Uploaded by satya k

dumas ch12

advertisement
Chapter 12:
Internetworking and the
Internet
Principles of Computer Networks
and Communications
M. Barry Dumas and Morris Schwartz
Objectives






Define and explain internetworks and intranets
Describe the Internet’s topology and explain why its
structure might be described as pseudo-hierarchical
Discuss the beginnings of the World Wide Web, its
evolution and its relation to the Internet
Describe Internet networking with the client/server model
Explain the composition of URLs and examine
addressing issues
Discuss issues associated with IPv4 addressing and the
move from IPv4 to IPv6
Chapter 12
Principles of Computer Networks and
Communications
2
Overview


Internetwork: a group of autonomous networks
Company internets and intranets
typically revolve around LANs


Creating an InterNetwork Requires paying attention to:





When varying locations are involved,
use WANs
For companies
that form
partnership
When these networks
use TCP/IP protocols,
they’re called extranets
Cost
Compatibility
Security
Reliability
The IPv4 system will soon be out of addresses

A move to IPv6 system is necessary
Chapter 12
Principles of Computer Networks and
Communications
3
Overview

Company intranet
 Company-owned, in-house network
 Uses TCP/IP protocols
 Designed only to be reached by authorized employees

Company extranet
 Company-owned, special outsider access to in-house network
 Uses TCP/IP protocols
 Connects between the owner company and networks of
“participating organizations” (e.g., suppliers, outsourcers, etc.)
Chapter 12
Principles of Computer Networks and
Communications
4
History of the Internet Revisited

Usually traced back to its precursor, the ARPANET
project


Main concern—interconnecting independent (mainframe)
computers
Later concern—the development of a robust internetwork



That could keep military communications flowing
That could deal with complicated communications with
incompatible networks
Can be linked to the Advanced Research Projects
Agency (ARPA)

The U.S. response to the 1957 USSR launch
of the Sputnik
Chapter 12
Principles of Computer Networks and
Communications
5
Internet Topology and Access
Compromises of millions
of interconnected hosts, l
LANS and WANS

Service providers


“The topology of the Internet . . . is a
pseudo-hierarchical structure based on links among
different levels of service providers.”
Organizations whose nodes and links supply all of the interconnections
Order of main hierarchy

International Internet service providers (IISPs) and
national service providers (NSPs) at the top



Most NSPs are also IISPs
Regional service providers (RSPs)
Local Internet service providers (ISPs) at the bottom
Many providers
connect directly
to each other,
whether at the
same or different
levels
Local providers offer dial-up access, bringing
the telephone system into the picture
Chapter 12
Principles of Computer Networks and
Communications
6
Internet Topology and Access

National service providers (NSPs)



Form the Internet backbone that extends worldwide
Are private companies that own and maintain
the backbone networks
Basic global interconnections are provided by NSPs linked to
each other through network access points (NAPs)



NAPs are complex switching stations
NAPs are privately owned, usually by companies other than NSPs
Some NSPs bypass NAPs to link directly to each other using
peering points in their switching offices
Chapter 12
Peering points are like the point of presence POPs
which is the location of a node on a network that users
can connect to.
i.e telephone companies’ end offices
Principles of Computer Networks and
Communications
7
Internet Topology and Access

Regional service providers (RSPs)

Through routers



Connect hierarchically to NSPs
Connect directly to other RSPs
Local Internet service providers (ISPs)

Can link to NSPs, RSPs, and ISPs


The higher up on the hierarchy, the faster the links and
the greater their capacity
ISPs can support many connection types


Dial-up, cable modem, DSL, ATM, frame relay, Ethernet
Not all ISPs can support all types
Most individuals and businesses
use ISPs to connect
Chapter 12
Principles of Computer Networks and
Communications
8
Basic Topology of the Internet
Some RSPs connect directly to
each other by routers
NSPs are linked to each other
by NAPs
Some NSPs connect directly to
each other by peering points
Fig. 12.1
Chapter 12
Principles of Computer Networks and
Communications
9
Internet2 and Abilene (a complete
separate entity)

Internet2 1995

Nonprofit development project



Purpose—to create advanced technologies and applications
that can be adopted by the Internet



Academic, industry, government partnership
Led by more than 200 universities (alliance)
Will eventually lead to the “Internet of the future”
Formation and constituency go back to its
predecessors
Abilene


High-speed wide-bandwidth
optical backbone network
Designed to support Internet2
Chapter 12
Principles of Computer Networks and
Communications
Abilene participants:
—Indiana University
—Juniper Networks
—Nortel Networks
—Qwest Communications in
partnership with Internet2
10
The World Wide Web aka “the Web”
An interface that allows us to access the Internet
the Web to the Internet is the same as the database application to a database
 Tim Berners-Lee in 1990



Wrote the first World Wide Web server: httpd
Created “WorldWideWeb”

Web interfaces:
Web browser software
Microsoft Internet Explorer
 Simplified the information-finding process on the Internet
Netscape Navigator
providing easy-to-use Web interfaces
Mozilla Firefox
Websites



the first client
a hypertext browser/editor


Collections of files (pages) organized by links
Via a structure called hypertext (that contains hyperlinks)
Hyperlinks are addresses that take us from page to page
and site to site, and make traversing the Internet straightforward
Chapter 12
Principles of Computer Networks and
Communications
11
The Client/Server Model
Client Software requests services, Servers Software
provide services
 Name refers to the association between network entities



Client software requests services
Server software provides services
A software model, not a hardware model

Because it is software based, the client/server model provides a
flexible and scalable architecture


This explains its popularity
Different from master/slave relationship!


Server software in server/client model
does not control the network as in the case of the master slave
Servers and clients operate independently
Servers and clients
Chapter 12
Master Slave example is
the Mainframe computing
only join for the
request–response
12
relationship
The Client/Server Model

Client/Server—how different types of software
running on network devices interact

Examples



When you go to a website, your browser software (client)
requests Web pages from the site’s Web server software
(server)
You can download a file from an Internet server by using
an FTP (file transfer protocol) client that requests the file
from a server running FTP software (part of the TCP/IP
protocol suite)
An application can be both a client and a server

One time requesting services and
another time providing them
This is common in
peer-to-peer networks
Chapter 12
Principles of Computer Networks and
Communications
13
The Challenge of Internetwork
Addressing
 Standardized protocols and procedures are key factors
in Internet success

To send a message, the system must



Resolve the location of the recipient machine
Distinguish it from all the devices on the Internet
Computers on a shared medium LAN (not an
internetwork) have unique flat physical addresses


Makes recipients easy to identify, but
Insufficient and impractical for internetworking!


Chapter 12
Addresses do not contain any location information
System would have to search every network in the internetwork
for the recipient machine
Principles of Computer Networks and
Communications
14
The Challenges of Internetwork
Addressing
solution

Hierarchical scheme

Different levels identify



A particular network of the internetwork
The physical machine address
Two architecture models

Open systems interconnection (OSI) model



The medium access control (MAC) sublayer of the data link layer
handles physical addresses
Network layer handles logical addresses
Transmission control protocol over Internet protocol (TCP/IP)
model

Follows the same pattern as OSI, but with possibly different labels


Chapter 12
OSI data link layer is the TCP/IP data link or link layer
OSI network layer is the TCP/IP network or Internet layer
Principles of Computer Networks and
Communications
15
Hierarchical Addresses
(Reviewing from Chapter 6)

The postal system uses hierarchical addresses



Zip codes, states, cities, streets, names, etc.
Allows the post office to route mail in stages
Hierarchical network addresses similarly comprise
groupings/segment


Chapter 12
Allow the system to route messages to general areas,
particular networks and subnetworks, and finally the
destination machine
Addresses are constructed and routed in network layer (OSI)
or internetwork layer (TCP/IP)
Principles of Computer Networks and
Communications
16
Hierarchical Addresses

Physical address is different from the network address

Physical address—refers to a particular device


Network address—refers only to the network in which
the device resides


The physical address doesn’t change when the device is moved
The network address changes when the device is moved!
Analogy


An automobile VIN stays with the automobile (physical address)
if you move to a different state
The license plate (network address) changes to be
state-specific
Chapter 12
Principles of Computer Networks and
Communications
17
Addressing in the Internet
“In 1983 ARPANET officially adopted TCP/IP as the
standard communications protocol.”



Replaced NCP (network control protocol)
Major step towards today’s Internet
Explains why the Internet uses TCP/IP model architecture

TCP/IP



OSI


Chapter 12
groups application functions into a single applications layer
Communications functions are in the other layers
Layers above transport focus on applications
Layers below session deal with communications
Principles of Computer Networks and
Communications
18
Model Architectures
Focused on
applications
Focused on
communications
Fig. 12.2
Chapter 12
Principles of Computer Networks and
Communications
19
Addressing in the Internet

Internet protocol (IP) address


Used to identify a device for the Internet,
in the internet layer
Different from a medium access control
(MAC) address

IP address




MAC address

Chapter 12
Associated with a machine that may or may not be in a LAN
A logical address at the internet layer
May be changed without affecting the physical address
A physical address at the data link layer of a device on a LAN
Principles of Computer Networks and
Communications
20
Addressing in the Internet

IP address

Can be

Static


Dynamic



Assigned and fixed on the device by a network administrator
Assigned to a device by a protocol process when the device
links (logs on) to the Internet
Dynamic IP addresses are recycled—released when a device
disconnects and available for assignment on another device
Is used by the Internet to route packets

To reach a device, there must be a mapping of its IP
address to its physical address
In other words, the IP address must be associated
with the device’s physical address
Chapter 12
Principles of Computer Networks and
Communications
21
how to find the IP and the MAC address on your
computer


For the IP address:
 Run
 Cmd
 Ipconfig
MAC address
 open the network connections
 Select your LAN connections, right click, select status
 In the support tap click Details
 Your MAC is the physical address
Chapter 12
22
Addressing in the Internet
Mapping of its IP address to its physical
address
 There are several protocols to do this
mapping (i.e., IP address to physical
address)



Address resolution protocol (ARP) << Original
Reverse address resolution protocol (RARP) <<
companion of ARP
Dynamic host configuration protocol (DHCP) << new
)More about these in Chapter 13…)
Chapter 12
Principles of Computer Networks and
Communications
23
The Domain Name System

Domain name


The alphabet version of an IP address on the Internet
Domain name system (DNS)


Used by the internet to translate a domain name or e-mail
address to an IP address
Every domain name and e-mail address



Is globally unique
Has a one-to-one relationship with a unique IP address
Resolving the domain name

The process where DNS translates a typed domain name into
an IP address that the Internet uses to route the transmission
For example, www.icann.org resolves (translates)
into dotted quad notation as 192.0.34.65
Translates into Binary 32 bits 4x8
Chapter 12
Principles of Computer Networks and
Communications
24
The Domain Name System
The translation process is called resolving
the domain name, applies for e-mail as well

E-mail addresses



A computer program called a mail transfer agent sends e-mail
from one computer or mail server to another
These agents use the DNS to find out where to deliver the email
Smooth operations in the DNS



DNS is an interconnected hierarchical system of high-speed
servers running distributed domain name databases
For translation, this system simply searches its databases,
finds the IP address for the name, and relays it back
Centralized organization keeps the DNS up to date (new
additions or deletes)
Chapter 12
Domain name registries are responsible
Principles
of Computer
Networks
for distributing
domain
names
andandIP addresses
Communications
while ensuring their uniqueness
25
The Parts of a URL

Uniform resource locator (URL)

Is a symbolic meaning for specifying





a Web resource
The Web server on which the resource resides
The protocol that will be used to retrieve the resource
URL components are separated from each other by
forward slashes, dots, and sometimes colons
Easiest to interpret from right to left

The rightmost segment is called the top-level domain
(TLD)
Chapter 12
Principles of Computer Networks and
Communications
26
Top-Level Domains (TLDs)
Easier to interpret if starting from right to left
www.users.alvernia.edu

Five original TLDs





TLD
.com for commercial enterprises
.gov for government sites
.net for organizations providing network services
.mil for use by the military
.org for nonprofit organizations and those that do not fit other designations

Because .com, .org, and .net characteristics have blurred over time,
they are now referred to as generic TLDs (gTLDs)

TLD concept speeds up the searching process in the database
because each partition is relatively small
Chapter 12
Principles of Computer Networks and
Communications
27
Domain and Sub-domain Names

Domain name
www.users.alvernia.edu




Also called second-level domain
To the left of the TLD, separated by a dot
Specifies a particular network, an autonomous system (AS)
within the Internet
Sub-domain name
www.users.alvernia.edu

Narrows the location of the resource server
Chapter 12
Principles of Computer Networks and
Communications
28
URL Server

Server (host) name
www.users.alvernia.edu

Is located to the left of the sub-domain name
 Holds the requested resource
It is common practice to give the
name www to the server
that hosts Web documents
However, it is not required!
Chapter 12
Principles of Computer Networks and
Communications
29
Domain Name and URL
Components
www is a server
at Baruch College
Combined domain name
.cuny.edu specifies a particular
network within the Internet
If you see a URL that ends after the TLD or after a subdirectory name,
the extension/index.htm or /index.html is assumed
Chapter 12
Principles of Computer Networks and
Communications
Fig 12.3
30
Specifying the File on the Server

Domain names



Specify location of the server
Do not explicitly specify the file (Web page) on the server
Beyond domain names

We need the path to the file on the server


Path must include directories and the file name
Path information is appended to the right of the TLD by a slash (/)
Example
www.users.alvernia.edu/students/finalgrades/index.htm



Chapter 12
/students is the directory where Web files for students are stored
/finalgrades is the subdirectory where files specific to final grades
are stored
/index.htm specifies one particular file
Principles of Computer Networks and
Communications
31
Specifying the File on the Server

.htm and .html

Indicate that the file is written in hypertext
markup language (HTML)
 Are default file names that are automatically
searched for if no file name is given
Any URL with nothing after
the TLD or a subdirectory name
assumes the extension
/index.htm or /index.html
Chapter 12
Principles of Computer Networks and
Communications
32
Specifying the File on the Server
The URL must inform the server of the protocol the
client will use in the interchange process
 Specifying the protocol in the URL


Leftmost segment of the URL defines actions taken
in response to particular requests
http:// is one of the most common Web protocols




Stands for hypertext transfer protocol
In a browser, sends a command to the site’s Web server to
download the page
Part of the application layer of the TCP/IP suite
A “stateless” protocol


Chapter 12
Each command is performed independently
Makes it difficult to create sites that interact with users
Principles of Computer Networks and
Communications
33
The Http Protocol and “Cookies”

Software like Java is used to overcome
“stateless” protocol difficulties

Used to write very small text files (cookies)
to the client’s hard drive
Cookies contain “state” information
 Allow a server application to understand the http
requests that make up a continuous exchange
 http does not prevent unauthorized accessing see
next slide

Chapter 12
Principles of Computer Networks and
Communications
34
Other Identifiers (common
protocols)

https://



ftp (file transfer protocol)




For sites that require secure transmissions, an s is added, indicating
encryption
Unreachable without appropriate passwords
Commonly employed protocol
Used for uploading and downloading files to and from ftp servers
ftp is typically in the server name, but not required
Country identifier


The country identification is part of the TLD, though separated from it
by a dot
For example, BBC News has a United Kingdom identifier
news.bbc.co.uk

When with the TLD, it is called a country code top-level domain (ccTLD)
There are more than 240 ccTLDs!
Chapter 12
Principles of Computer Networks and
Communications
35
IPv4


IP addressing began with ARPANET
1981 IPv4 became the standard we use today


Hierarchical scheme
Classes of addresses
Three logical arrangements/splits of the bits reserved
for addresses

For few organizations needing many host addresses


For many companies with many more hosts


Many bits for network addresses, but also many for hosts
For the great many organizations with very few hosts

Chapter 12
Few bits for network addresses, many for hosts
Many bits for network addresses, few for hosts
This lead to the creation of 3 arrangements
called classes of address
36
IPv4 Classful Addressing

“Classful”—most widely used type of IPv4
 Consists of 32 bits
 Four 8-bit sections
 Makes





arranged in the dotted quad format
192 .0.34 .65
up three unicast classes
Unicast—from one source to one destination
Two-part addresses that split the 32-bits into network/host
Class A: 8 / 24
Class B: 16 / 16
Class C: 24 / 8
 Class
identifier bits (prefixes) are included in the
network address part of the split
Chapter 12
Principles of Computer Networks and
Communications
37
Classful Addressing Prefixes

Prefixes

Identify class
 Are not part of the IP address
Class A is 0
Starting bit
 Class B is 10
 Class C is 110
 D (not classful) is 1110 used for multucasting
 E (not classful) is 1111 for Expermental

Chapter 12
Principles of Computer Networks and
Communications
38
IPv4 Classful Addressing
These classes account for 87.5% of
potentially available addresses
(1st 8-bit section)
Number of
Networks
Number of
Hosts
A
0___
____
27 – 2 = 126
224 – 2 = 16,777,214
B
10 _ _
____
214 – 2 = 16,382
216 – 2 = 65,534
C
110 _
____
221 – 2 = 2,097,150
28 – 2 = 254
Class
Prefix
Table 12.1
Chapter 12
Principles of Computer Networks and
Communications
39
IPv4 Non-Classful D and E

Two other categories of bits reserved for
addresses

D and E are not segmented into networks and hosts
 Both allow for 228 = 268,435,456 addresses

D

Multicasting


From a source to multiple destinations
E

Reserved for experimenting
Chapter 12
Principles of Computer Networks and
Communications
40
Class A address
Network Address
32 bits
 First 8 left most for network address
 The other 24 bit for the host
 First left most bit used as a class identifier
 No address can be all 1’s or all 0’s
n
7
 For 8 bits 2
2 gives 128 address
 Without the address of all 1’s or 0’s we
get 126 network addresses

Chapter 12
Principles of Computer Networks and
Communications
41
Class A address
host Address
24 bits
 First 24 right most for host address
 No address can be all 1’s or all 0’s
n
24
 For 24 bits 2
2 gives 16,777,216
address
 Without the address of all 1’s or 0’s we
get 17,777,214 host addresses
 Same calculations for class B and class C

Chapter 12
Principles of Computer Networks and
Communications
42
Classful Addressing

An organization that applies for an IPv4 address


Receives a network address with a block of
host addresses
The size of this block is determined by class


If the organization can handle more addresses than it
actually uses, the other addresses associated with the
company’s block go unused
Significant limitation to classful addressing

It wastes a lot of addresses
Soon they will run out of addresses!
To forestall this, classless addressing was implemented
Chapter 12
Principles of Computer Networks and
Communications
43
Classful Addresses, Networks,
Subnets, and Masks

Network ID

A company receives a network ID when a classful
network address is assigned



Network ID + host address all 0s = network address
Used by outside routers to direct IP packets addressed
to the company
Not assignable to any company host


No host ID can be all 0s
Logical IP networks

A company subdivides the classful network address
to organize its own hosts
Chapter 12
Principles of Computer Networks and
Communications
44
Subnets and Masks

Subnets
Logical networks with their own subnet addresses
 Created by assigning hosts to groups with their own
subnet addresses
 Organized many ways—by building, floor, department, LAN
Major advantages: A single IP address can connect

a whole subnet to the Internet


Better control on subdividing and managing the network
Masks



Bit patterns applied to entire addresses to isolate their
components
Used to separate network, subnet, and host addresses
Have the same number of bits (arranged in dotted quad
segments) as the IP address, but only use 1s and 0s
Chapter 12
Principles of Computer Networks and
Communications
45
Bitwise Multiplication and Masks

Bitwise multiplication of the address by the mask



Equivalent to applying the “and” operator
Captures address parts where mask bits are 1
and ignores where they are 0
Internet routers easily identify the IP address class
by finding bit patterns this way
Class B mask
Chapter 12
Principles of Computer Networks and
Communications
46
Bitwise Multiplication and Masks

When the class is identified, a network default
mask is applied

Three default masks
Class A mask: 255.0.0.0
 Class B mask: 255.255.0.0
 Class C mask: 255.255.255.0

Chapter 12
Principles of Computer Networks and
Communications
47
Bitwise Multiplication and Masks

In operation

After one of the three default masks is applied, the
network address is revealed

The network address is assigned to the edge router
of the organization

When a packet reaches any router, the appropriate
mask is applied


Chapter 12
If the network address it finds is not for that organization,
the packet is passed to the next hop router
If the network and router addresses match, a subnet mask
is applied
Principles of Computer Networks and
Communications
48
Addressing in the Internet

Subnet address

Comprises the network address + subnet mask bits


The remaining host address bits are all 0s
The total number of bits in the combined network and
subnet addresses is indicated by a /n notation 130.57.110.9/19
at the end of the address
16 bits
Chapter 12
3 bits
Principles of Computer Networks and
Communications
= 19 bits
49
Classless Addresses

A solution to the IP address shortage?

Classless addressing
All of IPv4’s address space of 32 bits would be
available without restriction
 Twice as many addresses could be created


But addressing hierarchy and restrictions
needed

Chapter 12
Otherwise, routers would be overwhelmed and
complicated
Principles of Computer Networks and
Communications
50
Classless Addresses

Classless inter-domain routing (CIDR)

The compromise between classful and classless

Allows any number of leftmost bits to be assigned
as a network address



Addresses assigned based on the number of hosts a
network can support; no class designation
CIDR is not limited to network addresses of 8,16,or 24 bits
CIDR is NOT perfect

Chapter 12
Still wastes addresses, just not as many as classful
addressing
Principles of Computer Networks and
Communications
51
CIDR, Subnetting, and Supernetting

Supernetting



CIDR’s hierarchical scheme that parallels subnetting
One key difference—it is applied to routing outside
of the organization (hence the name)
Is a method of route aggression



Chapter 12
A single high-level routing table entry represents many
lower-level routes
Internet backbone routers need fewer entries
More efficient, eases table size requirements
Principles of Computer Networks and
Communications
52
IPv6
Even with CIDR, supernetting and subnetting, still
address shortage
IPV6 replaced IPV4
 Uses a 128-bit address sequence instead of 32

Provides IP header extensions

Adds quality of service (QoS) labeling to IP packets

Uses coloned octal, not dotted quad

Accommodates CIDR by adding a (an) /n
to the end of the address
Chapter 12
Principles of Computer Networks and
Communications
53
IPv6

Uses a 128-bit address sequence instead of 32


increases the number of available IP addresses
allows for additional hierarchy levels that improve routing efficiency

Provides IP header extensions

Adds quality of service (QoS) labeling to IP packets

Uses coloned octal, not dotted quad

Accommodates CIDR by adding a /n to the end of the address
Chapter 12
Principles of Computer Networks and
Communications
54
IPv6

Uses a 128-bit address sequence instead of 32

Provides IP header extensions

Improve privacy, authentication, and integrity

Adds quality of service (QoS) labeling to IP packets

Uses coloned octal, not dotted quad

Accommodates CIDR by adding a /n to the end of the address
Chapter 12
Principles of Computer Networks and
Communications
55
IPv6

Uses a 128-bit address sequence instead of 32

Provides IP header extensions

Adds quality of service (QoS) labeling to IP packets

Specifies the level of service requests

Priority, real-time, normal handling

Uses coloned octal, not dotted quad

Accommodates CIDR by adding a /n to the end of the address
Chapter 12
Principles of Computer Networks and
Communications
56
IPv6

Uses coloned octal, not dotted quad
Eight segments separated by colons
A1B9:CC5F:000D:0037:FF0E:3945:0000:2A4D
 Two bytes per segment
 Typically written in hexadecimal notation

Still 32 characters, one hexadecimal digit = 2 bytes
 Leading 0s in each section are eliminated for simplification
A1B9:CC5F:000D:0037:FF0E:3945:0000:2A4D
A1B9:CC5F:D:37:FF0E:3945:0:2A4D
 BUT, only one string of 0s can be removed in a given address

Chapter 12
Principles of Computer Networks and
Communications
57
IPv6

Uses a 128-bit address sequence instead of 32

Provides IP header extensions

Adds quality of service (QoS) labeling to IP packets

Uses coloned octal, not dotted quad

Accommodates CIDR by adding a /n to the end of the address

Chapter 12
n is the number of bits in the CIDR prefix
Principles of Computer Networks and
Communications
58
IPv4 Packet Headers
Fig. 12.4
IPv4
Chapter 12
Principles of Computer Networks and
Communications
59
IPv6 Packet Headers
Fig. 12.4
IPv6
Chapter 12
Principles of Computer Networks and
Communications
60
Moving from IPV4 to IPV6
A huge difference between both methods
 Has to be done gradually
 Three methods to allow gradual transition
and to permit functioning in mixed
environment

Chapter 12
Principles of Computer Networks and
Communications
61
Methods for Moving from
IPv4 to IPv6
Dual stack
 What?

Stack—the IP protocols used by the network nodes (routers, hosts)
 Dual stack—nodes that contain the stacks for both IP versions

How?

The sender queries the DNS for an address




Pro


If the address is IPv4, the packet is sent as IPv4
If the address is IPv6, the packet is sent as IPv6
Once the change to IP6 is complete IP4 can be deleted
Network nodes accommodate both IPv4 and IPv6
Con

Each of the dual stack nodes must have an IPv4 address


Address scarcity is not alleviated
Processing through two stacks adds to switching time
Chapter 12
Principles of Computer Networks and
Communications
62
Transitioning from IPv4 to IPv6
Both IPv4 and IPv6
addresses are
maintained
The sender uses whatever
packet format (i.e., IPv4 or IPv6)
is returned from the DNS server
for the destination node
Fig. 12.5A
Chapter 12
Principles of Computer Networks and
Communications
63
Methods for Moving from
IPv4 to IPv6
Tunneling
 Why?


A packet from an IPv6 node or region of nodes (a cloud) may have to
travel across an IPv4 cloud to reach another IPv6 node
How?

An IPv4 tunnel is created for it to travel through




Pro


First it needs an IPv4 address from the IPv6 edge router at the IPv4/IPv6
border
The IPv6 router will encapsulate it into an IPv4 packet
At the other border, the IPv4 edge router will then decapsulate this packet
Avoids having to assign IPv4 addresses to IPv6-only nodes within a
capsule
Con

Additional processing at the borders
Chapter 12
Principles of Computer Networks and
Communications
64
Transitioning from IPv4 to IPv6
An IPv4 header encapsulates IPv6 packets
while transiting through IPv4 regions
Chapter 12
Principles of Computer Networks and
Communications
Fig. 12.5B
65
Methods for Moving from
IPv4 to IPv6
Translation
 Why?

An IPv4-only host cannot understand packets from a IPv6-only host
 Tunneling will not help resolve this problem


How?


At the least, the edge router must translate the IPv6 header into an
IPv4 header
Pro


The packet is still IPv6 after the encapsulating header is removed
IPv4 hosts and IPv6 hosts can communicate
Con

Translation can be complicated!

Chapter 12
The end node processes can involve the IP protocols themselves
Principles of Computer Networks and
Communications
66
Download