Global Mobile IPv6 Addressing Using Transition Mechanisms

Size: px
Start display at page:

Download "Global Mobile IPv6 Addressing Using Transition Mechanisms"

Transcription

1 Global Mobile IPv6 Addressing Using Transition Mechanisms Edgard JAMHOUR PPGIA, PUCPR, Brazil Simone STOROZ PPGIA, PUCPR, Brazil Abstract The adoption of the protocol in wireless technologies has considerably increased the number of hosts that can potentially access the global. The pressure for more IP addresses and the almost exhaustion of the address space has raised again the interest on the IPv6 protocol. This paper describes an approach for implementing wireless networks with global connectivity using private addresses and transition mechanisms published by IETF. The approach described in this paper is called Transparent IPv6. It consists in virtually assigning IPv6 addresses to private hosts without modifying enduser devices. The mobile hosts with virtual IPv6 addresses are fully addressable through the global by using IPv6 addresses or Fully Qualified Domain Names (FQDN). As shown in the paper, it permits the deployment of mobile networks with global connectivity without requiring public addresses. 1. Introduction In this paper, we address the issue of implementing Mobile IP [1] based networks using private IP addresses. We found Mobile IP implementations in cellular networks technologies such as GPRS [2] and iden [3]. Mobile IP can also be employed to provide seamless roaming between wireless localarea networks (WLANs), or even across different types of infrastructures (i.e., WLAN and cellular networks). However, in order to provide connectivity to the global, one must consider the shortage of IP version 4 () addresses. The use of private addresses [4] was considered a temporary solution to the shortage problem until a new addressing scheme, IPv6, would be adopted [5]. Private addresses are not considered a final solution because they are not fully addressable. That is, a host with a private address can start a session with a host with a public address, using a translation address mechanism such as a Address Translation (NAT) Gateway, but not the contrary [6]. IPv6 solves this problem by offering a virtually unlimited address space. However, there is expected to be a long transition period during which it will be necessary for and IPv6 to coexist and communicate. For this reason, IETF has recently published a significant set of mechanisms allowing IPv6 hosts to communicate through an existing infrastructure or, yet, allowing the communication between and IPv6 hosts. These mechanisms are known as "Transition Mechanisms" [7]. An overview of the IETF published mechanisms is presented in this paper. Then, a new mechanism that combines some important features of the existing mechanisms is proposed. Our proposal allows to "virtually" assigning IPv6 addresses to hosts without any hardware or software modification on the host. The mechanism is based on the introduction of a transparent gateway at the border of private networks. This mechanism is called in this paper Transparent IPv6 (TIP6, for short). The main idea is to provide the benefits of IPv6 addressing minimizing the changes in the existing infrastructure. In fact, this mechanism could be immediately implemented in Mobile IP based networks. Even though the TIP6 uses similar techniques employed by the transition mechanisms, it aims a different goal. The main idea is not to permit an host to communicate to an IPv6 host, but to permit hosts with private addresses to be fully addressable thought the. For these hosts, the use of IPv6 protocol is completely transparent, leading to the name "Transparent IPv6". TIP6 mechanism extends standard NAT implementations by permitting a private host in a TIP6 network to receive connections from public hosts, from other TIP6 networks or from true IPv6 hosts. Then TIP6 can also be considered a transition mechanism, because it also will permit the coexistence of emerging IPv6 implementations with existent s. This paper is structured as follows. Section 2 review several concepts related to the Mobile IP standard. Section 3 presents use of private IP addresses in Mobile IP networks and standard private to public translation mechanisms. Section 4 presents a review of the current IETF published transition mechanism. Section 5 presents the theory required to introduce the TIP6 mechanism. Section 6 finally presents the TIP6 mechanism. Section 7 presents the employment of Transparent IPv6 in wireless networks. The conclusion /02 $ IEEE

2 compares TIP6 with other transition mechanisms and points to future developments. 2. Mobile IP Review This section reviews the Mobile IP standard and defines the terminology used in the remaining of this paper. All the examples given in this paper assume a cellular network. However, the same idea can be easily adapted to any type of wireless network based on Mobile IP. The Mobile IP standard [1] treats the problem that may arise when a host changes its IP address during a communication. A mobile host changes its IP address because the IP protocol [27] assumes that each IP network identifier is related to a specific physical network. For example, when a cellular device changes its position, it can potentially connect to another cellular cell (or a coverage area defined by an access point) that is closer than its home cell. When it happens, this cellular device can potentially be attached to a different physical network (several cellular cells may represent the same physical network. It depends on the carrier network implementation). If a mobile host (e.g. a cellular device) connects to another physical network, it must change its IP. Changing the IP within a communication session will require rebooting any application being executed in the mobile host. Mobile IP solves this problem by using a tunneling technique. In this approach, each mobile host has two IP addresses. One IP is related to its home network (where the mobile host is registered), and does not change when the host changes its position. The second IP is related to a foreign network, and changes each time the host attaches to a different physical network (refer to Figure 1). This second IP is called COA (CareOfAddress). The router attached to the mobile host at the foreign network is called foreign agent. The router at the home network is called home agent. The home agent is a special router, responsible for authenticating the mobile host, and keeping an internal table mapping the COA to the home IP address of every mobile host. Mobile IP specifies that is up to the mobile host the responsibility of informing the home agent that it has changed its COA. For doing this, the mobile host send a binding update message to the home agent each time it changes its COA. The message is delivered to the home agent by the foreign agent. The binding update message contains a digital signature allowing the home agent to validate the binding request. For validating the digital signature, the home agent must share a secret key with each mobile host it serves. The secret keys and related information are stored in an AAA (Authentication, Authorization and Accounting) server. The mobile device changes its position. RF link RF link Cell Foreign BSS: Home BSS AAA Server Foreign Agent () Home Agent () BSS: Base Station System Figure 1. Simplified representation of a Mobile IP network From a nonmobile host viewpoint, a mobile host is identified by its home IP address. Packets from the are delivered to the mobile host through a tunnel that follows the hosts while it changes its position and attaches to different networks. Depending on the preferred implementation, this tunnel can be created between the home agent and the foreign agent, or between the home agent and the mobile host. The tunnel is created by encapsulating the incoming packets from the, addressing the mobile host by its home address, with an IP header that addresses the mobile host by its CareOf Address (COA). If the tunnel is created only up to the foreign agent, then all the mobile hosts served by the same foreign agent can share the same COA. If the tunnel is created up to the mobile host, than every mobile host must have their own COA. Please refer to [1] for more details about the Mobile IP standard terminology and operation. 3. Private IP Addresses in Mobile Private IP addresses are defined by RFC 1918 [4]. The private IP addresses can be freely used inside a private network, but they are not routable through the. The IP addresses reserved for private use are: /8, /16 and /16. Hosts with private IP addresses can exchange information with other hosts connected to the only by using IP address translators such as Proxy or NAT ( Address Translation) [6]. Many cellular networks operate nowadays using private addresses. Private addresses can be used without restriction for deploying WAP services, for example, because the WAP gateway can act as a Proxy for the mobile subscribers [8]. However, WAP is not the only packetdata service that can be deployed over a cellular network. Tethered (i.e. the /02 $ IEEE

3 cellular is a modem for a portable computer) and non WAP embedded applications need another mediator to access the such as NAT or Proxy. The same reasoning applies to a mobile device connected to a WLAN. The operation principle for both, NAT and Proxy, is almost the same: they replace the private IP addresses in the packets delivered to the by their own public IP addresses. Operating this way, they permit to use the same public IP address for several devices (in general, thousands of private IP addresses per public IP). An important limitation, however, is that a host with a private IP can act only as a client, because its address is not visible by hosts outside the private network. A Proxy is typically implemented as an application server. Therefore, the use of a Proxy is not transparent for a host, because the traffic transmitted by the host must be explicitly redirected to the Proxy. Being an application server, a Proxy breaks the clientserver model, i.e., a TCP connection between a client and a server is broken in two TCP connections, by inserting the Proxy as a mediator. A Proxy with a single public IP address can be used to support thousands of concurrent private IP sessions. The term "transparent proxy" is used when the default gateway is configured to redirect a selected traffic to the Proxy. In this case, the Proxy approach becomes transparent to the clients. A NAT, by the other hand, is typically implemented on routers. The NAT device is usually seen as the default gateway for the hosts with private IP addresses (i.e. NAT is application transparent). NAT is almost independent of the application protocol transported by the IP packets. Just the protocols that transport the source address in the data field of the packet present some problems for NAT operation [6]. Basically, NAT can be implemented by two different mechanisms: with or without port (TCP/UDP) translation. When port translation is not implemented, the number of concurrent sessions is limited to the number of public IP addresses available. With port translation, in this case NAT is also named PAT (Port Address Translation) or NAPT ( Address and Port Translation), a single public IP address can be used to support thousands of concurrent private IP sessions (similarly as a Proxy). Theoretically, one public IP address can be used to map about 63K private IP addresses (the number of TCP/UDP ports excluding well known ports), considering one connection per IP. In general, a NAT router uses a small poll of public addresses that allows to map hundreds of thousands private IP addresses [9]. When using a NAT or Proxy one must consider that all mobile hosts will appear to other hosts as being the same computer, because they will use the same IP address. Therefore, hosts with private IP addresses can t be used as servers, because there s no way to initiate a connection with them. This limitation can be somewhat minimized by implementing a NAT variant known as bidirectional or twoway NAT [9]. Bidirectional NAT is used in conjunction with a DNS extension, implemented as a DNS Application Level Gateway (DNS_ALG) [10]. In this mechanism, fully qualified domain names (FQDN) identify hosts with private addresses. When an external host query for a host name in a private network, DNS_ALG triggers a NAT session on a bidirectional NAT, mapping a public address to the private host. This dynamic mapped public address is then returned to the external host. It should be noted, however, that bidirectional NAT requires a pool of public addresses. This solution is not intended to provide bidirectional addressing to a large number of hosts, but instead, for just a selected number of host that are required to be externally addressed. 4. Transition Mechanisms As stated in previous section, private addresses allow deploying IP networks of virtually unlimited sized. However, hosts with private addresses can act only as clients, i.e., they can t receive a message from a host they haven t initiated a connection before. To overcome this limitation, this section will evaluate the use of Protocol Version 6 (IPv6) addresses [5,11] as an alternative to the private addresses mechanism. IPv6 is considered a real alternative for solving the shortageaddressing problem because it can support a virtually unlimited number of devices by introducing a 16byte address space. However, and IPv6 are not compatible. That means that adopting IPv6 will require changes in the existing infrastructure, including end user s and network devices. To allow an immediate use of IPv6 over existing infrastructure, transition techniques should be employed [7]. Several transition mechanisms have already been published by IETF, and they are still under development. An overview of these transition mechanisms is presented in an IETF Draft reviewed periodically [12]. There still no transition mechanism that could be used in any situation. Each transition mechanism intends to solve specific transition issues. In many situations, more than one transition mechanism should be used in order to allow proper communication between and IPv6 hosts and routers [13]. In order to facilitate the presentation of these mechanisms, they have been classified into 4 groups. The classification exposed here is for didactical purposes only; they are not employed by the IETF. The four groups are: DualStack Host Based Mechanisms, Transparent Gateway Based Mechanisms, Transport Layer Based Mechanisms and Tunneling Based Transition Mechanisms. Next we present a summary of /02 $ IEEE

4 each group of mechanisms and a table comparing its main features DualStack Host Based Mechanisms The dual stack approach is a straitforward way to assure the coexistence between and IPv6 hosts. A dual stack host has both an stack and an IPv6 stack implemented in a multiprotocol network operating system. By selecting the proper API, the application chooses the IPv6 or the stack for network communication, i.e., a dual stack approach requires existent applications to be rewritten using IPv6 API, in order to access the IPv6 stack. For avoiding this problem, two solutions have been proposed. The first one is named "BumpInThe Stack", or BIS for short [19]. The BIS approach allows applications to communicate with IPv6 applications by integrating in the host a translator that converts packets into IPv6 packets and viceversa. The translator mechanism is based on SIIT [20], and it is triggered when the application query a DNS server that responds with an "AAAA record". When the DNS server answers with an "A record", no translation is applied. Table 1: DualStack Host Based Mechanisms Mechanism Dual Stack BumpIn TheStack (BIS) BumpIn TheAPI (BIA) Dual Stack Transition Mechanism (DSTM) Allows Communication Between... A dual /IPv6 stack host and only or IPv6only hosts. A dual /IPv6 stack host running BIS and only or IPv6only hosts. A dual /IPv6 stack host running BIA and only or IPv6only hosts. A dual /IPv6 stack host running DSTM and only hosts. or IPv6. or IPv6 or IPv6. IPv6 domains connected to the. Observation applications need to be rewritten to have access to the IPv6 stack. Requires public addresses. Requires special software running at the host that converts headers to IPv6 headers. Requires special software running at the host that converts APIs to IPv6 APIs. Requires special software running at the host and a pool of public address. Recently, a similar approach called "Bumpinthe API" (BIA) [21] has been published as an IETF draft. The goal of this mechanism is the same of the BIS, but this mechanism provides the translation method between the APIs and IPv6 APIs. Thus, the goal is simply achieved without IP header translation. A third approach named DSTM (Dual Stack Transition Mechanism) also uses a dual stack host [22]. This mechanism however focuses a different issue. It aims to allow dual stack hosts, connected to IPv6 only networks, to communicate to only hosts in the. For allowing this, a 4over6 tunneling technique that encapsulates packets in the payload of IPv6 packets is employed. The packets are sent to a DSTM gateway, located at the border of the IPv6 network, that decapsulates the packets and deliver them through the. In the DSTM approach, addresses are not permanently allocated to the dual stack hosts. Instead, when a communication to an only host needs to be implemented, a DSTM server allocates a temporary address to the dual stack host. Table 1 presents a summary of the DualStack Host Mechanisms Transparent Gateway Based Mechanisms Transparent Gateway is a term used to describe gateways that implement some sort of address translation. Transparent gateway transition mechanisms are similar to conventional NAT. But instead of mapping private to public addresses, they map to IPv6 addresses. This approach permits to interconnect and IPv6 hosts without installing special software in the host. Both, NATPT ( Address Translation Protocol Translation) and NAPTPT ( Address and Port Translation Protocol Translation) are examples of transparent gateway mechanisms [26]. They enable communication between a host connected to an IPv6only network and a only host within the legacy. NATPT as defined in RFC 2766 uses public addresses only. Private addresses are considered for further study. IPv6 to communication follows this sequence: an IPv6 host sends an IPv6 packet to the NAT PT gateway. The NATPT gateway has a pool of public addresses. It maps the IPv6 address of the host to an address from the pool, implements the IPv6to protocol translation, and delivers the packet to the host. In order to address the host, the IPv6 host needs to add a preconfigured PREFIX::/96 to the address of the destination host. Only the packets with the preconfigured prefix are directed to the NATPT that builds the destination address by dropping the prefix. In traditional NATPT only IPv6 hosts can initiate sessions. With BidirectionalNATPT, sessions can be initiated from both hosts and IPv6 hosts. For implementing bidirectional NATPT, DNS_ALGS is required. Similarly to NAPT, NAPTPT allows sharing a single public address among 63K simultaneous connections. NAPTPT is always unidirectional (IPv6 to hosts). Table 2 presents a summary of the Transparent Gateway Based Mechanisms /02 $ IEEE

5 Mechanism NATPT NAPTPT Table 2: Transparent Gateway Based Mechanisms Allows Communication Between... IPv6 only hosts to only hosts. IPv6 only hosts to only hosts. IPv6 domains connected to the. IPv6 domains connected to the. Observation Requires a pool of public addresses. When integrates a DNS_ALGS, it becomes bidirectional. Similar to NAT PT, but employs NAPT instead of NAT. Require only one public address, but is unidirectional 4.3. Superior Layer Gateway Based Mechanisms Similarly as a conventional Proxy can map private to public addresses operating above the network layer, transition mechanism can also operate above the network layer. The most evident example of translation at the superior layers is the SOCKS64 Proxy [23]. SOCKS64 proxy is an enhanced proxy that employs the same approach than the conventional SOCKS [24]. In fact, sites that already use SOCKSaware clients can be easily updated to enable hosts to connect to IPv6 hosts. For doing that, the SOCKS gateway is implemented as a dual /IPv6 stack host. SOCKS64 uses a DNS trick to enable hosts to address IPv6 hosts. The SOCKS LIB, implemented in the client, intercept DNS queries an answers with fake addresses. When the client calls the "connect API", the SOCKS LIB replaces the fake IP by the original FQDN and delivers the "socksified" packet to the proxy that performs the real DNS query. If the answer is an "AAAA record", the proxy opens a socket to the destination IPv6 host using the IPv6 interface. Otherwise, it uses the interface. SOCKS64 is a bidirectional solution because it enables hosts open sessions with IPv6 hosts and viceversa. But the addresses are supposed to be public. A problem with the socks approach is that it broke the clientserver model, i.e., the Proxy internally maintains two sockets, and it may be a performance issue when the network is under huge traffic. A second mechanism called Transport Relay Translator (TRT) operates in a similar way than SOCKS64 [25]. The straitforward use of the TRT mechanism is to enable clients IPv6 onlyhosts to connect to servers onlyhosts without any software modification. For doing that, TRT introduces in the network an intermediary device that acts as a transport relay translator that respond for all IPv6 addresses with a dummy prefix (say C6::/64) in a IPv6 network. In order to address an host, an IPv6 host must build a fake IPv6 address by adding the dummy prefix to the address of the destination host. Consequently, the transport relay intercept all traffic designated to hosts, and similarly as the SOCKS64 mechanism, it opens an TCP connection or sends UDP datagrams to the destination. Theoretically, TRT can also be employed to permit hosts to initiate connections to IPv6 hosts, by using temporary mapped addresses on the IPv6 side, as implemented in the NATPT. TRT also broke the client server model. Table 3 presents a summary of the Superior Layer Based Gateway Mechanisms. Table 3: Superior Layer Based Gateway Mechanisms Mechanism Socksbased IPv6/ gateway (SOCKS64). Transport Relay Translator (TRT) Allows Communication Between... or IPv6 only hosts running a SOCKS LIB. IPv6 only hosts to only hosts. only host to IPv6 only hosts. Observation or IPv6 Requires special software running at the host. Broke the clientserver model. Acts at the API level. or IPv6 Broke the clientserver model Tunneling Based Transition Mechanisms: The tunneling transition mechanisms are intending to permit IPv6 connectivity to isolated hosts or networks without a full IPv6 network infrastructure. The basic solution consists in encapsulating IPv6 packets inside payloads. IETF has proposed several tunneling solutions. The 6over4 mechanism permits interconnect isolated IPv6 hosts to a 6over4 router [18]. The tunnel between the host and the router is implemented by creating an multicast group. The 6to4 mechanism also encapsulates IPv6 packets in the payload field of packets, but it intends to permit to Interconnect IPv6 isolated networks through the legacy () [16,17]. The 6to4 is used in this paper for implementing the Transparent IPv6 approach, and because of this, is presented in detail in the section 4. A third tunneling based solution proposed by IETF is called Teredo [14]. Teredo transports IPv6 packets as the payload of UDP packets. Teredo permits nodes behind NATs to obtain IPv6 connectivity. The direct encapsulation of IPv6 datagrams inside datagramas is not supposed to work with NAT. The use of UDP avoids this problem /02 $ IEEE

6 Table 4 presents a summary of the Tunneling Based Transition Mechanisms. There are other tunneling techniques proposed by IETF, but they are similar to the three mechanisms listed in the table. Mechanism Packet Tunneling over UDP (Teredo) Table 4: Tunneling Based Transition Mechanisms Allows Communication Between... Dual stack IPv6/ hosts and IPv6 only hosts. 6over4 Dual stack IPv6/ hosts and IPv6 routers with 6over4 capability. 6to4 IPv6 only hosts in different domains intradomain and interdomain intradomain and IPv6 interdomain The dual stack host can employ private addresses. If multicast routing is available, the mechanisms can also operates over intrasites. Uses a special address space already defined by IANA. No IPv6 address registration is required. IPv6 intradomains and interdomain Observation 5. Transition Mechanisms and the shortage problem In the following sessions, this paper will explore the use of the IETF transition mechanisms as a possible solution to the shortage problem. The basic idea is to use IPv6 address as global unique identifiers to hosts with private addresses. As seen before, transition mechanisms can be used to map addresses to IPv6 addresses, in many cases without software modification. Tunneling techniques permit to transport IPv6 packets through the legacy. By combining these solutions, this paper proposes a technique that acts as the same time as a transition mechanisms, allowing communication between and IPv6 hosts, but also as a solution to address hosts with private address from the. Let's consider some final remarks about the short review presented in this section. Mechanisms that require software modification in the client or dual stack hosts (such as Dual Stack, BIS, BIA, Teredo, SOCKS64 and 6over4) have not been considered as candidates to the solution proposed in this paper. Also, solutions requiring a pool of public addresses (such as DSTM, NAT PT) or that broke the client server model (TRT) have being avoided. Unidirectional solutions such as NAPTPT can also not be used. The solution proposed in this paper is strongly based on the 6to4 transition mechanism exposed in the next session. A transparent gateway similar to NATPT integrated with DNSALG is also employed. 6. Dynamic tunnels with 6to4 transition mechanism The IPv6To4 transition mechanism allows transporting IPv6 packets in the payload of packets using dynamic tunnels. This mechanism does not work with any IPv6 address. IANA has reserved a specific block of IPv6 addresses for supporting this mechanism. Before explaining how it can be done, it is convenient to examine how IPv6 address space is organized [11]. IPv6 address space has been segmented in order to support different type of addresses. The leading bits in the address indicate the specific type of an IPv6 address. The variablelength field comprising these leading bits is called the Format Prefix (FP). Most of the IPv6 address space is still unassigned. IANA is still working with IETF groups in order to define the use of these addresses. However, one important segment of addresses called AGGR Aggregatable Global Unicast has been already defined. This segment represents 1/8 of the full IPv6 address space. The AGGR address have a standard format, as shown if Figure 2. Please refer to [15] to an accurate description of the ADDR address fields. Provider Site FP 001 TLA ID RES NLA ID SLA ID Interface ID SLA ID Interface ID 2002 FP: Format Prefix TLA ID: Top Level Aggregation Identifier Aggregatable Global Unicast Address Format (AGGR) 6to4 scheme 2002::/16 = 1/65535 IPv6 address space NLA ID: Next Level Aggregation Identifier SLA ID: Site Level Aggregation Identifier Interface ID: Link Level Host Identifier : Address of 6to4 Tunnel Endpoint Figure 2. Aggregatable Global Unicast Address Format and 6to4 scheme. The TLA (Top Level Aggregation Identifier) field is used to segment the AGGR address space into smaller blocks. That permits IANA to allocate blocks of AGGR address to specific entities. IANA is supposed to assign these blocks to IPv6 Autonomous Systems that offers transit traffic, such as huge backbones. However, IANA reserved one TLA block to a special address scheme called 6to4. Its numeric value is 0x0002, i.e., it is 2002::/16 when expressed as an IPv6 address. Figure 2 shows the 6to4 scheme address format. The 6to4 scheme permits the creation of dynamic tunnels intended to transport IPv6 packets over an existing infrastructure. Figure 3 explains this principle /02 $ IEEE

7 To implement the 6to4 scheme, an IPv6 network must have at least one public address, referred as. The is the address of the router interface that connects the IPv6 network to the. The other router interface, attached to the IPv6 network, has an IPv6 address. This router (referred as IPv6to4 router) must support the 6to4 addressing scheme by dynamically tunneling the IPv6 packets forwarded to the [16,17]. The tunneling technique consists in encapsulating an IPv6 packet in an packet using the protocol type 41, as defined in the Transition Mechanisms, RFC 2893 [7]. The IPv6to4 router can discover the 6to4 tunnel endpoint by checking the field from the IPv6 destination address. This enables the router to dynamically create the tunnel without previous configuration. The 6to4 tunnels are stateless, because all information required for creating the tunnels are extracted from the packets. identifier field is defined using the address as the lower order 32 bits. Even though there is no restriction imposed to the identifier in the TIP6 mechanism, the higher order 32 bits of the interface identifier are kept zero to conform to existing standards [18]. For most implementations, SLA ID can also be kept equal to zero. The SLA ID field will be required only for very large networks that have overlapped private address spaces. 2002:V4DDR::Address :0 0:0:0:0 Address SLA ID Interface Identifier Figure 4. IPv6 address mapping to addresses in TIP6 mechanism. payload IPv6 host IPv6 packet 2002:C811:6201 header C8.C ( ) 2002:C8C0:7801 header C IPv6 packet C ( ) C8.C C C8.C :C811: :C8C0:7801 payload IPv6 host The Transparent IPv6 mechanism is implemented by combining the tunneling techniques described in this section with one to one mapping between and IPv6 addresses (similar to the NATPT transition mechanism). The full mechanism is illustrated in Figure 5. Observe in the figure that both networks are implemented using private addresses. Foreign Address Pool IPv6to4 Dynamic Mapping Table IP6to4 router IP6to4 router (C0.A8.0.2) (C0.A8.0.3) IPv6 2002:C8C0:7801::/48 ( ) IPv6 2002:C811:6201::/48 Figure 3. Dynamic tunnels with 6to4 scheme Host1.abc.com Host2.abc.com 7. TRANSPARENT IPv (C0.A8.0.1) C8.C This section presents a framework for assigning IPv6 addresses to devices without any hardware or software modification. This mechanism is called in this paper Transparent IPv6 (TIP6, for short). The TIP6 mechanism is a combination of the IETF 6to4 tunneling mechanism and a transparent gateway based mechanism. The main idea is to provide the benefits of IPv6 addressing without introducing changes in the existing infrastructure. In fact, this mechanism could be immediately employed by Mobile IP wireless technologies for assigning IPv6 addresses to existing mobile devices without any software modification. In this mechanism, a host with a private address will be mapped to an IPv6 address, according to Figure 4. The IPv6 address belongs to the TLA block 2002::/16, in accordance with the 6to4 scheme. The interface (A.0.0.2) Host1.bcd.com Foreign Address Pool (A.0.0.3) Host2.bcd.com (A.0.0.1) IPv6to4 Dynamic Mapping Table C Figure 5. Transparent IPv6 (TIP6) Implementation (Example) /02 $ IEEE

8 The key element in the TIP6 framework is the Transparent IPv6to4 Gateway (, for short). The is a dual home host developed specifically for supporting our proposal. One interface of is configured with a private address. The other interface must have a public registered address, used as the for creating dynamic tunnels. The TIP6 mechanism permit to build IP networks with private addresses without the limitations introduced by NAT or Proxy mechanisms. In the TIP6 mechanism, hosts are addressed using Fully Qualified Domain Names (FQDN), i.e., hosts must have their names registered in a DNS server using IPv6 "AAAA records". The host names are mapped to IPv6 address using the private address as interface identifier. permits that an host communicates with an IPv6 host without any software modification. hosts must be configured to use the local as both, the default gateway and the DNS server. The is not a simple NAT server. It is responsible to dynamically assign temporary addresses to represent IPv6 hosts in foreign networks. works as a reverse NAT by mapping the destination IPv6 address to a dynamically assigned private address that temporarily represents an IPv6 host in a foreign network. The IPv6 host can be a true IPv6 host or an host with an IPv6 address mapped through the TIP6 mechanism (see Figure 6). Foreign Address Pool (C0.A8.0.3) Host2.abc.com (C0.A8.0.1) = 2002:C811:6201::A000: = 2002:C901:0203::ACFA:0002. C8.C IPv6to4 Dynamic Mapping Table Hostx.cde.com 2002:C901:0203::ACFA:0002 IP6to4 C (A.0.0.2) Host1.bcd.com (A.0.0.1) Figure 6. mapping of foreign IPv6 hosts in TIP6. To configure the, the network administrator must define an Foreign Address Pool, with private addresses that are not used in the internal network. Because the mapping is not permanent, the pool size defines the number of concurrent sessions that can be handled by the. When receives a DNS query from an internal client, it maps a temporary address to represent the foreign IPv6 server (i.e. similar to DNS_ALG). This address is returned to the internal client that builds a simple packet and delivers it to the default router (). then perform two sequential operations upon the packet. First it converts the packet into an IPv6 packet using onetoone NATPT mechanism. Second, it tunnels the packet adding an header. These operations are illustrated in Figure 7. IPv6to4 Dynamic Mapping Table _fs = IPv6_s. Client Request _ic _fs payload _c _s IPv6_c IPv6_s _ic payload IPv6to4 Dynamic Mapping Table _fc = IPv6_c. _fc _is payload _c _s Server Response _is _fc payload _fs _ic payload _s _c IPv6_c IPv6_s payload 5. _is Figure 7. NATPT and tunneling in TIP6. The symbols used in Figure 7 are explained in Table Table 5: Legends for Figure 10. _ic: Internal client private address. _fs: address temporarily mapped to the IPv6 address of the foreign server. IPv6_s: IPv6 address of the foreign server (found by DNS resolution). IPv6_c: IPv6 address of the internal client (built by combining the Ipv4 address and ). _is: Internal server private address. _fc: address temporarily mapped to the IPv6 address of the foreign client. _c: address of the in the client s network. _s: address of the in the server s network. At the foreign network a similar operation happens. The in the destination network detunnels the incoming packet and performs a NATPT operation, building an packet with an private address temporarily mapped to the client s IPv6 address. The reply from the server is also illustrated in Figure 7. Figure 8 describes the procedure in the TIP6 approach when an host sends a packet to a foreign IPv6 host. There are two situations to consider: the internal is a client initiating a communication with an IPv6 foreign server; or the internal host is a server answering a request from an IPv6 foreign client. Observe that in this last situation, the mapping table is updated when the requisition arrives from the foreign host /02 $ IEEE

9 Initiate a communication with a foreign Answer a request from a foreign client or deliver a packet to a foreign server when the FQDN is already resolved Host DNS Server Send a DNS Query to resolve the FQDN of the destination host Mount the packet Send the packet to the default gateway () DNS query Find the IPv6 address corresponding to the FQDN Select an address from the Foreign Address Pool. Map the and the IPv6 address in the dynamic allocation table. Return the address to the client. Does the destination address belong to the foreign address pool? Find IPv6 address in the mapping table and build the IPv6 packet. Tunnel the packet with the header. Forward the packet to the router. S DNS query DNS response N FQDN to IP resolution Figure 8. Procedure for transmitting a packet in TIP6. Figure 9 describes the procedure when an internal host receives a packet from a foreign IPv6 host. Again, there are two situations to consider: the foreign IPv6 host is a client initiating a communication with an local server; or the foreign IPv6 host is a server answering a request to an internal client. Observe that in this last situation, the mapping table was updated when the internal client resolved the FQDN of the external server, as described in the procedure for transmitting a packet in Figure 8. Host Forward tunneled packet to Tunneled packet Detunnels the packet and extracts the IPv6 packet. 8. Wireless s and TIP6 This section explains how the Transparent IPv6 (TIP6) can be used to deploy very large wireless networks without provisioning. As seen in the previous sections, the TIP6 mechanism permits to assign IPv6 addresses to hosts without modifying existing user s devices or network elements. TIP6 is implemented in a wireless network by connecting a Transparent IPv6to4 Gateway () to the home agent, as show in Figure 10. In this configuration the must be configured as the DNS server for the mobile devices, but not the default gateway. The default gateway is the foreign agent, as specified by the Mobile IP standard. The TIP6 mechanism requires an additional route to be configured in the home agent. This route directs all packets that carry an belonging to the foreign address pool to the. All other packets can be delivered directly to the firewall. Observe that the standard NAT mechanism can still be used to permit the mobile devices to access networks that do not implement the TIP6 mechanism. The TIP6 mechanism permit mobile devices connected to different carrier networks to intercommunicate. For implementing this it is required to deploy TIP6 in both carrier networks (see Figure 10). Observe that TIP6 permit that carrier networks use overlapped private addresses. Therefore, it is not required any type of previous agreement between the carrier operators. PPP TCP or UDP/IP TCP or UDP/IP WAP/UDP/IP Foreign Cell BSS FA HA Private AAA Server Foreign Address Pool WAP Gateway Firewall and NAT router Is the source IPv6 address already mapped? Y TCP or UDP/IP Foreign IPv6 network IPv6to4 N Select an address from the Foreign Address Pool. Map the address to the source IPv6 address in the dynamic allocation table. PPP TCP or UDP/IP WAP/UDP/IP Cell BSS FA HA Private AAA Server WAP Gateway Firewall and NAT router Build the packet using the address mapped to the IPv6 source Forward the packet to the host. packet Receive the packet. Figure 10. Carrier s interoperation using TIP6 9. Conclusion Figure 9. Procedure for receiving a packet in TIP6. This paper presented a novel mechanism to manage the problem of shortage of globally unique addresses for Mobile IP. This mechanism is called Transparent IPv6 (TIP6, for short). The main idea is to provide the benefits /02 $ IEEE

10 of IPv6 addressing without introducing significant changes in the existing infrastructure. This mechanism could be, for example, immediately aggregated to Mobile IP cellular technologies, such as GPRS and iden, for assigning IPv6 addresses to cellular devices without any software modification. The TIP6 mechanism is a combination of the IETF 6to4 tunneling mechanism and NATPT. We have shown that the TIP6 mechanism extends the standard NAT functionalities by permitting a mobile host to receive connections from other mobile or fixed hosts connected to the. An host in a TIP6 network can communicate with other TIP6 networks or with true IPv6 hosts. This feature will permit the coexistence of emerging IPv6 Mobile IP implementations with legacy s. Future works are required to evaluate the effect of the transition mechanism over IPsec and QoS protocols. 10. References [1] C. Perkins, ed., IP Mobility Support, IETF RFC 2002, Oct [2] GSM Association. An Overview of GPRS (General Packet Radio Service). [3] Motorola. Integrated Dispatch Enhanced (iden) System Overview. view/sys_overview.html [4] Y. Rekhter, B. Moskowitz, D. Karrenberg, G. J. de Groot, E. Lear, Address Allocation for Private s, IETF RFC 1918, Febr [5] S. Deering and R. Hinden, Protocol, Version 6 (IPv6) Specification, IETF RFC 1883, Dec [6] Egevang, K. and P. Francis, "The IP Address Translator (NAT)", IETF RFC 1631, May [7] R. Gilligan, E. Nordmark, Transition Mechanisms for IPv6 Hosts and s, IETF RFC 2893, Aug [8] WAP Forum Technical Specifications. Wireless Application Protocol (WAP). [9] P. Srisuresh, M. Holdrege, "IP Address Translator (NAT) Terminology and Considerations", IETF RFC 2663, August [10] P. Srisuresh, G. Tsirtsis, P. Akkiraju, A. Heffernam, "DNS extensions to Address Translators (DNSALG)", IETF RFC 2694, Sept [11] R. Hidden, S. Deering. IP Version 6 Addressing Architecture. IETF RFC 2373, July [12] D. Finkerson, A. Hazeltine, M. Kaat, T. Larder, R. van der Pol, SURFnet, Y. Sekiya, Keio Univ. H. Steenman, G. Tsirtsis, "An overview of the introduction of IPv6 in the ", IETF Draft, Feb [13] A. Baudot, G. Egeland, C. Hahn, P. Kyheroinen, A. Zehl, "Interaction of Transition Mechanisms", IETF Draft, Febr [14] C. Huitema, Teredo: Tunneling IPv6 over UDP through NATs, IETF Draft, Feb [15] R. Hidden, M. O Dell, S. Deering. An IPv6 Aggregatable Global Unicast Address Format. IETF RFC 2374, July [16] B. E. Carpenter, K. Moore, B. Fink. Connecting IPv6 Routing Domains Over the. Cisco Protocol Journal, Volume 3, Number 1, March [17] B. Carpenter, K. Moore, "Connection of IPv6 Domains via Clouds", IETF RFC 3056, Feb [18] B. Carpenter, C. Jung, "Transmission of IPv6 over Domains without Explicit Tunnels", IETF RFC 2529, March [19] K. Tsuchiya, H. Higuchi, Y. Atarashi, "Dual Stack Hosts using the BumpIntheStack Technique (BIS)", IETF RFC 2767 Feb [20] E. Nordmark, "Stateless IP/ICMP Translation Algorithm (SIIT)", IETF RFC 2765, Feb [21] M. Shin, Y. Kim, E. Nordmark, A. Durand, "Dual Stack Hosts using "BumpintheAPI" (BIA)", IETF Draft, April [22] J. Bound, L. Toutain, O. Medina, F. Dupont,H. Affifi, A. Durand, "Dual Stack Transition Mechanism (DSTM)", IETF Draft, Jan [23] H. Kitamura, "A SOCKSbased IPv6/ gateway mechanism", IETF RFC 3089, April [24] M. Leech, M. Ganis, Y. Lee, R. Kuris, D. Koblas and L. Jones, "SOCKS Protocol Version 5", March [25] J. Hagino, K. Yamamoto, "An IPv6to transport relay translator", RFC3142, June [26] G. Tsirtsis, P. Srisuresh, " Address Translation Protocol Translation (NATPT)", IETF RFC 2766, Feb [27] J.B. Postel, ed., Protocol, IETF RFC 791, Sept /02 $ IEEE

Transition Strategies from IPv4 to IPv6: The case of GRNET

Transition Strategies from IPv4 to IPv6: The case of GRNET Transition Strategies from IPv4 to IPv6: The case of GRNET C. Bouras 1,2, P. Ganos 1, A. Karaliotas 1,2 1 Research Academic Computer Technology Institute, Patras, Greece 2 Department of Computer Engineering

More information

Building Wireless Networks with Transparent IPv6

Building Wireless Networks with Transparent IPv6 Building Wireless Networks with Transparent IPv6 Edgard JAMHOUR [1] jamhour@ ppgia.pucpr.br Simone STOROZ [1] simones@ppgia.pucpr.br [1] PPGIA, Pontificia Universidade Católica do Paraná Curitiba, PR 80215-901,

More information

B. Carpenter. January Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice

B. Carpenter. January Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice IETF Internet Draft January 1999 B. Carpenter K. Moore Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels Copyright Notice Placeholder for ISOC copyright if needed Abstract draft-ietf-ngtrans-6to4-00.txt

More information

DTTS: A Transparent and Scalable Solution for IPv4 to IPv6 Transition

DTTS: A Transparent and Scalable Solution for IPv4 to IPv6 Transition DTTS: A Transparent and Scalable Solution for to Transition Kai Wang, Ann-Kian Yeo, A. L. Ananda Center for Internet Research School of Computing National University of Singapore 3 Science Drive 2, Singapore

More information

Tik Network Application Frameworks. IPv6. Pekka Nikander Professor (acting) / Chief Scientist HUT/TML / Ericsson Research NomadicLab

Tik Network Application Frameworks. IPv6. Pekka Nikander Professor (acting) / Chief Scientist HUT/TML / Ericsson Research NomadicLab Pekka Nikander TKK/TML Tik-110.448 Network Application Frameworks IPv6 Pekka Nikander Professor (acting) / Chief Scientist HUT/TML / Ericsson Research NomadicLab 1 Pekka.Nikander@hut.fi Pekka Nikander

More information

CHAPTER 2 LITERATURE SURVEY

CHAPTER 2 LITERATURE SURVEY 23 CHAPTER 2 LITERATURE SURVEY The current version of the Internet Protocol IPv4 was first developed in the 1970s (Tanenbaum 2002), and the main protocol standard RFC 791 that governs IPv4 functionality

More information

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6 5.1 Tunneling 5.1.1 Automatic Tunneling 5.1.2 Configured Tunneling 5.2 Dual Stack 5.3 Translation 5.4 Migration Strategies for Telcos and ISPs Introduction - Transition - the process or a period of changing

More information

Mobile IP Address Efficiency

Mobile IP Address Efficiency 30 JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL. 2, NO. 1, MARCH 2006 Mobile IP Address Efficiency Zhen Zhen and Srinivas Sampalli Abstract In future wireless networks, Mobile IP will be widely

More information

A Service Management Architecture for NEMO in IPv4 and IPv6 Networks

A Service Management Architecture for NEMO in IPv4 and IPv6 Networks A Service Management Architecture for NEMO in IPv4 and IPv6 Networks JinHoKim,ChoongSeonHong, Dae Sun Kim Department of Computer Engineering, Kyung Hee University, Seocheon, Giheung, Yongin, Gyeonggi,

More information

IPv6 Transition Mechanisms

IPv6 Transition Mechanisms IPv6 Transition Mechanisms Petr Grygárek rek 1 IPv6 and IPv4 Coexistence Expected to co-exist together for many years Some IPv4 devices may exist forever Slow(?) transition of (part of?) networks to IPv6

More information

Network Address Translators (NATs) and NAT Traversal

Network Address Translators (NATs) and NAT Traversal Network Address Translators (NATs) and NAT Traversal Ari Keränen ari.keranen@ericsson.com Ericsson Research Finland, NomadicLab Outline Introduction to NATs NAT Behavior UDP TCP NAT Traversal STUN TURN

More information

IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol

IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol Ryuji Wakikawa Carl Williams Keisuke Uehara Jun Murai Keio University. Graduate School of Media and Governance KDDI

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

Radware ADC. IPV6 RFCs and Compliance

Radware ADC. IPV6 RFCs and Compliance Radware ADC IPV6 s and Compliance Knowledgebase Team February 2016 Scope: This document lists most of the s that relevant to IPv6. Legend: Yes supported N/A not applicable No Currently not supported Relevance:

More information

IPv6 Transition Mechanisms

IPv6 Transition Mechanisms IPv6 Transition Mechanisms Petr Grygárek rek 1 IPv6 and IPv4 Coexistence Expected to co-exist together for many years Some IPv4 devices may exist forever Slow(?) transition of (part of?) networks to IPv6

More information

A Scenario-Based Review of IPv6 Transition Tools

A Scenario-Based Review of IPv6 Transition Tools A Scenario-Based Review of IPv6 Transition Tools Moving Toward an IPv6 Future Momentum for IPv6 transition is on the rise, and many transition tools and techniques are available to ISPs, enterprise networks,

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

IPV6 SIMPLE SECURITY CAPABILITIES.

IPV6 SIMPLE SECURITY CAPABILITIES. IPV6 SIMPLE SECURITY CAPABILITIES. 50 issues from RFC 6092 edited by J. Woodyatt, Apple Presentation by Olle E. Johansson, Edvina AB. ABSTRACT The RFC which this presentation is based upon is focused on

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Mobile Communications Chapter 8: Network Protocols/Mobile IP Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols Prof. Jó Ueyama

More information

Chapter 15 IPv6 Transition Technologies

Chapter 15 IPv6 Transition Technologies Chapter 15 IPv6 Transition Technologies Published: April 18, 2006 Updated: November 06, 2006 Writer: Joe Davies 1 Abstract This chapter describes the mechanisms that aid in the transition of Internet Protocol

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6

CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6 CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6 1 MS. CHAITA JANI, 2 PROF.MEGHA MEHTA 1 M.E.[C.E] Student, Department Of Computer Engineering, Noble Group Of Institutions, Junagadh,Gujarat

More information

A Multihoming based IPv4/IPv6 Transition Approach

A Multihoming based IPv4/IPv6 Transition Approach A Multihoming based IPv4/IPv6 Transition Approach Lizhong Xie, Jun Bi, and Jianping Wu Network Research Center, Tsinghua University, China Education and Research Network (CERNET) Beijing 100084, China

More information

B. Carpenter. Oct Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice. Placeholder for ISOC copyright.

B. Carpenter. Oct Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice. Placeholder for ISOC copyright. IETF Internet Draft Oct 1999 B. Carpenter K. Moore Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels Copyright Notice Placeholder for ISOC copyright. Abstract draft-ietf-ngtrans-6to4-03.txt

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

Network Interconnection

Network Interconnection Network Interconnection Covers different approaches for ensuring border or perimeter security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Lecture

More information

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers Network Working Group H. Soliman, Ed. Request for Comments: 5555 Elevate Technologies Category: Standards Track June 2009 Status of This Memo Mobile IPv6 Support for Dual Stack Hosts and Routers This document

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

Request for Comments: Campio Communications February Network Address Translation - Protocol Translation (NAT-PT)

Request for Comments: Campio Communications February Network Address Translation - Protocol Translation (NAT-PT) Network Working Group Request for Comments: 2766 Category: Standards Track G. Tsirtsis BT P. Srisuresh Campio Communications February 2000 Network Address Translation - Protocol Translation (NAT-PT) Status

More information

IPv4-to-IPv6 Transition Strategies

IPv4-to-IPv6 Transition Strategies IPv4-to-IPv6 Transition Strategies By Tim Rooney Director, Product Management INS IPv4-to-IPv6 Transition Strategies February 2007 INS Whitepaper Table of Contents INTRODUCTION...1 MIGRATION TECHNOLOGIES

More information

Request for Comments: 5569 Category: Informational January 2010 ISSN:

Request for Comments: 5569 Category: Informational January 2010 ISSN: Independent Submission R. Despres Request for Comments: 5569 RD-IPtech Category: Informational January 2010 ISSN: 2070-1721 Abstract IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) IPv6 rapid deployment

More information

B. Carpenter. June Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice. Placeholder for ISOC copyright.

B. Carpenter. June Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice. Placeholder for ISOC copyright. IETF Internet Draft June 1999 B. Carpenter K. Moore Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels Copyright Notice Placeholder for ISOC copyright. Abstract draft-ietf-ngtrans-6to4-02.txt

More information

BIBLIOGRAFÍA. 3. Bound, J., L. Toutain, O. Medina, F. Dupont, H. Afifi, A. Durand, Draft-ietfngtrans-dstm-07,

BIBLIOGRAFÍA. 3. Bound, J., L. Toutain, O. Medina, F. Dupont, H. Afifi, A. Durand, Draft-ietfngtrans-dstm-07, BIBLIOGRAFÍA 1. Internet Protocol Version 5 http://www.glossary-tech.com/ipv5.htm 2. What happened to IPv5? http://www.nokia.com/ipv6/faq.html 3. Bound, J., L. Toutain, O. Medina, F. Dupont, H. Afifi,

More information

Cisco Network Address Translation (NAT)

Cisco Network Address Translation (NAT) Cisco Network Address Translation (NAT) Introduction IETF NGTrans working group defined several translation mechanisms to enable communications between IPv6-only and IPv4-only hosts. One such example is

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Stateful Network Address Translation 64

Stateful Network Address Translation 64 The feature provides a translation mechanism that translates IPv6 packets into IPv4 packets and vice versa. The stateful NAT64 translator algorithmically translates the IPv4 addresses of IPv4 hosts to

More information

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4. CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

MOBILITY AGENTS: AVOIDING THE SIGNALING OF ROUTE OPTIMIZATION ON LARGE SERVERS

MOBILITY AGENTS: AVOIDING THE SIGNALING OF ROUTE OPTIMIZATION ON LARGE SERVERS MOBILITY AGENTS: AVOIDING THE SIGNALING OF ROUTE OPTIMIZATION ON LARGE SERVERS Albert Cabellos-Aparicio and Jordi Domingo-Pascual * Technical University of Catalonia, Department of Computer Architecture

More information

CCNA Questions/Answers IPv6. Select the valid IPv6 address from given ones. (Choose two) A. FE63::0043::11:21 B :2:11.1 C.

CCNA Questions/Answers IPv6. Select the valid IPv6 address from given ones. (Choose two) A. FE63::0043::11:21 B :2:11.1 C. Select the valid IPv6 address from given ones. (Choose two) A. FE63::0043::11:21 B. 191.2.1.2:2:11.1 C. 2001::98 D. 2002:c0a8:101::42 E. :2001:: F. 2002.cb0a:3cdd:1::1 Answer: C, D. 2013 1 Which method

More information

Transparent Mobility in Mobile IPv6: An Experience Report

Transparent Mobility in Mobile IPv6: An Experience Report Transparent Mobility in Mobile IPv6: An Experience Report Rodolfo Kohn Senior Software Engineer at Global Software Group Argentina, Motorola, 146 Hipólito Irigoyen 9th floor, Córdoba, 5000, Argentina.

More information

Applicability of IETF Mobility Solutions to the 3GPP All IP Network

Applicability of IETF Mobility Solutions to the 3GPP All IP Network Applicability of IETF Mobility Solutions to the 3GPP All IP Patrick Stupar, Krishna Pandit, and Wolfgang Granzow Qualcomm CDMA Technologies GmbH Outline Motivation All-IP paradigm in 3GPP LTE network Survey

More information

Mobile IP and its trends for changing from IPv4 to IPv6

Mobile IP and its trends for changing from IPv4 to IPv6 Mobile IP and its trends for changing from IPv4 to IPv6 Nguyen Ngoc Chan*, Tran Cong Hung Ph.D. (Posts & Telecommunications Institute of Technology, Viet Nam) E-mail: ngoc_chan@ptithcm.edu.vn, conghung@ptithcm.edu.vn

More information

SJTU 2018 Fall Computer Networking. Wireless Communication

SJTU 2018 Fall Computer Networking. Wireless Communication SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP

More information

Implementing Cisco IP Routing

Implementing Cisco IP Routing Implementing Cisco IP Routing Cisco 300-101 Dumps Available Here at: /cisco-exam/300-101-dumps.html Enrolling now you will get access to 190 questions in a unique set of 300-101 dumps Question 1 Automatic

More information

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This

More information

Network Working Group Request for Comments: 4147 Category: Informational August Proposed Changes to the Format of the IANA IPv6 Registry

Network Working Group Request for Comments: 4147 Category: Informational August Proposed Changes to the Format of the IANA IPv6 Registry Network Working Group G. Huston Request for Comments: 4147 APNIC Category: Informational August 2005 Proposed Changes to the Format of the IANA IPv6 Registry Status of This Memo This memo provides information

More information

On using Mobile IP Protocols

On using Mobile IP Protocols Journal of Computer Science 2 (2): 211-217, 2006 ISSN 1549-3636 2006 Science Publications On using Mobile IP Protocols Fayza A. Nada Faculty of Computers and Information, Suez Canal University, Ismailia,

More information

IPv6 Addressing. There are three types of IPV6 Addresses. Unicast:Multicast:Anycast

IPv6 Addressing. There are three types of IPV6 Addresses. Unicast:Multicast:Anycast IPv6 Addressing There are three types of IPV6 Addresses. Unicast:Multicast:Anycast Unicast IPv6 addresses A unicast address identifies a single interface within the scope of the type of unicast address.

More information

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G.

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G. Network Security Chapter 17 Security of Mobile Internet Communications Network Security (WS 2002): 17 Mobile Internet Security 1 Motivation for Mobile IP Routing in the Internet: Based on IP destination

More information

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls NAT Configuration Guide Part number:5998-2649 Document version: 6PW100-20110909 Legal and notice information Copyright 2011 Hewlett-Packard Development Company,

More information

Mobile & Wireless Networking. Lecture 9: Mobile IP. [Schiller, Section 8.1]

Mobile & Wireless Networking. Lecture 9: Mobile IP. [Schiller, Section 8.1] 192620010 Mobile & Wireless Networking Lecture 9: Mobile IP [Schiller, Section 8.1] Geert Heijenk Outline of Lecture 11 q Mobile IP Basics q 3 parts of Mobile IP: q Advertising Care-of Addresses q Registration

More information

Communication Systems IPv6

Communication Systems IPv6 Communication Systems IPv6 Computer Science Network Layer from IPv4 to IPv6 Staying on the third layer but exchange the protocol Introduction to future IP The IP v6 address IP v6 header and extension headers

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture #4 preview ICMP ARP DHCP NAT

More information

Network Working Group Request for Comments: Category: Experimental J. Postel ISI December 1998

Network Working Group Request for Comments: Category: Experimental J. Postel ISI December 1998 Network Working Group Request for Comments: 2471 Obsoletes: 1897 Category: Experimental R. Hinden Nokia R. Fink LBNL J. Postel ISI December 1998 IPv6 Testing Address Allocation Status of this Memo This

More information

Table of Contents. Cisco How NAT Works

Table of Contents. Cisco How NAT Works Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9

More information

IPv6 : Internet Protocol Version 6

IPv6 : Internet Protocol Version 6 IPv6 : Internet Protocol Version 6 History Internet growth was faster than anticipated In early 1990 s, it was realized that we may run out of IPv4 addresses somewhere between 2000 and 2010 Also, experiences

More information

History. IPv6 : Internet Protocol Version 6. IPv4 Year-Wise Allocation (/8s)

History. IPv6 : Internet Protocol Version 6. IPv4 Year-Wise Allocation (/8s) History IPv6 : Internet Protocol Version 6 Internet growth was faster than anticipated In early 1990 s, it was realized that we may run out of IPv4 addresses somewhere between 2000 and 2010 Also, experiences

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

Comparision study of MobileIPv4 and MobileIPv6

Comparision study of MobileIPv4 and MobileIPv6 Comparision study of MobileIPv4 and MobileIPv6 Dr. Sridevi Assistant Professor, Dept. of Computer Science, Karnatak University,Dharwad Abstract: IPv4 is being replaced by IPv6 due to the increased demand

More information

Tunnels. Jean Yves Le Boudec 2015

Tunnels. Jean Yves Le Boudec 2015 Tunnels Jean Yves Le Boudec 2015 1. Tunnels Definition: a tunnel, also called encapsulation occurs whenever a communication layer carries packets of a layer that is not the one above e.g.: IP packet in

More information

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 1 March 2001

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 1 March 2001 Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-16.txt J. Bound Nokia M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center R. Droms(ed.) Cisco

More information

A Border Gateway Protocol 3 (BGP-3) DNS Extensions to Support IP version 6. Path MTU Discovery for IP version 6

A Border Gateway Protocol 3 (BGP-3) DNS Extensions to Support IP version 6. Path MTU Discovery for IP version 6 IPv6 Standards and RFC 1195 Use of OSI IS-IS for Routing in TCP/IP and Dual Environments RFC 1267 A Border Gateway Protocol 3 (BGP-3) RFC 1305 Network Time Protocol (Version 3) Specification, Implementation

More information

Internet Engineering Task Force (IETF) Request for Comments: 7040 Category: Informational. O. Vautrin Juniper Networks Y. Lee Comcast November 2013

Internet Engineering Task Force (IETF) Request for Comments: 7040 Category: Informational. O. Vautrin Juniper Networks Y. Lee Comcast November 2013 Internet Engineering Task Force (IETF) Request for Comments: 7040 Category: Informational ISSN: 2070-1721 Y. Cui J. Wu P. Wu Tsinghua University O. Vautrin Juniper Networks Y. Lee Comcast November 2013

More information

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP

More information

TCP/IP Protocol Suite

TCP/IP Protocol Suite TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol

More information

Mobile IP. Mobile IP 1

Mobile IP. Mobile IP 1 Mobile IP Mobile IP 1 Motivation for Mobile IP Routing based on IP destination address, network prefix (e.g. 129.13.42) determines physical subnet change of physical subnet implies change of IP address

More information

IPv6 Feature Facts

IPv6 Feature Facts 12.1.2 IPv6 Feature Facts The current IP addressing standard, version 4, will eventually run out of unique addresses, so a new system is being developed. It is named IP version 6 or IPv6. You should know

More information

ipv6 mobile home-agent (global configuration)

ipv6 mobile home-agent (global configuration) ipv6 mobile home-agent (global configuration) ipv6 mobile home-agent (global configuration) To enter home agent configuration mode, use the ipv6 mobile home-agent command in global configuration mode.

More information

IPv6 Transitioning. An overview of what s around. Marco Hogewoning Trainer, RIPE NCC

IPv6 Transitioning. An overview of what s around. Marco Hogewoning Trainer, RIPE NCC IPv6 Transitioning An overview of what s around Marco Hogewoning Trainer, RIPE NCC There Was a Plan The original idea was to have IPv6 deployed before we were out of IPv4 addresses By now the whole of

More information

Network Working Group Request for Comments: Nokia Research Center F. Dupont GET/ENST Bretagne June 2004

Network Working Group Request for Comments: Nokia Research Center F. Dupont GET/ENST Bretagne June 2004 Network Working Group Request for Comments: 3776 Category: Standards Track J. Arkko Ericsson V. Devarapalli Nokia Research Center F. Dupont GET/ENST Bretagne June 2004 Using IPsec to Protect Mobile IPv6

More information

Transition To IPv6 October 2011

Transition To IPv6 October 2011 Transition To IPv6 October 2011 Fred Bovy ccie #3013 fred@fredbovy.com 2011 Fred Bovy fred@fredbovy.com. Transition to IPv6 1 1st Generation: The IPv6 Pioneers Tunnels for Experimental testing or Enterprises

More information

Performance Analysis of Video Conferencing over Various IPv4/IPv6 Transition Mechanisms

Performance Analysis of Video Conferencing over Various IPv4/IPv6 Transition Mechanisms IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.7, July 2018 83 Performance Analysis of Video Conferencing over Various IPv4/IPv6 Transition Mechanisms Khalid EL KHADIRI,

More information

Mobile Communications Chapter 9: Network Protocols/Mobile IP

Mobile Communications Chapter 9: Network Protocols/Mobile IP Mobile Communications Chapter 9: Network Protocols/Mobile IP Motivation Data transfer Encapsulation Security IPv6 Problems DHCP Ad-hoc s Routing protocols 9.0.1 Motivation for Mobile IP Routing based on

More information

Mobile Communications Mobility Support in Network Layer

Mobile Communications Mobility Support in Network Layer Motivation Mobility support needed to be able to use mobile devices in the Mobile devices need IP address for their communication Applications would like to communicate while being on the move Mobile Communications

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Dual-Stack Lite for IPv6 Access Release NCE0025 Modified: 2016-10-12 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1 Mobile IP Petr Grygárek rek 1 Basic principle Picture from IOS IP and IP Routing Configuration Guide Mobile node maintains the same IP address even while roaming in foreign networks even if it s address

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track

Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track ISSN: 2070-1721 F. Xia B. Sarikaya Huawei USA J. Korhonen, Ed. Nokia Siemens Networks S. Gundavelli Cisco D.

More information

Request for Comments: Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009

Request for Comments: Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009 Network Working Group Request for Comments: 5648 Category: Standards Track R. Wakikawa, Ed. Toyota ITC V. Devarapalli Wichorus G. Tsirtsis Qualcomm T. Ernst INRIA K. Nagami INTEC NetCore October 2009 Multiple

More information

Internet Engineering Task Force (IETF) Request for Comments: Obsoletes: 4773, 5156, 5735, JHU April 2013

Internet Engineering Task Force (IETF) Request for Comments: Obsoletes: 4773, 5156, 5735, JHU April 2013 Internet Engineering Task Force (IETF) Request for Comments: 6890 BCP: 153 Obsoletes: 4773, 5156, 5735, 5736 Category: Best Current Practice ISSN: 2070-1721 M. Cotton L. Vegoda ICANN R. Bonica, Ed. Juniper

More information

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 15 April 2001

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 15 April 2001 Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-18.txt J. Bound Nokia M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center R. Droms(ed.) Cisco

More information

Javier Sedano David Fernández

Javier Sedano David Fernández Javier Sedano (javier.sedano@agora-2000.com) David Fernández (david@dit.upm.es) Introduction Dual stack Tunneling Translation Conclusions Madrid 2003 Global IPv6 Summit Coexistence and Transition 2 Motivation

More information

Foreword xxiii Preface xxvii IPv6 Rationale and Features

Foreword xxiii Preface xxvii IPv6 Rationale and Features Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP

More information

IPv4/v6 Considerations Ralph Droms Cisco Systems

IPv4/v6 Considerations Ralph Droms Cisco Systems Title IPv4/v6 Considerations Ralph Droms Cisco Systems Agenda Motivation for IPv6 Review of IPv6 Impact of differences Tools and techniques Why IPv6? More addresses More addresses More addresses Security,

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Stateful NAT64 for Handling IPv4 Address Depletion Release NCE0030 Modified: 2017-01-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

Configuring NAT for IP Address Conservation

Configuring NAT for IP Address Conservation This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about

More information

Advanced Computer Networks. IP Mobility

Advanced Computer Networks. IP Mobility Advanced Computer Networks 263 3501 00 IP Mobility Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Tuesday 1 April 2014 Outline Last week: Today: Cellular Networks

More information

Performance Comparison of Internet Protocol v4 with Internet Protocol v6

Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Mrs. Sheetal Mali Department of Electronics and Telecommunication Parvatibai Genba Sopanrao Moze College of Engineering Wagholi,

More information

Handover Management for Mobile Nodes in IPv6 Networks

Handover Management for Mobile Nodes in IPv6 Networks TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we

More information

Tunnels. Jean Yves Le Boudec 2015

Tunnels. Jean Yves Le Boudec 2015 Tunnels Jean Yves Le Boudec 2015 1. Tunnels Definition: a tunnel, also called encapsulation occurs whenever a communication layer carries packets of a layer that is not the one above e.g.: IP packet in

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer Diwakar Yagyasen.1 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport:

More information

Slide 1. Slide 2. Slide 3. Technological Advantages of Mobile IPv6. Outline of Presentation. Earth with 2 Billion Mobile devices

Slide 1. Slide 2. Slide 3. Technological Advantages of Mobile IPv6. Outline of Presentation. Earth with 2 Billion Mobile devices Slide 1 Technological Advantages of Mobile IPv6 Nokia Research Center Mountain View, CA USA Charles E. Perkins http://people.nokia.net/charliep charliep@iprg.nokia.com 1 NOKIA NERD2000.PPT/ 11/20/00 /

More information

Network Working Group Request for Comments: June 2001

Network Working Group Request for Comments: June 2001 Network Working Group Request for Comments: 3142 Category: Informational J. Hagino K. Yamamoto IIJ Research Laboratory June 2001 Status of this Memo An IPv6-to-IPv4 Transport Relay Translator This memo

More information

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information