The Bits and Bytes of Computer Networking
This course delves deep into computer networking and transport layers.
It has following submodules:
This course delves deep into computer networking and transport layers.
It has following submodules:
An interconnection of Computers.
The physical connection of computers and wires around the world.
The information present on the Internet.
In an IT field, managing, building, and designing networks.
A set of hardware or software that provides the infrastructure for a computer.
Delivers packets to right computers.
Delivers information from one network to another.
Lets an organization use one public IP address and many private IP addresses within the network.
The movement that lets governments, businesses, and organizations communicate and integrate together on an international scale.
Smart devices like thermostat, refrigerators, and other home appliances as well as every day smart devices which are being connected to the internet thanks to the IOT.
A defined set of standards that computers must follow in order to communicate properly.
The name we’ve given to the full scope of how computer communicate with each other.
“Connect different devices to each other, allowing data to be transmitted over them.”
Copper Cables
Crosstalk: “When an electrical pulse on one wire is accidentally detected on another wire.”
Fiber Optic Cables
Contain individual optical fibers, which are tiny tubes made out of glass about the width of a human hair.
Unlike copper cables, fibers use light pulses to send 1s and 0s
A physical layer device that allows for connections from many computers at once.
Layer 1 device
Collision domain: A network segment where only one device can communicate at a time.
If multiple systems try sending data at the same time, the electrical pulses sent across the cable can interfere with each other.
A device that knows how to forward data between independent networks
Server Provide data to some client, requesting it
Represents the physical devices that interconnect computers.
10 Base T, 802.11
Bits
The smallest representation of data that a computer can understand; it’s a one or zero
1s and 0s are sent across the network using modulation
Modulation: A way of varying the voltage of charge moving across the cables
When using modulation in computer networks, it’s called Line coding
Duplex Communication: The concept that information can flow in both directions across the globe
Simplex Communication: This is unidirectional
Twisted-Pair Cables end with the plug which takes the wires and act as a connector
The most common plug RJ45
Network Ports: They are generally directly attached to the devices that make up a computer network
Most network ports have two small LEDs
Activity LED: Would flash when data actively transmitted across the cable
Link LED: Lit when cable properly connected to two devices that are both powered on
Sometimes a network port isn’t connected directly to a device. Instead, there might be network ports mounted on a wall or underneath your desk. These ports are generally connected to the network via cables, run through the walls, that eventually end at a patch panel.
Patch Panel: A device containing many network ports. But it does no other work.
Responsible for defining a common way of interpreting these signals so network devices can communicate.
Ethernet is the most common means of sending data
Ethernet solves Collision domain by using a technique known as carrier sense multiple access with collision detection (CSMA/CD).
CSMA/CD: Used to determine when the communications channels are clear, and when device is free to transmit data
MAC Address: A globally unique identifier attached to an individual network interface
1) Organizationally Unique Identifier(OUI): The first three octets of a MAC address
2) Vendor Assigned(NIC Cards, Interfaces): Last three octets are assigned by the vendor, depending upon their preferences.
Uni-cast
A uni-cast transmission is always meant for just one receiving address
Broadcast
An Ethernet Broadcast is sent to every single device on a LAN
FF:FF:FF:FF:FF:FF:FF
Data Packet
An all-encompassing term that represents any single set of binary data being sent across a network link
Ethernet Frame
A highly structured collection of information presented in a specific order
Preamble: 8 bytes (or 64 bits) long, and can itself split into two sections
Signals to a receiving device that the preamble is over and that the actual frame contents will now follow
The hardware address of the intended recipient
16 bits long and used to describe the protocol of the contents of the frame
Indicates that the frame itself is what’s called a VLAN frame
Virtual LAN (VLAN): A technique that lets you have multiple logical LANs operating on the same physical equipment
In networking terms, is the actual data being transported, which is everything that isn’t a header.
A 4-byte (or 32-bit) number that represents a checksum value for the entire frame
Cyclic Redundancy Check (CRC): An important concept for data integrity, and is used all over computing, not just network transmissions
Allows different networks to communicate with each other through devices known as routers.
A collection of networks connected together through routers, the most famous of these being the Internet.
Sorts out which client and server programs are supposed to get that data.
There are lots of different protocols at this layer, and as you might have guessed from the name, they are application-specific. Protocols used to allow you to browse the web or send, receive email are some common ones.
32 bit long
4 octets describe in decimal number
Each octet range from 0 to 255
IP Addresses belong to Networks, not to the devices attached to those networks
When connecting to a network, an IP address is assigned automatically by Dynamic Host Configuration Protocol (DHCP)
IP address assigned by DHCP is called Dynamic IP address
Other type is static IP addresses
In most cases, static IP addresses are reserved for servers and networks devices, while Dynamic IP addresses are reserved for clients
A highly structured series of fields that are strictly defined.
Version
IPv4 is more common than IPv6
Header Length field
Almost always 20 bytes in length when dealing with IPv4
Service Type field
These 8 bits can be used to specify details about quality of service, or QoS, technologies
Total Length field
Indicates the total length of the IP datagram it’s attached to
Identification field
A 16-bit number that’s used to group messages together
The maximum size of a single datagram is the largest number you can represent with 16 bits which is 65535 If the total amount of data that needs to be sent is larger than what can fit in a single datagram, the IP layer needs to split this data up into many individual packets
Next are closely related Flags and Fragment Offset fields
Flags field
Used to indicate if a datagram is allowed to be fragmented, or to indicate that the datagram has already been fragmented
The process of taking a single IP datagram and splitting it up into several smaller datagrams
Time to Live (TTL) field
An 8-bit field that indicates how many router hops a datagram can transverse before it’s thrown away
Protocol field
Another 8-bit field that contains data about what transport layer protocol is being used, the most common ones are TCP and UDP
Header checksum field
A checksum of the contents of the entire IP datagram header
Source IP address (32-bits)
Destination IP address (32-bits)
IP Options field
An optional field and is used to set special characteristics for datagrams primarily used for testing purposes
Padding field
A series of zeros used to ensure the header is of correct total size, due to variable size to option field
IP datagram is basically the payload section of network layer, the process involved is called Encapsulation.
A way defining how the global IP address space is split up.
Only first octet is used for network ID, rest is used for host ID.
Only the first two octets are used for network ID, the rest are used for host ID.
First three octets used for network ID, the last one used for host ID.
A protocol used to discover the hardware address of a node with a certain IP address.
A list of IP addresses and the MAC addresses associated with them.
The process of taking a large network and splitting it up into many individual and smaller subnetworks, or subnets.
32-bits numbers that are normally written out as four octets in decimal.
OR
A way for a computer to use AND operators to determine if an IP address exists on the same network.
Generally, an IP address consists of Network ID and Host ID
In Subnetting world, Host ID is further divided into Subnet ID to identify the subnet mask.
To describe where one network or system ends and another one begins.
A network device that forwards traffic depending on the destination address of that traffic.
Used by routers to share information within a single autonomous system.
“A collection of networks that all fall under the control of a single network operator.”
In computer science, a list is known as a vector.
“A non-profit organization that helps manage things like IP address allocation.”
Numbers assigned to individual autonomous systems.
“Allows traffic to be directed to specific network applications”
A 16-bit number that’s used to direct traffic to specific services running on a networked computer
“Made up of a TCP header and a data section.”
Destination port
The port of the service the traffic is intended for.
Source port
A high-numbered port chosen from a special section of ports known as ephemeral ports.
Sequence number
A 32-bit number that’s used to keep track of where in a sequence of TCP segments this one is expected to be.
Acknowledgement number
The number of the next expected segment.
Data offset field
A 4-bit number that communicates how long the TCP header for this segment is.
Control Flag (See next part)
TCP window
Specifies the range of sequence numbers that might be sent before an acknowledgement is required.
TCP checksum
Operates just like the checksum fields at the IP and Ethernet level.
Urgent pointer field
Used in conjunction with one of the TCP control flags to point out particular segments that might be more important than others. (No real world adoption of this TCP feature)
Options field
It is sometimes used for more complicated flow control protocols. (rarely used in real world)
Padding
Just a sequence of zeros to make sure the data payload section starts at the expected location.
Not in strict order;
A value of one here indicates that the segment is considered urgent and that the urgent pointer field has more data about this. (No particular real world use for this flag)
A value of one in this field means that the acknowledgement number field should be examined.
The transmitting device wants the receiving device to push currently-buffered data to the application on the receiving end asap.
On the sides in a TCP connection hasn’t been able to properly recover from a series of missing or malformed segments.
It’s used when first establishing a TCP connection and makes sure the receiving end knows to examine the sequence number field.
When this flag is set to one, it means the transmitting computer doesn’t have any more data to send and the connection can be closed.
“A way for two devices to ensure that they’re speaking the same protocol and will be able to understand each other.”
Not very common
TCP connection when finishes sending data, it sends FIN to request the port closure.
Then receiving end responds with ACK flag and connection closes
Even though the port, on one end, can simply remain open, and the connection ends without closing it
“The instantiation of an end-point in a potential TCP connection.”
“The actual implementation of something defined elsewhere.”
A TCP socket is ready and listening for incoming connection.
A synchronization request has been sent, but the connection has not been established yet.
A socket previously in a LISTEN state has received a synchronization request and sent a SYN/ACK back.
The TCP connection is in working order and both sides are free to send each other data.
A FIN has been sent, but the corresponding ACK from the other end hasn’t been received yet.
The connection has been closed at the TCP layer, but the application that opened the socket hasn’t yet released its hold on the socket yet.
The connection has been fully terminated and that no further communication is possible.
“Established a connection, and uses this to ensure that all data has been properly transmitted.”
“A device that blocks traffic that meets certain criteria.”
“Allows network applications to communicate in a way they understand.”
“Facilitating the communication between actual applications and the transport layer.”
“Responsible for making sure that the un-encapsulated application layer data is able to understand by the application in question.”
“A global and highly distributed network service that resolves strings of letters into IP addresses for you.”
“The term we use for something that can be resolved by DNS.”
There are five primary types of DNS servers;
The purpose is to store known domain name lookups for a certain amount of time.
A value, in seconds, that can be configured by the owner of a domain name for how long a name server is allowed to cache an entry before it should discard it and perform a full resolution again
“A technique that’s used to route traffic to different destinations depending on factors like location, congestion, or link health.”
DNS, an application layer service, uses UDP
A full DNS lookup with TCP in use, will use 44 total packets
A full DNS lookup with UDP on the other hand require only 8 packets
Error recovery is done by asking again in the UDP, as no error check is present
“An A record is used to point a certain domain name at a certain IPv4 IP address.”
Round-robin is a concept that involves iterating over a list of items one by one in hastily fashion. The hope is that this ensures a fairly equal balance of each entry on the list that’s selected.
“Quad A record is used to point a certain domain name at a certain IPv6 IP address.”
“A CNAME record is used to redirect traffic from one domain name to another.”
“This resource record is used in order to deliver e-mail to the correct server.”
“It’s used to define the location of various specific services.”
The last part of a domain name. E.g. .com, .net etc.
“Used to demarcate where control moves from a TLD name server to an authoritative name server.”
“The WWW portion of a domain.”
When you combine all of these parts together, you have what’s known as this.
“An authoritative name server is actually responsible for a specific DNS zone.”
Allow for easier control over multiple level of a domain.
DNS zones are a hierarchical concept. The root name servers are responsible for some even finer-grained zones underneath that.
The root and TLD name servers are actually just authoritative name servers, too. It’s just that the zones that they’re authoritative for are special zones.
E.g., a large company has three servers, one in LA, other in Paris and 3rd one in Shanghai. It will have three zones that and fourth for large company server, so in total 4 DNS server zones.
“Simple configuration files that declare all resource record for a particular zone.”
“Declares the zone and the name of the name server that is authoritative for it.”
“Indicate other name servers that might also be responsible for this zone.”
These let DNS resolvers ask for an IP and get the FQDN associated with it returned.
Resolves an IP to a name.
Every single computer on a modern TCP/IP based network needs to have at least four things specifically configured;
“An application layer protocol that automates the configuration process of hosts on a network.”
Resolves problem having to manually give an IP address to a device each time, it connects to the internet.
DHCP works on some standards, like Dynamic allocation.
“A range of IP addresses is set aside for client devices, and one of these IPs is issued to these devices when they request one.”
“A range of IP addresses is set aside for assignment purposes.”
Requires a manually specified list of MAC address and their corresponding IPs.
“Used to keep all computers on a network synchronized in time.”
It is an application layer protocol, so it relies on:
So, how DHCP works in practice:
“The process by which a client configured to use DHCP attempts to get network configuration information.”
It has four steps
“A technology that allows a gateway, usually a router or firewall, to rewrite the source IP of an outgoing IP datagram while retaining the original IP in order to rewrite it into the response.”
Hides the IP of the computer originating the request. This is known as IP masquerading.
To the outside world, the entire space of Network A is hidden and private. This is called One-to-many NAT.
“A technique where the source port chosen by a client is the same port used by the router.”
“A technique where specific destination ports can be configured to always be delivered to specific nodes.”
IANA is in-charge of distributing IPs since 1988. The 4.2 billion have run out since long.
For some time now, the IANA has primarily been responsible with assigning address blocks to the five regional internet registries or RIRs.
The IANA assigned the last unallocated /8 network blocks to the various RIRs on February 3, 2011.
Solution is NAT, and Non-Routable Address Space, defined rfc1918.
“A technology that allows for the extension of a private or local network to hosts that might not be on that local network.”
A VPN is a tunneling protocol, it’s basically a technique not a strict protocol which involves, using different methods.
VPNs require strict authentication protocols to allow only access to the required clients
VPNs were the first to implement the 2FA on a large scale
VPNs can be used to have site to site connectivity as well
“A technique where more than just a username and password are required to authenticate.”
“A server that acts on behalf of a client in order to access another service.”
“A service that might appear to be a single server to external clients, but actually represents many servers living behind it.”
A dial-up connection uses POTS for data transfer, and gets its name because the connection is established by actually dialing a phone number.
Transferring data on dial-ups is done through Modems, stands for Modulator/Demodulator.
Early modems have very low Baud rate
By the late 1950s, computers can generally send data at the rate of 110bps.
When USENET was developed, this rate was increased to 300bps
In the early 1990s, when the dial-up access to the Internet became a household commodity, this rate was increased to 14.4kbps.
“A measurement of how many bits can be passed across a phone line in a second.”
“Any connectivity technology that isn’t dial-up Internet.”
“Originally invented by AT&T in order to transmit multiple phone calls over a single link.”
Before Transmission System 1 or short T1, each phone call requires its own copper cable to transmit.
With T1, AT&T invented a way to carry 24 phone calls simultaneously over a single copper cable.
A few years later, T1 technology was repurposed for data transfers.
Over the years, the phrase T1 has come to mean any twisted pair copper connection capable of speeds of 1.544mbps, even if they don’t strictly follow the original Transferring System 1 specifications.
Initially, T1 lines were used to connect telecommunication channels only
But as the Internet grew, many businesses and companies paid to have T1 cables installed for faster connectivity.
Improvements were made by developing a way for multiple T1s to act as a single link.
T3 line was invented which has 28 T1 lines combined, and total speed of 44.736mbps.
Now for small businesses and companies, Fiber connection are more common as they cheaper.
For inner-ISP communications, different Fiber technologies have all replaced older copper-based ones.
DSL made possible the occurrence of phone calls and data transfer on the same line, and at the same time.
DSL uses their own modems called Digital Subscriber Line Access Multiplexers (DSLAMs).
Just like dial-up modems, these devices establish data connections across phone lines, but inline dial-up connections, they’re usually long-running.
Two most common DLSs are:
Further developments in SDSL technology have yielded things like:
The history of both computer and telephone tells a story that started with all communications being wired, but the recent trend is moving towards more traffic as wireless.
But television followed the opposite path. Originally, all television broadcast was wireless, sent out by giant television towers and received by smaller antennas in people’s houses.
You had to be in range of that towers to receive signals, like today you’ve to be in range of cellular tower for cellular communications.
Late 1940s, first television technology was developed.
In 1984, Cable Communications Policy Act deregulated the television industry, started booming, rest of the world soon followed suit.
Cable connections are managed by Cable modems.
The device that sits at the edge of a consumer’s network and connects it to the cable modem, termination system, or CMTS.
Connects lots of different cable connections to an ISPs core network.
Fiber achieve higher speed, no degradation in signal transfer.
An electrical signal can only travel a few hundred meters before degradation in copper cable.
While light signal in fiber cables can travel many, many KMs before degradation.
Producing and laying fibers a lot more expensive than copper cables.
Fiber connection to the end consumers, varies tons due to tons of implications.
That’s why the phrase FTTX or fiber to the X was developed.
Instead of modem, the demarcation point for Fiber technologies is known as Optical Network Terminator or ONT.
Converts data from protocols, the fiber network can understand, to those that more traditional, twisted-pair copper networks can understand.
“Acts like a single network, but spans across multiple physical locations.”
Frame Relay is a standardized wide area network (WAN) technology that specifies the Physical & Data Link Layer of digital telecommunications channels using a packet switching methodology. Originally designed for transport across Integrated Services Digital Network (ISDN) infrastructure, it may be used today in the context of many other network interfaces.
HDLC is a bit-oriented code-transparent synchronous data link layer protocol developed by the International Organization for Standardization (ISO). The standard for HDLC is ISO/IEC 13239:2002.
A standard defined by **American National Standards Institute (ANSI) and ITU-T for digital transmission of multiple types of traffic.
“In a WAN, the area between a demarcation point and the ISP’s core network is called Local Loop.”
A popular alternative to WAN technologies
Companies are moving to cloud for services such as email, Cloud Storage. So, expensive cost of WANs is often outnumbered.
They maintain their secure connection to these cloud solutions through Point-to-Point VPNs.
Point-to-Point VPN, typically called Site-to-Site VPN.
“A way to network without wires.”
IEEE 802.11 Standards or 802.11 family define the most common workings of Wireless networks.
Wireless devices communicate via radio waves.
Different 802.11 generally use the same basic protocol but different frequency bands.
In North America, FM radio transmissions operate between 88 and 108 MHz. This specific frequency band is called FM Frequency Band.
Wi-Fi works at 2.4GHz and 5GHz bands.
There are many 802.11 specifications, but common ones, you might run into are: (In order of when it were introduced)
802.11 = physical and data link layers
All specifications operate with the same basic data link protocol. But, how they operate at the 88physical layer** varies.
802.11 frame has a number of fields.
It is 16-bits long and contains a number of subfields that are used to describe how the frame itself should be processed.
It specifies how long the total frame is, so the receiver knows how long it should expect to have to listen to this transmission.
It is 16-bits long and mainly contains a sequence number used to keep track of the ordering of frames.
Has all the data of the protocols further up the stack.
Contains a checksum used for a cyclical redundancy check, just like how Ethernet does it.
The most common wireless setup includes wireless access point.
“A certain section of the radio spectrum that’s been agreed upon to be used for certain communications.”
“A device that bridges the wireless and wired portions of a network.”
Simplest of the three
In an ad-hoc network, there isn’t really any supporting network infrastructure.
Every device on the network speaks directly to every other device on the network.
Used in smartphones, Warehouses
Important tool during disaster like earthquake, the relief workers, can communicate via ad-hoc network.
Most mesh networks are only made up of wireless access points. And are still connected to the wired network.
“Individual, smaller sections of the overall frequency band used by a wireless network.”
“Any one of the network segment where one computer can interrupt another.”
“An encryption technology that provides a very low level of privacy.”
You configure your access points to only allow for connections from a specific set of MAC addresses belonging to devices you trust.
Cellular networks have a lot in common with 802.11 networks.
Just like Wi-Fi, they also operate on radio waves.
There are cellular frequency bands reserved for Cellular communications.
Phone frequency waves can travel several KMs.
Mesh networks are used by many popular wireless IoT network protocols, like Zigbee and Z-Wave, for device communication. Wireless mesh networks use less power than other wireless connectivity options. Wireless mesh is a decentralized network of connected wireless access points (WAP), also called nodes. Each WAP node forwards data to the next node in the network until the data reaches its destination. This network design is “self-healing,” meaning the network can recover on its own when a node fails. The other nodes will reroute data to exclude the failed node. Wireless mesh is a good option for high reliability and low power consumption, which is better for battery powered IoT devices. Wireless mesh networks can be configured to be full or partial mesh:
Bluetooth is a widely used wireless network that operates at a 2.45 GHz frequency band and facilitates up to 3 Mbps connections among computing and IoT devices. Bluetooth has a range of up to 100 feet (ca. 30 m) and can accommodate multiple paired connections. It is a good choice for creating a short distance wireless connection between Bluetooth enabled devices. Bluetooth is often used by computing devices to manage, configure, control, and/or collect small amounts of data from one or more close range IoT devices. For example, Bluetooth may be used to control smart home lighting or thermostat IoT devices from a smartphone.
NFC is a short-range, low data, wireless communication protocol that operates on the 13.56 MHz radio frequency. NFC technology requires a physical chip (or tag) to be embedded in the IoT device. NFC chips can be found in credit and debit cards, ID badges, passports, wallet apps on smartphones (like Google Pay), and more. A contactless NFC scanner, like a Point-of-Sale (POS) device, is used to read the chip. This scanner communication connection typically requires the IoT device to be within 2 inches (5.08 cm) of the scanner, but some NFC chips have an 8 inch (20.32 cm) range. This short-distance range helps to limit wireless network security threats. However, criminals can carry a portable NFC scanner into a crowded area to pick up NFC chip data from items like credit cards stored inside purses and wallets. To protect against this type of data theft, the cards should be placed inside special NFC/RFID sleeves that make the chips unreadable until they are removed from the sleeves. NFC technology may also be used in the pairing process for Bluetooth connections.
LoRaWan is an open source networking protocol designed to connect battery powered, wireless IoT devices to the Internet for widely dispersed networks.
“The ability for a protocol or program to determine that something went wrong.”
“The ability for a protocol or program to attempt to fix it.”
ICMP packet is sent to troubleshoot network issues.
The make-up of an ICMP packet is pretty simple, it has a HEADER and DATA section.
The ICMP HEADER has the following fields:
Data Payload section for ICMP
ICMP isn’t developed for the humans to interact with.
Ping lets you send a special type of ICMP message called an Echo Request.
“A utility that lets you discover the path between two nodes, and gives you information about each hop along the way.”
An ISP almost always gives you access to a recursive name server as part of the service it provides.
Many businesses run their own name servers. To give names to the Printers, computers etc. instead of referring them with their IPs.
Another option is using DNS as a service provider. It is becoming more popular.
Some organizations run Public DNS servers, like Google’s 8.8.8.8, Cloudflare’s 1.1.1.1, quad9’s 9.9.9.9 etc.
Some level 3 DNS provider also provide free public DNS servers, but not advertised by them. I.e., 4.2.2.3 etc.
One should be careful when using Public DNS server, hijacking outbound DNS query, and redirecting the traffic to a malicious website is a common intrusion technique.
Always make sure the name server is run by a reputable company, and try to use the name servers provided by your ISP outside of troubleshooting scenarios.
An organization responsible for assigning individual domain names to other organizations or individuals.
“A flat file that contains, on each line, a network address followed by the host name it can be referred to as.”
A way of sending network traffic to yourself.
“A technological approach where computing resources are provisioned in a shareable way, so that lots of users get what they need, when they need it.”
Or
“A new model in computing where large clusters of machines let us use the total resources available in a better way.”
“A single physical machine, called a host, could run many individual virtual instances, called guests.”
“A piece of software that runs and manages virtual machines, while also offering these guests a virtual operating platform that’s indistinguishable from an actual hardware.”
A large cluster of machines runs by another company.
Used by a single large corporation and generally physically hosted on its own premises.
A term used to describe situations where companies might run a thing like their most sensitive proprietary technologies on a private cloud, while entrusting their less-sensitive servers to a public cloud.
You shouldn’t have to worry about building your own network or your own servers.
A subset of cloud computing where a platform is provided for customers to run their services.
A way of licensing the use of software to others while keeping that software centrally hosted and managed.
IPv4 was run out of new IPs
IPv5 was an experimental protocol that introduced the concept of connections.
IPv6 = 128 bits, written as 8 groups of 16-bits each. Each one of these groups is further made up of four hexadecimal numbers.
Full IPv6 address looks like this
Reserved IPv6 range is as follows, for education, documentation, books, courses etc.
Two rules
A way of addressing groups of hosts all at once.
Allow for local network segment communication and are configured based upon a host’s MAC address.
Header, much simpler than IPv4 header.
IPv6 header has the following components:
A 4-bit field that defines what version of IP is in use.
An 8-bit field that defines the type of traffic contained within the IP datagram, and allows for different classes of traffic to receive different priorities.
A 20-bit field that’s used in conjunction with the traffic class field for routers to make decisions about the quality of service level for a specific datagram.
A 16-bit field that defines how long the data payload section of the datagram is.
A unique concept of IPv6, and needs a little extra explanation. It defines what header is up next after that. To help reduce the problems with additional data that IPv6 addresses impose on the network, the IPv6 header was built to be a short as possible. One way to do that is to take all the optional fields and abstract them away from the IPv6 header itself. The next header field defines what kind of header is immediately after this current one. These additional headers are optional, so they’re not required for a complete IPv6 datagram. Each of these additional optional headers contain a next header field and allow for a chain of headers to be formed if there’s a lot of optional configuration.
An 8-bit field that’s identical in purpose to the TTL field in an IPv4 header.
Not possible for whole Internet to switch to IPv6 in no time.
So, IPv6 and IPv4 traffic need to coexist during the transition period.
This is possible with IPv4 mapped address space. The IPv6 specifications have set aside a number of addresses that can be directly correlated to an IPv4 address.
More important is IPv6 traffic needs to travel to IPv4 servers.
This is done through IPv6 tunnels.
Servers take incoming IPv6 traffic and encapsulate it within traditional IPv4 datagram.
They consist of IPv6 tunnel servers on either end of a connection. These IPv6 tunnel servers take incoming IPv6 traffic and encapsulate it within traditional IPv4 datagrams. This is then delivered across the IPv4 Internet space, where it’s received by another IPv6 tunnel server. That server performs the de-encapsulation and passes the IPv6 traffic further along in the network.
Companies that provide IPv6 tunneling endpoints for you, so you don’t have to introduce additional equipment to your network.