Each member of a group required to individually conduct a research and write a report IPv6 subnetting and routing characteristics. Not more than 2000 words.
1.Explain IPv6 structure and subnetting
2.Explain different IPv6 routing mechanisms, e.g. stationary nodes to mobile nodes, mobile nodes to mobile nodes and stationary nodes to stationary nodes.
3.Table pros and cons of different routing mechanisms in IPv6-enabled networks.
The main objective of this report includes the highlighting of the concepts and the processes that are related to the IPv6 sub-netting and with routing. The IPv6 protocol is elaborated a specification set and which is an upper version of the IPv4 network. The IPv6 structure has similarities with the IPv4 that has the more variations. The IPv6 is the improved version of the IPv4, the length of the bit is increased in the IPv6 protocol so the capacity of the address is increased (Rehman & Manickam, 2015). The auto configuration method is pre built in the IPv6 protocol and there more security features that are increased. The report will further discuss the sub-netting process and the different mechanism of routing. In the following paragraphs the advantage and the disadvantage of the each routing method will be discussed.
The internet protocol version 6 or the IPv6 is mainly carries the data as a packet that moves from the source to destination. The structure is a lit improved from the structure of the IPv4. The IPv6 can contain large amount of data node than the IPv4. The IPv6 allows the 2128 number of addresses, nodes and combinations. The internet version protocol 6 is released on the year of 2012 in 6th June and it is developed to the format of the hexadecimal (Rehman & Manickam, 2017). The main functions of the IPv6 is broadcasting of the address but it does not store the address of the broadcast. The IPv6 is the most updated version of the internet protocol.
The size of the Ipv6 is 128bit long. The header size of the IPv6 is 40 bytes. The address of the source and the destination address is use 16bytes and the header is left out with 8-bit information that is general. In can be seemed that the header of the IPv6 is simpler from the IPv4 and it allows the information processing to be more efficient. The main advantage of the IPv6 network over the IPv4 which is that the IPv6 has an address space which is larger that is of 128bits and is having space for address of around 212 (Rehman & Manickam, 2015).
The IPv6 protocol address mainly use the 128 bits for the address representation. In this address the bits are used for the subnetting. The subnet structure of the IPv6 is given below.
Figure 1: Representation of the IPv6 subnet
The 16bits of the subnet is similar to the network of class B present in the IPv4. The concept of the IPv6 shares similarities with the length of the variable of the subnet masking. The 128bits is converted to the 32 hex digits in the subnet mask of the IPv6. The IPv6 address model includes the Unicast, multicast and the Anycast. Full length of the of the IPv6 subnet mask use the 8 hex word format that is followed to the IPv6 network. In the IPv6 the first 48 bits are for the routing of the internet and the each of the address are represented by the 8 groups and the each groups will consist of four of the hexadecimal digits (Blumbergs et al., 2016). Each group is separated from each other’s by colons. With the IPv6, each of the device has the ability of creating a local address that is unique and it is based on the MAC address that a particular device is having. The format of the IPv6 is written in such way that the address interpretation gets easier and faster.
Usage of of the IPv6 or Internet Protocol version 6 brings a lot of benefits. Of them, the most significant is the provision that it imposes about the supple routing mechanism. When compared to the IPv4 or the Internet Protocol version 4, it can be seen that it reduces the size of a routing table. Keeping this mechanism in mind, it can be found that the routers that are situated intermediate to them must keep a track on the local portion of the networks. This helps in providing the messages in an appropriate way. However, for this, it is necessary that the IPv6 mechanism discovers the appropriate neighbour. Router advertisement is included in the process of IPv6 process for the discovery of router, solicitation of router, advertisement of neighbour and redirection. Longest match prefix is used during the working of IPv6 routing protocols. RIPng or RIP New Generation, OSPFv3, EIGRP for IPv6, IS-IS for IPv6 andMP-BGP4 are included in the routing protocols that have been backed up by the IPv6 mechanism (Lu, Wang & Huang, 2017).
On the other hand, the mobile to mobile routing helps in incorporating various different processes, which includes the methods of encapsulation and broadcasting. It becomes necessary to follow the methods as these points are having a mobile nature. During the method for encapsulation, there exists the availability of both the nodes (Rehman & Manickam, 2016). Each of the mobile nodes are is able to be identified by the process of the detection of the IP addresses which includes the home address and the other is the IP address. Nevertheless, during the process of routing of the mobile node, the address care gets changed with every new point and the information providing attachment works due to the current position of the mobile node (Chuangchunsong et al., 2014). The routing protocol in this matter uses the discovery of neighborhood of IPv6 to get hold of the neighboring addresses.
In the stationary to stationary routing in the mechanism of IPv6, the configuration of the routing process is done in an similar way to that of an IPv4 mechanism (You & Leu, 2015). This routing protocol, a router is required for the determination of local addresses for the neighboring router for connection establishment. For the stationary to stationary nodes routing, specification regarding the next hop router’s address is to be provided which is to be done by usage of the link local addresses of the router.
These mechanisms provide benefits such as, flexibility, efficiency, reactivity, and easy bug detection. It allows the addresses that belong to the same destination where it is to be transported by a single message.
The routing mechanisms in which the IPv6 is having numerous advantages as well as disadvantages. The major advantages along with the disadvantages have been listed below:
mobile nodes to mobile nodes |
stationary nodes to mobile nodes |
stationary nodes to stationary nodes |
|
Pros |
Enabling of the way so as to establish the paths which is to be used by the network traffic existing between two of the mobile nodes is done by this routing protocol or mechanism in IPv6 |
The routing protocol present in the IPv6 is associate with the creation of the network path between the static node and the mobile node. |
This type of routing protocol is associated with enabling the capability of selecting a path for network traffic which generally exists in between the two stationary or static nodes |
Mobile to mobile Ipv6 routing is generally responsible for the providing of a greater efficiency while a connection is being established between the mobile routers and this is associated with reducing the size of routing tables. |
Mobile to stationary routing protocol is responsible for the providing of offers related to the efficiency while a connection is being made between the static and mobile traffic in a network. |
This is associated with offeringthe simplest network configuration. |
|
This type of routing mechanism can be considered to be internet’s next generation protocol which is having the capability of replacing the protocol that is being used. |
This routing mechanism is associated with ensuring the fact that direction is provided to the data so as to reach the correct destination and also for the purpose of providing and ensuringa proper security of the data which is being transmitted (Alizadeh et al, 2015). |
This type of routing mechanism is associated with ensuring the fact that the traffic in the internet reaches the right destination. |
|
Cons |
There exists certain security issues which are associated with this mobile to mobile routing mechanism and all this issues needs to be addressed in a proper way. |
In this one of the major issue is regarding the process of Setting up of a router and also during the process of discovery of the neighboring routers |
Stationary to stationary routing mechanism is very simple so the usage of this is totally limited. |
Conclusion
The report above helps in understanding the basic structure that the IPv6 is having along with understanding the process involved in the IPV6 sub-netting. IPv6 is generally considered to be a internet protocol of next generation and the main reason for developing this is for the process of substituting the IPv4. This report is also associated with discussing the routing mechanism that the IPv6 is having along with significant benefits that this protocol is having. One of the major benefit is the providing of the flexibility in routing. The report has also been discussing the pros and cons of that the different routing mechanism is having. Besides this the report has also been discussing the various kind of mechanism that the IPv6 routing is having and this mainly includes the mobile nodes to mobile nodes, stationary to mobile nodes and mobile nodes to stationary nodes.
References
Chuangchunsong, N., Kamolphiwong, S., Kamolphiwong, T., & Elz, R. (2014, August). An Enhancement of IPv4-in-IPv6 Mechanism. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on (pp. 45-48). IEEE.
Alizadeh, M., Zamani, M., Baharun, S., Manaf, A. A., Sakurai, K., Anada, H., … & Khan, M. K. (2015). Correction: Cryptanalysis and Improvement of” A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks”. PloS one, 10(12), e0145975.
Blumbergs, B., Pihelgas, M., Kont, M., Maennel, O., & Vaarandi, R. (2016, November). Creating and detecting IPv6 transition mechanism-based information exfiltration covert channels. In Nordic Conference on Secure IT Systems (pp. 85-100). Springer, Cham.
You, I., & Leu, F. Y. (2015). Comments on “SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks”. IEEE Systems Journal.
Rehman, S. U., & Manickam, S. (2016). Novel mechanism to prevent denial of service (DoS) attacks in IPv6 duplicate address detection process. International Journal of Security & Its Applications, 10(4).
Lu, Y., Wang, M., & Huang, P. (2017). An SDN-based authentication mechanism for securing neighbor discovery protocol in IPv6. Security and Communication Networks, 2017.
Blumbergs, B., Blumbergs, B., Maunas. 0 Pihelgas, Kont, M., Maenneland, O. M., & Vaarandi, R. (2016). Hedgehog in the Fog: Creating and Detecting IPv6 Transition Mechanism-Based Information Exfiltration Covert Channels. CCDCOE, NATO Cooperative Cyber Defence Centre of Excellence.
Rehman, S. U., & Manickam, S. (2015). Significance of duplicate address detection mechanism in Ipv6 and its security issues: A survey. Indian Journal of Science and Technology, 8(30).
Rehman, S. U., & Manickam, S. (2017). Improved Mechanism to Prevent Denial of Service Attack in IPv6 Duplicate Address Detection Process. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 8(2), 63-70.
Rehman, S. U., & Manickam, S. (2015, September). Rule-based mechanism to detect Denial of Service (DoS) attacks on Duplicate Address Detection process in IPv6 link local communication. In Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions), 2015 4th International Conference on (pp. 1-6). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download