Verified Document

Transitioning From IPv4 To IPv6 Essay

Transitioning From IPv4 to IPv6 The proposed migration from IPv4 to IPv6 is on in some organizations though some organizations have not put in place measures to ensure the transition. The transition has been initiated since IPv6 offers increased addressing capacity, quality of service provisioning as well as improved routing efficiency. However, shifting from the current platform, IPv4 is not easy given the incompatibility of these two internet protocols. In addition, network specialists have created several technologies and address types to help in the proposed migration. Therefore, this paper describes the IPv6 transition technologies and constraints likely to impede the migration from IPv4 to IPv6 platforms.

Introduction

The proposed protocol transition from IPv4 to IPv6 is quite challenging just like other former transitions in the Internet domain. Protocol transitions involve the installation and configuration of new protocols on all existing nodes within the network and ascertaining that all the nodes and router operations work efficiently. For small and medium organizations, this transition is possible but for large firms, the challenge of making a rapid protocol transition is difficult. Moreover, due to the Internet's magnitude, rapid transitioning from IPv4 to IPv6 may prove to be a tall order (Cheswick & Bellovin, 1994). Proponents of IPv6 are aware the transition from the current IPv4 is likely to take several years and some organizations will continue using IPv4 indefinitely; thus, while the shift is a long-term goal, consideration should be given to co-existence between IPv4 and IPv6 nodes. The only hope to successful migration lies on the compatibility of IPv4 hosts and routers with their successors. In line with this, specialists have initiated several methods to ensure compatibility of IPv4 host and routers with IPv6 host and routers. These approaches range from Dual Stack, Tunneling and Translation among others. Dual Stack involves provision of both IP versions by a single host while Tunneling provides ways of carrying IPv6 packets over unmodified IPv4 routers. According to network specialists, these approaches are vital for the transition and may be implemented based on an organization's preferences. This paper therefore gives a detailed explanation of these methods, the constraints, as well as various techniques and standards necessary for the migration; however, they are a sample of tools required for transition and interoperability between IPv4 and IPv6.

Methodology

In this section, three approaches necessary for the transition from IPv4 to IPv6 will be discussed. In this part, the selected approaches are critically evaluated and compared as well as constraints likely to hinder compatibility between IPv4 and IPv6(Bi et al., 2007). Tunneling is a mechanism whereby IPv6 hosts without a path between them consisting entirely of IPv6-capable routers may be able to communicate by encapsulating IPv6 datagrams within IPv4. For Dual Stack, routers and hosts are configured with both IPv4 and IPv6 implementations to allow them communicate with both types of hosts. Finally, Translation involves configuration of Dual Stack routers and hosts to accept requests from IPv6 hosts, convert them to IPv4 datagrams, send the datagrams to the IPv4 destination and then process the return datagrams similarly.

Dual Stack Approach

Dual Stack provides several methods of assigning temporary IPv4 addresses to IPv6 nodes by using dynamic tunnels within IPv6 hosts to carry IPv4 traffic. In this approach, each node is given both IPv4 and IPv6 addresses to help in relaying data with other IPv4 and IPv6 hosts and routers (Park et al., 2004). Additionally, the nodes are able to send and receive both IPv4 and IPv6 packets and besides, they directly interoperate with IPv4 nodes using IPv4 packets, and as well with IPv6 nodes using IPv6 packets. However, the implementation of Dual Stack is possible for a short period for testing IPv6 applications and initial network deployment, but does not give a solution to lack of IPv4 addresses once IPv6 begins production operations.

Additionally, this approach assists in assigning IPv4 addresses to IPv6 hosts thus allowing IPv6 hosts to interconnect with IPv4-only hosts; besides, other IPv4-only applications are able to run without altering IPv6 hosts. This sharing out process is augmented by dynamic tunneling IPv4 packets inside IPv6 packets to restrict exposure of IPv4 native packets in some sections of the IPv6 network. This makes easy network management of IPv6 deployment because routers require only IPv6 routing tables to move IPv4 packets across an IPv6 network. Data Stack is essential in ensuring the interoperability of newly deployed IPv6 networks with existing IPv4 networks; thus, seeks to minimize chances of delaying IPv6 usage...

Parts of this document are hidden

View Full Document
svg-one

In this regard, the stacks may be operated in three different ways; with the IPv4 enabled and IPv6 disabled; when IPv6 is enabled and IPv4 disabled and with both stacks enabled. Disabling some protocols does not make the stack lose its functionality since nodes with the IPv6 stack disabled operate like IPv4-only nodes while nodes with the IPv4 stacks disabled work as IPv6-only nodes. This is due to the configuration switch provided by then Dual Stack by either disabling the IPv4 or IPv6 stack.
In addition, Dual Stack has DHCPv6 servers integrated with DNS servers that helps in assigning IPv4 addresses to IPv6 interfaces via the use of AIIH servers. By incorporating the services of the DHCPv6, the AIIH server will temporarily assign allocate IPv4 addresses to IPv6 hosts. Moreover, the server is important in maintaining close mapping between the IPv4 address and the host's permanent IPv6 address. Besides, all the IPv6 host are provided with IPv4 interfaces known as dynamic tunneling interface for compress IPv4 packets into IPv6 packets and resolve the address space mechanics between IPv4 and IPv6.

The DNS will be upgraded since the DNS infrastructure is essential for ensuring compatibility of IPv4 and IPv6 due to the use of names as opposed to addresses when referring to network resources. In this regard, records supporting IPv6 name-to-address and address-to-name resolutions will be fed into the DNS servers (Gallaher & Rowe, 2006). After using DNS name query to obtain addresses, the sending node selects addresses to use for communication. The DNS infrastructure for this transition approach contains A records for IPv4 nodes and AAAA for IPv6 nodes. Furthermore, for resolution of addresses to domain names, the DNS will provide; PTR records in the IN-ADDR.ARPA domain for IPv4 nodes and PTR records in the IP6.ARPA domain for IPv6 nodes.

Nonetheless, Dual Stack incorporates two sub-sections, mandatory and optional parts in its functioning. Under the mandatory section, IPv6 nodes are required to fully communicate with IPv4 nodes while the optional part allows IPv4 nodes to transmit data to IPv6 nodes after assigning IPv6 nodes with temporary IPv4 address whenever IPv4 nodes send packets to IPv6 connections.

Tunneling Approach

The integration of IPv6 will be conducted over a period of time and while the platform is being deployed, network administrators argue that the existing IPv4 system is supposed to remain efficient and functional to help in transmitting IPv6 packets. Therefore, it is proposed that tunneling is likely to offer a way of utilizing present IPv4 hosts infrastructure to relay IPv6 traffic. Tunneling also known as IPv6 over IPv4 tunneling is an approach whereby IPv4 tunnel endpoint addresses are pre-determined by configuration data on the encapsulating nodes. Moreover, the tunnels can be either unidirectional or bidirectional; tunnels configured bi-directionally conduct similar roles just like virtual point-to-point links and for all the tunnels; the encapsulating nodes store the tunnels' endpoint addresses.

Whenever an IPv6 packet is under transmission over a particular tunnel, the tunnel's endpoint address undergoes configuration to make the tunnel usable as the destination address for the IPv4 header. As a concern, within the IPv4 header there are two major processes that take place; the IPv4 protocol field is set as 41 an indication of an encapsulated IPv6 packet while the source and destination fields are set to IPv4 addresses of the tunnel endpoints (Bin et al., 2004). Besides, the tunnel's endpoints are either manually configured as part of the tunnel interface or are automatically derived from the next-hop address of the matching route for the destination and the tunneling interface. In line with this, routing information on the encapsulating node usually determines which packets to tunnel which is done via the use of routing tables; the tables are useful in directing packets to their destination address by the use of prefix masks and match techniques.

In the case of IPv6 over IPv4 tunneling approach, the IPv6 path Maximum Transmission Unit (MTU) for the destination is typically 20 less than the IPv4 path MTU for the destination. However, failure to store IPv4's path MTU for each tunnel results to the fragmentation of the IPv4 packet at an intermediate IPv4 router (Choi et al., 2006). As a result of this, the IPv6 over IPv4 tunneled packet is immediately relayed to the Don't Fragment flag within the IPv4 header set at 0. According to RFC articles, there exist three tunneling…

Sources used in this document:
References

Amoss, J.J. & Minoli, D., 2007. Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks. Auerbach Publications.

Bin, D., De-pei, Q., Yi, L. & Peng, Z., 2004. Experimental Research on IPv4/IPv6 Transition Mechanism. Microelectronics & Computer.

Bi, J., Wu, J. & Leng, X., 2007. IPv4/IPv6 Transition Technologies and Univer6 Architecture. International Journal of Computer Science and Network Security, 7(1), pp.232-43.

Chen, J.-L., Chang, Y.-C. & Lin, C.-H., 2004. Performance Investigation of IPv4/IPv6 Transition Mechanisms. In The 6th International Conference on Advanced Communication Technology., 2004.
Cite this Document:
Copy Bibliography Citation

Related Documents

IP Address
Words: 554 Length: 2 Document Type: Term Paper

Private IP Address The use of a private IP address on a business computer network has a number of advantages, one being an improved network security as well as a corporate social responsibility of conserving public addressing space. These IP addresses are commonly used on local networks and are good for businesses that share data as well as voice information. The company's computer network will not connect to the internet with this

Ip Address and Security
Words: 3513 Length: 16 Document Type: Essay

Kris Corporation's parent domain (kris.local) and child domain (corp.kris.local) for the organization's AD infrastructure are running on Server 2008. The following are concerns related to AD: (1) Kris Corporation is concerned about running multiple domains, and (2) automobile manufacturers are asking Kris Corporation to use a single identity to procure orders in real time. The company has five locations in Atlanta (GA), Baltimore (MD), Chicago (IL), Seattle (WA) and San

TCP IP Protocol
Words: 1088 Length: 3 Document Type: Term Paper

TCP/IP Protocol Suite For the average computer user, TCP/IP probably doesn't mean a whole lot, except maybe when it comes to "configuring" their computer so they can get online, but without the TCP/IP protocol, the activity experienced on the Internet up until this point would not be possible. This paper will examine some of the components of the TCP/IP protocol and explore their uses as they apply to relevant parts

Ip Man The Grandmaster and Women in Kung Fu
Words: 4082 Length: 13 Document Type: Essay

Grandmaster and Gong Er: Wong Kar Wai's Ip Man and the Women of Kung Fu Wong Kar Wai's Grandmaster begins with a stylish kung fu action sequence set in the rain. Ip Man battles a dozen or so no-names before doing a one-on-one show with another combatant who appears to be at equal skill and strength. Ip Man handily defeats him and walks away unscathed. Thanks to fight choreography by Chinese

Voice Over IP VOIP Security
Words: 1789 Length: 4 Document Type: Term Paper

Voice over IP (VoIP) Security Voice over Internet Protocol or VoIP refers to making use of telephone services over that of the computer networks. During the first part of the process, the VoIP makes an analog signal which is evolved from the speaker's voice. It is then transferred to a digital signal and further transfers over that of an IP network and this is well inclusive of the Internet. Voice over

China IP China's Intellectual Property Rights Protections
Words: 1981 Length: 7 Document Type: Essay

China IP China's intellectual property rights protections have come a long way since 1978, but there remains room for improvement. While the de jure situation with respect to protecting intellectual property rights approaches Western standards, the enforcement or de facto situation is less encouraging. Western companies have a difficult time enforcing the patchwork of laws and often fail to win judgments significantly large to serve as a deterrent to IP thieves. There

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now