rashmi vt report
TRANSCRIPT
A
Report on Vocational Training
In
“IPV6”
Submitted in partial fulfillment of requirement for the award of degree
Of
Bachelor of Engineering
In
“Electronics and Telecommunications”
To
Chhattisgarh Swami Vivekanand Technical University, Bhilai
In Session: 2013-2014
Submitted By:
Rashmi Kumari
7TH/ETC
1
A C K N O W L E D G E M E N T
I have completed my vocational training on routing and switching from Rooman Technologies and I
am thankful to the trainers. Especially to Mr. Ajit Singh for providing us valuable knowledge and
information about the”RoutingAndSwitching”. I extend my thanks to respected Mr. KSHITIJ
SINGHAI (Director) for his support, encouragement and facilitation. I highly thankful to”ROOMAN
TECHNOLOGIES” for their valuable guidance that they shared with us through our project during
the training session.
I also Grateful to Mr. AJAY PRAKASH VERMA (Chairman) ,Dr. ANURAG VERMA (Director)
and Dr. MAHESH P. (Principal) for their support & permission for the training. I also thankful to
Dr. AMIT AGRAWAL (professor & H.O.D Electronics & Telecommunication Department) for
the valuable guidance.
I express my sincere gratitude to all the faculty members and supporting staff members of Electronics
& Telecommunication Engineering Department.
(Signature of the Student)
Rashmi Kumari
CHHATRAPATI SHIVAJI INSTITUTE OF TECHNOLOGY, DURG
Shivaji Nagar, Balod Road, Kolihapuri, Post Pisegaon – Durg
(C.G.) 491001
2
CERTIFICATE
This is to certify that Shri/Ku Rashmi Kumari Roll No. 50 Semester 7th Branch Electronics
& Telecommunications student of Chhatrapati Shivaji Institute of Technology, Durg has
undergone his/her Vocational Training on Routers & Switches at ROOMAN Technologie
From July To August
Mr. Rahul Sinha Dr. Amit Agrawal
Assistant Professor Professor & Head
Department of Elex.& Telecom. Department of Elex.& Telecom.
Date:18/09/2014
Place: Durg
3
Table of Contents
Sr. No. Topic Page No.
1 Introduction 5
1.1 Comparison with IPV4 6
2
3
3.1
3.2
3.3
4
5
6
7
8
9
Packet format
Addressing
Link local address
Address representation
Create a global address
OSPF
Area Types
Implementing OSPF for IPv6
Result
Conclusion
References
10
11
11
11
12
13
16
18
21
23
23
4
1. Introduction
IPv6 is one of the most significant network and technology upgrades in history. It will slowly
grow into your existing IPv4 infrastructure and positively impact your network. Reading this
book will prepare you for the next step of networking technology evolution. IPv6 product
development and implementation efforts are already underway all over the world. IPv6 is
designed as an evolutionary step from IPv4. It is a natural increment to IPv4, can be installed
as a normal software upgrade in most Internet devices, and is interoperable with the current
IPv4. IPv6 is designed to run well on high performance networks like Gigabit Ethernet, ATM,
and others, as well as low bandwidth networks (e.g., wireless). In addition, it provides a
platform for new Internet functionality that will be required in the near future, such as
extended addressing, better security, and quality of service (QoS) features.
IPv6 includes transition and interoperability mechanisms that are designed to allow users to
adopt and deploy IPv6 step by step as needed and to provide direct interoperability between
IPv4 and IPv6 hosts. The transition to a new version of the Internet Protocol (IP) must be
incremental, with few or no critical interdependencies, if it is to succeed. The IPv6 transition
allows users to upgrade their hosts to IPv6 and network operators to deploy IPv6 in routers
with very little coordination between the two groups.
The rapid growth of IP devices today have led to a shortage of IP addresses. IPv6 will solve
this problem, along with some other improvements as well. It is important to understand the
fundamentals of IPv6 and how to configure complex and well working networks with this
new protocol. How to make the transition from IPv4 to IPv6 in a network can be made with
different solutions. The authors of this report have, in the network simulation tool GNS3, built
a network consisting of four routers running both IPv4 and IPv6, using dual stack as the
transition method. The reason for choosing dual stack is to simulate a situation where a
network wants to be prepared for the future transition to IPv6, while still maintaining the
function of the current IPv4 network. The routing protocol used is OSPF version 2 and 3,
using multiple areas and virtual links. The network also includes a DHCP server which
distributes IPv4 addresses to nodes connected to the four different routers. The nodes are
simulated using Microsoft loopback adapters. The reason for using GNS3 simulation program
is that you can run the real router images in it, meaning that the results are exactly the same as
with real equipment.
5
1.1 Comparison with IPV4
On the Internet, data is transmitted in the form of network packets. IPv6 specifies a
new packet format, designed to minimize packet header processing by routers. Because the
headers of IPv4 packets and IPv6 packets are significantly different, the two protocols are not
interoperable. However, in most respects, IPv6 is a conservative extension of IPv4. Most
transport and application-layer protocols need little or no change to operate over IPv6;
exceptions are application protocols that embed internet-layer addresses, such as FTP
and NTPv3, where the new address format may cause conflicts with existing protocol syntax.
1.1.1 Larger address space
The main advantage of IPv6 over IPv4 is its larger address space. The length of an IPv6
address is 128 bits, compared with 32 bits in IPv4. The address space therefore has 2128or
approximately 3.4×1038 addresses. This would be about 100 addresses for every atom on the
surface of the earth and almost four /64s per square centimetre of the planet. In addition, the
IPv4 address space is poorly allocated, with approximately 14% of all available addresses
utilized. While these numbers are large, it was not the intent of the designers of the IPv6
address space to assure geographical saturation with usable addresses. Rather, the longer
addresses simplify allocation of addresses, enable efficient route aggregation, and allow
implementation of special addressing features. In IPv4, complex Classless Inter-Domain
Routing (CIDR) methods were developed to make the best use of the small address space.
The standard size of a subnet in IPv6 is 264 addresses, the square of the size of the entire IPv4
address space. Thus, actual address space utilization rates will be small in IPv6, but network
management and routing efficiency is improved by the large subnet space and hierarchical
route aggregation. Renumbering an existing network for a new connectivity provider with
different routing prefixes is a major effort with IPv4. With IPv6, however, changing the prefix
announced by a few routers can in principle renumber an entire network, since the host
identifiers (the least-significant 64 bits of an address) can be independently self-configured by
a host
1.1.2 Multicasting
Multicasting, the transmission of a packet to multiple destinations in a single send operation,
is part of the base specification in IPv6. In IPv4 this is an optional although commonly
implemented feature. IPv6 multicast addressing shares common features and protocols with
6
IPv4 multicast, but also provides changes and improvements by eliminating the need for
certain protocols. IPv6 does not implement traditional IP broadcast, i.e. the transmission of a
packet to all hosts on the attached link using a special broadcast address, and therefore does
not define broadcast addresses. In IPv6, the same result can be achieved by sending a packet
to the link-local all nodes multicast group at address ff02::1 , which is analogous to IPv4
multicast to address 224.0.0.1 . IPv6 also provides for new multicast implementations,
including embedding rendezvous point addresses in an IPv6 multicast group address, which
simplifies the deployment of inter-domain solutions In IPv4 it is very difficult for an
organization to get even one globally routable multicast group assignment, and the
implementation of inter-domain solutions is arcane. Unicast address assignments by a local
Internet registry for IPv6 have at least a 64-bit routing prefix, yielding the smallest subnet size
available in IPv6 (also 64 bits). With such an assignment it is possible to embed the unicast
address prefix into the IPv6 multicast address format, while still providing a 32-bit block, the
least significant bits of the address, or approximately 4.2 billion multicast group identifiers.
Thus each user of an IPv6 subnet automatically has available a set of globally routable source-
specific multicast groups for multicast applications
1.1.3 Network-layer security
Internet Protocol Security (IPsec) was originally developed for IPv6, but found widespread
deployment first in IPv4, for which it was re-engineered. IPsec was a mandatory specification
of the base IPv6 protocol suite, but has since been made optional
Simplified processing by routers :-
In IPv6, the packet header and the process of packet forwarding have been simplified.
Although IPv6 packet headers are at least twice the size of IPv4 packet headers, packet
processing by routers is generally more efficient, thereby extending the end-to-end
principle of Internet design. Specifically:
The packet header in IPv6 is simpler than that used in IPv4, with many rarely used fields
moved to separate optional header extensions.
IPv6 routers do not perform fragmentation. IPv6 hosts are required to either perform path
MTU discovery, perform end-to-end fragmentation, or to send packets no larger than the
IPv6 default MTU size of 1280 octets.
7
The IPv6 header is not protected by a checksum; integrity protection is assumed to be
assured by both link-layer and higher-layer (TCP, UDP, etc.) error detection. UDP/IPv4
may actually have a checksum of 0, indicating no checksum; IPv6 requires UDP to have
its own checksum. Therefore, IPv6 routers do not need to recomputed a checksum when
header fields (such as the time to live (TTL) or hop count) change. This improvement
may have been made less necessary by the development of routers that perform checksum
computation at link speed using dedicated hardware, but it is still relevant for software-
based routers.
The TTL field of IPv4 has been renamed to Hop Limit in IPv6, reflecting the fact that
routers are no longer expected to compute the time a packet has spent in a queue.
1.1.4 Mobility
Unlike mobile IPv4, mobile IPv6 avoids triangular routing and is therefore as efficient as
native IPv6. IPv6 routers may also allow entire subnets to move to a new router connection
point without renumbering.
1.1.5 Privacy
Like IPv4, IPv6 supports globally unique IP addresses by which the network activity of each
device can potentially be tracked. The design of IPv6 intended to re-emphasize the end-to-end
principle of network design that was originally conceived during the establishment of the
early Internet. In this approach each device on the network has a unique address globally
reachable directly from any other location on the Internet.
Network prefix
Network prefix tracking is less of a concern if the user's ISP assigns a dynamic
network prefix via DHCP. Privacy extensions do little to protect the user from
tracking if the ISP assigns a static network prefix. In this scenario, the network prefix
is the unique identifier for tracking and the Interface identifier is secondary.
Interface identifier
In IPv4 the effort to conserve address space with network address translation (NAT)
obfuscates network address spaces, hosts, and topologies. In IPv6 when using address
auto-configuration, the Interface Identifier (MAC address) of an interface port is used
to make its public IP address unique, exposing the type of hardware used and
providing a unique handle for a user's online activity. It is not a requirement for IPv6
8
hosts to use address auto-configuration, however. Yet, even when an address is not
based on the MAC address, the interface's address is globally unique, in contrast to
NAT-masqueraded private networks. Privacy extensions for IPv6 have been defined to
address these privacy concerns, although Silvia Hagen describes these as being largely
due to "misunderstanding". When privacy extensions are enabled, the operating
system generates random host identifiers to combine with the assigned network prefix.
These ephemeral addresses are used to communicate with remote hosts making it
more difficult to track a single device. Privacy extensions are enabled by default in
Windows (since XP SP1), OS X (since 10.7), and iOS (since version 4.3). Some Linux
distributions have enabled privacy extensions as well. Privacy extensions do not
protect the user from other forms of activity tracking, such as tracking
cookies or browser fingerprinting.
1.1.6 Options extensibility
The IPv6 packet header has a fixed size (40 octets). Options are implemented as additional
extension headers after the IPv6 header, which limits their size only by the size of an entire
packet. The extension header mechanism makes the protocol extensible in that it allows future
services for quality of service, security, mobility, and others to be added without redesign of
the basic protocol.
1.1.7 Jumbo grams
IPv4 limits packets to 65535 (216−1) octets of payload. An IPv6 node can optionally handle
packets over this limit, referred to as jumbo grams, which can be as large
as4294967295 (232−1) octets. The use of jumbo grams may improve performance over high-
MTU links. The use of jumbo grams is indicated by the Jumbo Payload Option header.
9
2. Packet Format
An IPv6 packet has two parts: a header and payload. The header consists of a fixed portion
with minimal functionality required for all packets and may be followed by optional
extensions to implement special features. The fixed header occupies the first 40 octets (320
bits) of the IPv6 packet. It contains the source and destination addresses, traffic classification
options, a hop counter, and the type of the optional extension or payload which follows the
header. This Next Header field tells the receiver how to interpret the data which follows the
header. If the packet contains options, this field contains the option type of the next option.
The "Next Header" field of the last option, points to the upper-layer protocol that is carried in
the packet's payload. Extension headers carry options that are used for special treatment of a
packet in the network, e.g., for routing, fragmentation, and for security using
the IPsec framework. Without special options, a payload must be less than 64KB. With a
Jumbo Payload option (in a Hop-By-Hop Options extension header), the payload must be less
than 4 GB. Unlike for IPv4, routers never fragment a packet. Hosts are expected to use Path
MTU Discovery to make their packets small enough to reach the destination without needing
to be fragmented. See IPv6 packet fragmentation.
10
3. Addressing
Compared to IPv4, the most obvious advantage of IPv6 is its larger address space. IPv4
addresses are 32 bits long and number about 4.3×109 (4.3 billion). IPv6 addresses are 128 bits
long and number about 3.4×1038 (340 undecillion). IPv6's addresses are deemed enough for
the foreseeable future. IPv6 addresses are written in eight groups of four hexadecimal digits
separated by colons, such as 2001:0db8:85a3:0000:0000:8a2e:0370:7334 . IPv6 unicast
addresses other than those that start with binary 000 are logically divided into two parts: a 64-
bit (sub-) network prefix, and a 64-bit interface identifier
3.1 Link local address
The first step a host takes on startup or (re)initialization is to form a link-local address from its
MAC address and the link-local prefix FE80::/10. This is done by putting the prefix into the
leftmost bits and the MAC address (in EUI-64 format) into the rightmost bits, and if there are
any bits left in between, those are set to zero. When the host has formed an address it will test
if it is unique on the subnet. This is done with an algorithm called Duplicate Address
Detection (DAD)
3.2 Address representation
The 128 bits of an IPv6 address are represented in 8 groups of 16 bits each. Each group is
written as 4 hexadecimal digits and the groups are separated by colons (:). The address
2001:0db8:0000:0000:0000:ff00:0042:8329 is an example of this representation. For
convenience, an IPv6 address may be abbreviated to shorter notations by application of the
following rules, where possible.
One or more leading zeroes from any groups of hexadecimal digits are removed; this is
usually done to either all or none of the leading zeroes. For example, the group 0042 is
converted to 42.
Consecutive sections of zeroes are replaced with a double colon (::). The double colon
may only be used once in an address, as multiple use would render the address
indeterminate. RFC 5952 recommends that a double colon must not be used to denote an
omitted single section of zeroes.
11
An example of application of these rules:
Initial address: 2001:0db8:0000:0000:0000:ff00:0042:8329
After removing all leading zeroes: 2001:db8:0:0:0:ff00:42:8329
After omitting consecutive sections of zeroes: 2001:db8::ff00:42:8329
The loopback address, 0000:0000:0000:0000:0000:0000:0000:0001, may be abbreviated
to ::1 by using both rules. As an IPv6 address may have more than one representation, the
IETF has issued a proposed standard for representing them in text
3.3 Create a global address
This is done in the same fashion as the link-local address, but instead of the link-local prefix
FE80:: it will use the prefix supplied by the router and put it together with its identifier (which
by default is the MAC address in EUI-64 format). There is no need to perform a DAD check
because the identifier is already unique on the link, and the subnet prefix specifies a specific
link. If the information from the router contained several subnet prefixes, the host will create
one address for each one. For stateless address autoconfiguration (SLAAC) to work, subnets
require a /64 address block, as defined in RFC 4291 section 2.5.1. Local Internet registries get
assigned at least /32 blocks, which they divide among ISPs. The obsolete RFC
3177 recommended the assignment of a /48 to end-consumer sites. This was replaced by RFC
6177, which "recommends giving home sites significantly more than a single /64, but does not
recommend that every home site be given a /48 either". /56s are specifically considered. It
remains to be seen if ISPs will honor this recommendation. For example, during initial
trials, Comcast customers were given a single /64 network. IPv6 addresses are classified by
three types of networking methodologies: unicast addresses identify each network
interface, anycast addresses identify a group of interfaces, usually at different locations of
which the nearest one is automatically selected, and multicast addresses are used to deliver
one packet to many interfaces. The broadcast method is not implemented in IPv6. Each IPv6
address has a scope, which specifies in which part of the network it is valid and unique. Some
addresses are unique only on the local (sub-)network. Others are globally unique. Some IPv6
addresses are reserved for special purposes, such as loopback, 6to4 tunneling, and Teredo
tunneling, as outlined in RFC 5156. Also, some address ranges are considered special, such as
link-local addresses for use on the local link only, Unique Local addresses (ULA), as
12
described in RFC 4193, and solicited-node multicast addresses used in the Neighbor
Discovery Protocol.
4. OSPF
Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It
uses a link state routing algorithm and falls into the group of interior routing protocols,
operating within a single autonomous system (AS). It is defined as OSPF Version 2 in RFC
2328 (1998) for IPv4. The updates for IPv6 are specified as OSPF Version 3 in RFC
5340 (2008). OSPF is perhaps the most widely used interior gateway protocol (IGP) in large
enterprise networks. IS-IS, another link-state dynamic routing protocol, is more common in
large service provider networks. The most widely used exterior gateway protocol is
the Border Gateway Protocol (BGP), the principal routing protocol between autonomous
systems on the Internet. IPv6 supports many routing protocols, one of which is Open Shortest
Path First (OSPF). OSPF is a link-state routing protocol, which means that every router in the
area has the same link-state database. The database contains the paths to every other router in
the area. The information stored in the database is received from advertisements that are sent
over the network. Using Dijkstra's algorithm, the shortest path to different destinations is then
calculated on each router from the information in the database. The shortest path is stored in
the routing table. The new version of OSPF, version 3, is based on OSPFv2 that runs over
IPv4. Some similarities exist between the two versions, but some changes had to be made to
support the increased address space in IPv6 and other changes in the protocol. OSPF is
an interior gateway protocol (IGP) for routing Internet Protocol (IP) packets solely within a
single routing domain, such as an autonomous system. It gathers link state information from
available routers and constructs a topology map of the network. The topology is presented as
a routing table to the Internet Layer which routes datagrams based solely on the destination IP
address found in IP packets. OSPF supports Internet Protocol Version 4 (IPv4) and Internet
Protocol Version 6 (IPv6) networks and features variable-length subnet masking (VLSM)
and Classless Inter-Domain Routing (CIDR) addressing models. OSPF detects changes in the
topology, such as link failures, and converges on a new loop-free routing structure within
seconds. It computes the shortest path tree for each route using a method based on Dijkstra's
algorithm, a shortest path first algorithm. The OSPF routing policies for constructing a route
table are governed by link cost factors (external metrics) associated with each routing
interface. Cost factors may be the distance of a router (round-trip time), data throughput of a
link, or link availability and reliability, expressed as simple unitless numbers. This provides a
13
dynamic process of traffic load balancing between routes of equal cost. An OSPF network
may be structured, or subdivided, into routing areas to simplify administration and optimize
traffic and resource utilization. Areas are identified by 32-bit numbers, expressed either
simply in decimal, or often in octet-based dot-decimal notation, familiar from IPv4 address
notation. By convention, area 0 (zero), or 0.0.0.0, represents the core or backbone area of an
OSPF network. The identifications of other areas may be chosen at will; often, administrators
select the IP address of a main router in an area as area identification. Each additional area
must have a direct or virtual connection to the OSPF backbone area. Such connections are
maintained by an interconnecting router, known as area border router (ABR). An ABR
maintains separate link state databases for each area it serves and maintains summarized
routes for all areas in the network. OSPF does not use a TCP/IP transport protocol, such as
UDP or TCP, but encapsulates its data in IP datagrams with protocol number 89. This is in
contrast to other routing protocols, such as the Routing Information Protocol (RIP) and
the Border Gateway Protocol (BGP). OSPF implements its own error detection and correction
functions. OSPF uses multicast addressing for route flooding on a broadcast domain. For non-
broadcast networks, special provisions for configuration facilitate neighbor discovery. OSPF
multicast IP packets never traverse IP routers (never traverse Broadcast Domains), they never
travel more than one hop. OSPF is therefor a Link Layer protocol in the Internet Protocol
Suite. OSPF reserves the multicast addresses 224.0.0.5 (IPv4) and FF02::5 (IPv6) for all
SPF/link state routers (AllSPFRouters) and 224.0.0.6 (IPv4) and FF02::6 (IPv6) for all
Designated Routers (AllDRouters), as specified in RFC 2328 and RFC 5340. For routing
multicast IP traffic, OSPF supports the Multicast Open Shortest Path First protocol (MOSPF)
as defined in RFC 1584. Cisco does not include MOSPF in their OSPF implementations. PIM
(Protocol Independent Multicast) in conjunction with OSPF or other IGPs, is widely
deployed. The OSPF protocol, when running on IPv4, can operate securely between routers,
optionally using a variety of authentication methods to allow only trusted routers to
participate in routing. OSPFv3, running on IPv6, no longer supports protocol-internal
authentication. Instead, it relies on IPv6 protocol security (IPsec). OSPF version 3 introduces
modifications to the IPv4 implementation of the protocol. Except for virtual links, all
neighbor exchanges use IPv6 link-local addressing exclusively. The IPv6 protocol runs per
link, rather than based on the subnet. All IP prefix information has been removed from the
link-state advertisements and from the Hello discovery packet making OSPFv3 essentially
protocol-independent. Despite the expanded IP addressing to 128-bits in IPv6, area and router
Identifications are still based on 32-bit values.
14
4.1 Router Relationships
OSPF supports complex networks with multiple routers, including backup routers, to balance
traffic load on multiple links to other subnetworks. Neighboring routers in the samebroadcast
domain or at each end of a point-to-point telecommunications communicate with each other
via the OSPF protocol. Routers form adjacencies when they have detected each other. This
detection is initiated when a router identifies itself in a Hello protocol packet. Upon
acknowledgment, this establishes a two-way state and is the most basic relationship. The
routers in an Ethernet or Frame Relay network select a Designated Router (DR) and a Backup
Designated Router (BDR) which act as a hub to reduce traffic between routers. OSPF uses
both unicast and multicast transmission modes to send "Hello" packets and link state updates.
As a link state routing protocol, OSPF establishes and maintains neighbor relationships for
exchanging routing updates with other routers. The neighbor relationship table is called
anadjacency database. An OSPF router forms neighbor relationships only with the routers
directly connected to it. For forming a neighbor relationship between, the interfaces used to
form the relationship must be in the same OSPF area. Generally an interface is only
configured in a single area, however, an interface may be configured to belong to multiple
areas. In the second area, such an interface must be configured as a secondary interface.
15
5. Area Types
An OSPF network is divided into areas that are logical groupings of hosts and networks. An
area includes its router having interfaces connected to the network. Each area maintains a
separate link state database whose information may be summarized towards the rest of the
network by the connecting router. Thus, the topology of an area is unknown outside of the
area. This reduces the routing traffic between parts of an autonomous system. Area are
uniquely identified with 32-bit numbers. The area identifiers are commonly written in the dot-
decimal notation, familiar from IPv4 addressing. However, they are not IP addresses and may
duplicate, without conflict, any IPv4 address. The area identifiers for IPv6 implementations
(OSPFv3) also use 32-bit identifiers written in the same notation. When dotted formatting is
omitted, most implementations expand area 1 to the area identifier 0.0.0.1, but some have
been known to expand it as 1.0.0.0.
OSPF defines several special area types:
5.1 Backbone area
The backbone area (also known as area 0 or area 0.0.0.0) forms the core of an OSPF
network. All other areas are connected to it, and inter-area routing happens via routers
connected to the backbone area and to their own associated areas. It is the logical and physical
structure for the 'OSPF domain' and is attached to all nonzero areas in the OSPF domain. Note
that in OSPF the term Autonomous System Boundary Router (ASBR) is historic, in the sense
that many OSPF domains can coexist in the same Internet-visible autonomous system,
RFC1996 (ASGuidelines 1996, p. 25). The backbone area is responsible for distributing
routing information between nonbackbone areas. The backbone must be contiguous, but it
does not need to be physically contiguous; backbone connectivity can be established and
maintained through the configuration of virtual links. All OSPF areas must connect to the
backbone area. This connection, however, can be through a virtual link. For example, assume
area 0.0.0.1 has a physical connection to area 0.0.0.0. Further assume that area 0.0.0.2 has no
direct connection to the backbone, but this area does have a connection to area 0.0.0.1. Area
0.0.0.2 can use a virtual link through the transit area 0.0.0.1 to reach the backbone. To be a
transit area, an area has to have the transit attribute, so it cannot be stubby in any way.
16
5.2 Backbone area
The backbone area (also known as area 0 or area 0.0.0.0) forms the core of an OSPF network.
All other areas are connected to it, and inter-area routing happens via routers connected to the
backbone area and to their own associated areas. It is the logical and physical structure for the
'OSPF domain' and is attached to all nonzero areas in the OSPF domain. Note that in OSPF
the term Autonomous System Boundary Router (ASBR) is historic, in the sense that many
OSPF domains can coexist in the same Internet-visible autonomous system, RFC1996
(ASGuidelines 1996, p. 25). The backbone area is responsible for distributing routing
information between nonbackbone areas. The backbone must be contiguous, but it does not
need to be physically contiguous; backbone connectivity can be established and maintained
through the configuration of virtual links. All OSPF areas must connect to the backbone area.
This connection, however, can be through a virtual link. For example, assume area 0.0.0.1 has
a physical connection to area 0.0.0.0. Further assume that area 0.0.0.2 has no direct
connection to the backbone, but this area does have a connection to area 0.0.0.1. Area 0.0.0.2
can use a virtual link through the transit area 0.0.0.1 to reach the backbone. To be a transit
area, an area has to have the transit attribute, so it cannot be stubby in any way.
5.3 Stub area
A stub area is an area which does not receive route advertisements external to the autonomous
system (AS) and routing from within the area is based entirely on a default route. An ABR
deletes type 4, 5 LSAs from internal routers, sends them a default route of 0.0.0.0 and turns
itself into a default gateway. This reduces LSDB and routing table size for internal routers.
Modifications to the basic concept of stub areas exist in the not-so-stubby area (NSSA). In
addition, several other proprietary variations have been implemented by systems vendors,
such as the totally stubby area (TSA) and the NSSA totally stubby area, both an extension
in Cisco Systems routing equipment.
5.4 Transit area
A transit area is an area with two or more OSPF border routers and is used to pass network
traffic from one adjacent area to another. The transit area does not originate this traffic and is
not the destination of such traffic.
17
6. Implementing OSPF for IPv66.1 How OSPF for IPv6 Works
OSPF is a routing protocol for IP. It is a link-state protocol, as opposed to a distance-vector
protocol. Think of a link as being an interface on a networking device. A link-state protocol
makes its routing decisions based on the states of the links that connect source and destination
machines. The state of a link is a description of that interface and its relationship to its
neighboring networking devices. The interface information includes the IPv6 prefix of the
interface, the network mask, the type of network it is connected to, the routers connected to
that network, and so on. This information is propagated in various type of link-state
advertisements (LSAs). A router’s collection of LSA data is stored in a link-state database.
The contents of the database, when subjected to the Dijkstra algorithm, result in the creation
of the OSPF routing table. The difference between the database and the routing table is that
the database contains a complete collection of raw data; the routing table contains a list of
shortest paths to known destinations via specific router interface ports. OSPF version 3, which
is described in RFC 2740, supports IPv6.
6.2 Force SPF in OSPF for IPv6
When the process keyword is used with the clear ipv6 ospf command, the OSPF database is
cleared and repopulated, and then the SPF algorithm is performed. When the force-spf
keyword is used with the clear ipv6 ospf command, the OSPF database is not cleared before
the SPF algorithm is performed.
6.3 Fast Convergence—LSA and SPF Throttling
The OSPF for IPv6 LSA and SPF throttling feature provides a dynamic mechanism to slow
down link-state advertisement updates in OSPF during times of network instability. It also
allows faster OSPF convergence by providing LSA rate limiting in milliseconds. Previously,
OSPF for IPv6 used static timers for rate-limiting SPF calculation and LSA generation.
Although these timers are configurable, the values used are specified in seconds, which poses
a limitation on OSPF for IPv6 convergence. LSA and SPF throttling achieves subsecond
convergence by providing a more sophisticated SPF and LSA rate-limiting mechanism that is
able to react quickly to changes and also provide stability and protection during prolonged
periods of instability.
18
6.4 Load Balancing in OSPF for IPv6
When a router learns multiple routes to a specific network via multiple routing processes (or
routing protocols), it installs the route with the lowest administrative distance in the routing
table. Sometimes the router must select a route from among many learned via the same
routing process with the same administrative distance. In this case, the router chooses the path
with the lowest cost (or metric) to the destination. Each routing process calculates its cost
differently and the costs may need to be manipulated in order to achieve load balancing.
OSPF performs load balancing automatically in the following way. If OSPF finds that it can
reach a destination through more than one interface and each path has the same cost, it installs
each path in the routing table. The only restriction on the number of paths to the same
destination is controlled by the maximum-paths command. The default maximum paths is 16,
and the range is from 1 to 64.
6.5 Importing Addresses into OSPF for IPv6
When importing the set of addresses specified on an interface on which OSPF for IPv6 is
running into OSPF for IPv6, users cannot select specific addresses to be imported. Either all
addresses are imported, or no addresses are imported.
6.6 Enabling OSPF for IPv6 on an Interface
This task explains how to enable OSPF for IPv6 routing and configure OSPF for IPv6 on each
interface. By default, OSPF for IPv6 routing is disabled and OSPF for IPv6 is not configured
on an interface.
6.7 SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 ospf process-id area area-id [instance instance-id]
6.8 Defining an OSPF for IPv6 Area Range
The cost of the summarized routes will be the highest cost of the routes being summarized.
For example, if the following routes are summarized:
OI 2001:0DB8:0:0:7::/64 [110/20] via FE80::A8BB:CCFF:FE00:6F00, Ethernet0/0
OI 2001:0DB8:0:0:8::/64 [110/100] via FE80::A8BB:CCFF:FE00:6F00, Ethernet0/0
OI 2001:0DB8:0:0:9::/64 [110/20] via FE80::A8BB:CCFF:FE00:6F00, Ethernet0/0
They become one summarized route, as follows:
OI 2001:0DB8::/48 [110/100] via FE80::A8BB:CCFF:FE00:6F00, Ethernet0/0
This task explains how to consolidate or summarize routes for an OSPF area.
19
6.9 Defining Authentication in an OSPF Area
This task explains how to define authentication in an OSPF area.
6.8 SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router ospf process-id
4. area area-id authentication ipsec spi spi md5 [key-encryption-type] key
Defining Encryption in an OSPF Area
This task describes how to define encryption in an OSPF area.
6.9 SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 router ospf process-id
4. area area-id encryption ipsec spi spi esp encryption23
20
8. ConclusionOur simulations show that is possible and quite simple to implement a OSPF routing with
IPv6 in a network. The network is scalable and will work well in a larger scale as well. This
project shows that the possibility to work and easiness with features of OSPF and IPv6 as
well.
9. Reference[1] CCNA Routing and Switching Study Guide - Lammle, Todd
[2] Cisco IOS IPv6 Configuration Guide
[3] Skibbz.com
23