Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010319202 | TK5105.585 R66 2013 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
With the announcement in 2011 that the current Internet Protocol (IP), IPv4, has nearly run out, interest in IPv6 -- the latest IP version -- has grown substantially. This book describes IPv6 technology and its repercussions on organizations, including strategies and techniques for assessing the impact of deploying IPv6 on a network, discovering current IP assets, assessing network readiness, creating a plan to deploy IPv6 while retaining IPv4 connectivity, and for managing a dual protocol IPv4-IPv6 network. It is a must read for IP network engineers, managers, and those who work in IT.
Author Notes
Michael Dooley is responsible for overall operations of the BT Diamond IP division. Prior to joining the team, he was president and CEO of Diamond IP Technologies; vice president of operations for the VitalSoft line of software products at Lucent Technologies; and Vice President of Engineering at Quadritek Systems.
Timothy Rooney managed the engineering development and market introduction of BT Diamond IP's four next-generation IP management-systems: NetControl, IPControl, Sapphire Appliances, and ImageControl. Prior to that, he worked at ATT Bell Laboratories, Cingular, Triton PCS, and Lucent, including a leadership role managing the VitalQIP software product to its peak as market leader. Timothy Rooney is the author of IP Address Management Principles and Practice and Introduction to IP Address Management, both published by Wiley-IEEE Press.
Table of Contents
Acknowledgments | p. xi |
Introduction | p. xiii |
1 IPv6 Deployment Drivers | p. 1 |
1.1 The Internet: A Success Story | p. 1 |
1.1.1 Supply-Side Issues | p. 3 |
1.1.2 Internet at a Crossroads | p. 6 |
1.1.3 Which Internet Are You On? | p. 7 |
1.2 Emerging Applications | p. 7 |
1.3 IPv6 Business Case | p. 10 |
2 IPv5 Overview | p. 13 |
2.1 IPv6 Key Features | p. 14 |
2.2 The IPv6 Header | p. 14 |
2.2.1 IPv6 Extension Headers | p. 15 |
2.3 IPv6 Addressing | p. 17 |
2.3.1 Address Notation | p. 18 |
2.3.2 Address Structure | p. 19 |
2.3.3 IPv6 Address Allocations | p. 20 |
2.3.4 Internet Control Message Protocol for IPv6 (ICMPv6) | p. 27 |
2.3.5 IPv6 Ping | p. 28 |
2.3.6 Multicast Listener Discovery | p. 28 |
2.3.7 Multicast Router Discovery | p. 31 |
2.3.8 Neighbor Discovery Protocol | p. 31 |
2.3.9 Secure Neighbor Discovery (Send) | p. 33 |
2.3.10 Inverse Neighbor Discovery | p. 33 |
2.3.11 Router Renumbering | p. 34 |
2.3.12 Node Information Query | p. 34 |
2.4 IPv6 Address Autoconfiguration | p. 35 |
2.4.1 Modified Etji-64 Interface Identifiers | p. 36 |
2.4.2 Duplicate Address Detection (Dad) | p. 37 |
2.5 Mobile IPv6 | p. 38 |
2.6 Reserved Subnet Anycast Addresses | p. 40 |
2.7 Required Host IPv6 Addresses | p. 41 |
2.8 IPv6 Routing | p. 41 |
3 IPv4/Ipv6 Co-Existence Technologies | p. 43 |
3.1 Dual Stack | p. 44 |
3.1.1 Implementing Dual Stack | p. 44 |
3.1.2 Which Address Is Used? | p. 45 |
3.1.3 DNS Considerations | p. 47 |
3.1.4 DHCP Considerations | p. 48 |
3.2 Tunneling Approaches | p. 49 |
3.2.1 Tunneling Scenarios for IPv6 Packets Over IPv4 Networks | p. 49 |
3.2.2 Tunnel Types | p. 51 |
3.2.3 Tunneling Scenario for IPv4 Packets Over IPv6 Networks | p. 62 |
3.2.4 Tunneling Summary | p. 63 |
3.3 Translation Approaches | p. 63 |
3.3.1 IP/ICMP Translation | p. 65 |
3.3.2 Bump in the Host (BIH) | p. 72 |
3.3.3 Network Address Translation for IPv6/Ipv4 (NAT64) | p. 74 |
3.3.4 Other Translation Techniques | p. 75 |
3.4 Application Support of IPv6 | p. 78 |
3.5 Service Provider IPv4/IPv6 Co-Existence | p. 78 |
3.5.1 Reference Architecture | p. 79 |
3.5.2 Deployment Approaches Overview | p. 80 |
3.5.3 Routing Infrastructure Deployment Approaches | p. 80 |
3.5.4 Comparison of Deployment Approaches | p. 87 |
3.6 Addressing and DNS Considerations | p. 87 |
4 IPv6 Readiness Assessment | p. 91 |
4.1 Putting a Plan in Place | p. 92 |
4.2 IP Network Inventory | p. 93 |
4.2.1 IPv6 Readiness | p. 93 |
4.2.2 Discovery | p. 93 |
4.2.3 IPv6 Assessment | p. 94 |
4.3 IPv6 to do List | p. 106 |
4.4 IPv6 Readiness Assessment Summary | p. 106 |
5 IPv6 Address Planning | p. 109 |
5.1 Internet Registries | p. 109 |
5.1.1 RIR Address Allocation Policies | p. 111 |
5.1.2 Address Allocation Efficiency | p. 112 |
5.2 IPv6 Address Planning | p. 112 |
5.3 IPv6 Address Allocation Methods | p. 113 |
5.3.1 Best-Fit Method | p. 114 |
5.3.2 Sparse Allocation Method | p. 116 |
5.3.3 Random Allocation | p. 117 |
5.3.4 DHCPv6 Prefix Delegation | p. 118 |
5.3.5 Unique Local Address Space | p. 118 |
5.4 Defining Your IPv6 Address Plan | p. 118 |
5.5 Multihoming And IP Address Space | p. 122 |
5.6 IP Address Planning Summary | p. 125 |
6 IPv6 Security Planning | p. 127 |
6.1 The Good News: IP Is IP | p. 127 |
6.2 The Bad News: IPv6 Is Not IPv4 | p. 128 |
6.3 Update Your Security Policy | p. 129 |
6.4 Network Perimeter Monitoring and Intrusion Prevention | p. 129 |
6.4.1 IPv6 Address Filtering | p. 130 |
6.4.2 ICMPv6 Messages | p. 131 |
6.5 Extension Headers | p. 132 |
6.6 Internal Network Protection | p. 133 |
6.6.1 Network Reconnaissance | p. 133 |
6.6.2 Network Access | p. 134 |
6.6.3 DHCPv6 | p. 135 |
6.6.4 DNS | p. 135 |
6.6.5 Anycast Addressing | p. 136 |
6.6.6 Internal Network Filtering | p. 136 |
6.7 Network Device Security Considerations | p. 137 |
6.8 Mobile IPv6 Security | p. 138 |
6.8.1 Mobility Extension Header | p. 139 |
6.8.2 Mobile IPv6 Vulnerabilities | p. 143 |
6.9 IPv4/Ipv6 Coexistence Measures | p. 144 |
6.9.1 Securing Tunneling Implementations | p. 145 |
6.9.2 Securing Translation Implementations | p. 146 |
6.10 Summary | p. 148 |
7 IPv6 Network Management Planning | p. 149 |
7.1 Management Model | p. 149 |
7.2 Network Management Scope | p. 150 |
7.2.1 Network Inventory | p. 150 |
7.2.2 IP Address Inventory | p. 151 |
7.2.3 The Management Network | p. 151 |
7.3 The Simple Network Management Protocol (SNMP) | p. 152 |
7.3.1 Configuration Management | p. 153 |
7.3.2 Fault Management | p. 153 |
7.3.3 Accounting Management | p. 154 |
7.3.4 Performance Management | p. 154 |
7.4 Methods and Procedures | p. 154 |
7.5 Summary | p. 155 |
8 Managing the Deployment | p. 157 |
8.1 Integrating Plans | p. 157 |
8.2 Project Management | p. 159 |
8.3 Testing Deployment | p. 160 |
8.4 Production Deployment | p. 161 |
9 Managing the IPv4/IPv6 Network | p. 163 |
9.1 Common Network Management Tasks | p. 163 |
9.2 Configuration Management | p. 163 |
9.2.1 Network Allocation-Related Tasks | p. 164 |
9.2.2 Adding a New Device | p. 166 |
9.2.3 Deletion Tasks | p. 167 |
9.2.4 Address Renumbering or Movement Tasks | p. 168 |
9.2.5 Block/Subnet Splits | p. 171 |
9.2.6 Block/Subnet Joins | p. 172 |
9.2.7 DHCPv6 Server Configuration | p. 173 |
9.2.8 DNS Server Configuration | p. 174 |
9.2.9 Prefix Renumbering | p. 175 |
9.3 Fault Management | p. 176 |
9.3.1 Fault Detection | p. 176 |
9.3.2 Troubleshooting and Fault Resolution | p. 177 |
9.4 Accounting Management | p. 177 |
9.4.1 Inventory Assurance | p. 177 |
9.4.2 Address Reclamation | p. 180 |
9.5 Performance Management | p. 181 |
9.5.1 Services Monitoring | p. 181 |
9.5.2 Application Performance Management | p. 182 |
9.5.3 Auditing and Reporting | p. 182 |
9.6 Security Management | p. 183 |
9.7 Disaster Recovery/Business Continuity | p. 183 |
10 IPv6 and the Future Internet | p. 185 |
10.1 Technology Enablers | p. 185 |
10.2 The Internet's Dark Side | p. 187 |
10.3 The Internet's Bright Future | p. 187 |
10.3.1 Living Smarter | p. 187 |
10.3.2 Keeping Track | p. 188 |
10.3.3 Extensible Healthcare | p. 188 |
10.3.4 Public Safety | p. 188 |
10.3.5 Credit Cards of the Future | p. 188 |
10.3.6 Consumer Applications | p. 188 |
10.4 Conclusion | p. 189 |
Appendix | p. 191 |
Bibliography | p. 193 |
Index | p. 199 |