IPV6
IPV6
IPV6
5. Pay more attention to the type of service, particularly for real-time data.
Extension Headers
IPv6 introduces the concept of (optional) extension headers. These headers can be
suppliedto provide extra information, but encoded in an efficient way.
Six kinds of extension headers are defined at present, as listed in Fig. 5-57.
Each one is optional, but if more than one is present they must appear directly after the
fixed header, and preferably in the order listed.
Some of the headers have a fixed format; others contain a variable number of variable-
length options.
For these, each item is encoded as a (Type, Length, Value) tuple.
The Type is a 1-byte field telling which option this is. The Type values have been
chosen so that the first 2 bits tell routers that do not know how to process the option what
to do. The choices are: skip the option; discard the packet; discard the packet and send
back an ICMP packet; and discard the packetbut do not send ICMP packets for multicast
addresses (to prevent one bad multicastpacket from generating millions of ICMP reports).
The Length is also a 1-byte field. It tells how long the value is (0 to 255bytes).
The Value is any information required, up to 255 bytes.
The hop-by-hop header is used for information that all routers along the path must
examine. So far, one option has been defined: support of datagrams exceeding 64 KB.
The format of this header is shown in Fig. 5-58. When it is used, the Payload length
field in the fixed header is set to 0.
The next 2 bytes indicate that this option defines the datagram size (code 194) and that
the size is a 4-byte number. The last 4 bytes give the size of the datagram. Sizes less than
65,536 bytes are not permitted and will result in the firstrouter discarding the packet and
sending back an ICMP error message.
Datagrams using this header extension are called jumbograms. The use of jumbograms
is important for supercomputer applications that must transfer gigabytes ofdata efficiently
across the Internet.
The destination options header is intended for fields that need only be interpreted at the
destination host
The routing header lists one or more routers that must be visited on the way to the
destination. The format of the routing header is shown in Fig. 5-59.
Routing type field gives the format of the rest of the header. Type 0 says that a reserved
32-bit word follows the first word, followed by some number of IPv6 addresses.
Finally, the Segments left field keeps track of how many of the addresses in the list have
not yet been visited. It is decremented every time one is visited. When it hits 0, the packet
is on its own with no more guidance about what route to follow.
The fragment header deals with fragmentation similarly to the way IPv4 does.
The header holds the datagram identifier, fragment number, and a bit telling whether
more fragments will follow.
The authentication header provides a mechanism by which the receiver of a packet can
be sure of who sent it.
The encrypted security payload makes it possible to encrypt the contents of a packet so
that only the intended recipient canread it.
Address Resolution Protocol [ARP] is a network layer protocol that is used to convert IP
address intoMAC address. Network interface cards (NICs) each have a hardware address
or MAC addressassociated with them. Applications understand TCP/IP addressing, but
network hardware devices (such as NICs) do not.
For example, when two Ethernet cards are communicating, they have no knowledge of
the IP addressbeing used. Instead, they use the MAC addresses assigned to each card to
address data frames.
TheARP was designed to provide a mapping from the logical 32-bit TCP/IP addresses to
the physical 48-bit MAC addresses.
ARP resolves IP addresses used by TCP/IP-based software to media access control
addresses usedby LAN hardware.
When a host tries to interact with another host, an ARP request is initiated. If the IP
address is for the local network, the source host checks its ARP cache to find out the
hardware address of the destination computer.
If the correspondence hardware address is not found, ARP broadcasts the request to all
the local hosts.
All hosts receive the broadcast and check their own IP address. If no match is discovered,
the request is ignored.
The destination host that finds the matching IP address sends an ARP reply to the source
host along with its hardware address, thus establishing the communication. The ARP
cache is then updated with the hardware address of the destination host.
Dynamic Host Configuration Protocol (DHCP)
Open Shortest Path First (OSPF) is a link-state routing protocol. OSPF is another Interior
Gateway Protocol.
It is designed to be run as an Interior Gateway Protocol (IGP) to a single Autonomous
System (AS).
The Internet Engineering Task Force (IETF) group was formed in 1988 to design an IGP
basedon the Shortest Path First (SPF) algorithm for use in the Internet.
OSPF was created because in the mid1980s, the Routing Information Protocol (RIP) was
not capable of serving large, heterogeneousinternetworks.
OSPF being a SPF algorithm scales better than RIP.
As a link state routing protocol, OSPF contrasts with RIP and IGRP, which are
distancevector routingprotocols.
Routers running the distance vector algorithm send all or a portion of their routing tables
inrouting update messages, but only to their neighbor’s
OSPF Basic Operation OSPF is a very complex routing protocol but its fundamental
operation is quite simple.
1. Each router sends so called ℎ𝑒𝑙𝑙𝑜𝑝𝑎𝑐𝑘𝑒𝑡𝑠 out of all OSPF-enabled interfaces. This way,
the OSPF-enabled router discovers directly connected routers which also run OSPF. If
certain parameters in the hello packets match between the neighboring routers, they
formtherelationship called ℎ𝑒𝑎𝑑j𝑎𝑐𝑒𝑛𝑐𝑦.
2. Then, each router exchanges packets called 𝐿i𝑛𝑘𝑆𝑡𝑎𝑡𝑒𝐴𝑑𝑣𝑒𝑟𝑡i𝑠𝑒𝑚𝑒𝑛𝑡𝑠 (LSAs) with its
neighbors (adjacent routers). In OSPF terminology the word link is the same as the
interface. LSAs contain details such as: addresses/network masks configured on the links
(interfacesrunning OSPF of course), the metric, the state of the link (which is its relation
to the rest of the network), and list of neighbors connected to the link.
3. Each router stores the LSAs in its Link State Database (LSDB). These LSAs are hen
flooded (advertised) to all OSPF neighbors. As a result of the LSA flooding, all routers in
the area have identical LSDBs. An analogy would be having the same road map of a
given country which all drivers use. Their journey's starting point is different but the map
is still thesame.
4. Each router runs 𝐷ij𝑘𝑠𝑡𝑟𝑎′𝑠 algorithm to select the best path from this topological
database (LSDB). This way, each router creates loop free graph indicating the shortest
(best) path to each network/subnet advertised. The best paths end up in the routing table.
BGP—The Exterior Gateway Routing Protocol
Border Gateway Protocol [BGP] The Border Gateway Protocol (BGP) is the routing
protocol used to exchange routing information across the Internet.
It makes it possible for ISPs to connect to each other and for end-users to connect to more
than one ISP.
BGP is the only protocol that is designed to deal with a networkof theInternet's size, and
the only protocol that can deal well with having multiple connectionsto unrelated routing
domains.
BGP first became an Internet standard in 1989. The current version, BGP4 was
adoptedin1995.
What is BGP?
1. 𝑂𝑃𝐸𝑁: It is the first message to open a BGP session, transmitted when a linktoa BGP
neighbor comes up. It contains AS number (ASN) and IP address of the router whohassent the
message.
4. 𝐾𝐸𝐸𝑃 − 𝐴𝐿𝐼𝑉𝐸: It is a periodic message between BGP peers to inform neighbor that the
connection is still viable by guaranteeing that the transmitter is still alive.