Automated Connection of IPv6 Via IPv4 Clouds (original) (raw)

IP Tunneling and Stateless DHCPv6 Implementation in an Enterprise Network

2017

IPv4 has so many limitations such as limited assignable addresses, complex subnetting structure, and inefficient employment of NAT among others. It is because of these shortcomings of IPv4 that IPv6 protocol was introduced. IPv6 increases efficiency in routing and packet processing, promotes a simplified network configuration, supports new services and adds to the improvement QoS by reducing latency during packet transfer. There is therefore a need to move to the IPv6 platform. However, such a process is not automatic but deliberate and requires dealing with the current complexities of the IPv4 network. Tunneling is one of the common ways of transiting from IPv4 to IPv6 and vice versa. In this paper we simulated an IPv6to4 tunnel using cisco packet tracer and GNS software. It was shown that tunneling is a possibility and an effective step to preserving IPv4 infrastructure investments towards migrating from IPv4 to IPv6.

Design and implementation scheme for deploying IPv4 over IPv6 tunnel

Journal of Network and Computer Applications, 2008

IPv4 to IPv6 transition is an inevitable process when deploying IPv6 networks within the present IPv4 Internet. The two protocols are expected to coexist for a number of years during the transition period. A number of transition techniques exist to address the various needs of different networks. One of them is tunneling mechanism. Tunneling means encapsulation of one protocol into another one so that the encapsulated protocol is send as payload on the network. In this paper, a scheme is presented for tunneling of IPv4 packets in IPv6 packets. This scheme will be useful in the future when most of the networks would be converted into IPv6 networks involving minimum IPv4 routing.

IPv6-in-IPv4 Tunnel Discovery: Methods and Experimental Results

IEEE Transactions on Network and Service Management, 2004

Tunnels are widely used to improve security and to expand networks without having to deploy native infrastructure. They play an important role in the migration to IPv6, which relies on IPv6-in-IPv4 tunnels where native connectivity is not available; however, tunnels offer lower performance and are less reliable than native links. In this paper we introduce a number of techniques to detect, and collect information about, IPv6-in-IPv4 tunnels, and show how a known tunnel can be used as a "vantage point" to launch third-party tunnel-discovery explorations, scaling up the discovery process. We describe our Tunneltrace tool, which implements the proposed techniques, and validate them by means of a wide experimentation on the 6bone tunneled network, on native networks in Italy, the Netherlands, and Japan, and through the test boxes deployed worldwide by the RIPE NCC as part of the Test Traffic Measurements Service. We assess to what extent 6bone registry information is coherent with the actual network topology, and we provide the first experimental results on the current distribution of IPv6-in-IPv4 tunnels in the Internet, showing that even "native" networks reach more than 60% of all IPv6 prefixes through tunnels. Furthermore, we provide historical data on the migration to native IPv6, showing that the impact of tunnels in the IPv6 Internet did not significantly decrease over a 6-month period. Finally, we briefly touch on the security issues posed by IPv6-in-IPv4 tunnels, discussing possible threats and countermeasures.

Deploying IPv6 Service Across Local IPv4 Access Networks

This paper introduces a new protocol called D6across4, which stands for Deploying IPv6 Service across local IPv4 access networks. The protocol aims to encourage Internet Service Providers (ISPs) to start deploying IPv6 service to their customers (end-users). It utilizes the automatic IPv6-in-IPv4 tunnels to transport IPv6 traffic (data and control information) over local IPv4 access networks. The key aspects of this protocol include: providing IPv6 service to end-users equivalent to native one, stateful operation, and requiring simple configurations on both end-user’s host and ISP sides at the time of setup. D6across4 connected hosts can communicate with other IPv6 hosts outside their local IPv4 access network. The simulation results showed that D6across4 performance parameters (e.g. latency and throughput) are acceptable in comparison to both IPv4 and IPv6 performance parameters.

Exploiting Local IPv4-only Access Networks to Deliver IPv6 Service to End-users

This paper introduces a new IPv6 deployment protocol called E4Deliver6, which stands for Exploiting Local IPv4- only Access Networks to Deliver IPv6 Service to End-users. The protocol intends to help the Internet Service Providers (ISPs) to rapidly start providing IPv6 service to the end-users. E4Deliver6 tunnels the IPv6 traffic into IPv4 traffic to transit the IPv4-only access network infrastructure. The new protocol offers IPv6 service alongside IPv4 service to the end-users, economical solution, and requires simple and automatic configurations at both end-users’ hosts and ISP sides at the time of setup. E4Deliver6 connected hosts will be able to communicate with other IPv6-only servers outside their local IPv4-only access network. The performance analysis of E4Deliver6 showed that the performance parameters (e.g. Latency and Throughput) are acceptable in comparison to other stateless protocols (e.g. 6rd) and it is much better than other stateful protocols (e.g. BDMS) performance parameters.

IP v6 secure tunneling mechanism

Proceedings of the CUBE International Information Technology Conference on - CUBE '12, 2012

The Network performance optimization, configuration depends on proper design of complete network. The network layer is primarily concerned with routing. The packets may cross many networks to reach the destination during this process. To achieve its goals, the network layer must know about the topology, communication subnets and the version of the IP addresses used. The present version of IP is version 4 which must communicate with the next generation of IP addresses which is version 6. As both the versions of Internet Protocol must co-exist, we need some mechanisms that can help the transition process run smoothly. The old applications which are still using IP v4 should work smoothly with IP v6. We discuss IPv6 secure tunneling mechanism that has some advantages over the other models. The model discussed here can be used to establish hybrid communications between the two different versions of Internet protocol in both ways.

A Comparative Analysis of Transition Mechanisms for IPv6/IPv4 Routing Environment

1999

This paper introduces an analysis for IPv6/IPv4 routed protocols on different transition mechanisms named IPv4 compatibility mechanisms that can be implemented by IPv6 hosts and routers. These mechanisms include providing complete implementations of both versions of the Internet Protocol (IPv4 and IPv6), and tunneling IPv6 packets over IPv4 routing infrastructures. They are designed to allow IPv6 nodes to maintain complete compatibility with IPv4, which should greatly simplify the deployment of IPv6 in the Internet, and facilitate the eventual transition of the entire Internet to IPv6.

Evaluation and Study of Transition Techniques Addressed on IPv4-IPv6

International Journal of Computer Applications, 2013

IPv4/IPv6 transition rolls out many challenges to the world of internet. IETF proposes various transition techniques including dual IP stack, IP translation and tunnelling transition mechanisms. A detailed study is made on the IPv6 addressing architecture. Out of the three mechanisms Tunnelling proves to be most effective in the study which has been done. The 6rd mechanism that is used for IPv4/IPv6 transition mechanism permits an IPv6 mobile node to roam into IPv4 based network and get serviced besides roaming in IPv6 based network. This paper aims at a comparative study on the three transition techniques such as Softwire mesh which supports Dual Stack, NAT444 which supports translation and IPv6 Rapid Development (6rd) mechanism in tunnelling mechanism.

Automated and secure IPv6 configuration in enterprise networks

2010 International Conference on Network and Service Management, 2010

Over the last decade, IPv6 has established itself as the most mature network protocol for the future Internet. Its recent deployment in core networks of operators, its availability to end customers of multiple ISPs together with the availability of native access to large services like Google assess the increasing penetration of IPv6.