Muutke küpsiste eelistusi

E-raamat: IPv6 Deployment and Management [Wiley Online]

Teised raamatud teemal:
  • Wiley Online
  • Hind: 85,59 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
Teised raamatud teemal:
Because the use of the Internet is growing so rapidly in Asia, warn software developers Dooley and Rooney, Asian institutions and individuals new to the Internet will start immediately with IPv6 (Internet Protocol version six) rather than moving from IPv4, which everyone uses now. For longer than is profitable, therefore, the Internet will be divided into two spheres that cannot communicate with each other-- unless service providers take measures to access both protocols. They explain how IPv4 providers can accommodate IPv6 users. Among the topics are IPv6 deployment drivers, co-existence technologies, security planning, network management planning, and managing the IPv4/IPv6 network. Annotation ©2013 Book News, Inc., Portland, OR (booknews.com)

A guide for understanding, deploying, and managing Internet Protocol version 6

The growth of the Internet has created a need for more addresses than are available with Internet Protocol version 4 (IPv4)?the protocol currently used to direct almost all Internet traffic. Internet Protocol version 6 (IPv6)?the new IP version intended to ultimately succeed IPv4?will expand the addressing capacity of the Internet to support the explosive growth of users and devices on the Internet as well as add flexibility to allocating addresses and efficiency for routing traffic.

IPv6 Deployment and Management describes the IPv6 protocol in detail, as well as technologies for interworking IPv4 and IPv6. It discusses why organizations?even those with adequate IPv4 space?should consider IPv6 deployment from a business perspective. In addition, it details strategies and techniques for assessing the impact of deploying IPv6 on a network, discovering current IP assets, assessing IPv6 readiness, creating a plan to deploy IPv6 while considering addressing security and network management impacts, and managing a dual protocol IPv4-IPv6 network.

Featured chapters in the book are:

  • IPv6 Deployment Drivers
  • IPv4-IPv6 Co-Existence Technologies
  • IPv6 Readiness Assessment
  • IPv6 Address Planning
  • IPv6 Security Planning
  • Managing the Deployment
  • IPv6 Network Management Planning
  • Managing the IPv4/IPv6 Netowork
  • IPv6 and the Future Internet

IPv6 Deployment and Management is a must-read for IP network engineers, managers, and those who work in Information Technology.

Acknowledgments xi
Introduction xiii
1 Ipv6 Deployment Drivers 1(12)
1.1 The Internet: A Success Story
1(6)
1.1.1 Supply-Side Issues
3(3)
1.1.2 Internet at a Crossroads
6(1)
1.1.3 Which Internet Are You On?
7(1)
1.2 Emerging Applications
7(3)
1.3 IPv6 Business Case
10(3)
2 IPv6 Overview 13(30)
2.1 IPv6 Key Features
14(1)
2.2 The IPv6 Header
14(3)
2.2.1 IPv6 Extension Headers
15(2)
2.3 IPv6 Addressing
17(18)
2.3.1 Address Notation
18(1)
2.3.2 Address Structure
19(1)
2.3.3 IPv6 Address Allocations
20(7)
2.3.4 Internet Control Message Protocol for IPv6 (ICMPv6)
27(1)
2.3.5 IPv6 Ping
28(1)
2.3.6 Multicast Listener Discovery
28(3)
2.3.7 Multicast Router Discovery
31(1)
2.3.8 Neighbor Discovery Protocol
31(2)
2.3.9 Secure Neighbor Discovery (SEND)
33(1)
2.3.10 Inverse Neighbor Discovery
33(1)
2.3.11 Router Renumbering
34(1)
2.3.12 Node Information Query
34(1)
2.4 IPv6 Address Autoconfiguration
35(3)
2.4.1 Modified EUI-64 Interface Identifiers
36(1)
2.4.2 Duplicate Address Detection (DAD)
37(1)
2.5 Mobile IPv6
38(2)
2.6 Reserved Subnet Anycast Addresses
40(1)
2.7 Required Host IPv6 Addresses
41(1)
2.8 IPv6 Routing
41(2)
3 IPv4/IPv6 Co-Existence Technologies 43(48)
3.1 Dual Stack
44(5)
3.1.1 Implementing Dual Stack
44(1)
3.1.2 Which Address Is Used?
45(2)
3.1.3 DNS Considerations
47(1)
3.1.4 DHCP Considerations
48(1)
3.2 Tunneling Approaches
49(14)
3.2.1 Tunneling Scenarios for IPv6 Packets Over IPv4 Networks
49(2)
3.2.2 Tunnel Types
51(11)
3.2.3 Tunneling Scenario for IPv4 Packets Over IPv6 Networks
62(1)
3.2.4 Tunneling Summary
63(1)
3.3 Translation Approaches
63(15)
3.3.1 IP/ICMP Translation
65(7)
3.3.2 Bump in the Host (BIH)
72(2)
3.3.3 Network Address Translation for IPv6/IPv4 (NAT64)
74(1)
3.3.4 Other Translation Techniques
75(3)
3.4 Application Support of IPv6
78(1)
3.5 Service Provider IPv4/IPv6 Co-Existence
78(9)
3.5.1 Reference Architecture
79(1)
3.5.2 Deployment Approaches Overview
80(1)
3.5.3 Routing Infrastructure Deployment Approaches
80(7)
3.5.4 Comparison of Deployment Approaches
87(4)
3.6 Addressing and DNS Considerations
87(4)
4 IPv6 Readiness Assessment 91(18)
4.1 Putting a Plan in Place
92(1)
4.2 IP Network Inventory
93(13)
4.2.1 IPv6 Readiness
93(1)
4.2.2 Discovery
93(1)
4.2.3 IPv6 Assessment
94(12)
4.3 IPv6 to do List
106(1)
4.4 IPv6 Readiness Assessment Summary
106(3)
5 IPv6 Address Planning 109(18)
5.1 Internet Registries
109(3)
5.1.1 RIR Address Allocation Policies
111(1)
5.1.2 Address Allocation Efficiency
112(1)
5.2 IPv6 Address Planning
112(1)
5.3 IPv6 Address Allocation Methods
113(5)
5.3.1 Best-Fit Method
114(2)
5.3.2 Sparse Allocation Method
116(1)
5.3.3 Random Allocation
117(1)
5.3.4 DHCPv6 Prefix Delegation
118(1)
5.3.5 Unique Local Address Space
118(1)
5.4 Defining Your IPv6 Address Plan
118(4)
5.5 Multihoming and IP Address Space
122(3)
5.6 IP Address Planning Summary
125(2)
6 IPv6 Security Planning 127(22)
6.1 The Good News: IP Is IP
127(1)
6.2 The Bad News: IPv6 Is Not IPv4
128(1)
6.3 Update Your Security Policy
129(1)
6.4 Network Perimeter Monitoring and Intrusion Prevention
129(3)
6.4.1 IPv6 Address Filtering
130(1)
6.4.2 ICMPv6 Messages
131(1)
6.5 Extension Headers
132(1)
6.6 Internal Network Protection
133(4)
6.6.1 Network Reconnaissance
133(1)
6.6.2 Network Access
134(1)
6.6.3 DHCPv6
135(1)
6.6.4 DNS
135(1)
6.6.5 Anycast Addressing
136(1)
6.6.6 Internal Network Filtering
136(1)
6.7 Network Device Security Considerations
137(1)
6.8 Mobile IPv6 Security
138(6)
6.8.1 Mobility Extension Header
139(4)
6.8.2 Mobile IPv6 Vulnerabilities
143(1)
6.9 IPv4/IPv6 Coexistence Measures
144(4)
6.9.1 Securing Tunneling Implementations
145(1)
6.9.2 Securing Translation Implementations
146(2)
6.10 Summary
148(1)
7 IPv6 Network Management Planning 149(8)
7.1 Management Model
149(1)
7.2 Network Management Scope
150(2)
7.2.1 Network Inventory
150(1)
7.2.2 IP Address Inventory
151(1)
7.2.3 The Management Network
151(1)
7.3 The Simple Network Management Protocol (SNMP)
152(2)
7.3.1 Configuration Management
153(1)
7.3.2 Fault Management
153(1)
7.3.3 Accounting Management
154(1)
7.3.4 Performance Management
154(1)
7.4 Methods and Procedures
154(1)
7.5 Summary
155(2)
8 Managing The Deployment 157(6)
8.1 Integrating Plans
157(2)
8.2 Project Management
159(1)
8.3 Testing Deployment
160(1)
8.4 Production Deployment
161(2)
9 Managing The IPv4/IPv6 Network 163(22)
9.1 Common Network Management Tasks
163(1)
9.2 Configuration Management
163(13)
9.2.1 Network Allocation-Related Tasks
164(2)
9.2.2 Adding a New Device
166(1)
9.2.3 Deletion Tasks
167(1)
9.2.4 Address Renumbering or Movement Tasks
168(3)
9.2.5 Block/Subnet Splits
171(1)
9.2.6 Block/Subnet Joins
172(1)
9.2.7 DHCPv6 Server Configuration
173(1)
9.2.8 DNS Server Configuration
174(1)
9.2.9 Prefix Renumbering
175(1)
9.3 Fault Management
176(1)
9.3.1 Fault Detection
176(1)
9.3.2 Troubleshooting and Fault Resolution
177(1)
9.4 Accounting Management
177(4)
9.4.1 Inventory Assurance
177(3)
9.4.2 Address Reclamation
180(1)
9.5 Performance Management
181(2)
9.5.1 Services Monitoring
181(1)
9.5.2 Application Performance Management
182(1)
9.5.3 Auditing and Reporting
182(1)
9.6 Security Management
183(1)
9.7 Disaster Recovery/Business Continuity
183(2)
10 IPv6 And The Future Internet 185(6)
10.1 Technology Enablers
185(2)
10.2 The Internet's Dark Side
187(1)
10.3 The Internet's Bright Future
187(2)
10.3.1 Living Smarter
187(1)
10.3.2 Keeping Track
188(1)
10.3.3 Extensible Healthcare
188(1)
10.3.4 Public Safety
188(1)
10.3.5 Credit Cards of the Future
188(1)
10.3.6 Consumer Applications
188(1)
10.4 Conclusion
189(2)
Appendix 191(2)
Bibliography 193(6)
Index 199
MICHAEL DOOLEY is responsible for overall operations of the BT Diamond IP division. Prior to joining the team, he was president and CEO of Diamond IP Technologies; vice president of operations for the VitalSoft line of software products at Lucent Technologies; and Vice President of Engineering at Quadritek Systems.

TIMOTHY ROONEY managed the engineering development and market introduction of BT Diamond IP's four next-generation IP management systems: NetControl, IPControl, Sapphire Appliances, and ImageControl. Prior to that, he worked at AT&T Bell Laboratories, Cingular, Triton PCS, and Lucent, including a leadership role managing the VitalQIP software product to its peak as market leader. Timothy Rooney is the author of IP Address Management Principles and Practice and Introduction to IP Address Management, both published by Wiley-IEEE Press.

Includes an introduction by Vint Cerf, VP and Chief Internet Evangelist for Google.