104
Figu
of netw
be able
networ
link. T
A sum
f
F
L
l
i
a
2
indepe
networ
e 6MTU s
3.36 IPv4
s IP packet
orks each
to be brok
. These fra
is process
ary of poi
hen fragm
agment onl
ield, More
ength Field
cation, rel
ternet iden
dress, and
)
eeping in
dent entity
routes; thi
ize compar
ragmentat
s are sent o
uilt on a v
n into sma
gments the
s handled
ts are take
entation oc
y. The fiel
ragments
and Heade
tive to the
ification fi
the protoc
ind that o
and can be
s concept i
isons of La
ion
ut over the
riety of La
ler parts to
n need to b
y the frag
from (Po
urs, some
s which m
lag, Frag
r Checksu
eginning
eld (ID) is
l fields, to
ce an IP pa
directed se
s called dat
er 2 techn
Internet th
er 2 techn
overcome
reassembl
entation
tel, 1981b)
options are
y be affect
ent Offset,
... The Fra
f the origi
sed togeth
dentify da
cket has be
parately fr
gram inde
logies Sou
y will have
logies, the
ifferent M
ed in seque
echanism i
illustrates
copied, but
ed by frag
Internet H
gment Off
al un-frag
er with the
agram frag
en fragme
m its siste
endence a
rce: (Park
to traverse
efore an I
TU sizes e
nce at the
IPv4.
ow fragm
others re
entation i
ader Leng
et field ide
ented data
source and
ents for r
ted each fr
fragments
outlined i
P a
r & Siyan,
a diverse
packet ne
countered
ther end o
ntation wo
ain with th
clude: Opt
h Field, To
tifies the f
gram... The
destination
assembly.
gment bec
over differ
(Postel, 1
g e | 16
2002)
ixture
ds to
n each
the
rks:
first
ons
tal
agment
(pp. 23-
omes an
nt
81b).
-
8/12/2019 Into the Future With IPv4 or IPv6?
25/104
P a g e | 17
3.37 IPv4 Delivery & Routing
To quote (Hall, 2000) IPv4 is responsible only for getting datagrams from one host to
another, one network at a time (p. 32). Explaining the delivery and routing process of IPv4
is best done through an example. Figure 7 depicts two separate IP networks joined via a
router. Each network has two IPv4 enabled hosts. Computers A and C have direct
connections to each other eliminating the need to route data through the router, the same goes
for computers B and D. If communication is required between network 1 and network 2 then
the router acts as an intermediary between the communicating parties.
Figure 7IP Routing and Delivery between networks
Each host on the network keeps track of simple routes to neighbouring hosts in a file
called a route table. In order for IPv4 to discover the Ethernet address of a remote node the
Address Resolution Protocol (ARP) is used. Once Layer 2 & 3 connectivity is established a
small list of IPv4 addresses and their corresponding Ethernet address are stored on each host
in the ARP cache (Hall, 2000).
-
8/12/2019 Into the Future With IPv4 or IPv6?
26/104
P a g e | 18
3.38 IPv4 Multicasting
IP multicasting is a specialised form of broadcasting where IP packets are sent to a
select number of hosts who have indicated they want to receive multicast transmissions. IP
multicasting is built on a special range of IP addresses; according to the Internet Assigned
Numbers Authority (IANA) the multicast address space occupies the range 224.0.0.0 to
239.255.255.255. (Goncalves & Niles, 1999)articulate the following points about IP
multicasting:
In a unicast environment a node only has the ability to send to one other node at a time.In a multicast environment, a node can efficiently send a single packet of information to
multiple destination nodes in one operation. A node's operating system and TCP/IP
stack must support IP multicasting for the node to participate in multicastingIP
multicasting... creates a single stream of data to which users subscribe... IP Multicast
reduces bandwidth demands by carrying only one instance of the data to multiple
destinations (pp. 92-120)
For IP multicasting to work, routers, switches and hosts must be running the Internet
Group Management Protocol (IGMP). (Fenner, 1997) describes how this protocol works:
IGMP is used by IP hosts to report their multicast group memberships to neighbouring
multicast routers. Multicast routers use IGMP to learn which groups have members on
each of their attached physical networks. A multicast router (in turn) keeps a list of
multicast group memberships for each attached network. (pp. 1-3)
This concludes the section on IPv4. The next chapter covers a protocol that started
development in 1996 and as of now the year 2010 organisations have already deployed this
new version of Internet Protocol called IPv6. This protocol has a lot in common with IPv4
but it also brings new features that are still under analysis by engineers and scientists.
-
8/12/2019 Into the Future With IPv4 or IPv6?
27/104
P a g e | 19
3.4 Internet Protocol Version 6 (IPv6)
Here in specifies an Internet standards track protocol for the Internet community, and
requests discussion and suggestions for improvements. Specifically version 6 of the Internet
Protocol (IPv6) is also sometimes referred to as IP Next Generation or IPng (Deering &
Hinden, 1998).
3.41 IPv6 Addressing
In IPv6, multiple IPv6 addresses can be assigned to a network interface; in turn
multiple interfaces can be part of a network node. Each IPv6 address has a 128 bit binaryaddress, an example being 100000000000011110111000011000100000000000000000
000000000000000011000001000000011101101100111001. To represent these addresses in
a manageable form they are converted to hexadecimal and are also separated into eight 16 bit
blocks separated by colons; converting the binary address above produces the following IPv6
address 2001:770:18:2::c101:db39. Due to its 128 bit address length the IPv6 protocol is able
to provide unique addresses.
3.42 IPv6 Address Classification
Figure 8 IPv6 unicast address allocation Source: (Hinden & Deering, 2006)
The first type of IPv6 unicast addressing is called Link-Local unicast addressing; this
type of IPv6 address is assigned to a physical interface at Layer 3 (Hinden & Deering, 2006)
present the following points and figure 8 to note on IPv6 Link-Local unicast addressing:
(A Link-Local unicast address is an) identifier for a single interface. All interfaces
are required to have at least one Link-Local unicast address. A single interface may
-
8/12/2019 Into the Future With IPv4 or IPv6?
28/104
a
L
s
p
a
fi
i
T
of IPv6
hierarc
an iden
address
so have m
ocal addres
ch as auto
esent R
dresses to
gure 9)
terface. (p
he next typ
packets an
ically-stru
tifier of a li
of the inte
3.43 IPv6
Fig
Figure
Figur
ltiple IPv6
ses are des
atic addre
uters must
other links
here the i
. 5-11)
e of IPv6 a
d illustrate
tured) val
nk within t
face as out
ncapsulati
re 11IPv6
9 Link-loc
10 Global
addresses
gned to be
ss configur
not forwar
Link-Lo
terface ID
dress is th
in figure 1
e assigned
e site, and
lined by (H
on and For
encapsulat
l unicast a
unicast ad
f any type
used for ad
ation, neig
any pack
al address
s (usually
global un
0. The glo
to a site (a
the interfa
inden & D
matting
ion Source:
dress Sour
ress Sourc
(unicast, a
dressing o
bour disco
ts with Lin
s have the
rafted) fro
cast addres
al routing
cluster of s
e ID is usu
ering, 200
(Deering
ce: (Hinde
e: (Hinden
ycast, and
a single li
ery, or wh
k-Local so
following
the MA
s used for
refix is a (
bnets/link
ally crafted
).
Hinden, 1
& Deerin
& Deering,
P a
ulticast)
k for purp
en no route
rce or dest
ormat (as p
address of
very day r
typically
s), the subn
from the
998)
, 2006)
2006)
g e | 20
Link-
ses
rs are
nation
er
the
uting
et ID is
AC
-
8/12/2019 Into the Future With IPv4 or IPv6?
29/104
P a g e | 21
IPv6 is encapsulated in Layer 2 in much the same way as IPv4; however the IPv6
header and optional header extensions take up more space, 20 bytes for IPv4 compared to 40
bytes for IPv6. Figure 11 illustrates a TCP segment encapsulated in an IPv6 packet in turn the
IPv6 packet is encapsulated in an Ethernet V2 frame.
A major difference between IPv4 and IPv6 is the structure and format of the IPv6
packet header; (Deering & Hinden, 1998) specification for the IPv6 header is as follows:
The 4 bit Version field contains the Internet Protocol version number, 4 or 6. The 8 bit
Traffic Class field enables a source to identify the desired delivery priority of itspackets, relative to other packets from the same source. The 20 bit Flow Label field is
used to tag a sequence of packets that should receive special treatment from routers.
The 16 bit Payload Length field indicates the length of the payload data including the
extension headers. The 8 bit Next Header field identifies the type of header
immediately after the IPv6 header. The 8 bit Hop Limit field is used to control how
many nodes a packet can pass through. The 128 bit Source Address field contains the
address of the originator of the packet and the 128 bit Destination Address contains the
address of the intended recipient of the packet. (p. 4)
The IPv6 header along with four currently specified extension headers are illustrated in
figure 12, where the specifics of the extension headers are defined by (Deering & Hinden,
1998) as follows:
The Hop-by-Hop Options header is used to carry optional information that must be
examined by every node along a packet's delivery path. The Hop-by-Hop Options
header is identified by a Next Header value of 0 in the IPv6 header The Destination
Options header is used to carry optional information that need be examined only by a
packet's destination node(s). The Destination Options header is identified by a Next
Header value of 60 in the immediately preceding header The Routing header is used
-
8/12/2019 Into the Future With IPv4 or IPv6?
30/104
P a g e | 22
by an IPv6 source to list one or more intermediate nodes to be "visited" on the way to a
packet's destination. The Routing header is identified by a Next Header value of 43 in
the immediately preceding header The Fragment header is used by an IPv6 source to
send a packet larger than would fit in the path MTU to its destination. (Unlike IPv4,
fragmentation in IPv6 is performed only by source nodes, not by routers along a
packet's delivery path). The Fragment header is identified by a Next Header value of 44
in the immediately preceding header. (pp. 11-23)
Figure 12IPv6 Header and Extension headers Source: (Deering & Hinden, 1998)
3.44 IPv6 Datagram Size
(Deering & Hinden, 1998) specify that IPv6 has a minimum datagram size of 1280
bytes. In Ethernet systems it is recommended that the minimum IPv6 datagram size be 1500bytes. If IPv6 undergoes translation to IPv4 where the legal minimum datagram size is 576
bytes, IPv6 systems are allowed to reduce their payload size to 1232 bytes which allows
space for the 40 byte IPv6 header and 8 byte fragmentation header. Given that the payload
length field in the IPv6 header is 16 bits long it is capable of carrying up to 65,535 bytes of
data. (Borman, Deering, & Hinden, 1999) stipulate an addition to IPv6 called Jumbo-grams;
these are packets with a payload larger than 65,535 bytes. Jumbo-grams are achieved through
-
8/12/2019 Into the Future With IPv4 or IPv6?
31/104
P a g e | 23
the use of an extension header that uses a 32 bit payload length field allowing the field to
address up to 4,294,967,295 bytes of data. Obviously different networking equipment
supports different datagram sizes so as data travels over links of varying capacity the
maximum throughput is determined by the Maximum Transmission Unit (MTU) of the entire
link.
3.45 IPv6 Maximum Transmission Unit (MTU)
(McCann, Deering, & Mogul, 1996) recommend thatevery link in an IPv6 internet
have an MTU of 1280 bytes and where data-grams may need to be encapsulated an MTUconfiguration of 1500 bytes is recommended. If packets larger than the link MTU need to be
sent, packet fragmentation may be used but in the interests of optimum performance packet
fragmentation is very much discouraged in IPv6.
3.46 IPv6 Fragmentation
If and when fragmentation is required the fragmentation extension header is used (as
shown in figure 12) by an IPv6 source to send packets that are larger than the path MTU,
however unlike IPv4, fragmentation in IPv6 is performed only by source nodes, not by
routers along a packet's delivery path (Deering & Hinden, 1998).
3.47 IPv6 Delivery & Routing
The delivery and routing methodology in IPv6 is quite different from its predecessor
IPv4. When IPv6 nodes connect to the network for the first time they configure themselves
with a Link-local unicast address; they then instigate the Neighbour Discovery Protocol.
Nodes (hosts and routers) use Neighbour Discovery to determine the link-layer addresses
(Layer 2) for neighbours known to reside on attached links. Hosts also use Neighbour
Discovery to find neighbouring routers that are willing to forward packets on their behalf. As
previously discussed the IPv6 header contains a source address and a destination address,
IPv6 also makes use of a routing extension header that an IPv6 source can use to list one or
-
8/12/2019 Into the Future With IPv4 or IPv6?
32/104
P a g e | 24
more intermediate nodes to be "visited" on the way to a packet's destination. All of this
addressing data is supplied and kept up to date by Neighbour Discovery Protocol (Deering &
Hinden, 1998; Narten, et al., 2007).
3.48 IPv6 Multicast
Figure 13 IPv6 Multicast address format Source: (Hinden & Deering, 2006)
There are three types of addressing in IPv6, unicast, anycast and multicast. Researchers
(Hinden & Deering, 2006) define anycast and multicast addressing as follows:
Anycast (is) an identifier for a set of interfaces (typically belonging to different nodes).
A packet sent to an anycast address is delivered to one of the interfaces identified by
that address (the "nearest" one, according to the routing protocols' measure of distance).
Multicast (is) an identifier for a set of interfaces (typically belonging to different
nodes). A packet sent to a multicast address is delivered to all interfaces identified by
that address. (p. 2)
IPv6 multicast addresses are in the following range FF00::/8, anycast addresses are
taken from the unicast address pool which includes every other address except ::/128,
::1/128, FF00::/8 and FE80::/10. Figure 13 shows the IPv6 multicast address format where a
group of Internet multicast servers could be assigned the group ID of 101Hex, resulting in an
address of the following format, FF0E:0:0:0:0:0:0:101 (Hinden & Deering, 2006). A final
point to note on IPv6 multicast is that it uses the Multicast Listener Discovery (MLD)
protocol which distinguishes it from IPv4 which uses IGMP.
This section described IPv6 a technology designed to supplant IPv4. During the
transition to IPv6 engineers developed two short term solutions to the IPv4 address depletion
-
8/12/2019 Into the Future With IPv4 or IPv6?
33/104
P a g e | 25
issue, Classless Inter-Domain Routing (CIDR) and Network Address Translation (NAT).
These two technologies were designed to prolong the life of the IPv4 address space however
these technologies have gained first mover advantage over IPv6. These technologies are now
hindering the deployment of IPv6.
3.5 Future Proofing IPv4
In 1996 the development of IPv6 began with the view that this technology would be a
long term solution to the IPv4 address depletion problem. As a stop gap short term solution
Variable Length Subnet Masking (VLSM), Classless Inter-Domain Routing (CIDR) andNetwork Address Translation (NAT) were developed to help slow the depletion of IPv4
addresses. These technologies have gone a long way to future proofing IPv4 even in the face
of what is perceived and engineered to be a better protocol, IPv6.
3.51 IPv4 Sub-netting or Fixed-Length Subnet Masks (FLSM)
From the outset it is important to distinguish between a network mask and a sub-
network mask. A network mask is used to identify the network portion of an IPv4 address;
there are three IPv4 network masks (255.0.0.0), (255.255.0.0) and (255.255.255.0) which are
applied to /8, /16 and /24 (CIDR notation) networks respectfully. Network masks must also
occur along octet boundaries of the IPv4 address.
A sub-network mask is a 32-bit binary number; a sub-network mask is structurally
similar to an IP address however a sub-network mask is not routable, nor does it have to be
unique. The mask is used to tell end systems in the network how many bits of the IP address
are used for network and sub-network identification. These bits are called the extended
network prefix. The remaining bits identify the hosts within the sub-network. The bits of the
extended network prefix that identify the network mask and the sub-network mask are set to
1s and the host bits are set to 0s. For example, a dotted-binary mask of
(11111111.11111111.11111111.11000000) equates to (255.255.255.192) in dotted-decimal
-
8/12/2019 Into the Future With IPv4 or IPv6?
34/104
P a g e | 26
notation (Parker & Siyan, 2002; Sportack, 2002). Fixed Length Subnet Masking still
produces wastage of IPv4 addresses; a further refinement of FLSM is covered in the next
section.
3.52 IPv4 Variable Length Subnet Mask (VLSM)
To reduce IPv4 address wastage (Parker & Siyan, 2002) articulate that instead of using
one subnet mask to carve up an address space, one should use many subnet masks all of
varying sizes (p. 78). To illustrate this point, consider an organisation that has two separate
subnets each with a 22 bit extended network prefix; the organisation wants to join thesenetworks via a third point-to-point network. Applying a 22 bit FLSM to the point-to-point
link would be quite wasteful of IP addresses but with VLSM the organisation can deploy a 30
bit extended network prefix, this uses only four IP addresses where one is used on each side
of the link and the remaining two are used for the network and broadcast addresses
respectfully. VLSM solved some of the IPv4 address wastage but at the same time it helped
to contribute to the ballooning in the size of routing tables on network routers (Sportack,
2002). This is one of the reasons why the next addressing system Classless Inter-Domain
Routing (CIDR) was developed.
3.53 IPv4 Classless Inter-domain Routing (CIDR)
Classless Inter-domain Routing (CIDR) looks similar to VLSM, the difference being
that the subnet mask used in VLSM is not routable and only has significance on the local
network. There is also a CIDR notation for writing IP addresses such as the following
194.45.20.10/26where the/26 indicates that 26 bits are used to identify the network portion
of the IP address, also in CIDR addressing, the network mask is routable which allows for IP
address aggregation and super-netting where super-netting allows multiple smaller networks
to be advertised to the internet as a single larger network (Sportack, 2002). So having
-
8/12/2019 Into the Future With IPv4 or IPv6?
35/104
P a g e | 27
discussed the various addressing techniques, it is important to note that CIDR is now the de
facto standard in routing protocol design.
3.54 Network Address Translation (NAT)
Figure 14Network Address Translation (NAT)
In 1994 a proposal to deploy Network Address Translation (NAT) was made and as it
was seen by (Egevang & Francis, 1994) The... problems facing the IP Internet are IP address
depletion, and scaling in routing. It is possible that CIDR will not be adequate to maintain the
IP Internet... (however) another short-term solution, address reuse... complements CIDR or
even makes it unnecessary (p. i). An illustration of NAT along with the associated private IP
addresses ranges is shown in figure 14.There are two flavours of NAT the first type known as
Traditional or Basic NAT is described by (Srisuresh & Egevang, 2001) as follows:
A domain with a set of private network addresses could be enabled to communicate
with external networks by dynamically mapping the set of private addresses to a set of
globally valid network addresses. If the number of local nodes are less than or equal to
the number of addresses in the global set, each local address is guaranteed a global
address to map to. Otherwise, nodes allowed to have simultaneous access to external
network are limited by the number of addresses in the global set. Individual local
addresses may be statically mapped to specific global addresses to ensure guaranteed
-
8/12/2019 Into the Future With IPv4 or IPv6?
36/104
P a g e | 28
access to the outside or to allow access to the local host from external hosts via a fixed
public address. (pp. 2-3)
3.55 Network Address Port Translation (NAPT)
Figure 15Network Address Port Translation (NAPT)
The second flavour of NAT is called Network Address Port Translation (NAPT) and its
key difference from NAT is that tuples of Private Network addresses and TCP/User
Datagram Protocol (UDP) ports are mapped to a single Globally valid tuple of IP address and
TCP/UDP port number as illustrated in figure 15 (Srisuresh & Egevang, 2001). The features
of NAPT are outlined by (Srisuresh & Egevang, 2001) as follows: (1) Inbound access for
services such as DNS need to be statically mapped to a local node. (2) Sessions other than
TCP, UDP and ICMP are not permitted to pass from local nodes to the internet facing side of
the NAPT box. (3) During outbound translation IP packets have their Source Address and
Checksum modified and during inbound translation IP packets have their Destination
Address and Checksum modified. (4) TCP and UDP headers also undergo modification
particularly the TCP/UDP source port on outbound packets and the TCP/UDP destination
port for inbound packets.
-
8/12/2019 Into the Future With IPv4 or IPv6?
37/104
P a g e | 29
In summary this section looked at technologies that have been developed to prolong the
life of IPv4. As IPv6 gains more approval globally the Internet will striate into two realms for
users who are communicating with IPv4 and those who are using IPv6. It is predicted that
these two realms will exist in parallel for decades to come so a bridging mechanism needs to
be built between these two protocols to prevent further striation. These bridging mechanisms
are the subject of the next section.
3.6 Parallel Internets IPv4 & IPv6
To aid the proposed transition from IPv4 to IPv6 end users will undoubtedly use one ofthe many transition mechanisms including dual stack tunnelling and translation. This usage
should of course appear transparent to the end user but questions abound at technical
management level as to what transition mechanism to use, where to use it and for how long.
The first mechanism to be examined will be that of the dual IP stack.
3.61 Dual Stack IPv4 & IPv6
Figure 16Dual stack IPv4 & IPv6 Source: (Amoss & Minoli, 2008)
According to (Amoss & Minoli, 2008) in the dual-stack scheme:
A network node incorporates both IPv4 and IPv6 protocol stacks in parallel where IPv4
applications use the IPv4 stack and IPv6 applications use the IPv6 stack. Flow
-
8/12/2019 Into the Future With IPv4 or IPv6?
38/104
P a g e | 30
decisions in the node are based on the IP header Versionfield for packets that are
received from the lower layers, a Versionfield value of 4 results in passing the IP
protocol data unit to the IPv4 layer and a Version field value of 6 results in passing the
IP protocol data unit to the IPv6 layer. When sending packets, the destination address
type received from the upper layers determines the appropriate stack. (p. 109)
(Nordmark & Gilligan, 2005) asserts that in a Dual-stacked configuration IP address
acquisition is more complicated because nodes may be configured with both IPv4 and IPv6
addresses. Dual-stacked nodes use Dynamic Host Configuration Protocol (DHCP) to acquiretheir IPv4 addresses, and stateless address auto-configuration and or DHCPv6, to acquire
their IPv6 addresses (p. 4). The dual-stacked node is represented in Figure 16.
3.62 IPv6 Tunnelling
IPv6 tunnelling is carried out to allow connectivity between IPv6 networks that are
separated by IPv4 only network infrastructure, (Beijnum, 2006) outlines this process and
suggests that:
A tunnel is a mechanism whereby one protocol is encapsulated into another protocol to
be transported through a part of the network where the original protocol wouldnt
normally be supported or would have been processed in some undesirable way.
Tunnelling IPv6 in IPv4 is usually done by simply adding an IPv4 header before the
IPv6 packet. The resulting packet is then forwarded to the destination address listed in
the IPv4 header. At this destination, the outer header is stripped away, and the packet is
processed as if it had been received over a regular IPv6-enabled interface. (p. 33)
3.63 Transmission of IPv6 over IPv4 Domains (6over4)
According to (Carpenter & Jung, 1999) 6over4 is a: method to allow isolated IPv6
hosts, located on a physical link which have no directly connected IPv6 router, to become
fully functional IPv6 hosts by using an IPv4 domain that supports IPv4 multicast as their
-
8/12/2019 Into the Future With IPv4 or IPv6?
39/104
P a g e | 31
virtual local link (p. 1). According to many sources including (Beijnum, 2006) 6over4 is
greatly limited in its deploy ability due to its dependence on IPv4 multicast infrastructure
which is not ubiquitous on the internet. Some technical parameters outlined by (Carpenter &
Jung, 1999) provide an insight into 6over4: (1) The default MTU size for IPv6 packets on an
IPv4 domain is 1480 octets; (2) IPv6 packets are transmitted in IPv4 packets with an IPv4
protocol type of 41 (indicating IPv6 encapsulation); (3) The 6over4 interface identifier is
formed by appending zeros to the left of the IPv4 address until the interface ID is 64 bits
long; (4) The IPv6 link-local address is created by appending the interface ID to FE80::/16;(5) The 6over4 infrastructure must be restricted to the multicast address block
239.192.0.0/16.
3.64 Transmission of IPv6 Domains to IPv4 Clouds (6to4)
6to4 allows IPv6 sites to communicate with other IPv6 sites that are separated by IPv4
infrastructure. (Beijnum, 2006)illustrates the mechanics of 6to4 as follows: (1) every system
that holds a valid, routable IPv4 address can automatically create a 6to4 prefix for itself by
combining its IPv4 address with the 16-bit value 2002 (hexadecimal)... (2) When a 6to4
capable system wants to send a packet to another 6to4 capable system, it encapsulates the
IPv6 packet in an IPv4 packet and addresses this packet to the IPv4 address encoded in the
6to4 destination address. Upon reception, the destination IPv4 host removes the IPv4 header
and continues to process the IPv6 packet. (3) Communication between the 6to4 world and the
regular IPv6 Internet is facilitated by relays... RFC 3068 defines 192.88.99.1 as a 6to4
anycast relay router address... People who run a public 6to4 relay announce to the rest of the
world that theyre prepared to handle traffic toward the IPv4 prefix 192.88.99.0/24 and the
IPv6 prefix 2002::/16. This way, packets automatically find their way to one of the relays
without the need for any relay-specific configuration.
-
8/12/2019 Into the Future With IPv4 or IPv6?
40/104
P a g e | 32
3.65 ISATAP Intra-Site Automatic Tunnel Addressing Protocol
ISATAP is similar to 6to4 but as (Hagen, 2006) communicates The Intra-Site
Automatic Tunnel Addressing Protocol (ISATAP) is designed to provide IPv6 connectivity
for dual-stack nodes over an IPv4-based network (p. 256). An advantage to ISATAP is that
it does not require an IPv4 multicast infrastructure, but it does require that all participating
nodes support ISATAP (Templin, Gleeson, & Thaler, 2008).
3.66 Teredo Tunnelling
Teredo Tunnelling is used to allow communication between IPv6 nodes that are behindone or more NAT devices. This technique encapsulates IPv6 packets in IPv4 payloads and
then communicates via User Datagram Protocol (UDP) through the NAT device. The
designers of the Teredo service stipulate that it be used as a last resort and canvas that clients
should priorities the use of IPv6 provided natively or via 6to4 (Huitema, 2006).
In summary this section looked at a variety of transition mechanisms that it is hoped
will expedite the adoption of IPv6. Elements of IPv6 are still in research and the same can be
said of the transition mechanisms. Today IPv4 still carries the over whelming majority of
network traffic and if organisations start to move to IPv6 we may see performance issues
arise with the transition mechanisms or they may prove to be very robust, only time will tell.
3.7 Mobile IP
In non mobile networks each attached device is assigned an IP address either statically
or dynamically such that the device is managed in a controlled and predictable fashion. When
it comes to mobile networks, devices roam constantly between different network segments
which require an IP address change at each network boundary.
3.71 Mobile IPv4
To extend the original IP specification to facilitate mobility the mobile IP network is
built around four components as defined by (Helal et al., 2002): (1) Mobile Node (MN) is a
-
8/12/2019 Into the Future With IPv4 or IPv6?
41/104
P a g e | 33
host or a router that changes its point of attachment to the network from one sub network to
another; (2) Home Agent (HA) is a mobile-IP capable router on the mobile nodes home
network. The HA maintains the location information for the mobile node; (3) Foreign Agent
(FA) is a mobile-IP capable router that the mobile node has visited. After attaching to the
foreign network, the mobile node is required to register itself with the FA who then provides
a Care Of Address (COA) to the MN; (4) Corresponding Node (CN) is any other party that
wishes to make contact with the MN. Scholars (Helal, et al., 2002) describe the mechanics of
mobile IPv4 in the following account:The mobility agents (HA and FA) in the network broadcast their availability through
agent advertisement packets. The mobile node, after connecting to a network, receives
information about the mobility agents through the agent advertisement broadcasts... The
mobile node determines the network it is attached to. If it is connected to the home
network, it operates without mobility services.... If the mobile node is attached to a
foreign network, a care-of-address (extra IP address) is obtained from the FA. The
mobile node operating from a foreign network registers itself with its home agent. The
foreign agent then acts as a relay in this registration process. When the mobile node is
away from its home network, datagrams destined to the mobile node are intercepted by
the home agent, which then tunnels these datagrams to the mobile nodes care-of-
address... In the latter case, the mobile node obtains a temporary IP address on the
foreign agent network to be used for forwarding... The datagrams originating from the
mobile node are routed... (from the foreign agent back to the home agent). (pp. 103-
104)
Call routing in mobile IPv4 is illustrated in figure 17 where data is routed between the
MN and the CN via a tunnel established between the FA and HA.
-
8/12/2019 Into the Future With IPv4 or IPv6?
42/104
P a g e | 34
Figure 17Mobile IPv4 operation
3.72 Mobile IPv6
Drawing from the many years of experience with mobile IPv4 engineers built mobile
IPv6 with similar features but with a lot of added functionality too. In their mobile IPv4 and
mobile IPv6 comparison table (Johnson, Perkins, & Arkko, 2004) explain the differences
between these two technologies as follows:
a. There is no need to deploy special routers as "foreign agents", as in mobile IPv4;mobile IPv6 operates in any location without any special support required from the
local router; support for route optimization is a fundamental part of the protocol,
rather than a nonstandard set of extensions,
b. Mobile IPv6 route optimization can operate securely even without pre-arrangedsecurity associations; it is expected that route optimization can be deployed on a
global scale between all mobile nodes and correspondent nodes,
c. Support is also integrated into mobile IPv6 for allowing route optimization to coexistefficiently with routers that perform "ingress filtering",
d. The IPv6 Neighbour Un-reach ability Detection assures symmetric reach abilitybetween the mobile node and its default router in the current location,
-
8/12/2019 Into the Future With IPv4 or IPv6?
43/104
P a g e | 35
e. Most packets sent to a mobile node while away from home in mobile IPv6 are sentusing an IPv6 routing header rather than IP encapsulation, reducing the amount of
resulting overhead compared to mobile IPv4,
f. Mobile IPv6 is decoupled from any particular link layer, as it uses IPv6 NeighbourDiscovery instead of ARP; this also improves the robustness of the protocol,
g. The use of IPv6 encapsulation (and the routing header) removes the need in mobileIPv6 to manage "tunnel soft state",
h.
The dynamic home agent address discovery mechanism in mobile IPv6 returns asingle reply to the mobile node; the directed broadcast approach used in IPv4 returns
separate replies from each home agent.
(pp. 5-6)
(Johnson, et al., 2004) assert the modus operandi of mobile IPv6 as follows:
A mobile node is always expected to be addressable at its home address, whether it iscurrently attached to its home link or is away from home. The "home address" is an IP
address assigned to the mobile node within its home subnet prefix on its home link...
While a mobile node is attached to some foreign link away from home, it is also
addressable at one or more Care Of Addresses (COA). A care-of address is an IP
address associated with a mobile node that has the subnet prefix of a particular foreign
link. The mobile node can acquire its care-of address through conventional IPv6
mechanisms, such as stateless or state full auto-configuration... The association
between a mobile node's home address and care of address is known as a "binding" for
the mobile node. While away from home, a mobile node registers its primary care-of
address with a router on its home link, requesting this router to function as the "home
agent" for the mobile node... Any node communicating with a mobile node is referred
-
8/12/2019 Into the Future With IPv4 or IPv6?
44/104
P a g e | 36
to as a "correspondent node" of the mobile node... There are two possible modes for
communications between the mobile node and a correspondent node. The first mode,
bidirectional tunnelling, does not require mobile IPv6 support from the correspondent
node and is available even if the mobile node has not registered its current binding with
the correspondent node. Packets from the correspondent node are routed to the home
agent and then tunnelled to the mobile node. Packets to the correspondent node are
tunnelled from the mobile node to the home agent ("reverse tunnelled") and then routed
normally from the home network to the correspondent node. In this mode, the homeagent uses proxy Neighbour Discovery to intercept any IPv6 packets addressed to the
mobile node's home address... on the home link. Each intercepted packet is tunnelled to
the mobile node's primary care-of address. This tunnelling is performed using IPv6
encapsulation. The second mode, "route optimization", requires the mobile node to
register its current binding at the correspondent node. Packets from the correspondent
node can be routed directly to the care of address of the mobile node... Routing packets
directly to the mobile nodes care of address allows the shortest communications path to
be used... When routing packets directly to the mobile node, the correspondent node
sets the Destination Address in the IPv6 header to the care of address of the mobile
node... Similarly, the mobile node sets the Source Address in the packet's IPv6 header
to its current care-of address. (pp. 13-14)
Call routing in mobile IPv6 is illustrated in figure 18 where data can take one of two
routes between the MN and the CN, the first being through the bidirectional tunnel from MN
to HA or the second route via the MNs COA on the foreign network direct to the CN, where
the second method is known as route optimisation.
-
8/12/2019 Into the Future With IPv4 or IPv6?
45/104
P a g e | 37
Figure 18Mobile IPv6 call processing
3.8 Chapter Summary
In summary this chapter looked at mobile IP from the perspective of IPv4 and IPv6.
The issue of IPv4 address depletion effects mobile networks to the same extent as wired
networks; this has lead to the use of NAT devices on mobile networks which effects network
performance; IPv6 may fix some issues but its adoption on mobile networks is quite slow.
The next chapter look at extracting performance parameters from the research literature in a
technique known as aLiterature Analysis.
-
8/12/2019 Into the Future With IPv4 or IPv6?
46/104
P a g e | 38
CHAPTER 4 - LITERATURE ANALYSIS
4.0 Introduction
The literature analysis is undertaken to extract valid performance parameters which are
used by the research community to aid in making performance related comparisons between
IPv4 and IPv6. Based on this approach, the following parameters have been established as
valid indicants for performance comparison: Throughput, Round Trip Time (RTT),
Performance & Operating System Dependence, Application Performance and Scalability.
4.1 Throughput
Starting with a throughput evaluation of IPv4 and IPv6 and examining work carried out
at the Central University of Venezuela; in an effort to alleviate IPv4 traffic congestion issues
(Gamess & Morales, 2007) installed an IPv6 network in parallel with their IPv4 network;
they carried out throughput tests from which they could infer that IPv6 has a lower
throughput than the one shown by IPv4. However the difference is not significant (p. 47). In
other work (Shiau, Li, Chao, & Hsu, 2006) carried out a throughput evaluation of IPv6 and
IPv4 on the Taiwan Advanced Research & Education Network (TWAREN) where
experimental results reveal:
In a real large-scale network, we obtained a minor degradation (roughly2% for TCP) on
IPv6 compared to IPv4 networks because the overhead of the IPv6 address size is more
significant (128 bits and 32 bits respectfully). For example, for a message size of 256
bytes, overhead due to the address size is 6.25% and 1.56% for IPv6 and IPv4 networks
respectively, whereas for a message size of 1408 bytes, overhead drops to 1.13% and
0.28% for IPv6 and IPv4 networks respectively... From the UDP throughput results we
observed that there were very close throughputs for both IPv4 and IPv6 networks in
small message sizes or messages with lower Constant Bit Rate (CBR). However, above
-
8/12/2019 Into the Future With IPv4 or IPv6?
47/104
P a g e | 39
the 512 byte message size... we find that... the IPv4 network yields about 13.7% higher
throughput than the IPv6 network. (p. 3116)
(Shiau, et al., 2006) believe: the Nagle algorithm and the delayed acknowledgement
process in the TCP stack are optimised for IPv4 and thus hinder slightly the performance of
IPv6 (p. 3120).
In throughput tests carried out by (Law, Lai, Tan, & Lau, 2008) where they
downloaded a range of small (1MB) to enormous (100MB) file sizes from dual-stack servers;
they concluded from the throughput tests that: IPv6 throughput is higher than IPv4throughput, especially for large and enormous file download sizes. This can be explained by
the fact that the IPv6 backbone network is less congested compared to the IPv4 backbone
network (p. 5927).
An interesting test using the network simulator (ns-2) to evaluate IPv4/IPv6
deployment over dedicated links (Sanguankotchakorn & Somrobru, 2005) configured an IPv6
network to communicate with an IPv4 network through a Tunnel End Point (TEP) or dual
stacked border router; aggregating VoIP IPv4, Internet traffic IPv4, FTP IPv6 and MEPG-4
IPv6 traffic over a single link they discovered:
IPv6 has better performance than IPv4; especially when the traffic density of IPv6
sessions increases, the bandwidth for IPv6 session increases at the expense of the
decrement of the bandwidth for IPv4 session. On the other hand, as we increase the
traffic density of IPv4 sessions, the bandwidth for IPv4 session does not increase due to
its lower priority, it is apparent that the increment of packet size of IPv6 traffic results
in the increment a little bit of the Mean End-to-End Delay. (p. 248)
Measurements carried out at the Taiwan Advanced Research and Education Network
(TWAREN) by (Wu, Chao, Tsuei, & Li, 2005) revealed that in efficiency tests of the
-
8/12/2019 Into the Future With IPv4 or IPv6?
48/104
P a g e | 40
TWAREN back-bone, IPv4 out preformed IPv6; in tests carried out on their Gigabit Ethernet
network they found that:
The highest throughput for IPv4 UDP packets reached 811Mbps under the no packet
loss condition. The throughput for the IPv6 side was about 715Mbps, which is roughly
88% that of the IPv4 case. The TCP packet test result reached the highest throughput at
859Mbps for IPv4 TCP when the window size was set to 256 Kb. The throughput on
the IPv6 side was about 770Mbps, roughly 89% that of the IPv4 case. (p. 418)
4.2 Round Trip Time (RTT), Jitter & Packet Loss Rate
RTT is the time it takes for a packet to travel from one network node to the next
network node and then return to the original sending node again. Jitter according to (Bates,
2002) is: Jitter (variable delay) is a variation of the inter-packet delivery time introduced by
the processing of each packet across the network, coupled with transmission delay across the
medium (p. 503). Turning now to the research findings of (Shiau, et al., 2006), with regard
to delay jitter for both IPv4 and IPv6 networks they found that:
jitter was below 16ms and also that the higher the Constant Bit Rate (CBR) and the
packet size, the higher the value of delay jitter; when it came to measuring packet loss
rate it was observed that IPv4 and IPv6 had similar rates of loss but note that the loss
rate drops using a combination of low CBR and large packet size, however above a
CBR of 600Mbps both IPv4 and IPv6 experience a packet loss rate of 90%. In their
final test (Shiau, et al., 2006) measured packet round trip time and they found that:
The round trip time of the IPv6 network is always longer than that of the IPv4 network
in any message size category because of the higher header overheads associated with
IPv6 networks (p. 3120).
Researchers based at the Hong Kong Advanced Research Network (HARNET)
evaluated IPv4 and IPv6 using the metrics of; hop count and round trip time; (Law, et al.,
-
8/12/2019 Into the Future With IPv4 or IPv6?
49/104
P a g e | 41
2008) found that hop count tests revealed IPv6 packets had to travel further than IPv4
packets, due to the fact that there are less IPv6 nodes in the world compared to IPv4 nodes.
This is important to remember when next considering the results of their round trip time
experiment; (Law, et al., 2008) found that:
The IPv6 RTTs are higher than the IPv4 RTTs. The average values of the IPv6 RTT
and IPv4 RTT are 403.36ms and 272.78ms respectively... However, due to the fact that
the number of IPv6 nodes and its concentration are lower and less dense compared to
IPv4 nodes, and that the direct link connectivity of the IPv6 networks is lowercompared to IPv4 networks... translates to higher IPv6 RTTs compared to IPv4 RTTs.
(p. 5926)
In a non simulated experiment carried out from the China Education and Research
Network (CERNET) (Wang, Ye, & Li, 2005) collected packet data from 936 IPv4/IPv6 dual-
stacked web servers in 44 countries; they measured packet loss, round trip time (RTT) and
the performance of IPv6-in-IPv4 tunnels. Keeping in mind for (Wang, et al., 2005) that Due
to the development and enormous diversity of the Internet, average packet loss rate in
different studies is reported in a wide range (p. 73). It is interesting to note that this
experiment took measurements across three regions of the internet controlled by Rseaux IP
Europens (RIPE), American Registry for Internet Numbers (ARIN) and Asia Pacific
Network Information Centre (APNIC). For packet loss (Wang, et al., 2005) found that:
The IPv6 and the IPv4 connections have an average packet loss rate of 3.09% and
0.76% respectively. Round-trip time (RTT) is an important parameter to indicate the
quality-of-service of networks. The RIPE nodes cluster into two narrow bands with
IPv6 RTT range approximately from 320ms to 420ms and from 450ms to 550ms (IPv4)
respectively... The ARIN nodes do not have such a notable clustering characteristic as
the RIPE (nodes)... Most of the ARIN nodes are around the unity line (IPv6 RTT= IPv4
-
8/12/2019 Into the Future With IPv4 or IPv6?
50/104
P a g e | 42
RTT). In spite of their small total number, the APNIC nodes have large variance of
RTT values due to their topology diversity also note that, although about 66.7% of the
dual-stack nodes have smaller IPv6 RTTs than IPv4 RTTs, 58.0% of the nodes suffer
larger IPv6 RTT fluctuation (in terms of RTT standard deviation) at the same time. It is
recently believed that tunnels degrade the network performance and reliability. It is
obvious that tunnelling does not seem to introduce notable extra delays. Most tunnelled
IPv6 paths have smaller RTT values than their IPv4 counterparts, and the reductions are
often more than 100ms. (pp. 74-76)In an effort to identify IPv6 network problems in the dual-stacked world (Cho, Luckie,
& Huffaker, 2004) took measurements from three Regional Internet Registries (RIR)s on the
internet APNIC, RIPE and ARIN; ping tests were carried out on 4,086 dual-stacked
IPv4/IPv6 nodes across these three RIRs, tests revealed that of the 4,086 dual-stacked nodes:
about 16% are reachable by IPv4 but not by IPv6 even though they have AAAA records (an
IPv6 DNS entry) and these sites would then force communicating peers to timeout with IPv6
before falling back to IPv4 (p. 285). Of the dual-stacked nodes that did respond to ping tests
(Cho, et al., 2004) found: the majority of the nodes have similar RTT for both IPv4 and
IPv6, a number of individual nodes have IPv6 performance issues specific to the node or the
site (p. 286). When correlating the ratio of IPv6 only to IPv4 only nodes for each RIR, (Cho,
et al., 2004) also found that: ARIN was about 0.23. The low level of IPv6 responding in
ARIN could be the result of the low level of commitment to IPv6 in the US (p. 286). Given
that the metrics of RTT, Jitter and Packet Loss Rate are very particular to each individual
network and therefore cannot be generalised to other cases, these metrics do reveal that the
density of the IPv6 network is a lot lower than the IPv4 network which will have advantages
and disadvantages for the Internet community.
4.3 Performance & Operating System (OS) Dependence
-
8/12/2019 Into the Future With IPv4 or IPv6?
51/104
P a g e | 43
In tests carried out by (Gamess & Morales, 2007) at the Central University of
Venezuela, OS dependency tests on each of the following Windows XP-SP2, Solaris 10 and
Debian 3.1 found that: Windows XP and Debian has similar TCP and UDP throughputs.
Both (Windows XP and Debian) outperform the throughput of Solaris for small TCP and
UDP payload. However, Solaris shows an equal or superior performance for large data (p.
47). In similar work to evaluate IPv4/IPv6 OS dependence on the following operating
systems; Windows XP, FreeBSD 6.1 and Fedora Core 5, (Law, et al., 2008) found: results
show that FreeBSD and Fedora clients obtained similar throughput as each other, theWindows client performed the worst, the Windows client can only obtain at most 50% of the
average download rate of the FreeBSD and Fedora clients (p. 5927).
With a narrower focus on Windows operating systems (Narayan & Yhi, 2009)
examined DNS and game (Counter Strike and Quake 3 Arena) traffic performance on
Windows 7, Windows Vista, Windows XP, Windows 2003 and Windows 2008 where their
results reveal that:
Windows Vista gives the lowest through put for DNS traffic. For IPv6, the newer
operating systems give a higher throughput value. Windows 7 has the highest round trip
time and Windows XP the lowest for DNS traffic. Windows 7 throughput values for
Counter Strike and Quake 3 game traffic is comparatively higher than that of the other
operating systems. Latency values between the operating systems are comparable,
except for Windows Server 2003 these values are much higher than the rest. (p. 4)
In similar work to examine the effect of the operating system on IPv4 and IPv6
(Narayan, Shang, & Fan, 2009) measured throughput, delay, jitter and CPU usage on
the following operating systems Windows XP, Windows Vista, Windows Server 2003 &
Windows Server 2008 and also Linux Fedora and Linux Ubuntu again their results show that:
-
8/12/2019 Into the Future With IPv4 or IPv6?
52/104
P a g e | 44
For packet sizes larger than 256 bytes, IPv4 always gives a slightly better throughput
than IPv6 (consistent with theory). Windows Vista throughput values for most packets
sizes for both TCP and UDP traffic are lower than Linux Ubuntu by up to 5%.... For
TCP traffic, Windows Vista (average) delay is approximately zero but Linux Ubuntu
averages around 500ms, and for UDP Windows Vista delay is approximately 4 times
lower than Ubuntu. Jitter values for Windows Vista are lower than that of Linux
Ubuntu for TCP traffic. For almost all packet sizes, Windows Vista uses more CPU
resources on both the sending and the receiving nodes. TCP and UDP traffic decodinguses more CPU resources in Windows Vista than Linux Ubuntu. (p. 4)
In research to test the IP stack of two Windows operating systems with the same kernel
researchers pitted Windows XP against Windows Server 2003 (Narayan, Kolahi, Sunarto,
Nguyen, & Mani, 2008) tested IPv4 and IPv6 throughput of both systems and found that:
Using TCP and UDP traffic between two nodes for small packet sizes Windows XP and
Server 2003 have a throughput difference of approximately 5%... For large packet size
TCP traffic on Windows Server 2003 shows a difference of 10.4% and UDP traffic on
Windows XP shows 12%. (p. 668)
In a comparison of end systems in particular Windows 2000, Redhat Linux 7.3 and
Solaris 8.0 (Zeadally, Wasseem, & Raicu, 2004) measured throughput, round trip time,
socket creation time, TCP connection time and web client/server simulation; they conclude
that:
IPv6 (as well as IPv4) on Linux outperforms Windows 2000 and Solaris 8 IPv6 (and
IPv4) implementations for all the metrics used... we obtained a minor degradation in
throughput and round-trip latency performances for IPv6 compared to IPv4 on
Windows 200