Deployment of Ipv6: Cover Diagram
Deployment of Ipv6: Cover Diagram
Deployment of Ipv6: Cover Diagram
Abstract
The gradual transition from IPv4 to IPv6 requires the network admin to become aware of the
next generation protocol IPv6 and its associated security risks. The deployment of IPv6 in campus
network requires transport process of IPv4 to IPv6, common transitory techniques include dual
stack, tunneling and protocol conversion technique and others.
In the specific situation of the deployment of IPv6 in campus network, we usually use dual stack
mode, inter-site automation tunnel addressing protocol (ISATAP), manual configuration tunnel
and mixture modes of deployment.
Dual Stack is a type of transition mechanism which plays an important role in
IPv6 and 4G networks. However, the presence of IPv6 makes network susceptible to attack. One
of the major problems in the Dual Stack transition mechanism is Threat issues. By transitioning
to IPv6 without adequate precautions, an adversary can easily bypass the network security
infrastructure.
In this, we proposed a transitional method of IPv4 to IPv6 and transitional threats and attacks
model to solve all IPv6 threat issues for dual stack transition in 4G.
Cover Diagram
Architecture Diagram
1. Dual-Stack Deployment
2. Tunnel Deployment
Issue No of Papers
Deployment/Implementation 5
Security 3
Optimization 2
Optimization issues
The paper proposed [86] CRC checking at Network Layer to reduce link layer processing
overheads and increased the performance of link layer.
In the Network Optimization paper [103] proposed Memory Management system to overcome
the memory buffer overflow issue in implementation of IPv6 in LoWPAN.
In this section we mentioned the technologies and approached discussed in various papers and
the next section will discussed about the key findings of this review paper.
Proposed Technology
Since IPv6 will take a long time to completely implement itself over networking devices so to
implement IPv6 over network we have to implement it parallel with IPv4 technology and we do
this by using IPv6 Transition Technology.
In the above diagram, a server having IPv4 as well as IPv6 address configured for it can
now speak with all the hosts on both the IPv4 as well as the IPv6 networks with the help
of a Dual Stack Router. The Dual Stack Router can communicate with both the networks.
It provides a medium for the hosts to access a server without changing their respective IP
versions.
2. IPv4-IPv6 tunneling: In IPv4 network to IPv6 network transition scene, multiple isolated
IPv6 network or hosts need to communicate with each other across the IPv4 network.
IPv6-over-IPv4 tunneling is a kind of transition technology under this scenario. In IPv4 in
IPv6 GRE (Generic Routing Encapsulation) tunnel, IPv6 packets was carried in standard
GRE tunnel in IPv4 network. GRE tunneling is a kind of manual tunnel and can be generally
used to provide point to point connection. However, Large-scale GRE tunnel configuration
work is complex and hard. Forwarding mechanism and characteristics of the IPv6 in IPv4
manual tunnel is like the GRE tunnel. Multiple isolated IPv6 network can be connected
through IPv4 network by 6to4 tunnel. 6to4 tunnel is a multipoint connection type. 6to4
tunnel is an automatic tunnel technology, needed a special 6to4 address. 6to4 tunnel is
facilitated to maintenance, but the drawback is that the special 6to4 address must be
used. 6over4 is also an automatic tunnel, but not widely used because it requires the
condition that multicast must be supported by IPv4 network. ISATAP (Intra-Site Automatic
Tunnel Addressing Protocol) tunnel is a kind of the automatic tunnel technology, while
supporting address autoconfiguration. ND (Neighbor Discovery) protocol can be run
between the devices that connected by the ISATAP tunnel. Dual-stack host that dispersed
in IPv4 network can automatically get global IPv6 addresses and connected through
ISATAP. 6PE (IPv6 Provider Edge) is an IPv6 edge routers communicate with each other
through current existing IPv4 MPLS network. In this technology, the existing IPv4 MPLS
backbone network was used to provide access to distributed IPv6 users. The scalability of
6PE is good. The existing network architecture and business will not be impacted by 6PE,
but MPLS must be deployed in the backbone network between PE.
The above diagram depicts how two remote IPv4 networks can communicate via a Tunnel,
where the transit network was on IPv6. Vice versa is also possible where the transit
network is on IPv6 and the remote sites that intend to communicate are on IPv4.
Conclusion
IPv6 technique is an inexorable trend. How to transmit effectively becomes an essential issue we
need to solve. For the dual stake mode, the implementer obstacle is less, but if network
equipment does not support IPv6, the cost of the upgrade of equipment is more. Tunnel
techniques always need to combine with dual stack technique. As a protocol transition technique,
IVI has a great effect in generalize pure IPv6 network. It is also an important technique in CNGI
commercial stage. The above IPv6 deployed scheme has valuable selector in the practical campus
network. The actual deployed scheme need to be given a specific project according to network
scale, existing environment, implement period, target service and capital budget