Professional Documents
Culture Documents
Unit 3
TSN 304/05
Network Applications
IPv6 Migration
and Network
Applications
ii WAWASAN OPEN UNIVERSITY
TSN 304/05 Network Applications
COURSE TEAM
Course Team Coordinator: Dr. Karen Khor Ean Teng
Content Writer: Ms. Saravadee Sae Tan
Instructional Designer: Ms. Michelle Loh Woon Har
Academic Member: Ms. Azrina Jamal
COURSE COORDINATOR
Dr. Karen Khor Ean Teng
PRODUCTION
Editor: Penerbitan Pelangi Sdn. Bhd.
In-house Editor: Ms. Michelle Loh Woon Har
Graphic Designers: Ms. Audrey Yeong and Ms. Valerie Ooi
Wawasan Open University is Malaysia’s first private not-for-profit tertiary institution dedicated to
adult learners. It is funded by the Wawasan Education Foundation, a tax-exempt entity established
by the Malaysian People’s Movement Party (Gerakan) and supported by the Yeap Chor Ee Charitable
and Endowment Trusts, other charities, corporations, members of the public and occasional grants
from the Government of Malaysia.
The course material development of the university is funded by Yeap Chor Ee Charitable and
Endowment Trusts.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or
transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or
otherwise, without prior written permission from WOU.
Contents
Unit 3 IPv6 Migration and Network
Applications
Unit overview 1
Unit objectives 1
Objectives 3
Introduction 3
Benefits of IPv6 4
Objectives 9
Introduction 9
Objectives 21
Introduction 21
Objectives 31
Introduction 31
IPv6 tunnelling 33
Summary of Unit 3 43
References 47
Glossary 49
UNIT 3 1
IPv6 migration and network applications
Unit Overview
The Internet Assigned Numbers Authority (IANA) has exhausted the global IPv4
address space. Therefore, IPv4 to IPv6 migration has become inevitable and fairly
urgent. IPv4 and IPv6 are different protocols with different addressing schemes
and they are not directly interoperable. The transition from IPv4 to IPv6 will not
happen overnight. To ensure smooth transition, a number of transition mechanisms
are needed to allow the coexistence of IPv4 and IPv6 networks for a period of time.
The routing protocols in IPv4 have to be modified in order to support longer IPv6
addresses and different header structures.
Unit Objectives
By the end of Unit 3, you should be able to:
Introduction
The exhaustion of IPv4 address space is the main reason that prompted the
development of IPv6. IPv4 uses a 32-bit addressing scheme, which allows 232
possible addresses. Due to the increasing numbers of devices connected to the
Internet, the available IPv4 addresses are depleting. Internet Protocol Version 6
or IPv6 was developed to deal with the depletion of the IPv4 address space. IPv6
uses a 128-bit addressing scheme, which is able to support 2128 possible addresses.
In addition to the larger address space, IPv6 has other features such as simpler
header format, multicasting, stateless address configuration, etc.
1. Mobile devices
2. Always-on connections
3. Internet demographics
Benefits of IPv6
Due to the exhaustion of IPv4 address pool, a new addressing protocol, Internet
Protocol version 6 (IPv6), was designed to satisfy the requirement of future Internet.
In this section, we will describe the benefits of IPv6 (Wikipedia: IPv6 2014).
The main advantage of IPv6 over IPv4 is its larger address space. The length of an
IPv6 address is 128 bits, compared with 32 bits in IPv4. The address space therefore
has 2128 or approximately 3.4 × 1038 addresses. This would be about 100 addresses
for every atom on the surface of the earth and almost four /64s per square centimetre
of the planet.
UNIT 3 5
IPv6 migration and network applications
Multicasting
In IPv6, the packet header and the process of packet forwarding have been simplified.
Although IPv6 packet headers are at least twice the size of IPv4 packet headers, packet
processing by routers is generally more efficient, thereby extending the end-to-end
principle of Internet design. Specifically:
1. The packet header in IPv6 is simpler than that used in IPv4, with many
rarely used fields moved to separate optional header extensions.
4. The TTL field of IPv4 has been renamed to Hop Limit in IPv6, reflecting
the fact that routers are no longer expected to compute the time spent by
a packet in a queue.
Activity 3.1
Activity 3.2
IPv4 uses a 32-bit addressing scheme whereas IPv6 uses a 128-bit addressing
scheme. The size of an IPv6 address is much larger than an IPv4 address. It
is important to ensure that an application properly defines the size of data
structures that can accommodate both addressing schemes.
• Function calls
Not all function calls executed in IPv4 will execute in IPv6. Applications must
be checked and analysed to ensure they can be executed in IPv6.
UNIT 3 7
IPv6 migration and network applications
• Types of addresses
Summary
Self-test 3.1
A. I, II and III
B. I, III and IV
C. II, III and IV
D. I, II, III and IV
8 WAWASAN OPEN UNIVERSITY
TSN 304/05 Network Applications
A. I, II and III
B. I, III and IV
C. II, III and IV
D. I, II III and IV
a. address space
b. security
c. transmission mode
Feedback
Activity 3.1
1. Inevitability
2. Efficiency
3. Security
Activity 3.2
Introduction
IPv6 addresses are 128 bits in length and are represented in hexadecimal format.
IPv6 introduces three types of IPv6 addresses: unicast, multicast and anycast. A
unicast address is used to identify a single interface on a network. A packet sent to
a unicast address is delivered to the interface specified by the address. A multicast
address is used to identify a group of interfaces. A packet sent to a multicast address
is delivered to all interfaces identified by the address. An anycast address is used
for one-to-one-of-many delivery. A packet sent to an anycast address is delivered to
the nearest interface identified by the address. Subnetting is the process of dividing
a single network into multiple smaller networks. Subnetting is used to optimise
performance and security as well as to make network management easier.
0 0000 0
1 0001 1
2 0010 2
3 0011 3
4 0100 4
5 0101 5
6 0110 6
7 0111 7
8 1000 8
9 1001 9
10 WAWASAN OPEN UNIVERSITY
TSN 304/05 Network Applications
10 1010 A
11 1011 B
12 1100 C
13 1101 D
14 1110 E
15 1111 F
An IPv6 address consists of 128 bits which is divided into eight 16-bit blocks. Every
block is converted into 4-digit hexadecimal numbers separated by the colon symbol.
For example, an IPv6 address in binary format is divided into eight blocks:
Each block is converted into hexadecimal number and the address is represented as:
2001:0000:3238:DFE1:0063:0000:0000:FEFB
There are two rules provided by IPv6 to shorten the address. The rules are:
2001:0000:3238:DFE1:63:0000:0000:FEFB
Double colon symbol (::) can be used to replace consecutive blocks of zeroes
in block 6 and 7:
2001:0:3238:DFE1:63::FEFB
IPv6 addresses are classified by the primary addressing and routing methodologies
common in networking: unicast addressing, anycast addressing, and multicast
addressing. (Wikipedia: IPv6 Address 2014)
UNIT 3 11
IPv6 migration and network applications
Unicast address
A unicast address is composed of two logical parts: a 64-bit network prefix used for
routing, and a 64-bit interface identifier used to identify a host’s network interface.
The format of a unicast address is illustrated in Figure 3.1:
The network prefix (which consists of the routing prefix and the subnet id) consists
of 64 bits of the address. The size of the routing prefix may vary. If the routing
prefix size is larger, then the subnet id size is smaller. This means that m + n = 64.
The interface identifier (64-bit) is either automatically generated from the interface’s
MAC address or obtained from a server.
The subnet id has 16 bits and is used to identify a subnet within a site. The
16 bits allow an organisation to create up to 65,536 individual subnets. The
interface identifier has 64 bits and it is a unique identifier of a particular
interface. It is unique within the specific prefix and subnet. The format of
a global unicast address is illustrated in Figure 3.2:
2. Link-local address
Web Reference
http://en.wikipedia.org/wiki/Link-local–address
A unique local address is identified by the first 7 bits with binary value of
1111 110 in the prefix. The Local (L) flag has value 1 to indicate that the
prefix is locally assigned. Therefore, a unique-local address has the prefix
FD00::/8. The 40-bit Global ID is generated randomly and it is used to
identify a specific site within an organisation. A unique local address is
illustrated in Figure 3.4:
L
1111 110 Global Id Subnet Id Interface identifier
1
(7-bit) (40-bit) (16-bit) (64-bit)
(1-bit)
Web References
http://en.wikipedia.org/wiki/Unique_local_address
http://www.certs4u.info/ccna/IPv6%20Essentials%20-%20
Silvia%20Hagen.pdf
Activity 3.3
Activity 3.4
Multicast address
A multicast address has a prefix FF00::/8. The 8-bit prefix is set to 1111 1111 to
indicate a multicast address. A multicast address has 4-bit Flags, 4-bit Scope and 112-
bit Group ID. The structure of an IPv6 multicast address is illustrated in Figure 3.5:
14 WAWASAN OPEN UNIVERSITY
TSN 304/05 Network Applications
Flags
1111 1111 Scope Group Id
0RPT
(8-bit) (4-bit) (112-bit)
(4-bit)
1. Flags
The size of the Flags field is 4 bits. The first bit is zero and it is reserved
for future use. The second bit is the Rendezvous Point Address (R) flag. It
indicates whether the multicast address contains an embedded rendezvous
point. The third bit is the Prefix (P) flag, which indicates whether the
multicast address is based on a unicast address prefix. The last bit of the
Flags field is the Transient (T) flag which indicates whether the multicast
address is permanently allocated by the Internet Assigned Number Authority
(IANA). Table 3.2 gives a summary of the multicast address Flags field.
Flag 0 1
2. Scope
The size of Scope field is 4 bits and it indicates the scope of the IPv6 network
for which the multicast traffic is intended. In addition to the information
provided by multicast routing protocols, the multicast scope is used to
determine if multicast traffic can be forwarded. Table 3.3 gives the defined
values for the Scope field.
Scope field
Scope Description
value
0 Reserved –
1 Interface-local Packets with this destination address
scope may not be sent over any network link,
but must remain within the current
node; this is the multicast equivalent
of the unicast loopback address.
2 Link-local scope Packets with this destination address
may not be routed anywhere.
UNIT 3 15
IPv6 migration and network applications
Scope field
Scope Description
value
3 Reserved –
4 Admin-local scope The smallest scope that must be
administratively configured.
5 Site-local scope Restricted to the local physical net-
work.
6,7 Unassigned –
8 Organisation-local Restricted to networks used by the
scope organisation administering the local
network.
9, A, B, C, D Unassigned –
E Global scope Eligible to be routed over the public
internet.
F Reserved –
3. Group ID
The Group ID field is used to identify the multicast group, either permanent
or transient, and is unique within the scope. The size of Group ID field is
112 bits. Permanently assigned Group IDs are independent of the scope.
They can use the Group ID with any scope value whereas transient Group
IDs are dependent on a specific scope. Multicast addresses from FF01::
through FF0F:: are reserved, well-known addresses.
Anycast address
An anycast address identifies a group of interfaces in the IPv6 network called anycast
group. A packet sent to an anycast address is received by the nearest interface in
the anycast group. The nearest interface is defined in terms of routing distance. In
contrast to a multicast address, which is used for one-to-many delivery, an anycast
address is used for one-to-one-of-many delivery. An anycast address has the same
format as unicast address and differs only by their presence in the network at
multiple points.
16 WAWASAN OPEN UNIVERSITY
TSN 304/05 Network Applications
Web References
http://www.certs4u.info/ccna/IPv6%20Essentials%20-%20
Silvia%20Hagen.pdf
http://www.tcpipguide.com/free/index.htm
Web References
1. http://www.tutorialspoint.com/ipv6/ipv6_address_types.htm
2. http://en.wikipedia.org/wiki/IPv6_address
2001:db8:1234:XYZZ:/64
site
sub-site
subnets
For each site, sub-sites can be used to determine the types of devices such as
workstations, printers, etc.
Activity 3.5
Activity 3.6
00110001110110100000000011010011000000000000000000
10111100111111
00000010101010100000000011111111111111100010100010
01110001011010
Summary
IPv6 address is 128 bits long and is logically divided into a network
prefix and an interface identifier. The default prefix length is 64 bits
(/64) and the remaining 64 bits are used for the interface identifier.
IPv6 supports three main types of addresses: unicast, multicast and
anycast. Each address type has a scope that specifies in which part
of the network it is valid and unique. Some addresses are unique
only on the local network, whereas some are globally unique. In
the 64-bit network prefix, we can allocate 16 bits for subnetting.
Subnetting is a method for splitting a network into smaller networks.
By separating a large network into distinct but interconnected
subnets, it is easier to isolate the performance issues and enhance
the maintenance process.
Self-test 3.2
A. I, II and III
B. I, II, III and IV
C. I and II
D. III and IV
UNIT 3 19
IPv6 migration and network applications
Feedback
Activity 3.3
2. Link-local address
3. Unique-local address
4. Special address
5. Compatibility address
Activity 3.4
Activity 3.5
Activity 3.6
31DA:00D3:0000:2F3F:02AA:00FF:FE28:9C5A
31DA:D3:0:2F3F:2AA:FF:FE28:9C5A
UNIT 3 21
IPv6 migration and network applications
1. Describe the routing process and the various types of routing protocols.
Introduction
Routing is the process of forwarding a packet from a source host to a destination
host on a network. Typically, when there are multiple routes to a destination, one
route needs to be selected. A routing table is used to keep track of the routes together
with their metrics. A router will select a best route based on the information in the
routing table. Manually populating the routing table is expensive. Therefore, routing
protocols are used to automatically populate the routing table. Routing protocols
provide a way for routers to exchange information from their routing tables in order
to determine the best route to a destination.
IPv6 router
A router is needed to forward IPv6 packets between different subnets. Each router
maintains a local routing table for each protocol it is configured to route. An entry
in the routing table represents an IPv6 route, which includes an IPv6 address prefix
and its length, the next-hop and the metric of the IPv6 route. When a router receives
a packet, it looks at the packet’s destination address and searches for a matching
entry in its local routing table. If a match is found, the packet is forwarded to the
next router or the final destination based on the next-hop information in the entry
in the routing table.
22 WAWASAN OPEN UNIVERSITY
TSN 304/05 Network Applications
Routing table
A routing table is a data table maintained in a router that contains the routes to
particular network destinations and the metrics associated with those routes. The
routing table contains information about the topology of the network immediately
around it. The routing table consists of at least three information fields:
2. Cost/metric: The cost of metric of the path through which the packet is to
be sent.
3. Next hop: The next-hop is the address of the next location to which the
packet is to be sent on the way to its final destination.
The construction of the routing table is a primary issue. Routing table can be
populated manually, which is called static routing. However, static routing is more
expensive. An efficient automatic approach is by deploying routing protocols
(dynamic routing).
Activity 3.7
Web References
http://www.certs4u.info/ccna/IPv6%20Essentials%20-%20
Silvia%20Hagen.pdf
http://www.mums.ac.ir/shares/hit/eduhit/book/IPv6.pdf
24 WAWASAN OPEN UNIVERSITY
TSN 304/05 Network Applications
Web References
http://en.wikipedia.org/wiki/Routing
http://www.tutorialspoint.com/ipv6/ipv6_routing.htm
Activity 3.8
In the network below, find the shortest paths and their costs and
the next-hop entries from A to every other node.
10 B 1
C
A 6 7 2
1
E 1 D
RIPng configuration
To use RIPng, we must configure RIPng on all of the interfaces in the IPv6 network.
The configuration process includes creating the routing process, enabling the routing
process on interfaces and customising the routing protocol for a particular network.
The first step is to create an IPv6 routing process with a specific name. The syntax
of the command is:
In this section, we will give an example of RIPng configuration. Figure 3.7 illustrates
an example of network topology used for RIPng configuration. There are two routers
that need to be configured with RIPng.
2050::1/64 2050::2/64
Name: Austin Name: Houston
F0/0 F0/0
R1 R2
R1
Step 1 R1# configure terminal Enter global configuration mode
Step 2 R1(config)# ipv6 unicast-routing Enable forwarding IPv6 packets
Step 3 R1(config)# interface f0/0 Enter interface configuration mode
Step 4 R1(config-if )# ipv6 address 2050::1/64 Configure the IPv6 interface
Step 5 R1(config-if )# ipv6 rip Austin enable Enable RIPng on the interface
R2
Step 6 R2# configure terminal Enter global configuration mode
Step 7 R2(config)# ipv6 unicast-routing Enable forwarding IPv6 packets
Step 8 R2(config)# interface f0/0 Enter interface configuration mode
Step 9 R2(config-if )# ipv6 address 2050::2/64 Configure the IPv6 interface
Step 10 R2(config-if )# ipv6 rip Austin enable Enable RIPng on the interface
Web Reference
http://www.6net.org/book/deployment-guide.pdf
UNIT 3 27
IPv6 migration and network applications
Activity 3.9
Summary
Self-test 3.3
A. I, II and III
B. I, II and IV
C. I, III and IV
D. I, II, III and IV
A. True
B. False
28 WAWASAN OPEN UNIVERSITY
TSN 304/05 Network Applications
Feedback
Activity 3.7
Distance-vector routing
Link-state routing protocol
protocol
1 Uses Bellman-Ford algorithm Uses Dijkstra algorithm
2 Uses distance or hopcount Uses current congestion,
as metric to define the best cost and speed to determine
path to a destination the best path
3 Sends routing updates Sends triggered change
periodically based on updates when
there is a topology change
4 Relies fully on the information Does not rely solely on the
from its neighbours information from its
neighbours
Activity 3.8
1
10 B
C
6 7
A 2
1
E D
1
Example:
1. A → B (weight: 10)
2. A → E → B (weight: 1+6=7)
3. A → E → C → B (weight: 1+7+1=9)
4. A → E → D → C → B (weight: 1+1+2+1=5)
Activity 3.9
2. RIPng uses only a fixed metric, which is the hop count to select
a route. Other parameters such as measured delay, reliability
and load are ignored.
30 WAWASAN OPEN UNIVERSITY
TSN 304/05 Network Applications
UNIT 3 31
IPv6 migration and network applications
Introduction
It is important to understand that IPv4 to IPv6 transition would not happen
overnight. IPv6 and IPv4 will coexist for many years. A wide range of techniques have
been developed to make the coexistence possible and to provide an easy transition.
It is important to find a best migration method that suits the requirement of each
organisation and network.
Dual-stack technique
Dual-stack technique allows IPv4 and IPv6 to coexist in the same device and network.
It refers to the side-by-side implementation of IPv4 and IPv6 where both IPv4 and
IPv6 protocols run on the same network infrastructure. A dual-stack architecture
contains both IPv4 and IPv6 internet layers with separate protocol stacks. Each
protocol stack has separate implementation of transport layer protocols. Figure 3.8
illustrates a dual-stack architecture.
Application layer
All network devices such as routers are both IPv4 and IPv6 enabled. If both end
hosts support IPv6, they can communicate using IPv6. Otherwise, they will
communicate using IPv4. The advantage of dual-stack technique is that both IPv4
and IPv6 protocols are in native mode. Applications can migrate from IPv4 to IPv6
when they are available. Therefore, traffic shifts smoothly from IPv4 to IPv6 and
no temporary transition mechanisms are needed.
Activity 3.10
Tunnelling technique
Many current internet users do not have IPv6 dual-stack support and thus cannot
reach IPv6 sites directly. Instead, they must use IPv4 infrastructure to carry IPv6
packets. This is done using a technique known as tunnelling, which encapsulates
IPv6 packets in IPv4 packets. The packets are transmitted across the IPv4 network.
The packets are decapsulated to their original IPv6 format when they exit the IPv4
network. More details on tunnelling technique are described in the next subsection.
Web Reference
http://www.certs4u.info/ccna/IPv6%20Essentials%20-%20
Silvia%20Hagen.pdf
IPv6 tunnelling
Tunnelling is also called encapsulation and this technique is used when two IPv6
devices want to communicate with each other via an IPv4 network. Tunnelling
allows isolated IPv6 hosts to communicate without the need to upgrade the IPv4
network between them. In this technique, an IPv6 packet is encapsulated inside an
IPv4 packet and forwarded over the IPv4 network. An IPv4 header (as illustrated
in Figure 3.9) is added to an IPv6 packet when it enters the IPv4 region. In the
IPv4 header, the IPv4 protocol field is set to 41 to indicate an encapsulated IPv6
packet. The source and destination fields are set to IPv4 addresses of the tunnel
endpoints. When the IPv6 packet exits the IPv4 region, the IPv4 header is removed
(decapsulation).
IPv6 Packet
Upper-Layer
IPv6 Header Extension Headers
Protocol Data Unit
Upper-Layer
IPv4 Header IPv6 Header Extension Headers
Protocol Data Unit
IPv4 Packet
Figure 3.10 shows two IPv6 networks connected via an IPv4 network. The network
between router R1 and router R2 is an IPv4-only network. Host A on an IPv6
network wants to send an IPv6 packet to host B on another IPv6 network. Host A
sends the IPv6 packet to router R1, which is the tunnel entry point. When router R1
receives the packet, it encapsulates the packet with an IPv4 header and forwards it
to router R2. In this case, router R2 is the tunnel exit point. Router R2 decapsulates
the packet and forwards it to host B, which is the final destination. It is possible to
have any number of IPv4 routers between R1 and R2.
IPv4 network
IPv6 IPv6
IPv6-over-IPv4 Tunnel network
network
A R1 R2 B
Tunnelling configurations
There are three types of tunneling configurations to tunnel IPv6 traffic over an
IPv4 network.
1. Router-to-router
IPv6-over-IPv4 Tunnel
IPv6/IPv4 Router IPv6/IPv4 Router
IPv6 Host IPv6 Host
v6 add=X v6 add=Y
v6 add=W v6 add=Z
v4 add=B v4 add=C
2. Host-to-router or router-to-host
IPv6-over-IPv4 Tunnel
3. Host-to-host
IPv4 network
IPv6-over-IPv4 Tunnel
v4 source=A v6 source=W
v4 dest=D v6 dest=Z
IPv6 in IPv4 packet
Types of tunnels
There are two types of tunnels, configured tunnel and automatic tunnel. In a
configured tunnel, the tunnel endpoint address is predefined. For each tunnel,
the encapsulating node keeps the tunnel endpoint address. When an IPv6 packet
is transmitted over the tunnel, the tunnel endpoint address is used as destination
address for the encapsulating IPv4 header. Typically, manually configured tunnels
are used for router-to-router tunnelling.
On the other hand, an automatic tunnel does not require manual configuration.
The tunnel endpoints are determined automatically using an IPv4-compatible IPv6
address. For example, 6to4 is an automatic tunneling technique that uses protocol
41 encapsulation. Tunnel endpoints are determined using a well-known IPv4 anycast
address on the remote side and by embedding IPv4 address information within IPv6
addresses on the local site.
Web Reference
http://en.wikipedia.org/wiki/IPv6
UNIT 3 37
IPv6 migration and network applications
Web References
http://www.mums.ac.ir/shares/hit/eduhit/book/IPv6.pdf
http://www.certs4u.info/ccna/IPv6%20Essentials%20-%20
Silvia%20Hagen.pdf
Web Reference
http://arxiv.org/pdf/1410.2013.pdf
1. Agree on the set of security protocols used, so that the packets are sent in a
format where both parties can understand.
3. Exchange keys that are used to unlock the data that has been cryptographically
encoded.
38 WAWASAN OPEN UNIVERSITY
TSN 304/05 Network Applications
After both parties agree on the settings, they have to use the protocols, encryption
algorithm and keys to encode the data when the packets are sent across the network.
The IPSec protocol suite uses two core security protocols: Authentication Header
(AH) and Encapsulating Security Payload (ESP).
c. Reserved
f. Integrity check value contains the checksum for the packet that is used
to verify the integrity of the message.
IPSec can work in two modes: tunnel mode and transport mode. In tunnel mode,
IPSec encrypts the IP header and the payload, whereas in transport mode, only the
IP payload is encrypted for example, when computer A sends a packet to computer
B. A typical TCP/IP packet is illustrated in Figure 3.14.
IP header IP payload
Figure 3.15 and Figure 3.16 illustrate the packet structure in ESP tunnel mode
and transport mode respectively. ESP tunnel mode protects the whole IP packet
(Figure 3.15). The IP packet is encapsulated with an ESP header and a new IP
header. The IP addresses of the new IP header are the tunnel endpoints, whereas
the IP addresses of the original IP header are the ultimate source and destination
addresses.
ESP in transport mode does not protect the IP header. As shown in Figure 3.16,
the ESP header is placed before the IP payload and an ESP trailer and an ESP
authentication field are placed after the IP payload.
Original Original
IP payload
packet IP header
Encrypted
Authenticated
Original Original
IP payload
packet IP header
Encrypted
Authenticated
Web Reference
http://www.tcpipguide.com/free/index.htm
Web References
1. http://en.wikipedia.org/wiki/IPsec
2. http://technet.microsoft.com/en-us/library/cc959500.aspx
Summary
Self-test 3.4
A. I, II and III
B. I, II and IV
C. I, III and IV
D. I, II, III and IV
A. Router-to-router
B. Host-to-router
C. Router-to-host
D. Host-to-host
A. I and II
B. I, II and III
C. I, II and IV
D. I, II, III and IV
42 WAWASAN OPEN UNIVERSITY
TSN 304/05 Network Applications
I Authentication
II Integrity
III Confidentiality
IV Replay protection
A. I, II and III
B. I, II and IV
C. I, III and IV
D. I, II, III and IV
Feedback
Activity 3.10
Devices configured using only one stack must forward their traffic
to a dual-stack device, which is an inefficient use of bandwidth.
UNIT 3 43
IPv6 migration and network applications
Summary of Unit 3
Summary
Feedback
Self-test 3.1
1. B
2. D
3. a. Address space
b. Security
c. Transmission mode
Self-test 3.2
1. A
2. A
3. 0000, 0001
46 WAWASAN OPEN UNIVERSITY
TSN 304/05 Network Applications
Self-test 3.3
1. Static routing
Dynamic routing
2. B
3. A
Self-test 3.4
1. D
2. B
3. A
4. B
References
Ali, A and Issac, B (2014) ‘Analysis of Ipv6 transition technologies’, International
Journal of Computer Networks & Communications (IJCNC), 6(5).
Hagen, S (2014) IPv6 Essentials: Integrating IPv6 into Your IPv4 Network, 3rd edn,
O'Reilly Media, Inc.
Additional references
http://en.wikipedia.org/wiki/IPv6
http://en.wikipedia.org/wiki/IPv4_address_exhaustion
http://en.wikipedia.org/wiki/IPv6_address
http://en.wikipedia.org/wiki/Multicast_address
http://en.wikipedia.org/wiki/Routing_table
http://en.wikipedia.org/wiki/Routing_protocol
48 WAWASAN OPEN UNIVERSITY
TSN 304/05 Network Applications
UNIT 3 49
IPv6 migration and network applications
Glossary
Anycast address An address assigned from the unicast address
space. It identifies a group of interfaces and is
used for one-to-one-of-many delivery.
IPv6 routing table A data table stored in a router that keeps track of
the routes along with their metrics to particular
destinations.