Huitema, Christian

IPV6 : the new internet protocol / Christian Huitema. - New Jersey: Prentice Hall, 1996 - 188 p.

CONTENIDO
Chapter 1 Introduction 1
1.1 Preparing for a Decision 2
1.2 Two Years of Competition 4
1.3 The New Specifications 6
1.4 Points of Controversy 6
Chapter 2 The Design of IPv6 9
2.1 The IPv6 Header Format 9
2.1.1 A Comparison of Two Headers 10
2.1.2 Simplifications 11
2.1.3 Classic Parameters, Revised 12
2.1.4 New Fields 14
2.2 From Options to Extension Headers 14
2.2.1 A Daisy Chain of Headers 15
2.2.2 Routing Header 16
2.2.3 Fragment Header 18
2.2.4 Destination Options Header 19
2.2.5 Hop-by-Hop Options 22
2.2.6 Extension Header Order 23
2.3 The Evolution of ICMP 24
2.3.1 Error Messages 25
2.3.2 The IPv6 Ping 28
2.4 Impact on the Upper Layers 28
2.4.1 Upper-layer Checksums 29
2.4.2 IPv6 in the Domain Name Service 30
2.4.3 Programming Interface 31
2.5 Points of Controversy 33
2.5.1 Do We Need More Than 255 Hops? 33
2.5.2 Should Packets Be Larger Than 64K? 34
2.5.3 Can We Live without a Checksum? 35
2.5.4 What Should Be the Structure of the Routing Header? 36
Chapter 3 Routing and Addressing 39
3.1 Address Architecture 39
3.1.1 Notation of IPv6 Addresses 40
3.1.2 Initial Assignment 42
3.1.3 Provider Addresses 43
3.1.4 Special Address Formats 44
3.2 Multicasting and Anycasting 46
3.2.1 Structure of Multicast Addresses 46
3.2.2 Predefined Multicast Addresses 48
3.2.3 Group Management 49
3.2.4 Multicast Routing 50
3.2.5 Anycast 51
3.3 Interdomain Routing 52
3.3.1 From CIDR to Providers 52
3.3.2 From BGP-4 to IDRP 54
3.3.3 Provider Selection 58
3.4 Intradomain Routing 59
3.4.1 Updating OSPF 60
3.4.2 Updating RIP 61
3.4.3 Other Protocols 62
3.5 Points of Controversy 63
3.5.1 The Length of Addresses 63
3.5.2 Providers and Monopolies 65
3.5.3 Flows and Services 66
Chapter 4 Plug and Play 69
4.1 Autoconfiguration 69
4.1.1 Link Local Addresses 70
4.1.2 Stateless Autoconfiguration 71
4.1.3 Duplicate Detection 74
4.1.4 Stateful Configuration 75
4.1.5 Lifetime of Addresses 76
4.1.6 Updating the Name Servers 77
4.2 Address Resolution 78
4.2.1 The Basic Algorithm 79
4.2.2 Redirects 82
4.2.3 The Case of Nonconnected Networks 83
4.2.4 Getting Information from Routers 84
4.2.5 Black Hole Detection 85
4.2.6 Random Delays 86
4.2.7 Protection Against Off-link Messages 87
4.3 Advanced Features 88
4.3.1 Serial Links 88
4.3.2 Nonbroadcast Multiple Access 88
4.3.3 Anycast Servers 89
4.3.4 Proxy servers 90
4.3.5 Multihomed Hosts 91
4.3.6 Changing Interface Boards 91
4.4 Points of Controversy 92
4.4.1 Why Not Just ARP? 92
4.4.2 Broadcasting or Multicasting? 92
4.4.3 Should We Support Mobility? 93
4.4.4 Router Configuration 94
Chapter 5 Bringing Security to the Internet 97
5.1 Encryption and Authentication 97
5.1.1 Security Association 98
5.1.2 Authentication Header 98
5.1.3 Computing the Authentication Data 100
5.1.4 Encrypted Security Payload 101
5.1.5 Authentication and Confidentiality 103
5.2 Key Distribution 104
5.2.1 The Design of Photuris 104
5.2.2 Photuris Exchanges 106
5.2.3 Authenticating the Keys 111
5.2.4 Manual Key Distribution 113
5.2.5 Key Distribution for Multicast Groups 113
5.3 Usage of IPv6 Security 113
5.3.1 Steel Pipes and Firewalls 113
5.3.2 Mobile Hosts 114
5.3.3 Secure Hosts 115
5.3.4 Neighbor Discovery 115
5.3.5 Routing Protocols 116
5.4 Points of Controversy 116
5.4.1 Should We Mandate Security? 117
5.4.2 Did We Choose the Correct Algorithm? 118
5.4.3 Is This the Right Layer? 120
5.4.4 Do We Need Additional Protection? 121
Chapter 6 Real-time Support and Flows 125
6.1 An Elusive Specification 125
6.1.1 Defining Flow Labels and Priorities 126
6.1.2 Flows and Policy Routes 126
6.1.3 Flows, Not Virtual Circuits 127
6.2 Supporting Reservations 127
6.2.1 Special Services 128
6.2.2 Using RSVP and Flows 129
6.2.3 Using Hop-by-Hop Options 130
6.3 Modem Handling of Multimedia 131
6.3.1 Adaptive Applications 131
6.3.2 Enforcing Fairness 132
6.3.3 Class-based Queuing 133
6.3.4 Hierarchical Coding 134
6.4 Points of Controversy 136
6.4.1 Will Flow Labels Be Used? 137
6.4.2 To Reserve or Not? 138
6.4.3 What about ATM? 139
Chapter 7 Transitioning the Internet 143
7.1 Dual-Stack Strategy 143
7.1.1 Supporting Two IP Layers 143
7.1.2 Name Servers and Decisions 145
7.1.3 Critical Points of Transition 146
7.2 Building the 6-Bone 146
7.2.1 Choosing the MTU 148
7.2.2 Tunnels and Routing Protocols 149
7.2.3 Time to Live in a Tunnel 150
7.2.4 Controlling the Tunnelīs Share 150
7.2.5 Digging Tunnels and Closing Them 151
7.3 Connecting End Stations 152
7.3.1 Reaching the IPv6 Internet 153
7.3.2 Reaching Isolated Hosts 154
7.3.3 MTU and TTL for Automatic Tunnels 155
7.3.4 Configurations and Decisions 156
7.4 Points of Controversy 158
7.4.1 Should We Perform Translations? 158
7.4.2 Life after Doomsday 160
Chapter 8 A Provisional Conclusion 163
8.1 The Right Solution 163
8.2 The Right Time 165
8.3 The Future Will Tell 166
Glossary 167

013241936X


INTERNET-PROTOCOLS
IPV6

004.738.5.057.4 H876