Investigations of using Dual Stack and Tunneling Mechanisms in migration from IPV4 to IPV6:
Abstract
Introduction
Internet protocol written as IP in the short form is the method by which one computer communicates by sending data to another computer over the Internet. Normally, each computer has a unique form of IP address that identifies itself on the internet. Internet protocol has two versions: Internet protocol version 4 and Internet protocol version 6 that is the most current version of IPV6 is an upgrade of IPV4 (Gavrilova 2006). IPV6 has added advantages and therefore necessitates every organization to migrate from IPV4 to IPV6.
Background of the study
The internet protocol version 4 abbreviated as IPV4 is a connectionless protocol
…show more content…
IPV6 is not a rigid IP as it allows for the growth of the internet concerning the number of interconnected computers or hosts and the volume of data transmitted (Kott, Wang, & Erbacher 2014). The primary advantage of the IPV6 over IPV4 is the increase in IP addresses. However, there are other advantages of IPV6 which include: automatic configuration, simplified and more efficient routing, Simpler header format, flow labeling, easier administration, Flexible options and extensions, privacy support and inbuilt authentication and an end to network address translation (Adibi, Mobasher, & Tofigh 2010).
Objective/Aim of the Study
As Zurawski (2005) explains, an organization 's network status and the speed at which they need the IPV4 transition to IPV6 greatly determine the selection of the transition method, the dual-stack method, tunneling method or any available option.
This paper seeks to explore how the transition methods; the dual-stack method and tunneling method works. Businesses with small network devices and bleeding edge technology can promulgate to IPV6 faster compared to businesses with large network devices. Large companies usually have many and large network devices, leading to slow Ipv4 to IPV6 transition process (Jonas, Rai, & Tchuente 2013). Following the multiple benefits resulting from IPV6, it is therefore, important that network practitioners should seek expertise in IPV6 quickly in order to meet
IPv6 is more flexible in using protocols which, are mainly defined as the Request for Comment (RFC) that we discussed in the discussions. Protocols are defined in the RFC, but the name of the protocol will be something like Internet Protocol, Internet Control Message Protocol, Telnet Protocol, and many more. The reason why these Protocols are more flexible in the IPv6 is for one, the IPv6 is a newer technology than the IPv4, and the IPv6 also has more functionality and allows more flexibility in the protocols, whereas the
The popularity of Internet has become ubiquitous and pervasive all over the world. The Internet plays a pivotal role in all walks of human life and has improved the quality of people life and has invaded all sectors like Governmental Organizations, Science and Technology, Business World, Industry and Education. In 1969, the Internet was originated by US Department of Defense (DoD) and Advanced Research Project (ARPANET) using Network Control Program (NCP). Research on packet switching communication methodology resulted in inter-networking of networks in 1981, when the researchers in Great Britain and Norway tried to collaborate with the researchers in US using Internet Protocol (IP). Realizing the importance and advantages of IP, the Internet
Internet Protocol version 4 (IPv4) IPv4 is a connectionless protocol for use on packet-switched networks. It is the fourth version of the Internet Protocol (IP), that is one of the core protocols of standards-based internetworking methods in the Internet. It was the first version deployed for production in the ARPANET in 1983. It still used to routing most Internet traffic today, eventhough we have the next version of it,IPv6.
Primary function of IP protocol = identify individual hosts and groups of hosts using the address
classless interdomain routing (CIDR)- One of the short-term solutions to the IPv4 address exhaustion problem that actually helped solve the problem for a much longer time frame. CIDR allows more flexibility in how many addresses IANA assigns to a
With admirable foresight, the Internet Engineering Task Force (IETF) initiated as early as in 1994, the design and development of a suite of protocols and standards now known as Internet Protocol Version 6 (IPv6), as a worthy tool to phase out and supplant IPv4 over the coming years. There is an explosion of sorts in the number and range of IP capable devices that are being released in the market and the usage of these by an increasingly tech savvy global population. The new protocol aims to effectively support the ever-expanding Internet usage and functionality, and also address security concerns.
The Internet is, quite literally, a network of networks. It is comprised of ten thousands of interconnected networks spanning the globe. The computers that form the Internet range from huge mainframes in research establishments to modest PCs in people's homes and offices. Despite the recent hype, the Internet is not a new phenomenon. Its roots lie in a collection of computers that were linked together in the 1970s to form the US Department of Defense's communications systems. Fearing the consequences of nuclear attack, there was no central computer holding vast amounts of data, rather the information was dispersed across thousands of machines. A set of rules, of protocols, known as TCP/IP was
IPv6 is not a solution for security, however, in light of the fact that few security issues
officially been known as IPv6. In the transition to IPv6, both IPv6 and IPv4 will
The TCP/IP protocols are the heart and soul of the Internet, and they describe the fundamental rules that govern all communications in the network. The original address system of the Internet is Internet Protocol version 4 (IPv4). The Internet Engineering Task Force (IETF) developed IPv6 to deal with the long-anticipated problem of IPv4 address exhaustion. However, IPv6 is not foreseen to supplant IPv4 instantaneously.
The internet matured in the 1970's as a result of the Transmission Control Protocol/Internet Protocol (TCP/IP), which is sill used today. It was adopted by the U.S. Department of Defense in 1980, and universally adopted in 1983. The usage of TCP/IP is what unites all elements of the net. Both public domain and commercial implementations of the roughly one hundred protocols of the TCP/IP protocol suite became available in the 1980's. During the early 1990's, Open Systems Interconnection (OSI) protocol implementations also became available by the end of 1991, the Internet has grown to include some 5,000 networks in over three dozen countries, serving over 700,000 host computers used be over 4,000,000 people. By December 1996, about 627,000 Internet domain names had been registered and now there are more than 30 million registered.
IPv4 addressing is the next method, it’s is split up into two main parts as well Network I.D and Host I.D which are split over four octets which are written as four decimal numbers which have 32 bits, it only contains 4.3billion different IPs. For example, you sent an IP to a website and it sends its IP back, which means you can communicate. Whereas IPv6 addressing has 128 bits and is written as
The two TCP/IP transport layer protocols (TCP and UDP), are very crucial for the smooth operation of network services for both the computer applications and application layer protocols such as HTTP, FTP, SMTP and Telnet. These two transport layer protocols TCP and UDP execute these services via the employment of IP. They use IP in the efficient routing of packets to their respective destination networks (Steinke,2001).The TCP is further noted by Steinke (2001) to be responsible for the provision of a reliable and yet connection-oriented byte-stream packet delivery while its counterpart UDP is noted to be responsible for the provision of a connectionless but rather unreliable packet delivery. In this paper we explain the work of the two TCP/IP transport layer protocols (TCP and UDP). In addition, describe how TCP and UDP manage key functions such as reliability, port addressing, and segmentation.
* Next Generation TCP/IP Stack: this networking feature of windows is available for “Windows Server 2008” and “Windows Vista”. It is a “complete redesign of TCP/IP functionality for both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) that meets the connectivity and performance needs of today 's varied networking environments and technologies.” Joe Davies (2008)
When connecting your internal network to the internet the need route the packets between the two networks happens inside a router. This translation between the two different networks is known as network address translation (NAT). There are advantages when using NAT as well as disadvantages to the end user, network administrators and overall functionality of the network. We also have to understand the differences between IPv4, IPv6, and the need for NAT in each as they are different protocols and will operate differently ("Network Address Translation," 2015).