IT tutorials

Windows Server 2012 : IPv6 Introduction (part 1)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/15/2015 5:24:32 AM

Internet Protocol version 6 (IPv6) is the updated and revised implementation of the current networking protocol used around the world, IPv4. IPv6 was developed to solve many of the limitations and challenges faced with the IPv4 protocol, initially because of the fast growth of the Internet in the late 1980s and early 1990s and the worry that available addresses would run out. Twenty-plus years ago, the advances in computer networking allowed for huge opportunities for sharing and accessing data between networks, and the Internet Protocol, IPv4, was developed and implemented by the largest Internet service providers (ISPs) that hosted the backbone of the Internet. Organizations, including government institutions, commercial businesses, and schools, started to move their internal networks to this protocol. Although many organizations continued to leverage other networking protocols, if you wanted to share and access data across the Internet, you had to use IPv4. With this big push, operating system development, network-ready applications, and networking devices all included IPv4.

Network administrators had to work hard in some cases to support the quick growth and to troubleshoot issues because IPv4 required manual configuration of addressing on devices and in most cases they also had to deploy and support a method of dynamic addressing provided by, you guessed it, DHCP services. Neither the manual nor automated addressing methods could keep track of all addresses, and administrators had to tightly control and monitor address usage, hence the need for IPAM.

The quick adoption and growth of Internet networking by both private users and businesses began to quickly absorb the usable IP address ranges, and some began to worry that there was a serious risk of running out of IP addresses. When this occurred, private IP ranges were defined, for use on internal networks only, and Network Address Translation (NAT) was developed and leveraged to allow devices on private IP ranges to access the Internet using a shared Internet address. The organizations that used NAT found many uses for this service, mainly managed on routers and firewalls/proxy servers, but in some cases, with certain applications, NAT cannot function at 100%.

Separately, but simultaneously, as organizations moved toward sharing data across the Internet with business partners and between office locations, transmitting data securely over the Internet became a requirement, because supporting private point-to-point lines could not compare on price. Encrypted tunnels, or virtual private networks, were created across the Internet, and this is still in heavy usage today. The use of NAT and VPNs in some earlier implementations proved to be challenging to configure because IPv4 did not have clearly defined or inclusive security standards. Because of this, different hardware and software vendors implemented sometimes similar, but not always compatible versions of IP Security (IPsec). So, for organizations to securely share or securely connect their networks over the Internet, many times they had to use the same vendors for software/hardware or resort to paying for higher-priced private point-to-point connections. As time has passed, IPsec for IPv4 has advanced, and most implementations are compatible, but this IPsec security also comes with more data overhead and utilizes more bandwidth.

Last but certainly not least, with the daily expanding market of Internet services, transferring of data, and the growing number of users on the Internet, network utilization and IP address assignment are always increasing. Streaming music and peer networking were some of the first types of Internet applications to consume large amounts of bandwidth. Now network utilization and bandwidth requirements are being driven higher and higher by streaming video, social networking, Voice over IP (VoIP) phones, email, Internet browsing and shopping, and the ever-growing number of Internet-capable mobile devices (smartphones, tablets, and even gaming consoles). Many organizations, including Internet and telephone service providers, need a way to prioritize their traffic to ensure that the most business-critical or mission-critical applications have all the bandwidth they require and that the less-important applications, such as those for streaming music, can suffer when mission-critical applications require more throughput. To support this, IPv4 quality of service (QoS) features were implemented on many networks. However, because QoS was not a strict requirement for software and hardware developers to support, many applications do not include enough information in their data packets to sufficiently distinguish their data so that QoS could effectively categorize and prioritize the traffic (thus presenting a challenge to IPv4). For example, QoS in many cases uses the port number, like HTTP 80, to identify web browsing traffic. For an application to work through a web proxy server, the application had to run on port 80 (a music or video streaming application, for example). Therefore, categorizing video as web traffic was incorrect, and the video could get the undesired tier of priority, and this could be a good or bad thing depending on the situation. Although deeper examination into an IPv4 packet allows IPv4 QoS to better prioritize traffic, that can also slow down traffic handling, and when IPsec is used and IPv4 packets are encrypted, QoS cannot do its job properly.

Ah, finally, IPv6 is here! IPv6 has been a work in progress since the early1990s when it was first named IP Next Generation. Originally, IPv6 was developed to solve the issue of running out of addresses, but now it has grown to also include many features that IPv4 was lacking or needed improvement/guidelines and standardization. Some of the most prominent improvements IPv6 has over IPv4 are as follows:

IP addressing—IPv6 addresses are 128-bit addresses, IPv4 addresses are 32-bit. Although this might seem only four times larger, the actual number of usable addresses as compared is IPv4 232 addresses versus IPv6 2128 addresses.

Automated addressing—IPv4 required manual IP addressing or a DHCP server to provide addressing for newly connected network devices. IPv6 includes both stateful (same as IPv4) and stateless addressing. Stateless addressing can be described as each IPv6 adapter assigns itself a unique address based on discoveries with other neighboring IPv6 stateless devices to enable real automated networking and communication. This self-assigned stateless address is also referred to as the link-local address.

Included security—IPv6 includes detailed specifications for IPsec built in to the protocol. This allows each software and hardware vendor to adopt these standards to make securing communication and traffic between different applications and devices simpler and more reliable. Also, the way IPsec has been implemented in IPv6, encrypted data can still be categorized and prioritized properly with QoS, without compromising the security of the data.

Included QoS—The IPv6 header of each packet of data includes two main fields that allow for QoS to perform better than IPv4. These fields, the Traffic Class and Flow Label fields, can be used by software and hardware developers to properly identify their data so that it can be prioritized and routed correctly. The Traffic Class field is used much like the IPv4 header Type of Service (ToS) field, but the Flow Label field is key to quickly identifying a flow or stream of packets, encrypted or not, to allow the entire dataset to be transmitted without examining each packet individually after the first packet is identified.

This list identifies just a few of the key improvements of IPv6 over IPv4; there are many more. However, if you are still not convinced that you need to learn IPv6, open a PowerShell console session on a Windows Server 2012 Active Directory domain controller and type Netstat -n and press Enter. This will show you that without a doubt, IPv6 is in use, whether you want to accept it or not. Just look for the IPv6 link-local address, which will start with fe80:: (the link-local prefix).

- Windows Server 2012 : Exploring Advanced DHCP Concepts
- Windows 8 : Automatic Updates as Security - Thwarting Exploits with DEP
- Windows 8 : Automatic Updates as Security - Managing Updates (part 2) - Changing how updates work, Reviewing and removing updates
- Windows 8 : Automatic Updates as Security - Managing Updates (part 1) - Managing optional updates
- Windows 8 : Automatic Updates as Security - Enabling Automatic Updates
- Windows 8 : Automatic Updates as Security - Understanding Automatic Updates
- Windows 8 : File Maintenance Using the Open and Save As Dialog Boxes, Metadata and the File Explorer Property System
- Windows 8 : The Recycle Bin: Deleting and Recovering Files and Folders
- Windows 8 : Expert Drag-and-Drop Techniques, Taking Advantage of the Send To Command
- Windows 8 : Selecting Files with Check Boxes, Resolving File Transfer Conflicts
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us