Analysis of Tunneling Transition Mechanism in IPv6

 

Rinki Kaur, Sanjay Kumar, V.K. Patle

School of Studies in Computer Science & IT Pt. Ravishankar Shukla University, Raipur (Chhattisgarh) 492010 India

*Corresponding Author Email: kaur0rinki@gmail.com, sanraipur@rediffmail.com, patlevinod@gmail.com

 

 

ABSTRACT:

During the time of migration from Internet Protocol Version4 to Internet Protocol Version6 network, a various number of transitions mechanism have been proposed to ensure smooth, stepwise and independent changeover. IPv6 was proposed by IETF (Internet Engineering Task force) as a replacement of IPv4 protocol. When IPv6 was applied in cellular network, need of some improved Protocols was felt in order to support the mobility and Quality Of Service of a node.IPv6 Tunneling is a process where an encapsulation technique is fairly simple in which outer IP header is added before the original IP header, between them any other headers for the path, such as security headers specific to the tunnel configuration. The outer IP header source and destination identify the “end points” of the tunnel. Tunneling has two types i.e. automatic and configured. Tunneling is applied in four way i.e. Host-to-Host, Host-to-Router, Router-to-Router, Router-to-Host. Analyze the Automatic and Configured Tunneling in all the four way of Tunneling. Automatic tunnel is not point-to-point; it is point-to-multipoint. Configured tunnel is Simple point-to-point tunnels that can be used within a site or between sites.

 

KEY WORDS: MANET, IPv6, Automatic Tunneling, Configured Tunneling, Way of Tunneling. 

 


1. INTRODUCTION:

In the last 20 years, the internet undertook a huge and unexpected explosion of growth [1]. There was an effort to develop a protocol that can solve problems in the current Internet protocol which is in the Internet protocol version 4 (IPv4).It was soon realized that the current internet protocol the IPv4, would be inadequate to handle the internet’s continued growth [2].The Internet Engineering Task Force was developed a new protocol in year 1990’s and it was launched IPng in 1993 which is stand for Internet Protocol Next Generation. So a new generation of the Internet Protocol (IPv6) was developed [3], allowing for millions of more IP addresses. IPv6 is an advanced version of IPv4 that support improved scalability and routing ,security and ease-of configuration, address space cardinality high-density mobility, multimedia and real time applications like Audio and Video etc[4].

 

IPv6 is designed to coexist with IPv4 and eventually provide better internetworking capabilities than IPv4. IPv6 offers the potential of achieving the scalability, reach ability, end-to-end internetworking, Quality of service (QoS). Due to the current scalability and complexity of the Internet IPv6 becomes mandatory. IPv6 protocol has 128-bit addresses instead 32 bit IPv4 addresses, however the migration from IPv4 to IPv6 is an instant is impossible because of the huge size of the Internet and of the great number of IPv4 users [5].One of the biggest challenges in the deployment of IPv6 is how to migrate IPv4-based infra structures to those supporting IPv6. It is impractical and costly to replace existing IPv4-based networking infra -structures with IPv6, because IPv4 is not compatible with IPv6. To ensure a flowless and successful integration of IPv6 into existing networks, the IETF IPng Transition Working Group [6] has been working on several transition strategies, tools, and mechanisms. These transition technologies play a major role in making communication between the two protocol suites. Both IPv6 and IPv4 involvement is mandatory in IPv6 transition, which leads to major security threats. The IETF Next Generation Transition Working Group (NGTrans) has proposed many transition technologies to enable the flawless integration of IPv6 facilities into current infrastructure. In general, these transition mechanisms encapsulate IPv6 packets into IPv4 packets and transport them over an IPv4 network infrastructure. The IPv6 transition mechanisms are:-

 

Tunneling transition mechanism, and the type of Tunneling like Automatic and Configured Tunneling, way of tunneling and IPv6 security aspect .This paper is organized as follow: In the section 2 of this paper we focus on the architecture of the IPv4 and IPv6 and the comparisons between them. Section 3 of this paper gives the detail explanation about the Tunneling Transition Mechanism and the type of the Tunneling .In section 4 we describe about the way of tunneling. Section 5 give the Overview for the Automatic and configured Tunneling in the four way of tunneling i.e. Host-to-Host, Router-to –Router, Host –to Router and vice versa. Finally in the section 6 we make some concluding remarks and discuss Future work.

 

1)

Dual stack

2)

Tunneling Techniques

3)

Translation.

Fig .1 The IPv6 Transition Mechanisms

 

2. HEADER FORMAT OF IPV4 AND IPV6:

Internet Protocol Version 4 is the current version of the which was finally introduce in 1981. It has a 32 bit address, and it supports up to 4,294,967,296 addresses. The Header Format for the IPv4 is:

 

Fragmentation Flags:

Removed in IPv6. Fragmentation information is not included in the IPv6 header. It is contained in a Fragment extension header. Fragment Offset: These field was removed from the IPv6. Fragmentation information is not included in the IPv6 header. It is contained in a Fragment extension header.

 

Version

Header Length

Service

Total Lenght

Identification

Flags

Fragment Offset

TTL

Protocol

Header Checksum

Source Address

Destination Address

Options

Options

Options

Figure 2: IPv4 Header Format Internet Protocol Version 6 is the128 bit addresses .IPv6 is designed to allow the Internet to grow steadily, both in terms of the number of hosts connected and the total amount of data traffic transmitted and it will supports unique addresses up to 340,282,366,920938,463,463,374,607,431,768,211,456.The Header Format for the IPv6 is:

 

Version

 

Traffic class

Flow label

 

Payload Length

Next Header

Hop Limit

 

Source Address

 

 

Destination Address

 

Figure 2: IPv6 Header Format [7]

 

2.1 IPV6 Verses Ipv4:

This Section describes the Comparisons between the IPv4 and IPv6 Header format. These Comparisons gives the better understanding of the IPv6 then IPv4.

 

IPv4 Header Field Vs IPv6 Header Field:

Version:

It has same field but with different version numbers.

 

Internet Header Length:

This field was removed in IPv6.IPv6 does not include a Header Length field because the IPv6 header is always a fixed size of 40 bytes. Each extension header is either a fixed size or indicates its own size.

 

Type of Service:

It is replaced by the IPv6 Traffic Class field.

 

Total Length:

It was replaced by the IPv6 Payload Lengthfield, which only indicates the size of the payload.

 

Identification:

Removed in IPv6. Fragmentation information is not included in the IPv6 header. It is contained in a Fragment extension header.

 

Time to Live:

Replaced by the IPv6 Hop Limit field.

 

Protocol:

Replaced by the IPv6 Next Header field.

 

Header Checksum:

Removed in IPv6. In IPv6, bit-level error detection for the entire IPv6 packet is performed by the link layer.

 

Source Address:

The field is the same except that IPv6

Addresses are 128 bits in length.

 

Destination Address:

The field is the same except that IPv6

addresses are 128 bits in length.

 

Options:

Removed in IPv6. IPv4 options are replaced by IPv6

extension headers

 

3. Tunneling Transition Mechanism:

Tunneling is a strategy used when two computers using IPv6 want to communicate with each other and the packet must pass through a region that uses IPv4[2]. The term “tunneling” refers to a means to encapsulate one version of IP in another so the packets can be sent over a backbone that does not support the encapsulated IP version. For example, when two isolated IPv6 networks need to communicate over an IPv4 network, dual-stack routers at the network edges can be used to set up a tunnel which encapsulates the IPv6 packets within IPv4, allowing the IPv6 systems to communicate without having to upgrade the IPv4 network infrastructure that exists between the networks. This mechanism allow the node which want to use the same protocol and communicate over the network that uses another network protocol. This mechanism which is mainly used to tunnel traffic between two IPv6 hosts through an IPv4 network, or vice-versa. The Tunneling process has three basic steps i.e. Encapsulation, Decapsulation and tunneling management. it also need the two tunnel end point, generally which are dual stack IPv4/IPv6 node, to handle the encapsulation and decapsulation . In dual stack approach, they will support the both IPv4 and IPv6 at the same time. In IPv6 transition, Tunneling is commonly used for IPv6 hosts/networks to communicate with each other over IPv4 network (i.e., IPv6 over IPv4), and for IPv4 hosts/networks to communicate over IPv6 network (i.e. IPv4 over IPv6). Figure 3 show the tunneling of

 

Figure 3(a) .IPv6 over Ipv4 Tunneling

IPv4 Header

 

After Tunneling

IPv4 Header

IPv4 Header

Figure 3(b) IPv6 over Ipv4 Tunneling

 

In this example host and routers supporting the dual stack (i.e. dual stack node) can use tunnels to route IPv6 packets over IPv4 regions shown in the figure 3. In this example, host A sends the native IPv6 packet to router R1, which retransmits the packet in an IPv4 tunnel to router R2, which finally transmits it as a native IPv6 packet to host B. In this case, the tunnel is managed by R1 and R2. From the encapsulation point of view, implementing a tunnel means encapsulating an IPv6 packet inside an IPv4 packet, as shown in Figure 3.1. Figure 3.1 show the IPv6 header will contain addresses A and B, and the IPv4 header will contain addresses R1 and R2

 

3.1 TYPES OF TUNNELING MECHANISM:

IPv6 have a various Tunneling Transition Mechanism that are:

1.     1. Automatic Tunneling

2.     2. Configured Tunneling

3.     3. Tunnel Broker 4.6to 4

4.     5.6 Over 4.

 

In this paper we discuss about the Automatic Tunneling and configured Tunneling.

 

1. Automatic Tunneling:

Automatic tunneling refers to a technique where the tunnel endpoints are automatically determined by the routing infrastructure. Tunnel endpoints are determined by using a well-known IPv4 anycast address on the remote side, and embedding IPv4 address information within IPv6 addresses on the local side [10]. In this Mechanism the sender send the IPv6 packets using the IPv6 compatible address as the destination address to the receiver. When the packets enter in the boundary of IPv4 network, the router encapsulates these packets in to IPv4 packet, which should have an IPv4 address. To get this address, the router extracts the IPv4 address embedded in the IPv6 address the packet then travels the rest of its journey as an IPv4 packet.

 

The destination host, which is using a dual stack, now receives an IPv4 packet. Recognizing its IPv4 address, it reads the header, and finds that the packet is carrying an IPv4 packet. It then passes the packet to the IPv6 software for processing [9], [2].

 

Configured Tunneling:

Configured tunneling is a technique where the tunnel endpoints are configured explicitly, either by a human operator or by an automatic service known as a Tunnel Broker. Configured tunneling is usually more deterministic and easier to debug than automatic tunneling, and is therefore recommended for large, complex networks [10].Configured Tunneling is also known as explicit tunneling. In this mechanism sender sends the IPv6 packet with the receiver’s no compatible IPv6 address, however the packet cannot pass through the IPv4 region without first being encapsulated in an IPv4 packet. The two routers at the boundary of the IPv4– region are configured to pass the packet encapsulated in an IPv4 packet. The router at one end sends the IPv4 packet with its own IPv4 address as the source address and the other router’s address as the destination. The router receiver’s the packet, decapsulates the IPv6 packet, and sends it to the destination host. The destination host then receives the packet in IPv6 format and processes it [9], [2].

 

4. WAY OF TUNNELING:

During the transition, the tunneling can be deployed in a four way i.e. Host-to-Host, Router-to-Router, Host-to-Router and Router –to –Host.

1.     1. Host-to-Router: IPv6/IPv4 hosts can tunnel IPv6 packets to an intermediary IPv6/IPv4 router that can be reached via an IPv4 infrastructure.

2.     2. Router-to Host: IPv6/IPv4 routers can use tunnels to reach an IPv6/IPv4 host via an IPv4 infrastructure.

 

Figure4 (a) Host-to-Router, Router-to-Host

 

1.             3. Host-to-Host: IPv4/IPv6 hosts that are interconnected by an IPv4 infrastructure can tunnel IPv6 packets between themselves.

2.             4. Router-to Router: IPv6/IPv4 routers interconnected by an IPv4 infrastructure can tunnel IPv6 packets between themselves.

 

Figure 4(b) Host-to-Host Tunneling

 

5. A OVERVIEW OF THE AUTOMATIC AND CONFIGURED TUNNELING IN FOUR WAY:

In the above 1 and 4 way of tunneling methods i.e. router-to-router and host-to-router the IPv6 packet is being tunneled to a router. The endpoint of this type of tunnel is an intermediary router which must decapsulate the IPv6 packet and forwards it on to its final destination. When tunneling to a router, the endpoint of the tunnel is different from the destination of the packet being tunnelled. So the addresses in the IPv6 packet being tunneled cannot provide the IPv4 address of the tunnel endpoint. Instead, the tunnel endpoint address must be determined from configuration information on the node performing the tunneling [11].so this type of tunneling is called Configured tunneling. Configured tunnels require: Dual stack end points both IPv4 and IPv6 addresses configured at each end.

 

5.1 Working Process of Router-to-Router Tunneling:

(a) A packet with an IPv6 address arrives at dual stack router.

(b) Dual Stack Router A identifies its forwarding table and finds that it can route this IPv6 address by sending it to Dual Stack Router B. It finds that Dual Stack Router B’s IPv4 address is 10.1.1.1.

(c) Dual Stack Router A encapsulates the IPv6 packet in an IPv4 packet and sends it into the IPv4 cloud.

(d) The IPv4 cloud routes the packet using the 10.1.1.1 destination address as if it were a normal IPv4 packet. The packet finally reaches Dual Stack Router B. e) Dual Stack Router B looks at the packet and realizes that it is carrying an IPv6 packet inside. It strips out the IPv4 header and uses the IPv6 header to identify its forwarding table. It finds that it can reach the IPv6 address destination in the IPv6 network to which it is connected.

 

 

5.2 Working Process of Host-to-Router Tunneling:

(a) A packet with an IPv6 address arrives at dual stack host.

(b)It is clearly show that on one end encapsulation is taken place at the host and the other at the router; the tunnel is therefore established between the host and the router.

(c) In this method one dual stack supporting router and one dual stack supporting host is required.

(d) The endpoint of this type of tunnel is an intermediary router which must decapsulate the IPv6 packet and forwards it on to

 

 

 

In the 2 and 3 way of tunneling methods i.e. host-to-host and router-to-host the IPv6 packet is tunnelled all the way to its final destination. In this case, the destination address of both the IPv6 packet and the encapsulating IPv4 header identify the same node. This fact can be exploited by encoding information in the IPv6 destination address that will allow the encapsulating node to determine tunnel endpoint IPv4 address automatically. Automatic tunneling employs this technique, using an special IPv6 address format with an embedded IPv4 address to allow tunneling nodes to automatically derive the tunnel endpoint IPv4 address. This eliminates the need to explicitly configure the tunnel endpoint address, greatly simplifying configuration [11].For the automatic tunneling we can use the 6 to 4, Tunnel Broker, ISATAP, Terodo, 6 over 4. For control of the tunnel paths, and to reduce the potential for tunnel relay denial-of-service attacks, manually configured tunnels can be advantageous over automatically configured tunnels.

 

5.3 Working Process of Host-to-Host Tunneling:

(a) In the host-to-host method, the encapsulation is done at the source host and the decapsulation is done at the destination host.

(b) The encapsulated datagram are sent through a native IPv4 Network that has no knowledge of the IPv6 network protocol [13].

(c)It is clearly shows that the both hosts having dual stack to encapsulate the packet of IPv6 in IPv4 packets and transmit over the network as an IPv4 packet utilizing all the

 

5.4 Working Process of Router -to-Host Tunneling:

(a) In the router-to-host tunneling configuration, an IPv6/IPv4 router creates an IPv6 over IPv4 tunnel across an IPv4 infrastructure to reach an IPv6/IPv4 node.

(b) The tunnel endpoints span the last segment of the path between the source node and destination node. The IPv6 over IPv4 tunnel between the IPv6/IPv4 router and the IPv6/IPv4 node acts as a single hop.

(c)On the IPv6/IPv4 router, a tunnel interface representing the IPv6 over IPv4 tunnel is created, and a route (typically a subnet route) is added using the tunnel interface. The IPv6/IPv4 router tunnels the IPv6 packet based on the matching subnet route, the tunnel interface, and the destination address of the IPv6/IPv4

 

6. CONCLUSION AND FUTURE WORK:

This paper briefly covers the Tunneling Transition Mechanism for the IPv6, these Mechanism play the important role to make the communication between IPv4 and IPv6 .This paper gives theoretical analysis about four way of automatic and configured tunneling .After analysis we find that for control of the tunnel paths, and to reduce the potential for tunnel relay denial-of-service attacks, manually configured tunnels can be advantageous over automatically configured tunnels.

 

Future work will be continue to analysis the various techniques about the Configured and automatic tunneling through Experimental implementation and evaluate that which tunneling transition mechanism is best.

 

REFERENCES:

1.        Jelena Mirkovic and Peter Reiher, A Taxonomy of DDoS attack and DDoS defense mechanisms, ACMSIGCOMM Computer Communication review, PP.39-53, April 2004.

2.        Hanumanthappa J. and Dr. Manjaiah D.H., IPv6 an IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model:-A Case Study for University of Mysore Network-,(IJCSIS) International Journal of Computer Science and Information Security, Vol. 3, No.1, 2009.

3.        Joseph Davies.. Understanding IPv6.Washington: Microsoft Press 2003.

4.        Hanumanthappa. J. and Dr. Manjaiah Design and Implementation of Stateless BD-SIIT {IPv4->IPv6 and IPv6->IPv4} Translation Algorithms in Transition of IPv4 to IPv6.

5.        Kurose.J. & Ross .K. Computer Networking: A top-down approach featuring the Internet .3rd ed,(Addison Wesley) (2005).

6.        IETF, IPv6 Transition Working, group, http://www.6bone. net/ngtrans. As, on retrive, date 15/01/2013

7.        Iona Riau and Ahmad Navaid. Tunnelling: A Transition Mechanism to Deploy IPv6 Networks.

8.        The Migration from IPv4 to IPv6, Page 227, 56982_CH12I 12/12/97.

9.        Behrouz A. Forouzan, Third Edition, “TCP/IP Protocol Suite”.

10.     A Primer on IPv6, http://www.gigi.com.

11.     RFC 2893-Transition Mechanisms for IPv6 Hosts and Routers

12.     CISCO, White Paper, Federal Agencies and the Transition to IPv6, http://www.cisco.com/ipv6.Asonretrieve date 17/01/2013.

 

13.     Ioan Raicu and Sherali Zeadally, Evaluating IPv4 to IPv6 Transition Mechanisms. 0-7803-7661-7/03/$17.00©2003 IEEE.

14.     http://www. ietf.org. As on retrieve date.20/01/2013.

15.     Abidah Hj Mat Taib, IPv6 Transition: Why a new security mechanisms model is necessary.

16.     Baker, F., "Requirements for IP Version 4 Routers", RFC 1812, June1995.

17.     Daniel Stirnimann, IPv6 (IPv6 Transition and  Tunneling  Specific Issues), September 25,2008.

18.     R. Graveman, M. Parthasarthy, P. Savola, and Tschofeing using IPSec to secure IPv6 –in IPv4 tunnels draft –ietf— 6ops-ipsec-tunnels-01, August, 25, 2005.

19.     J. Postel, NCP/TCP Transition Plan, RFC 801, November 1981.

20.     Dr. Manjaiah. D.H. Hanumanthappa. J. 2009, Economical and Technical costs for the Transition of IPv4–to-IPv6 Mechanisms.

21.     A. Conta, S. Deering, “Generic Packet Tunneling in IPv6 Specification,” Request for Comments 2473, Internet Engineering Task Force, December 1998.

 

 

 

 

Received on 22.02.2013       Accepted on 15.03.2013        

Modified on 22.03.2013©A&V Publications all right reserved

Research J. Science and Tech 5(3): July- Sept., 2013 page 313-318