Fiveable

📡Systems Approach to Computer Networks Unit 11 Review

QR code for Systems Approach to Computer Networks practice questions

11.2 IPv6 and Transition Mechanisms

11.2 IPv6 and Transition Mechanisms

Written by the Fiveable Content Team • Last updated August 2025
Written by the Fiveable Content Team • Last updated August 2025
📡Systems Approach to Computer Networks
Unit & Topic Study Guides

IPv6 Fundamentals

IPv6 replaces IPv4's 32-bit addressing with a 128-bit address space, providing roughly 3.4×10383.4 \times 10^{38} unique addresses. Beyond solving address exhaustion, IPv6 introduces a streamlined header, built-in security, and auto-configuration features that make it well suited for modern networks and the Internet of Things.

IPv6 Header Structure

IPv4 vs. IPv6 Headers

The IPv6 header is a fixed 40 bytes, which is a deliberate simplification over IPv4's variable-length header. A fixed size means routers don't need to parse options or compute header length on every hop, which speeds up forwarding.

IPv6 header fields:

  • Version — set to 6
  • Traffic Class (8 bits) — used for Differentiated Services (DSCP) and Explicit Congestion Notification (ECN)
  • Flow Label (20 bits) — identifies a specific traffic flow so routers can apply per-flow QoS handling without inspecting upper-layer headers
  • Payload Length (16 bits) — length of everything after the 40-byte header
  • Next Header (8 bits) — identifies what follows the IPv6 header (e.g., TCP, UDP, or an extension header)
  • Hop Limit (8 bits) — decremented by 1 at each router; packet is discarded when it reaches 0 (same role as IPv4's TTL)
  • Source Address (128 bits)
  • Destination Address (128 bits)

Fields removed from IPv4 and why:

Removed FieldReason
Header LengthNot needed because the IPv6 header is always 40 bytes
Identification, Flags, Fragment OffsetFragmentation is now handled only by the source host using an extension header, not by intermediate routers
Header ChecksumRemoved to reduce per-hop processing; link-layer and transport-layer checksums already catch errors
OptionsReplaced by a chain of extension headers, which are more flexible and only processed when needed
IPv4 vs IPv6 header structures, IPsec

Advantages of IPv6

Massive address space. With 21282^{128} possible addresses (approximately 3.4×10383.4 \times 10^{38}), IPv6 eliminates the address exhaustion problem that forced IPv4 networks to rely heavily on NAT.

Mandatory IPsec support. IPv6 was designed with IPsec as a core component, providing encryption (ESP) and authentication (AH) at the network layer. In practice, IPsec is available on all IPv6 implementations, though its actual use is still optional per deployment.

Simplified header. The fixed-length header with fewer fields reduces processing overhead at each router, improving forwarding efficiency.

Flow Label for QoS. The 20-bit Flow Label field lets routers identify and prioritize traffic flows without deep packet inspection.

Stateless Address Autoconfiguration (SLAAC). Hosts can generate their own IPv6 addresses using Router Advertisement messages and their interface identifier. This removes the strict dependency on DHCP, though DHCPv6 is still available when more control is needed.

Better multicast. IPv6 has no broadcast. Instead, multicast is built directly into the addressing architecture, enabling efficient one-to-many delivery. Neighbor discovery, for example, uses multicast rather than broadcast.

Transition Mechanisms and IoT

IPv4 vs IPv6 header structures, File:IPv6 vs IPv4.jpg - Wikipedia

IPv4 to IPv6 Transition Mechanisms

IPv4 and IPv6 are not directly compatible, so the internet can't switch overnight. Three main strategies allow gradual migration:

1. Dual Stack

Devices run both IPv4 and IPv6 protocol stacks at the same time. The OS and applications choose which protocol to use based on what the destination supports (typically preferring IPv6 when available). This is the most straightforward approach, but it requires maintaining two complete protocol stacks and two sets of routing infrastructure.

2. Tunneling

IPv6 packets are encapsulated inside IPv4 packets so they can traverse IPv4-only networks. Think of it as putting an IPv6 "letter" inside an IPv4 "envelope." Several tunneling methods exist:

  • 6in4 — static point-to-point tunnels configured manually between two endpoints
  • 6to4 — automatic tunneling that connects isolated IPv6 networks ("islands") across the IPv4 internet using a special 2002::/162002::/16 prefix
  • 6rd (IPv6 Rapid Deployment) — used by ISPs to quickly offer IPv6 to customers by embedding the customer's IPv4 address into an IPv6 prefix
  • Teredo — designed to tunnel IPv6 through IPv4 NAT devices, which is useful when the host sits behind a NAT gateway that blocks other tunnel types

3. Translation (NAT64 / DNS64)

Translation rewrites packet headers to convert between IPv4 and IPv6. This is necessary when an IPv6-only client needs to reach an IPv4-only server (or vice versa).

  • NAT64 translates between IPv6 and IPv4 at a gateway, mapping IPv6 addresses to IPv4 addresses.
  • DNS64 works alongside NAT64 by synthesizing AAAA (IPv6) DNS records from A (IPv4) records. When an IPv6-only client queries a domain that has only an IPv4 address, DNS64 returns a synthetic IPv6 address that routes through the NAT64 gateway.

IPv6 for the Internet of Things

IoT deployments can involve millions of sensors, actuators, and embedded devices. IPv6 addresses several challenges that IPv4 handles poorly at this scale:

  • Unique addressing without NAT. The enormous address space means every IoT device can have a globally routable address, simplifying end-to-end communication and removing the complexity of NAT traversal.
  • Zero-touch configuration with SLAAC. Devices can self-assign addresses as soon as they join a network, which is critical when deploying thousands of sensors that can't be configured manually.
  • Efficient group communication. Built-in multicast supports service discovery and simultaneous data delivery to groups of devices without flooding the entire network.
  • Security via IPsec. End-to-end encryption and authentication protect communication between constrained devices and cloud servers, ensuring data confidentiality and integrity.
  • 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks). This adaptation layer compresses IPv6 headers to fit within the small frame sizes of low-power, low-bandwidth wireless links (like IEEE 802.15.4). It enables resource-constrained devices such as battery-powered sensors and actuators to participate directly in IPv6 networks.