1026 Osage Apt. #12 Manhattan, KS 66502 March 7, 2016 George Hallowberton, Chief Information Officer Garmin International Inc. 200 E. 151st Street Olathe, KS 66062-3426 Dear Mr. Hallowberton, In early April, you authorized me to research the growing problems with IPv4. The research and report are complete. I believe the best recommendation is given for the current situation. You can find this recommendation in the report Enterprise Transition to IPv6. The current network at Garmin consists entirely of IPv4. This implementation is currently the enterprise standard. Although stable, IPv4 isn’t the best option for the future your network. New technologies integrated in IPv6 like QoS and IPsec will drastically improve the reliability and security of your network. Public IP addresses needed for Internet communication will expire in the near future. To ensure connectivity, immediate allocation of resources should be enacted to implement IPv6 on your network infrastructure. Future development of GPS products will also benefit from using IPv6 on your company’s intranet. A constant push has been found for Internet connectivity on mobile devices. In China, this large increase in devices prompted integration of IPv6. North America might see this large influx as well. Integration now in your company’s intranet will ease the transition in these mobile devices. IPv6 is a well documented topic and I would enjoy answering any questions you may have. Please feel free to contact me at the address. Thank you for the chance to research and report on this important and interesting problem. Sincerely, Bryant Newby Enterprise Transition to Internet Protocol Version 6 SUBMITTED TO: George Hallowberton, Chief Information Officer Garmin International Inc. 200 E. 151st Street Olathe, KS 66062-3426 SUBMITTED BY: Bryant Newby Kansas State University Information Sciences Student 1026 Osage Apt. #12 Manhattan, KS 66502 March 7, 2016 Table of Contents List of Figures ................................................................................................................. iv List of Tables .................................................................................................................... v Glossary ........................................................................................................................... vi Executive Summary ......................................................................................................vii Background .......................................................................................................................1 Introduction ......................................................................................................................1 IPv4 ..................................................................................................................................2 Addressing ............................................................................................................2 Security ..................................................................................................................3 IPv6 ………......................................................................................................................4 Addressing ............................................................................................................4 Security ..................................................................................................................5 China and IPv6 .................................................................................................................5 Transition Mechanisms ..................................................................................................6 DTTS ......................................................................................................................6 6 to 4 and 4 to 6......................................................................................................7 Conclusion .........................................................................................................................7 Recommendation .............................................................................................................8 References Cited...............................................................................................................9 iii List of Figures Figure 1 IPv4 packet header format ……………………………………3 Figure 2 IPv6 packet header format ……………………………………5 Figure 3 DTTS dynamic tunneling technique ……………………......# iv List of Tables Table 1 IPv4 Class allocation ranges…………………………………...3 v Glossary IPv4 is version 4 of the Internet Protocol (IP) and it is the first version of the Internet Protocol to be widely deployed. IPsec (IP security) is a standard for securing Internet Protocol (IP) communications by encrypting and/or authenticating all IP packets. Internet Protocol version 6 (IPv6) is a network layer standard used by electronic devices to exchange data across a packet-switched internetwork. Internet Protocol address (IP) – An IP address (Internet Protocol address) is a unique number that devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP). Source: Wikipedia.com v Executive Summary Garmin is faced with a growing problem. IPv4, a heavily used protocol in your business has problems which can no longer be ignored. The constant depletion of public IP addresses is gradually becoming a crisis. Many researchers have poured many hours into developing solutions to the problem. IPv6, the clear solution is ready for mainstream use. China is now successfully using IPv6 for several sections of their Internet. U.S. and Europe are predicted to soon follow China’s lead. U.S. businesses will soon emerge as leaders for the country. Careful planning will make transitioning between protocols successful. The steps towards a solution in your company are as follows: 1. 2. 3. 4. Establishment of a long-term planning committee. Hiring of additional network personnel. Investigation into how future products may benefit from implementing IPv6. Allocation of fiscal resources. A transition of this size will not be cheap. It will require a large up front cost to hire the best labor possible. Furthermore, replacement of network hardware may be required. Upon even closer inspection, you will find most current equipment to be adequate. But, as the end result gets close, the invested capital will prove well spent. The risk involved in transitioning to IPv6 is somewhat high. There is always a chance something could be overlooked and cause downtime on your network. Careful planning will rule most of this out, is something to keep in mind. The transitioning technologies will rule out most problems. The recommendation is solid and straightforward. Writing off on a project should begin immediately to reduce time of completion. vii Enterprise Transition to Internet Protocol Version 6 Background Garmin is founded on the principles of innovation, convenience, performance, value, and service. Research guides these principles and is the reason Garmin currently leads the GPS industry. Several large problems are commonly found during research. Investigated here is the growing problem in your internal network. Your employees deserve the best network available to them. Soon, addressing will become an enormous problem for connectivity. Because your internal network uses public IP addresses, this can be an issue very soon. Careful review of the problem located in this document, will preserve Garmin’s founding principles and how they relate to your internal network. Introduction What is your reaction if you heard the internet was on a course to extinction? Well, you should be somewhat worried. There is a problem that might affect yours or Garmin’s connectivity. The problem is a few years away, but planning for the problem is NOW. It has the ability to affect a large number of computers. Fortunaly, the problem is well researched and will be easily remedied. Investigation on the problem and solution are complete and the results are now documented. Newby 1 IPv4 Internet Protocol version 4 (IPv4), developed in 1981, currently controls the majority of intranet and Internet communication. It was the first viable protocol to handle distance computer communication. Predecessors had difficulty routing data over long distances with high reliably. It had a unique, radical approach in 1981. Many questions were answered by IPv4 that were unknown at the time. Over the next decade, the usefulness of IPv4 soon surfaced. IPv4’s predecessors fell short of the requirements for large scale communication. IPv4 was developed by Internet Engineering Task Force (IETF) in September 1981. Some of the new technologies made were addressing and security. Now, we investigate these technologies and reveal how they compound the problem. Addressing The IETF knew the scope of IPv4. Among many things, it had to find a way to uniquely identify a node for communication. The solution to this problem came in the form of IPv4 addressing schemes. The IPv4 addressing scheme segments portions of public networks and assigns them an IP address. An IP address is represented in four decimal numbers separated by periods. An example of an IP address is the web server of Garmin at 63.76.48.75. All addresses are allocated 32 bits of space for representation (see figure 1). Therefore the maximum IP address is 255.255.255.255. Overall, this allocates about 4.3 billion unique public IP addresses. With this large number, the creators never envisioned any problem to occur in addressing. However, in practice, this changed. When IP addressing became common, it was introduced in classes. Class allocation is a method to allocate blocks of public IP addresses to one segment of the Internet. For example, Garmin, has a class B network allocated. Therefore, there are 65,535 addresses available for use (see table 1). There are not that many nodes on your network. So what happens to all the unused IP addresses? They are reserved, or wasted until a network device acquires the IP address. This creates a large problem. Many companies choose class B, creating about 1.4 billion of wasted IP addresses. The two reasons IPv4 is problematic are the small 32 bit space and the class allocation schemes used to allocate IP addresses. The designers of IPv4 did an amazing job, but with even more precise planning, this problem would have been averted. There are no other allocation schemes. 32 bits is easily implemented with the current A, B and C schemes. No other class solution approach is available. Only 8-10 years ago, the problem received attention. Soon after, research into new solutions began. Newby 2 Figure 1 IPv4 packet header format Adapted from: Information Sciences Institute Sept. 1981 Internet Protocol Specification. Request for Comments #791 Pg. 11 Table 1 IPv4 Class allocation ranges Taken from: IPv4 Wikipedia.com available: http://en.wikipedia.org/wiki/IPv4 Security By design, IPv4 and the Internet originally had no network layer security mechanism available. As the need arose, new network layer technologies were developed. Internet Protocol Security (IPsec) is the solution to the security need. “IPsec is a standard for securing IP communications by encrypting and/or authenticating all IP packets.”[10] IPsec is commonly implemented in two modes: tunnel or transport mode. Tunnel mode encrypts data twice, requiring more processing overhead. Transport mode, however provides a secure connection with one level of encryption. IPsec for IPv4 can be installed for either mode. Newby 3 Along with the need to develop security, the authors had to devise a way to integrate these technologies with IPv4. The solution was to install IPsec on every computer needing secure communication. This was an expensive solution at the time. It required hours of labor to configure each machine. Today, the optional component of IPsec in IPv4 is directly related to the overhead years ago of installing the protocol. The optional integration of IPsec creates another problem. It adds to the complexity of each IP packet. Because IPsec adds another layer to each IP packet, more overhead is added. Complexity is bad when designing networks. The additional computational overhead leads to slower the traffic flows. This has become less of a problem with fast machines today, but still cannot be ignored. Addressing and security are just a few problems with IPv4. William Stallings identifies maximum packet sizes, interfaces, and reliability as three other problems. It was in the mid 90’s when research started approaching these problems. In January 1995, RFC 1752 was released outlining the next-generation protocol IPv6. IPv6 IPv6 creation was primarily due to the extinction of IP addresses. The authors identified quickly a new protocol could fix multiple problems at the same time. Therefore, several weaknesses in IPv4 are addressed. We will investigate these solutions to ensure they fix the problem they address. Addressing As mentioned, addressing was the major importance in a new protocol. It is very clear the authors took the problem very seriously. The first change made was the increase of bits in the IPv6 header allocation. 128 bits is the number the authors implemented. This is four times the number of bits IPv4 allocated. In figure 3, the number of bits is represented in the IPv6 header format. Upon closer inspection, four times the number of bits provides far more than four times the number of available IP addresses. The space is calculated as 2x, where x is the number of bits. The gross number is now closer to 38 digits. Instead of millions of addresses, IPv6 introduces undecillion addresses. Based on these numbers, the problem is solved. It will be some time before this issue surfaces again. Newby 4 Figure 3 IPv6 packet header format. Adapted from: Lee, D.C.; Lough, D.L. April/May 1998 The Internet Protocol version 6 IEEE Potentials Security Security is now is now a mandatory requirement in IPv6. Integration of IPsec was done within IPv6, providing every node network layer security. “IPsec functionality is similar in both IPv6 and IPv4; however, site-to-site tunnel mode only is supported in IPv6." [12] “In transport mode, the protocol protects the message passed down to IP from the transport layer. “[12] Site-to-site tunnel mode establishes a tunnel of encrypted data between hosts. So which mode is more secure? If you look closely at the last paragraph, transport mode actually encrypts the data twice. It is encrypted at the transport layer and then authenticated at the next layer (network layer). This leads to two different levels of security. Unfortunately, this additional level added an unnecessary level of complexity. IPv4 realized this unneeded complexity and was usually implemented in tunnel mode. IPv6 further realized there was no substantial gain in using transport mode. Therefore, IPv6 only supports tunnel mode because of it’s reduced complexity, yet still secure method. It is interesting to see the compromise they made for IPv6. China and IPv6 China has proved itself to be the testing grounds of IPv6. In China, the recent influx of people and mobile phones has prompted early IPv6 adaptation [1]. When the IETF began assigning IP addresses, China was given a large number. This need came quicker than most people believed. One current use of IPv6 lies Newby 5 directly in the backbone of China’s segment of the Internet. The CERNET network became the first IPv6 Internet backbone. CERNET links the biggest sections of China with high speed IPv6 connections. It has influenced other providers to consider implementing IPv6 tunnels to other countries [1]. Gradually, other countries will follow this leadership. Transitioning Mechanisms Soon during the early stages of IPv6, the authors identified mechanisms would be needed to transparently integrate the new protocol. Transparency to the end user is of prime concern. This led to several different mechanisms available to network technicians. Investigation into these protocols is necessary to determine the readiness of IPv6 for your network. Proper implementation if IPv6 is a careful and tedious operation. “Solely to introduce IPv6 is impractical” [8]. The two common transitioning techniques for IPv6 are tunneling and interoperation [18]. Tunneling deploys IPv6 in a specific network segment; interoperation involves translating packets from one protocol version to the other. One example of interoperation is the method 6to4. 6to4 encapsulates IPv6 packets within IPv4 packets. Furthermore, Mackay states this technique is low risk. By deploying 6to4, problems can be identified before widespread rollout of IPv6. DTTS The transitioning technique with the best promise is DTTS. “To support incremental deployment of IPv6 networks within the IPv4 based Internet, we propose a new solution named Dynamic Tunneling Transition Solution (DTTS)” [4]. This technique is unique. It is similar to techniques, but another dimension is added. They incorporate a dual stack approach. The dual stack approach uses both versions of IP and picks out which one is needed for the certain situation. For example, if we want to send out IPv4 and IPv6, this is achievable. IPv4 and IPv6 are used on a case by case basis. If the end destination on the internet needs IPv6, it sends IPv6 or vice versa. DTTS adds a level of backwards compatibility. This approach is seamless and provides insight on the possible solutions to transitioning. Newby 6 Fig 3 DTTS Dynamic tunneling technique. Adapted From: Kai Wang, Ann-Kian Yeo, A. L. Ananda 2001 DTTS: A Transparent and Scalable Solution for IPv4 to IPv6 Transition IEEE Pg 2. 6 to 4 Another popular transitioning technique is 6to4. 6to4 is a mechanism enabling IPv6 packets to be sent over an IPv4 Internet segment. The way 6to4 achieves this isn’t by masking, but by encapsulation. Each IPv6 packet is “stored inside” a IPv4 packet. Upon change from a IPv4 Internet segment to IPv6, the IPv4 header is stripped off, revealing the original IPv6 packet. In “Realizing the Transition to IPv6”, Waddington argues the main problem with adoption lies in software applications. Many programs are hard coded a certain IPv4 IP address. This means to deploy IPv6 widespread, program’s server IP address has to be changed to the new IPv6 address. This can require some labor. Furthermore, complex data structures may embed IP addresses [12]. Embedded IP addresses may hinder adoption of IPv6. Conclusion Upon investigation of IPv4, several problems were found. Security and addressing need improved for future Internet communication. IPv6 was found to be the clear solution to these problems. IPv6 contains the grand solution to the address extinction problem. Security is now standard in IPv6, enabling a more secure Internet. Finally, the complexity of IPv6 is reduced from IPv4’s large Newby 7 packet header. When developed, IPv6 authors developed several techniques to transition between the two very different versions. These techniques should are currently in use in China and have proven successful. With current offerings, the groundwork is set for corporations to lead the Internet and implement IPv6 for themselves. Recommendation Garmin should immediately allocate resources to transition network infrastructure to IPv6. Because of its mandatory security requirements, larger allocation schemes, and reduction of complexity, IPv6 is ready for your network. The first step is to allocate resources for the transition. These resources should include most, if not all, of the following: 5. 6. 7. 8. Establishment of a long-term planning committee. Hiring of additional network personnel. Investigation into how future products may benefit from implementing IPv6. Allocation of fiscal resources. This procedure will take several years to complete. Depending on applications in your company, it will take some changes in configuration. Cost will also certainly be a factor. Most routers sold in the past few years have IPv6 functionality built in. This is quite helpful for costs, but labor will be high. Documentation of IPv6 transition technologies is good, but it has been found that documentation on the routers is poor. It will take ingenuity by the designers to enable IPv6. Patience is important during the transition and may result in minimal down time for the network. The minimal risk now outweighs the high costs. Upon completion of this project, Garmin will stand out as the industry leader in IP communication. Furthermore, Garmin can retain knowledge of IPv6 for inclusion in future IP devices. The solution is clear and needs to begin now. References Cited [1] Hua Ning. (2004, 26-30 Jan. 2004). IPv6 test-bed networks and R&D in china. Applications and the Internet Workshops pp. 105-111. Available: http://ieeexplore.ieee.org/iel5/8957/28387/01268573.pdf?isnumber=28387&pro Newby 8 d=STD&arnumber=1268573&arnumber=1268573&arSt=+105&ared=+111&arAut hor=Hua+Ning [2] Information Sciences Institute. (1981, 1981). Internet protocol darpa internet program protocol specification (RFC 791). Defense Advanced Research Projects Agency, 1981. [3] Jun Tian and Zhongcheng Li. (2001, June 11-14 2001). The next generation internet protocol and its test. IEEE vol. 1pp. 210--215. Available: http://ieeexplore.ieee.org/iel5/7452/20261/00936305.pdf?isnumber=20261&pro d=STD&arnumber=936305&arnumber=936305&arSt=210&ared=215+vol.1&arAu thor=Jun+Tian%3B+Zhongcheng+Li [4] Kai Wang, A. -. Yeo and A. L. Ananda. (2001, 2001). DTTS: A transparent and scalable solution for IPv4 to IPv6 transition. Computer Communications and Networks pp. 2/17/2006. Available: http://ieeexplore.ieee.org/iel5/7587/20684/00956257.pdf?isnumber=20684&pro d=STD&arnumber=956257&arnumber=956257&arSt=248&ared=253&arAuthor= Kai+Wang%3B+Yeo%2C+A.-K.%3B+Ananda%2C+A.L. [5] G. Lawton. (2001, Aug 2001). Is IPv6 finally gaining ground? IEEE 34(8), pp. 2/17/2006. Available: http://ieeexplore.ieee.org/iel5/2/20351/00940007.pdf?isnumber=20351&prod=J NL&arnumber=940007&arnumber=940007&arSt=11&ared=15&arAuthor=Lawto n%2C+G. [6] D. C. Lee and D. L. Lough. (1998, Apr/May 1998). The internet protocol version 6. IEEE 17(2), pp. Apr/May 1998. Available: http://ieeexplore.ieee.org/iel4/45/14643/00666638.pdf?isnumber=14643&prod =JNL&arnumber=666638&arnumber=666638&arSt=11&ared=12&arAuthor=Lee %2C+D.C.%3B+Lough%2C+D.L. [7] D. C. Lee, D. L. Lough, S. F. Midkiff, N. J. Davis IV and P. E. Benchoff. (1998, Jan/Feb 1998). The next generation of the internet: Aspects of the internet protocol version 6. IEEE 12(1), pp. 2/17/2006. Available: http://ieeexplore.ieee.org/iel4/65/14452/00660004.pdf?isnumber=14452&prod =STD&arnumber=660004&arnumber=660004&arSt=28&ared=33&arAuthor=Lee Newby 9 %2C+D.C.%3B+Lough%2C+D.L.%3B+Midkiff%2C+S.F.%3B+Davis%2C+N.J.%2 C+IV%3B+Benchoff%2C+P.E. [8] M. Mackay, C. Edwards, M. Dunmore, T. Chown and G. Carvalho. (2003, June 2003). A scenario-based review of IPv6 transition tools. IEEE vol.7(no. 3), pp. 2/22/06. Available: http://ieeexplore.ieee.org/iel5/4236/27022/01200298.pdf?isnumber=27022&pro d=JNL&arnumber=1200298&arnumber=1200298&arSt=+27&ared=+35&arAutho r=Mackay%2C+M.%3B+Edwards%2C+C.%3B+Dunmore%2C+M.%3B+Chown% 2C+T.%3B+Carvalho%2C+G. [9] R. Hinden, Nokia, S. Deering and Cisco Systems. (1998, July 1998). IP version 6 addressing architecture (RFC 2373). [10] S. Deering, Cisco, R. Hinden and Nokia. (1998, 1998). Internet protocol, version 6 (IPv6) specification (RFC 2460). The Internet Society, Internet. [11] W Stallings. (1996, Jul 1996). IPv6: The new internet protocol. IEEE vol.34(no. 7), pp. 2/17/06. Available: http://ieeexplore.ieee.org/iel1/35/11080/00526895.pdf?isnumber=11080&prod =STD&arnumber=526895&arnumber=526895&arSt=96&ared=108&arAuthor=Sta llings%2C+W. [12] D. G. Waddington and Fangzhe Chang. (2002, Jun 2002). Realizing the transition to IPv6. IEEE vol.40(no.6), pp. 2/22/06. Available: http://ieeexplore.ieee.org/iel5/35/21727/01007420.pdf?isnumber=21727&prod =STD&arnumber=1007420&arnumber=1007420&arSt=138&ared=147&arAuthor =Waddington%2C+D.G.%3B+Fangzhe+Chang [13] Yujun Zhang and Zhongcheng Li. (2004, 2004). IPv6 conformance testing: Theory and practice. Test Conference pp. 2/17/2006. Available: http://ieeexplore.ieee.org/iel5/9526/30190/01387334.pdf?isnumber=30190&pro d=STD&arnumber=1387334&arnumber=1387334&arSt=+719&ared=+727&arAut hor=Yujun+Zhang%3B+Zhongcheng+Li [14] Yujun Zhang and Zhongcheng Li. (Sept 2004, 29 Aug.-1 Sept. 2004). Test framework for IPv6 conformance testing. IEEE vol.2pp. 2/23/06-pp. 810- 813. Newby 10 Available: http://ieeexplore.ieee.org/iel5/9581/30299/01391830.pdf?isnumber=30299&pro d=STD&arnumber=1391830&arnumber=1391830&arSt=+810&ared=+813+vol.2& arAuthor=+Yujun+Zhang%3B++Zhongcheng+Li [15] IPv4 entry Available: www.wikipedia.org/wiki/IPv4 [16] IPv4 – Running out of time? RIPE NCC Available: http://www.ripe.net/info/info-services/ipv4/index.html [17] Million, Billion, Trillion... - Jim Loy Available: http://www.jimloy.com/math/billion.htm [18] IPSec Modes: Transport and Tunnel The TCP/IP Guide http://www.tcpipguide.com/free/t_IPSecModesTransportandTunnel.htm Newby 11