Detailed Report on IPv6 Subnetting and Routing Mechanisms
VerifiedAdded on 2023/06/11
|10
|2311
|170
Report
AI Summary
This report provides a detailed analysis of IPv6 subnetting and routing mechanisms. It begins with an introduction to IPv6, highlighting its structure, subnetting process, and advantages over IPv4. The report then delves into various IPv6 routing mechanisms, including mobile-to-mobile, stationary-to-mobile, and stationary-to-stationary routing, discussing the protocols and processes involved. Furthermore, it presents a comparative analysis of the pros and cons of each routing mechanism, covering aspects such as efficiency, security, and configuration complexity. The report concludes by summarizing the key benefits of IPv6 routing, such as flexibility and improved network management, while also acknowledging potential security concerns and implementation challenges. Desklib provides students access to this and many other solved assignments.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: INTERMEDIATE COMPUTER NETWORKING
Intermediate Computer Networking
[Name of the Student]
[Name of the University]
[Author note]
Intermediate Computer Networking
[Name of the Student]
[Name of the University]
[Author note]
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1INTERMEDIATE COMPUTER NETWORKING
Table of Contents
Part B...............................................................................................................................................2
1. Introduction:................................................................................................................................2
2. IPv6 Structure and Sub-netting:...................................................................................................2
3. IPv6 Routing Mechanism............................................................................................................4
4. Pros and Cons of Routing Mechanisms.......................................................................................5
5. Conclusion...................................................................................................................................7
Reference.........................................................................................................................................9
Table of Contents
Part B...............................................................................................................................................2
1. Introduction:................................................................................................................................2
2. IPv6 Structure and Sub-netting:...................................................................................................2
3. IPv6 Routing Mechanism............................................................................................................4
4. Pros and Cons of Routing Mechanisms.......................................................................................5
5. Conclusion...................................................................................................................................7
Reference.........................................................................................................................................9

2INTERMEDIATE COMPUTER NETWORKING
Part B
1. Introduction:
The main objective of this report includes the highlighting of the concepts and the
processes that are related to the IPv6 sub-netting and with routing. The IPv6 protocol is
elaborated a specification set and which is an upper version of the IPv4 network. The IPv6
structure has similarities with the IPv4 that has the more variations. The IPv6 is the improved
version of the IPv4, the length of the bit is increased in the IPv6 protocol so the capacity of the
address is increased (Rehman & Manickam, 2015). The auto configuration method is pre built in
the IPv6 protocol and there more security features that are increased. The report will further
discuss the sub-netting process and the different mechanism of routing. In the following
paragraphs the advantage and the disadvantage of the each routing method will be discussed.
2. IPv6 Structure and Sub-netting:
The internet protocol version 6 or the IPv6 is mainly carries the data as a packet that
moves from the source to destination. The structure is a lit improved from the structure of the
IPv4. The IPv6 can contain large amount of data node than the IPv4. The IPv6 allows the 2128
number of addresses, nodes and combinations. The internet version protocol 6 is released on the
year of 2012 in 6th June and it is developed to the format of the hexadecimal (Rehman &
Manickam, 2017). The main functions of the IPv6 is broadcasting of the address but it does not
store the address of the broadcast. The IPv6 is the most updated version of the internet protocol.
Part B
1. Introduction:
The main objective of this report includes the highlighting of the concepts and the
processes that are related to the IPv6 sub-netting and with routing. The IPv6 protocol is
elaborated a specification set and which is an upper version of the IPv4 network. The IPv6
structure has similarities with the IPv4 that has the more variations. The IPv6 is the improved
version of the IPv4, the length of the bit is increased in the IPv6 protocol so the capacity of the
address is increased (Rehman & Manickam, 2015). The auto configuration method is pre built in
the IPv6 protocol and there more security features that are increased. The report will further
discuss the sub-netting process and the different mechanism of routing. In the following
paragraphs the advantage and the disadvantage of the each routing method will be discussed.
2. IPv6 Structure and Sub-netting:
The internet protocol version 6 or the IPv6 is mainly carries the data as a packet that
moves from the source to destination. The structure is a lit improved from the structure of the
IPv4. The IPv6 can contain large amount of data node than the IPv4. The IPv6 allows the 2128
number of addresses, nodes and combinations. The internet version protocol 6 is released on the
year of 2012 in 6th June and it is developed to the format of the hexadecimal (Rehman &
Manickam, 2017). The main functions of the IPv6 is broadcasting of the address but it does not
store the address of the broadcast. The IPv6 is the most updated version of the internet protocol.

3INTERMEDIATE COMPUTER NETWORKING
The size of the Ipv6 is 128bit long. The header size of the IPv6 is 40 bytes. The address
of the source and the destination address is use 16bytes and the header is left out with 8-bit
information that is general. In can be seemed that the header of the IPv6 is simpler from the IPv4
and it allows the information processing to be more efficient. The main advantage of the IPv6
network over the IPv4 which is that the IPv6 has an address space which is larger that is of
128bits and is having space for address of around 212 (Rehman & Manickam, 2015).
The IPv6 protocol address mainly use the 128 bits for the address representation. In this
address the bits are used for the subnetting. The subnet structure of the IPv6 is given below.
Figure 1: Representation of the IPv6 subnet
The 16bits of the subnet is similar to the network of class B present in the IPv4. The
concept of the IPv6 shares similarities with the length of the variable of the subnet masking. The
128bits is converted to the 32 hex digits in the subnet mask of the IPv6. The IPv6 address model
includes the Unicast, multicast and the Anycast. Full length of the of the IPv6 subnet mask use
the 8 hex word format that is followed to the IPv6 network. In the IPv6 the first 48 bits are for
the routing of the internet and the each of the address are represented by the 8 groups and the
each groups will consist of four of the hexadecimal digits (Blumbergs et al., 2016). Each group is
separated from each other’s by colons. With the IPv6, each of the device has the ability of
creating a local address that is unique and it is based on the MAC address that a particular device
The size of the Ipv6 is 128bit long. The header size of the IPv6 is 40 bytes. The address
of the source and the destination address is use 16bytes and the header is left out with 8-bit
information that is general. In can be seemed that the header of the IPv6 is simpler from the IPv4
and it allows the information processing to be more efficient. The main advantage of the IPv6
network over the IPv4 which is that the IPv6 has an address space which is larger that is of
128bits and is having space for address of around 212 (Rehman & Manickam, 2015).
The IPv6 protocol address mainly use the 128 bits for the address representation. In this
address the bits are used for the subnetting. The subnet structure of the IPv6 is given below.
Figure 1: Representation of the IPv6 subnet
The 16bits of the subnet is similar to the network of class B present in the IPv4. The
concept of the IPv6 shares similarities with the length of the variable of the subnet masking. The
128bits is converted to the 32 hex digits in the subnet mask of the IPv6. The IPv6 address model
includes the Unicast, multicast and the Anycast. Full length of the of the IPv6 subnet mask use
the 8 hex word format that is followed to the IPv6 network. In the IPv6 the first 48 bits are for
the routing of the internet and the each of the address are represented by the 8 groups and the
each groups will consist of four of the hexadecimal digits (Blumbergs et al., 2016). Each group is
separated from each other’s by colons. With the IPv6, each of the device has the ability of
creating a local address that is unique and it is based on the MAC address that a particular device
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4INTERMEDIATE COMPUTER NETWORKING
is having. The format of the IPv6 is written in such way that the address interpretation gets easier
and faster.
3. Routing Mechanism of IPv6
Usage of of the IPv6 or Internet Protocol version 6 brings a lot of benefits. Of them, the
most significant is the provision that it imposes about the supple routing mechanism. When
compared to the IPv4 or the Internet Protocol version 4, it can be seen that it reduces the size of a
routing table. Keeping this mechanism in mind, it can be found that the routers that are situated
intermediate to them must keep a track on the local portion of the networks. This helps in
providing the messages in an appropriate way. However, for this, it is necessary that the IPv6
mechanism discovers the appropriate neighbour. Router advertisement is included in the process
of IPv6 process for the discovery of router, solicitation of router, advertisement of neighbour and
redirection. Longest match prefix is used during the working of IPv6 routing protocols. RIPng or
RIP New Generation, OSPFv3, EIGRP for IPv6, IS-IS for IPv6 andMP-BGP4 are included in the
routing protocols that have been backed up by the IPv6 mechanism (Lu, Wang & Huang, 2017).
On the other hand, the mobile to mobile routing helps in incorporating various different
processes, which includes the methods of encapsulation and broadcasting. It becomes necessary
to follow the methods as these points are having a mobile nature. During the method for
encapsulation, there exists the availability of both the nodes (Rehman & Manickam, 2016). Each
of the mobile nodes are is able to be identified by the process of the detection of the IP addresses
which includes the home address and the other is the IP address. Nevertheless, during the process
of routing of the mobile node, the address care gets changed with every new point and the
information providing attachment works due to the current position of the mobile node
is having. The format of the IPv6 is written in such way that the address interpretation gets easier
and faster.
3. Routing Mechanism of IPv6
Usage of of the IPv6 or Internet Protocol version 6 brings a lot of benefits. Of them, the
most significant is the provision that it imposes about the supple routing mechanism. When
compared to the IPv4 or the Internet Protocol version 4, it can be seen that it reduces the size of a
routing table. Keeping this mechanism in mind, it can be found that the routers that are situated
intermediate to them must keep a track on the local portion of the networks. This helps in
providing the messages in an appropriate way. However, for this, it is necessary that the IPv6
mechanism discovers the appropriate neighbour. Router advertisement is included in the process
of IPv6 process for the discovery of router, solicitation of router, advertisement of neighbour and
redirection. Longest match prefix is used during the working of IPv6 routing protocols. RIPng or
RIP New Generation, OSPFv3, EIGRP for IPv6, IS-IS for IPv6 andMP-BGP4 are included in the
routing protocols that have been backed up by the IPv6 mechanism (Lu, Wang & Huang, 2017).
On the other hand, the mobile to mobile routing helps in incorporating various different
processes, which includes the methods of encapsulation and broadcasting. It becomes necessary
to follow the methods as these points are having a mobile nature. During the method for
encapsulation, there exists the availability of both the nodes (Rehman & Manickam, 2016). Each
of the mobile nodes are is able to be identified by the process of the detection of the IP addresses
which includes the home address and the other is the IP address. Nevertheless, during the process
of routing of the mobile node, the address care gets changed with every new point and the
information providing attachment works due to the current position of the mobile node

5INTERMEDIATE COMPUTER NETWORKING
(Chuangchunsong et al., 2014). The routing protocol in this matter uses the discovery of
neighborhood of IPv6 to get hold of the neighboring addresses.
In the stationary to stationary routing in the mechanism of IPv6, the configuration of the
routing process is done in an similar way to that of an IPv4 mechanism (You & Leu, 2015). This
routing protocol, a router is required for the determination of local addresses for the neighboring
router for connection establishment. For the stationary to stationary nodes routing, specification
regarding the next hop router’s address is to be provided which is to be done by usage of the link
local addresses of the router.
These mechanisms provide benefits such as, flexibility, efficiency, reactivity, and easy
bug detection. It allows the addresses that belong to the same destination where it is to be
transported by a single message.
4. Pros and Cons of Routing Mechanisms
The routing mechanisms in which the IPv6 is having numerous advantages as well as
disadvantages. The major advantages along with the disadvantages have been listed below:
mobile nodes to
mobile nodes
stationary nodes to
mobile nodes
stationary nodes to
stationary nodes
Pros Enabling of the way so
as to establish the paths
which is to be used by
the network traffic
existing between two of
the mobile nodes is
The routing protocol
present in the IPv6 is
associate with the
creation of the network
path between the static
node and the mobile
This type of routing
protocol is associated
with enabling the
capability of selecting a
path for network traffic
which generally exists
(Chuangchunsong et al., 2014). The routing protocol in this matter uses the discovery of
neighborhood of IPv6 to get hold of the neighboring addresses.
In the stationary to stationary routing in the mechanism of IPv6, the configuration of the
routing process is done in an similar way to that of an IPv4 mechanism (You & Leu, 2015). This
routing protocol, a router is required for the determination of local addresses for the neighboring
router for connection establishment. For the stationary to stationary nodes routing, specification
regarding the next hop router’s address is to be provided which is to be done by usage of the link
local addresses of the router.
These mechanisms provide benefits such as, flexibility, efficiency, reactivity, and easy
bug detection. It allows the addresses that belong to the same destination where it is to be
transported by a single message.
4. Pros and Cons of Routing Mechanisms
The routing mechanisms in which the IPv6 is having numerous advantages as well as
disadvantages. The major advantages along with the disadvantages have been listed below:
mobile nodes to
mobile nodes
stationary nodes to
mobile nodes
stationary nodes to
stationary nodes
Pros Enabling of the way so
as to establish the paths
which is to be used by
the network traffic
existing between two of
the mobile nodes is
The routing protocol
present in the IPv6 is
associate with the
creation of the network
path between the static
node and the mobile
This type of routing
protocol is associated
with enabling the
capability of selecting a
path for network traffic
which generally exists

6INTERMEDIATE COMPUTER NETWORKING
done by this routing
protocol or mechanism
in IPv6
node. in between the two
stationary or static
nodes
Mobile to mobile Ipv6
routing is generally
responsible for the
providing of a greater
efficiency while a
connection is being
established between the
mobile routers and this
is associated with
reducing the size of
routing tables.
Mobile to stationary
routing protocol is
responsible for the
providing of offers
related to the efficiency
while a connection is
being made between
the static and mobile
traffic in a network.
This is associated with
offeringthe simplest
network configuration.
This type of routing
mechanism can be
considered to be
internet’s next
generation protocol
which is having the
capability of replacing
the protocol that is
being used.
This routing
mechanism is
associated with
ensuring the fact that
direction is provided to
the data so as to reach
the correct destination
and also for the purpose
of providing and
ensuringa proper
security of the data
which is being
This type of routing
mechanism is
associated with
ensuring the fact that
the traffic in the
internet reaches the
right destination.
done by this routing
protocol or mechanism
in IPv6
node. in between the two
stationary or static
nodes
Mobile to mobile Ipv6
routing is generally
responsible for the
providing of a greater
efficiency while a
connection is being
established between the
mobile routers and this
is associated with
reducing the size of
routing tables.
Mobile to stationary
routing protocol is
responsible for the
providing of offers
related to the efficiency
while a connection is
being made between
the static and mobile
traffic in a network.
This is associated with
offeringthe simplest
network configuration.
This type of routing
mechanism can be
considered to be
internet’s next
generation protocol
which is having the
capability of replacing
the protocol that is
being used.
This routing
mechanism is
associated with
ensuring the fact that
direction is provided to
the data so as to reach
the correct destination
and also for the purpose
of providing and
ensuringa proper
security of the data
which is being
This type of routing
mechanism is
associated with
ensuring the fact that
the traffic in the
internet reaches the
right destination.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7INTERMEDIATE COMPUTER NETWORKING
transmitted (Alizadeh et
al, 2015).
Cons There exists certain
security issues which
are associated with this
mobile to mobile
routing mechanism and
all this issues needs to
be addressed in a
proper way.
In this one of the major
issue is regarding the
process of Setting up of
a router and also during
the process of
discovery of the
neighboring routers
Stationary to stationary
routing mechanism is
very simple so the
usage of this is totally
limited.
5. Conclusion
The report above helps in understanding the basic structure that the IPv6 is having along with
understanding the process involved in the IPV6 sub-netting. IPv6 is generally considered to be a
internet protocol of next generation and the main reason for developing this is for the process of
substituting the IPv4. This report is also associated with discussing the routing mechanism that
the IPv6 is having along with significant benefits that this protocol is having. One of the major
benefit is the providing of the flexibility in routing. The report has also been discussing the pros
and cons of that the different routing mechanism is having. Besides this the report has also been
discussing the various kind of mechanism that the IPv6 routing is having and this mainly
includes the mobile nodes to mobile nodes, stationary to mobile nodes and mobile nodes to
stationary nodes.
transmitted (Alizadeh et
al, 2015).
Cons There exists certain
security issues which
are associated with this
mobile to mobile
routing mechanism and
all this issues needs to
be addressed in a
proper way.
In this one of the major
issue is regarding the
process of Setting up of
a router and also during
the process of
discovery of the
neighboring routers
Stationary to stationary
routing mechanism is
very simple so the
usage of this is totally
limited.
5. Conclusion
The report above helps in understanding the basic structure that the IPv6 is having along with
understanding the process involved in the IPV6 sub-netting. IPv6 is generally considered to be a
internet protocol of next generation and the main reason for developing this is for the process of
substituting the IPv4. This report is also associated with discussing the routing mechanism that
the IPv6 is having along with significant benefits that this protocol is having. One of the major
benefit is the providing of the flexibility in routing. The report has also been discussing the pros
and cons of that the different routing mechanism is having. Besides this the report has also been
discussing the various kind of mechanism that the IPv6 routing is having and this mainly
includes the mobile nodes to mobile nodes, stationary to mobile nodes and mobile nodes to
stationary nodes.

8INTERMEDIATE COMPUTER NETWORKING
Reference
Chuangchunsong, N., Kamolphiwong, S., Kamolphiwong, T., & Elz, R. (2014, August). An
Enhancement of IPv4-in-IPv6 Mechanism. In Intelligent Information Hiding and Multimedia
Signal Processing (IIH-MSP), 2014 Tenth International Conference on (pp. 45-48). IEEE.
Alizadeh, M., Zamani, M., Baharun, S., Manaf, A. A., Sakurai, K., Anada, H., ... & Khan, M. K.
(2015). Correction: Cryptanalysis and Improvement of" A Secure Password Authentication
Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks". PloS one, 10(12),
e0145975.
Blumbergs, B., Pihelgas, M., Kont, M., Maennel, O., & Vaarandi, R. (2016, November).
Creating and detecting IPv6 transition mechanism-based information exfiltration covert
channels. In Nordic Conference on Secure IT Systems (pp. 85-100). Springer, Cham.
You, I., & Leu, F. Y. (2015). Comments on “SPAM: A Secure Password Authentication
Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks”. IEEE Systems Journal.
Rehman, S. U., & Manickam, S. (2016). Novel mechanism to prevent denial of service (DoS)
attacks in IPv6 duplicate address detection process. International Journal of Security & Its
Applications, 10(4).
Lu, Y., Wang, M., & Huang, P. (2017). An SDN-based authentication mechanism for securing
neighbor discovery protocol in IPv6. Security and Communication Networks, 2017.
Blumbergs, B., Blumbergs, B., Maunas. 0 Pihelgas, Kont, M., Maenneland, O. M., & Vaarandi,
R. (2016). Hedgehog in the Fog: Creating and Detecting IPv6 Transition Mechanism-Based
Reference
Chuangchunsong, N., Kamolphiwong, S., Kamolphiwong, T., & Elz, R. (2014, August). An
Enhancement of IPv4-in-IPv6 Mechanism. In Intelligent Information Hiding and Multimedia
Signal Processing (IIH-MSP), 2014 Tenth International Conference on (pp. 45-48). IEEE.
Alizadeh, M., Zamani, M., Baharun, S., Manaf, A. A., Sakurai, K., Anada, H., ... & Khan, M. K.
(2015). Correction: Cryptanalysis and Improvement of" A Secure Password Authentication
Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks". PloS one, 10(12),
e0145975.
Blumbergs, B., Pihelgas, M., Kont, M., Maennel, O., & Vaarandi, R. (2016, November).
Creating and detecting IPv6 transition mechanism-based information exfiltration covert
channels. In Nordic Conference on Secure IT Systems (pp. 85-100). Springer, Cham.
You, I., & Leu, F. Y. (2015). Comments on “SPAM: A Secure Password Authentication
Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks”. IEEE Systems Journal.
Rehman, S. U., & Manickam, S. (2016). Novel mechanism to prevent denial of service (DoS)
attacks in IPv6 duplicate address detection process. International Journal of Security & Its
Applications, 10(4).
Lu, Y., Wang, M., & Huang, P. (2017). An SDN-based authentication mechanism for securing
neighbor discovery protocol in IPv6. Security and Communication Networks, 2017.
Blumbergs, B., Blumbergs, B., Maunas. 0 Pihelgas, Kont, M., Maenneland, O. M., & Vaarandi,
R. (2016). Hedgehog in the Fog: Creating and Detecting IPv6 Transition Mechanism-Based

9INTERMEDIATE COMPUTER NETWORKING
Information Exfiltration Covert Channels. CCDCOE, NATO Cooperative Cyber Defence Centre
of Excellence.
Rehman, S. U., & Manickam, S. (2015). Significance of duplicate address detection mechanism
in Ipv6 and its security issues: A survey. Indian Journal of Science and Technology, 8(30).
Rehman, S. U., & Manickam, S. (2017). Improved Mechanism to Prevent Denial of Service
Attack in IPv6 Duplicate Address Detection Process. INTERNATIONAL JOURNAL OF
ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 8(2), 63-70.
Rehman, S. U., & Manickam, S. (2015, September). Rule-based mechanism to detect Denial of
Service (DoS) attacks on Duplicate Address Detection process in IPv6 link local communication.
In Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions),
2015 4th International Conference on (pp. 1-6). IEEE.
Information Exfiltration Covert Channels. CCDCOE, NATO Cooperative Cyber Defence Centre
of Excellence.
Rehman, S. U., & Manickam, S. (2015). Significance of duplicate address detection mechanism
in Ipv6 and its security issues: A survey. Indian Journal of Science and Technology, 8(30).
Rehman, S. U., & Manickam, S. (2017). Improved Mechanism to Prevent Denial of Service
Attack in IPv6 Duplicate Address Detection Process. INTERNATIONAL JOURNAL OF
ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 8(2), 63-70.
Rehman, S. U., & Manickam, S. (2015, September). Rule-based mechanism to detect Denial of
Service (DoS) attacks on Duplicate Address Detection process in IPv6 link local communication.
In Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions),
2015 4th International Conference on (pp. 1-6). IEEE.
1 out of 10
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.