2
It takes Passion & Patience! 3
Perception: IPv4 is Innovation - IPv6: an Upgrade Political Goodwill Yv4 Not needed Yv6 Needed? Business Drivers Innovation Upgrade Technology Value Powerful Same & More Infrastructure The IPv6 Final Marathon 4
5
Yv4 WORLD INTERNET USAGE & POPULATION STATISTICS Yv6 World Regions Population ( 2007 Est.) Population % of World Internet Usage, Latest Data % Population ( Penetra tion ) Usage % of World Usage Growth 2000-2007 Africa 933,448,292 14.2 % 43,995,700 4.7 % 3.5 % 874.6 % Asia 3,712,527,624 56.5 % 459,476,825 12.4 % 36.9 % 302.0 % Europe 809,624,686 12.3 % 337,878,613 41.7 % 27.2% 221.5 % Middle East 193,452,727 2.9 % 33,510,500 17.3 % 2.7 % 920.2 % North America 334,538,018 5.1 % 234,788,864 70.2 % 18.9% 117.2 % Latin America 556,606,627 8.5 % 115,759,709 20.8 % 9.3 % 540.7 % Oceania / Australia 34,468,443 0.5 % 19,039,390 55.2 % 1.5 % 149.9 % WORLD TOTAL 6,574,666,417 100.0 % 1,244,449,601 18.9 % 100.0 % 244.7 % IPv4 Achieved the Critical 20% IPv6 Can Drive Growth & Continuity! 6
WWW: WORLD WIDE WIRELESS 7
8
9
10
11
12
13
14
15
16
17
18
19
20
German IPv6 Council Initiatives - German IPv6 ROADMAP - TRAINING (elearning) - Showcase @ HPI - Dissemination & PR Efforts - EC IPv6 Conference March 3-4 Slovenia - German IPv6 Summit 14-15-16, 2008 Viviane Reding/ Vint Cerf - Worldwide Collaboration 21
22
World s Top 21 Telecom Companies by Revenue ($US Billion) Verizon Communications NTT Deutsche Telekom Telefonica France Telecom AT&T Vodafone Sprint Nextel Telecom Italia BT China Mobile Communications KDDI Comcast Vivendi China Telecommunications America Movil Korea Telecom Telstra BCE Carso Global Telecom Royal KPN 28.5 25.7 25.1 24.8 21.5 18.6 17.3 16.5 16.1 15.1 43.5 40.2 38.3 35.9 59.8 63.1 66.4 65.9 Source: July 23, 2007 77.0 93.2 92.0 23
IPv6 vs. IPv4 Security Model Easy to configure IP-VPNs between end-to-end nodes with IPv6 IPv4 Private address segments Global address segments Private address segments Site-to-Site secure communications IPsec optional Branch A Low security in the LAN segments IPsec Node NAT R Secure Transmission IPv4 Internet R IPsec Node NAT Branch B Low interoperability between different vendors Global address segments IPv6 Secure Transmission End-to-End secure communications Branch A R IPv6 Internet Secure Transmission R R Branch B IPsec support mandated End-to-End secure communications Easy to set up new connection Partner company 24
The UOPF and m2m-x Ubiquitous Open Platform Forum ISPs and appliance manufactures established the UOPF in February of 2004 to accelerate the Internet Appliance market. ISPs: NTT Com, KDDI, Fujitsu, NEC, Panasonic, Sony Manufactures: Hitachi, Matsushita, Mitsubishi, Panasonic, Pioneer, Sanyo, Sony, Toshiba http://uopf.org/en/ m2m-x m2m-x is an open standard - the UOPF published the technical specifications in April of this year. One great example of a peer-to-peer technology. The basis for m2m-x is to create new IPv6 business models and provide customers with secure, easy, and real-time communications between objects on an end-to-end basis. 25
QuickTime and a Graphics decompressor are needed to see this picture. m2m-x Technology VPN connection LAN Secure Data Channel IPv6 IPv6 Internet Internet Secure Signaling Channel m2m-x Management Server m2m-x = machine to machine security (authentication and encryption) anytime, anywhere Designed to facilitate secure communications between appliances, computers, and any other device Based on IPsec and SIP Authentication, connection management, and configuration is controlled by a central m2m-x management server After necessary connection management by m2m-x server, data communications between devices is conducted peer-to-peer with IPsec encryption with no intervention by the m2m-x server 26
Example 1: Smart Home Security System Remote Home owner @Mobile GW Mobile Network m2m-x Management Server 3PCC Security Controller PS Home Home owner @Office Camera Intruder Sensor Security Officer 3PCC: 3 rd Party Call Control, PS: Presence Server Upon detecting an intruder, the system instantly finds the current location of the authorized watcher (e.g. home owner) and establishes a video connection. Features: Secured communication: m2m-x security Strict Authorization: No third party eavesdropping Application Integration: Uses SIP 3PCC for connection establishment Other Applications: Office-building, Industry, Campus, Home security, Emergency Services, Remote Health Care 27
Example 2: Cyber Conferencing System IPv6 ready collaboration system works based on the m2m-x authentication platform. For remote site meeting facilitation, this system enables not only video communications but also sharing images, applications and handwritten notes on the screen between remote sites - interactively and securely. Remote Maintenance site Signaling (Secure session control) m2m-x Server NTT Global IPv6 Backbone Data Channel( Secure transmission ) Office A End to End IPsec VPN Office B 28
29
30
31
32
33
Bechtel IPv6 34
Protocol Trends in Control Networks Non-IP BACnet Fieldbus PROFIBUS Others IP BACnet/IP Fieldbus HSE PROFInet IP-based Many other significant change drivers Economics, Interoperability, Simplify Security Customer requirements 20-Sep-2007 35 Bechtel IPv6 35
36
37
German Federal Government Simple email as Driver Public servers Internet ISP Router Edge Router Stateful Firewall Public servers IPv4 NAT Federal Ministry of Education Internet ISP Router Edge Router Stateful Firewall Public servers IPv4 NAT Lander Ministry of Education Internet ISP Router Edge Router Stateful Firewall IPv4 NAT Communes network 38
DEUTSCHLAND ONLINE Die DOI definierte IPv4/IPv6 Dualstack Zielarchitektur Zusätzlich IPv6 enabled DC-Backbone als isoliertes Netz oder dediziertes logisches MPLS VPN Dezentrale Netze und DC betreiben IPv4 und IPv6 parallel 39 Donnerstag, 1. Dezember 2016 39 www.deutschland-online.de
Developing Nations Ministers Yahoo email the only email Spy African Minister Public servers Internet ISP Router Edge Router Stateful Firewall IPv4 NAT African Ministry 40
Emergency Response 41
42
43
Government & Industry Emergency & Crisis Management 44
45
IT Budgets 46
47
48
49
With Everyone! 50
Internet Environment Diversity Dual Stack Enterprise WAN: 6to4, IPv6 over IPv4, Dual Stack Aggregation 6to4 Relay IPv6 over IPv4 tunnels or Dedicated data link layers Cable IPv6 over IPv4 Tunnels Residential Teleworker DSL, FTTH, Dial Teleworker IPv6 over IPv4 tunnels or Dual stack Dual Stack or MPLS & 6PE ISATAP IPv6 IX IPv6 over IPv4 tunnels or Dedicated data link layers ISP s Enterprise 52