Parts of this article (those related to RFC 8200 and RFC 8201) need to be updated. Please help update this article to reflect recent events or newly available information.(July 2017)
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion, and was intended to replace IPv4.[1] In December 1998, IPv6 became a Draft Standard for the IETF,[2] which subsequently ratified it as an Internet Standard on 14 July 2017.[3][4]
Devices on the Internet are assigned a unique IP address for identification and location definition. With the rapid growth of the Internet after commercialization in the 1990s, it became evident that far more addresses would be needed to connect devices than the IPv4 address space had available. By 1998, the IETF had formalized the successor protocol. IPv6 uses 128-bit addresses, theoretically allowing 2128, or approximately 3.4×1038 total addresses. The actual number is slightly smaller, as multiple ranges are reserved for special usage or completely excluded from general use. The two protocols are not designed to be interoperable, and thus direct communication between them is impossible, complicating the move to IPv6. However, several transition mechanisms have been devised to rectify this.
IPv6 provides other technical benefits in addition to a larger addressing space. In particular, it permits hierarchical address allocation methods that facilitate route aggregation across the Internet, and thus limit the expansion of routing tables. The use of multicast addressing is expanded and simplified, and provides additional optimization for the delivery of services. Device mobility, security, and configuration aspects have been considered in the design of the protocol.
IPv6 addresses are represented as eight groups of four hexadecimal digits each, separated by colons. The full representation may be shortened; for example, 2001:0db8:0000:0000:0000:8a2e:0370:7334 becomes 2001:db8::8a2e:370:7334.
In addition to offering more addresses, IPv6 also implements features not present in IPv4. It simplifies aspects of address configuration, network renumbering, and router announcements when changing network connectivity providers. It simplifies packet processing in routers by placing the responsibility for packet fragmentation in the end points. The IPv6 subnet size is standardized by fixing the size of the host identifier portion of an address to 64 bits.
The addressing architecture of IPv6 is defined in RFC4291 and allows three different types of transmission: unicast, anycast and multicast.[5]: 210
Internet Protocol Version 4 (IPv4) was the first publicly used version of the Internet Protocol. IPv4 was developed as a research project by the Defense Advanced Research Projects Agency (DARPA), a United States Department of Defenseagency, before becoming the foundation for the Internet and the World Wide Web. IPv4 includes an addressing system that uses numerical identifiers consisting of 32 bits. These addresses are typically displayed in dot-decimal notation as decimal values of four octets, each in the range 0 to 255, or 8 bits per number. Thus, IPv4 provides an addressing capability of 232 or approximately 4.3 billion addresses. Address exhaustion was not initially a concern in IPv4 as this version was originally presumed to be a test of DARPA's networking concepts.[6] During the first decade of operation of the Internet, it became apparent that methods had to be developed to conserve address space. In the early 1990s, even after the redesign of the addressing system using a classless network model, it became clear that this would not suffice to prevent IPv4 address exhaustion, and that further changes to the Internet infrastructure were needed.[7]
RIPE NCC announced that it had fully run out of IPv4 addresses on 25 November 2019,[13] and called for greater progress on the adoption of IPv6.
Comparison with IPv4
On the Internet, data is transmitted in the form of network packets. IPv6 specifies a new packet format, designed to minimize packet header processing by routers.[2][14] Because the headers of IPv4 packets and IPv6 packets are significantly different, the two protocols are not interoperable. However, most transport and application-layer protocols need little or no change to operate over IPv6; exceptions are application protocols that embed Internet-layer addresses, such as File Transfer Protocol (FTP) and Network Time Protocol (NTP), where the new address format may cause conflicts with existing protocol syntax.
Larger address space
The main advantage of IPv6 over IPv4 is its larger address space. The size of an IPv6 address is 128 bits, compared to 32 bits in IPv4.[2] The address space therefore has 2128=340,282,366,920,938,463,463,374,607,431,768,211,456 addresses (340 undecillion, approximately 3.4×1038). Some blocks of this space and some specific addresses are reserved for special uses.
While this address space is very large, it was not the intent of the designers of IPv6 to assure geographical saturation with usable addresses. Rather, the longer addresses simplify allocation of addresses, enable efficient route aggregation, and allow implementation of special addressing features. In IPv4, complex Classless Inter-Domain Routing (CIDR) methods were developed to make the best use of the small address space. The standard size of a subnet in IPv6 is 264 addresses, about four billion times the size of the entire IPv4 address space. Thus, actual address space utilization will be small in IPv6, but network management and routing efficiency are improved by the large subnet space and hierarchical route aggregation.
Multicasting
Multicasting, the transmission of a packet to multiple destinations in a single send operation, is part of the base specification in IPv6. In IPv4 this is an optional (although commonly implemented) feature.[15] IPv6 multicast addressing has features and protocols in common with IPv4 multicast, but also provides changes and improvements by eliminating the need for certain protocols. IPv6 does not implement traditional IP broadcast, i.e. the transmission of a packet to all hosts on the attached link using a special broadcast address, and therefore does not define broadcast addresses. In IPv6, the same result is achieved by sending a packet to the link-local all nodes multicast group at address ff02::1, which is analogous to IPv4 multicasting to address 224.0.0.1. IPv6 also provides for new multicast implementations, including embedding rendezvous point addresses in an IPv6 multicast group address, which simplifies the deployment of inter-domain solutions.[16]
In IPv4 it is very difficult for an organization to get even one globally routable multicast group assignment, and the implementation of inter-domain solutions is arcane.[17] Unicast address assignments by a local Internet registry for IPv6 have at least a 64-bit routing prefix, yielding the smallest subnet size available in IPv6 (also 64 bits). With such an assignment it is possible to embed the unicast address prefix into the IPv6 multicast address format, while still providing a 32-bit block, the least significant bits of the address, or approximately 4.2 billion multicast group identifiers. Thus each user of an IPv6 subnet automatically has available a set of globally routable source-specific multicast groups for multicast applications.[18]
IPv6 hosts configure themselves automatically. Every interface has a self-generated link-local address and, when connected to a network, conflict resolution is performed and routers provide network prefixes via router advertisements.[19] Stateless configuration of routers can be achieved with a special router renumbering protocol.[20] When necessary, hosts may configure additional stateful addresses via Dynamic Host Configuration Protocol version 6 (DHCPv6) or static addresses manually.
Like IPv4, IPv6 supports globally unique IP addresses. The design of IPv6 intended to re-emphasize the end-to-end principle of network design that was originally conceived during the establishment of the early Internet by rendering network address translation obsolete. Therefore, every device on the network is globally addressable directly from any other device.
A stable, unique, globally addressable IP address would facilitate tracking a device across networks. Therefore, such addresses are a particular privacy concern for mobile devices, such as laptops and cell phones.[21]
To address these privacy concerns, the SLAAC protocol includes what are typically called "privacy addresses" or, more correctly, "temporary addresses".[22] Temporary addresses are random and unstable. A typical consumer device generates a new temporary address daily and will ignore traffic addressed to an old address after one week. Temporary addresses are used by default by Windows since XP SP1,[23] macOS since (Mac OS X) 10.7, Android since 4.0, and iOS since version 4.3. Use of temporary addresses by Linux distributions varies.[24]
Renumbering an existing network for a new connectivity provider with different routing prefixes is a major effort with IPv4.[25][26][27] With IPv6, however, changing the prefix announced by a few routers can in principle renumber an entire network, since the host identifiers (the least-significant 64 bits of an address) can be independently self-configured by a host.[19]
The SLAAC address generation method is implementation-dependent. IETF recommends that addresses be deterministic but semantically opaque.[28]
IPsec
Internet Protocol Security (IPsec) was originally developed for IPv6, but found widespread deployment first in IPv4, for which it was re-engineered. IPsec was a mandatory part of all IPv6 protocol implementations,[2] and Internet Key Exchange (IKE) was recommended, but with RFC 6434 the inclusion of IPsec in IPv6 implementations was downgraded to a recommendation because it was considered impractical to require full IPsec implementation for all types of devices that may use IPv6. However, as of RFC 4301 IPv6 protocol implementations that do implement IPsec need to implement IKEv2 and need to support a minimum set of cryptographic algorithms. This requirement will help to make IPsec implementations more interoperable between devices from different vendors. The IPsec Authentication Header (AH) and the Encapsulating Security Payload header (ESP) are implemented as IPv6 extension headers.[29]
Simplified processing by routers
The packet header in IPv6 is simpler than the IPv4 header. Many rarely used fields have been moved to optional header extensions. The IPv6 packet header has simplified the process of packet forwarding by routers. Although IPv6 packet headers are at least twice the size of IPv4 packet headers, processing of packets that only contain the base IPv6 header by routers may, in some cases, be more efficient, because less processing is required in routers due to the headers being aligned to match common word sizes.[2][14] However, many devices implement IPv6 support in software (as opposed to hardware), thus resulting in very bad packet processing performance.[30] Additionally, for many implementations, the use of Extension Headers causes packets to be processed by a router's CPU, leading to poor performance or even security issues.[31]
Moreover, an IPv6 header does not include a checksum. The IPv4 header checksum is calculated for the IPv4 header, and has to be recalculated by routers every time the time to live (called hop limit in the IPv6 protocol) is reduced by one. The absence of a checksum in the IPv6 header furthers the end-to-end principle of Internet design, which envisioned that most processing in the network occurs in the leaf nodes. Integrity protection for the data that is encapsulated in the IPv6 packet is assumed to be assured by both the link layer or error detection in higher-layer protocols, namely the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) on the transport layer. Thus, while IPv4 allowed UDP datagram headers to have no checksum (indicated by 0 in the header field), IPv6 requires a checksum in UDP headers.
Unlike mobile IPv4, mobile IPv6 avoids triangular routing and is therefore as efficient as native IPv6. IPv6 routers may also allow entire subnets to move to a new router connection point without renumbering.[32]
Extension headers
The IPv6 packet header has a minimum size of 40 octets (320 bits). Options are implemented as extensions. This provides the opportunity to extend the protocol in the future without affecting the core packet structure.[2] However, RFC 7872 notes that some network operators drop IPv6 packets with extension headers when they traverse transit autonomous systems.
Jumbograms
IPv4 limits packets to 65,535 (216−1) octets of payload. An IPv6 node can optionally handle packets over this limit, referred to as jumbograms, which can be as large as 4,294,967,295 (232−1) octets. The use of jumbograms may improve performance over high-MTU links. The use of jumbograms is indicated by the Jumbo Payload Option extension header.[33]
The header consists of a fixed portion with minimal functionality required for all packets and may be followed by optional extensions to implement special features.
The fixed header occupies the first 40 octets (320 bits) of the IPv6 packet. It contains the source and destination addresses, traffic class, hop count, and the type of the optional extension or payload which follows the header. This Next Header field tells the receiver how to interpret the data which follows the header. If the packet contains options, this field contains the option type of the next option. The "Next Header" field of the last option points to the upper-layer protocol that is carried in the packet's payload.
Extension headers carry options that are used for special treatment of a packet in the network, e.g., for routing, fragmentation, and for security using the IPsec framework.
Without special options, a payload must be less than 64kB. With a Jumbo Payload option (in a Hop-By-Hop Options extension header), the payload must be less than 4 GB.
Unlike with IPv4, routers never fragment a packet. Hosts are expected to use Path MTU Discovery to make their packets small enough to reach the destination without needing to be fragmented. See IPv6 packet fragmentation.
IPv6 addresses have 128 bits. The design of the IPv6 address space implements a different design philosophy than in IPv4, in which subnetting was used to improve the efficiency of utilization of the small address space. In IPv6, the address space is deemed large enough for the foreseeable future, and a local area subnet always uses 64 bits for the host portion of the address, designated as the interface identifier, while the most-significant 64 bits are used as the routing prefix.[36]: 9 While the myth has existed regarding IPv6 subnets being impossible to scan, RFC 7707 notes that patterns resulting from some IPv6 address configuration techniques and algorithms allow address scanning in many real-world scenarios.
Address representation
The 128 bits of an IPv6 address are represented in 8 groups of 16 bits each. Each group is written as four hexadecimal digits (sometimes called hextets[37][38] or more formally hexadectets[39] and informally a quibble or quad-nibble[39]) and the groups are separated by colons (:). An example of this representation is 2001:0db8:0000:0000:0000:ff00:0042:8329.
For convenience and clarity, the representation of an IPv6 address may be shortened with the following rules:
One or more leading zeros from any group of hexadecimal digits are removed, which is usually done to all of the leading zeros. For example, the group 0042 is converted to 42. The group 0000 is converted to 0.
Consecutive sections of zeros are replaced with two colons (::). This may only be used once in an address, as multiple use would render the address indeterminate. A double colon should not be used to denote an omitted single section of zeros.[40]: §4.2.2
Because IPv6 addresses contain colons, and URLs use colons to separate the host from the port number, an IPv6 address used as the host-part of a URL should be enclosed in square brackets,[42] e.g. http://[2001:db8:4006:812::200e] or http://[2001:db8:4006:812::200e]:8080/path/page.html.
Link-local address
All interfaces of IPv6 hosts require a link-local address, which have the prefix fe80::/10. This prefix is followed by 54 bits that can be used for subnetting, although they are typically set to zeros, and a 64-bit interface identifier. The host can compute and assign the Interface identifier by itself without the presence or cooperation of an external network component like a DHCP server, in a process called link-local address autoconfiguration.[citation needed]
The lower 64 bits of the link-local address (the suffix) were originally derived from the MAC address of the underlying network interface card. As this method of assigning addresses would cause undesirable address changes when faulty network cards were replaced, and as it also suffered from a number of security and privacy issues, RFC8064 has replaced the original MAC-based method with the hash-based method specified in RFC7217.[citation needed]
Address uniqueness and router solicitation
IPv6 uses a new mechanism for mapping IP addresses to link-layer addresses (e.g. MAC addresses), because it does not support the broadcast addressing method, on which the functionality of the Address Resolution Protocol (ARP) in IPv4 is based. IPv6 implements the Neighbor Discovery Protocol (NDP, ND) in the link layer, which relies on ICMPv6 and multicast transmission.[5]: 210 IPv6 hosts verify the uniqueness of their IPv6 addresses in a local area network (LAN) by sending a neighbor solicitation message asking for the link-layer address of the IP address. If any other host in the LAN is using that address, it responds.[43]
A host bringing up a new IPv6 interface first generates a unique link-local address using one of several mechanisms designed to generate a unique address. Should a non-unique address be detected, the host can try again with a newly generated address. Once a unique link-local address is established, the IPv6 host determines whether the LAN is connected on this link to any router interface that supports IPv6. It does so by sending out an ICMPv6 router solicitation message to the all-routers[44] multicast group with its link-local address as source. If there is no answer after a predetermined number of attempts, the host concludes that no routers are connected. If it does get a response, known as a router advertisement, from a router, the response includes the network configuration information to allow establishment of a globally unique address with an appropriate unicast network prefix.[45] There are also two flag bits that tell the host whether it should use DHCP to get further information and addresses:
The Manage bit, which indicates whether or not the host should use DHCP to obtain additional addresses rather than rely on an auto-configured address from the router advertisement.
The Other bit, which indicates whether or not the host should obtain other information through DHCP. The other information consists of one or more prefix information options for the subnets that the host is attached to, a lifetime for the prefix, and two flags:[43]
On-link: If this flag is set, the host will treat all addresses on the specific subnet as being on-link and send packets directly to them instead of sending them to a router for the duration of the given lifetime.
Address: This flag tells the host to actually create a global address.
Global addressing
The assignment procedure for global addresses is similar to local-address construction. The prefix is supplied from router advertisements on the network. Multiple prefix announcements cause multiple addresses to be configured.[43]
Stateless address autoconfiguration (SLAAC) requires a /64 address block.[36]Local Internet registries are assigned at least /32 blocks, which they divide among subordinate networks.[46] The initial recommendation of September 2001 stated assignment of a /48 subnet to end-consumer sites.[47] In March 2011 this recommendation was refined:[48] The IETF "recommends giving home sites significantly more than a single /64, but does not recommend that every home site be given a /48 either". Blocks of /56s are specifically considered. It remains to be seen whether ISPs will honor this recommendation. For example, during initial trials, Comcast customers were given a single /64 network.[49]
IPv6 in the Domain Name System
In the Domain Name System (DNS), hostnames are mapped to IPv6 addresses by AAAA ("quad-A") resource records. For reverse resolution, the IETF reserved the domain ip6.arpa, where the name space is hierarchically divided by the 1-digit hexadecimal representation of nibble units (4 bits) of the IPv6 address. This scheme is defined in RFC3596.
When a dual-stack host queries a DNS server to resolve a fully qualified domain name (FQDN), the DNS client of the host sends two DNS requests, one querying A records and the other querying AAAA records. The host operating system may be configured with a preference for address selection rules RFC6724.[50]
An alternative record type was used in early DNS implementations for IPv6, designed to facilitate network renumbering, the A6 records for the forward lookup and a number of other innovations such as bit-string labels and DNAME records. It is defined in RFC2874 and its references (with further discussion of the pros and cons of both schemes in RFC3364), but has been deprecated to experimental status (RFC3363).
IPv6 is not foreseen to supplant IPv4 instantaneously. Both protocols will continue to operate simultaneously for some time. Therefore, IPv6 transition mechanisms are needed to enable IPv6 hosts to reach IPv4 services and to allow isolated IPv6 hosts and networks to reach each other over IPv4 infrastructure.[51]
According to Silvia Hagen, a dual-stack implementation of the IPv4 and IPv6 on devices is the easiest way to migrate to IPv6.[52] Many other transition mechanisms use tunneling to encapsulate IPv6 traffic within IPv4 networks and vice versa. This is an imperfect solution, which reduces the maximum transmission unit (MTU) of a link and therefore complicates Path MTU Discovery, and may increase latency.[53][54]
Dual-stack IP implementation
Dual-stack IP implementations provide complete IPv4 and IPv6 protocol stacks in the operating system of a computer or network device on top of the common physical layer implementation, such as Ethernet. This permits dual-stack hosts to participate in IPv6 and IPv4 networks simultaneously.[55]
A device with dual-stack implementation in the operating system has an IPv4 and IPv6 address, and can communicate with other nodes in the LAN or the Internet using either IPv4 or IPv6. The DNS protocol is used by both IP protocols to resolve fully qualified domain names and IP addresses, but dual stack requires that the resolving DNS server can resolve both types of addresses. Such a dual-stack DNS server holds IPv4 addresses in the A records and IPv6 addresses in the AAAA records. Depending on the destination that is to be resolved, a DNS name server may return an IPv4 or IPv6 IP address, or both. A default address selection mechanism, or preferred protocol, needs to be configured either on hosts or the DNS server. The IETF has published Happy Eyeballs to assist dual-stack applications, so that they can connect using both IPv4 and IPv6, but prefer an IPv6 connection if it is available. However, dual-stack also needs to be implemented on all routers between the host and the service for which the DNS server has returned an IPv6 address. Dual-stack clients should be configured to prefer IPv6 only if the network is able to forward IPv6 packets using the IPv6 versions of routing protocols. When dual-stack network protocols are in place the application layer can be migrated to IPv6.[56]
While dual-stack is supported by major operating system and network device vendors, legacy networking hardware and servers do not support IPv6.
ISP customers with public-facing IPv6
Internet service providers (ISPs) are increasingly providing their business and private customers with public-facing IPv6 global unicast addresses. If IPv4 is still used in the local area network (LAN), however, and the ISP can only provide one public-facing IPv6 address, the IPv4 LAN addresses are translated into the public facing IPv6 address using NAT64, a network address translation (NAT) mechanism. Some ISPs cannot provide their customers with public-facing IPv4 and IPv6 addresses, thus supporting dual-stack networking, because some ISPs have exhausted their globally routable IPv4 address pool. Meanwhile, ISP customers are still trying to reach IPv4 web servers and other destinations.[57]
While some ISPs still allocate customers only IPv4 addresses, many ISPs allocate their customers only an IPv6 or dual-stack IPv4 and IPv6. ISPs report the share of IPv6 traffic from customers over their network to be anything between 20% and 40%, but by mid-2017 IPv6 traffic still only accounted for a fraction of total traffic at several large Internet exchange points (IXPs). AMS-IX reported it to be 2% and SeattleIX reported 7%. A 2017 survey found that many DSL customers that were served by a dual stack ISP did not request DNS servers to resolve fully qualified domain names into IPv6 addresses. The survey also found that the majority of traffic from IPv6-ready web-server resources were still requested and served over IPv4, mostly due to ISP customers that did not use the dual stack facility provided by their ISP and to a lesser extent due to customers of IPv4-only ISPs.[59]
Tunneling
The technical basis for tunneling, or encapsulating IPv6 packets in IPv4 packets, is outlined in RFC 4213. When the Internet backbone was IPv4-only, one of the frequently used tunneling protocols was 6to4.[60]Teredo tunneling was also frequently used for integrating IPv6 LANs with the IPv4 Internet backbone. Teredo is outlined in RFC 4380 and allows IPv6 local area networks to tunnel over IPv4 networks, by encapsulating IPv6 packets within UDP. The Teredo relay is an IPv6 router that mediates between a Teredo server and the native IPv6 network. It was expected that 6to4 and Teredo would be widely deployed until ISP networks would switch to native IPv6, but by 2014 Google Statistics showed that the use of both mechanisms had dropped to almost 0.[61]
IPv4-mapped IPv6 addresses
Hybrid dual-stack IPv6/IPv4 implementations recognize a special class of addresses, the IPv4-mapped IPv6 addresses.[62]: §2.2.3 [36] These addresses are typically written with a 96-bit prefix in the standard IPv6 format, and the remaining 32 bits are written in the customary dot-decimal notation of IPv4.
Addresses in this group consist of an 80-bit prefix of zeros, the next 16 bits are ones, and the remaining, least-significant 32 bits contain the IPv4 address. For example, ::ffff:192.0.2.128 represents the IPv4 address 192.0.2.128. A previous format, called "IPv4-compatible IPv6 address", was ::192.0.2.128; however, this method is deprecated.[36]
Because of the significant internal differences between IPv4 and IPv6 protocol stacks, some of the lower-level functionality available to programmers in the IPv6 stack does not work the same when used with IPv4-mapped addresses. Some common IPv6 stacks do not implement the IPv4-mapped address feature, either because the IPv6 and IPv4 stacks are separate implementations (e.g., Microsoft Windows 2000, XP, and Server 2003), or because of security concerns (OpenBSD).[63] On these operating systems, a program must open a separate socket for each IP protocol it uses. On some systems, e.g., the Linux kernel, NetBSD, and FreeBSD, this feature is controlled by the socket option IPV6_V6ONLY.[64]: 22
The address prefix 64:ff9b::/96 is a class of IPv4-embedded IPv6 addresses for use in NAT64 transition methods.[65] For example, 64:ff9b::192.0.2.128 represents the IPv4 address 192.0.2.128.
Security
A number of security implications may arise from the use of IPv6. Some of them may be related with the IPv6 protocols themselves, while others may be related with implementation flaws.[66][67]
Shadow networks
The addition of nodes having IPv6 enabled by default by the software manufacturer may result in the inadvertent creation of shadow networks, causing IPv6 traffic flowing into networks having only IPv4 security management in place. This may also occur with operating system upgrades, when the newer operating system enables IPv6 by default, while the older one did not. Failing to update the security infrastructure to accommodate IPv6 can lead to IPv6 traffic bypassing it.[68] Shadow networks have occurred on business networks in which enterprises are replacing Windows XP systems that do not have an IPv6 stack enabled by default, with Windows 7 systems, that do.[69] Some IPv6 stack implementors have therefore recommended disabling IPv4 mapped addresses and instead using a dual-stack network where supporting both IPv4 and IPv6 is necessary.[70]
IPv6 packet fragmentation
Research has shown that the use of fragmentation can be leveraged to evade network security controls, similar to IPv4. As a result, RFC7112 requires that the first fragment of an IPv6 packet contains the entire IPv6 header chain, such that some very pathological fragmentation cases are forbidden. Additionally, as a result of research on the evasion of RA-Guard in RFC7113, RFC6980 has deprecated the use of fragmentation with Neighbor Discovery, and discouraged the use of fragmentation with Secure Neighbor Discovery (SEND).
Standardization through RFCs
Working-group proposals
Due to the anticipated global growth of the Internet, the Internet Engineering Task Force (IETF) in the early 1990s started an effort to develop a next generation IP protocol.[5]: 209 By the beginning of 1992, several proposals appeared for an expanded Internet addressing system and by the end of 1992 the IETF announced a call for white papers.[71] In September 1993, the IETF created a temporary, ad hoc IP Next Generation (IPng) area to deal specifically with such issues. The new area was led by Allison Mankin and Scott Bradner, and had a directorate with 15 engineers from diverse backgrounds for direction-setting and preliminary document review:[7][72] The working-group members were J. Allard (Microsoft), Steve Bellovin (AT&T), Jim Bound (Digital Equipment Corporation), Ross Callon (Wellfleet), Brian Carpenter (CERN), Dave Clark (MIT), John Curran (NEARNET), Steve Deering (Xerox), Dino Farinacci (Cisco), Paul Francis (NTT), Eric Fleischmann (Boeing), Mark Knopper (Ameritech), Greg Minshall (Novell), Rob Ullmann (Lotus), and Lixia Zhang (Xerox).[73]
The Internet Engineering Task Force adopted the IPng model on 25 July 1994, with the formation of several IPng working groups.[7] By 1996, a series of RFCs was released defining Internet Protocol version 6 (IPv6), starting with RFC1883. (Version 5 was used by the experimental Internet Stream Protocol.)
RFC standardization
The first RFC to standardize IPv6 was the RFC1883 in 1995,[74] which became obsoleted by RFC2460 in 1998.[5]: 209 In July 2017 this RFC was superseded by RFC8200, which elevated IPv6 to "Internet Standard" (the highest maturity level for IETF protocols).[3]
Universities were among the early adopters of IPv6. Virginia Tech deployed IPv6 at a trial location in 2004 and later expanded IPv6 deployment across the campus network. By 2016, 82% of the traffic on their network used IPv6. Imperial College London began experimental IPv6 deployment in 2003 and by 2016 the IPv6 traffic on their networks averaged between 20% and 40%. A significant portion of this IPv6 traffic was generated through their high energy physics collaboration with CERN, which relies entirely on IPv6.[75]
By 2011, all major operating systems in use on personal computers and server systems had production-quality IPv6 implementations. Cellular telephone systems presented a large deployment field for Internet Protocol devices as mobile telephone service made the transition from 3G to 4G technologies, in which voice is provisioned as a voice over IP (VoIP) service that would leverage IPv6 enhancements. In 2009, the US cellular operator Verizon released technical specifications for devices to operate on its "next-generation" networks.[78] The specification mandated IPv6 operation according to the 3GPP Release 8 Specifications (March 2009), and deprecated IPv4 as an optional capability.[78]
The deployment of IPv6 in the Internet backbone continued. In 2018 only 25.3% of the about 54,000 autonomous systems advertised both IPv4 and IPv6 prefixes in the global Border Gateway Protocol (BGP) routing database. A further 243 networks advertised only an IPv6 prefix. Internet backbone transit networks offering IPv6 support existed in every country globally, except in parts of Africa, the Middle East and China.[79]: 6 By mid-2018 some major European broadband ISPs had deployed IPv6 for the majority of their customers. Sky UK provided over 86% of its customers with IPv6, Deutsche Telekom had 56% deployment of IPv6, XS4ALL in the Netherlands had 73% deployment and in Belgium the broadband ISPs VOO and Telenet had 73% and 63% IPv6 deployment respectively.[79]: 7 In the United States the broadband ISP Xfinity had an IPv6 deployment of about 66%. In 2018 Xfinity reported an estimated 36.1 million IPv6 users, while AT&T reported 22.3 million IPv6 users.[79]: 7–8
^ abcNarten, T. (August 1999). "Neighbor discovery and stateless autoconfiguration in IPv6". IEEE Internet Computing. 3 (4): 54–62. doi:10.1109/4236.780961.
Ranuccio Farnese, O.S.Io.Hieros.cardinale di Santa Romana ChiesaRitratto di Ranuccio Farnese in abito di Cavaliere di Malta di Tiziano, 1542. Oggi questo dipinto è conservato nella National Gallery of Art, Washington Incarichi ricoperti Amministratore apostolico di Napoli (1544-1549) Cardinale diacono di Santa Lucia in Silice (1546) Legato apostolico della Marca Anconitana (1546-1547) Patriarca titolare di Costantinopoli (1546-1550) (1554-1565) Cardinale diacono di Sant'Angelo in Pesch...
Diogo Flaínez Período fl. 1047 - 1048 Consorte ? Rodrigues Descendência Rodrigo Dias de Vivar Casa Flaínez Diogo Flaínez (em castelhano: Diego Flaínez e em latim: Didaco Flaginiz[a]; fl. 1047 -1048) foi um nobre, membro do poderoso linhagem leões dos Flaínez e o pai de O Cid ou El Cid. Foi filho do conde Flaín Munhoz e de Justa Fernandes de Cea, filha do conde Fernando Bermudes.[1][b] Teve vários irmãos, incluindo o conde Fernando Flaínez, o avô de Jimena Dias, mulher de O Cid.[2...
Osberghausen Gemeinde Engelskirchen Koordinaten: 51° 0′ N, 7° 30′ O50.9938888888897.4922222222222162Koordinaten: 50° 59′ 38″ N, 7° 29′ 32″ O Höhe: 162 (150–210) m ü. NHN Einwohner: 1023 (31. Dez. 2009) Postleitzahl: 51766 Vorwahl: 02262 Osberghausen (Engelskirchen) Lage von Osberghausen in Engelskirchen Osberghausen (1980) Ehemalige evangelische Kirche Osberghausen Osberghausen (2014) aus Richt...
Chinese Han dynasty warlord (died 212) Ma Teng馬騰A Qing dynasty illustration of Ma TengMinister of the Guards (衛尉)In office208 (208)–211 (211)MonarchEmperor Xian of HanChancellorCao CaoGeneral of the Vanguard (前將軍)In office208MonarchEmperor Xian of HanGeneral Who Attacks the South (征南將軍)In office202 (202)–208 (208)MonarchEmperor Xian of HanGeneral Who Pacifies the Di (安狄將軍)In office195 (195)–202 (202)MonarchEmperor Xian of HanGe...
هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (يونيو 2019) ستيفن كورتني معلومات شخصية الميلاد سنة 1955 (العمر 67–68 سنة) مواطنة الولايات المتحدة الحياة العملية المهنة عالم بيئة تعديل مصدري - تعديل ستيفن كو
Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada Februari 2023. Rumah Sakit Umum Daerah LaswiGeografiLokasiJalan Cipaku No.87, Paseh, Kabupaten Bandung., Jawa Barat, IndonesiaKoordinatKoordinat: 7°2′54″S 107°46′19″W / 7.04833°S 107.77194°W / -7.04833; -107.77194OrganisasiJenisBP...
Het VaderlandEdisi tanggal 9 Januari 1942TipeSurat kabarDidirikan12 April 1869Pandangan politikProgresif-liberalBahasaBelandaBerhenti publikasi14 Agustus 1982PusatDen Haag Het Vaderland, adalah sebuah surat kabar malam hari Belanda yang terbit tahun 1869 hingga 1982 di Den Haag dan berpusat di Parkstraat 25. Periode awal Het Vaderland 1982 Pendiri surat kabar ini adalah penerbit Albertus Willem Sijthoff (setelah tahun 1883 terlibat dalam Haagsche Courant yang merupakan saingan surat kabar ini...
Tuan Philip Sidney (1554-1586) Tuan Philip Sidney (lahir 30 November 1554 - 17 Oktober 1586) adalah seorang penyair, punggawa, cendekiawan, dan tentara Inggris yang dikenang sebagai salah satu tokoh paling terkemuka di zaman Elizabeth. Karya-karyanya meliputi rangkaian soneta, Astrophel dan Stella, sebuah risalah, The Defense of Poesy (juga dikenal sebagai The Defense of Poesie atau An Apology for Poetrie ).[1] Ia lahir di Penshurst Place, Kent. Ia menempuh pendidikan di Shrewsbury Sc...
321 BC – 428 AD monarchy in Ancient Near East This article is about the Kingdom of Armenia during classical antiquity. For a list of other Armenian Kingdoms, see Kingdom of Armenia (disambiguation). This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Kingdom of Armenia antiquity – news · newspapers · books · sc...
Legal principle Universal jurisdiction is a legal principle that allows states or international organizations to claim criminal jurisdiction over an accused person regardless of where the alleged crime was committed, and regardless of the accused's nationality, country of residence, or any other relation to the prosecuting entity. Crimes prosecuted under universal jurisdiction are considered crimes against all, too serious to tolerate jurisdictional arbitrage. The concept of universal jurisdi...
Species of plant in the genus Sorbus Sorbus ulleungensis Scientific classification Kingdom: Plantae Clade: Tracheophytes Clade: Angiosperms Clade: Eudicots Clade: Rosids Order: Rosales Family: Rosaceae Genus: Sorbus Species: S. ulleungensis Binomial name Sorbus ulleungensisChin S.Chang[1] Synonyms[2] Pyrus ulleungensis (Chin S.Chang) M.F.Fay & Christenh. Sorbus commixta var. ulleungensis (Chin S.Chang) M.Kim Sorbus ulleungensis is a species of rowan native to Ulleung ...
Banana Republicans AuthorSheldon RamptonJohn StauberCover artistTom TomorrowSubjectMedia bias, Republican PartyPublisherJeremy P. Tarcher/PenguinPublication date2004Pages264ISBN1-58542-342-4OCLC54694701 Banana Republicans: How the Right Wing Is Turning America Into a One-Party State is a book by Sheldon Rampton and John Stauber of the Center for Media and Democracy.[1] It was published in 2004. In the book, Rampton and Stauber argue that a right-wing political machine, in the for...
Military Geo-location Naval Headquarters NHQIslamabad in PakistanSite informationOwnerPakistan NavyWebsitewww.paknavy.gov.pkGarrison informationCurrentcommanderChief of Naval Staff Amjad Khan Niazi Naval Headquarters (NHQ) is the headquarters of Pakistan Navy located in Islamabad, Pakistan. History The headquarters of Pakistan Navy established in 1947 in Mules Mansion, Karachi. On 15 March 1975, it was moved to Islamabad.[1] Initially it was housed in a government secretariat bui...
Indian politician Padma BhushanMallika SarabhaiSarabhai in Bertolt Brecht's adaptation of The Good Person of Szechwan directed by Arvind GaurBornAhmedabad, Gujarat, IndiaOccupation(s)Kuchipudi and Bharatanatyam dancer, actress, politicianYears active1969–presentSpouseBipin ShahChildren2, including RevantaParentsVikram SarabhaiMrinalini SarabhaiRelativesKartikeya Sarabhai (brother) Subhashini Ali (cousin) Shaad Ali (nephew)AwardsPadma BhushanWebsitewww.mallikasarabhai.com Mallika Sarabh...
Track in Queensland and the Northern Territory Donohue HighwayQueensland–Northern TerritoryDonohue Highway (depicted in blue and white)General informationTypeTrackLength249 km (155 mi)Major junctionsWest end Plenty Highway (State Route 12), Tobermorey Homestead, Northern Territory (near NT/Qld Border)East end Diamantina Developmental Road (National Route 83), near Boulia, Queensland The Donohue Highway is a 249 km (155 mi) mostly unpaved outback track that lead...
У этого термина существуют и другие значения, см. Уолфиш-Бей (значения). ГородУолфиш-Бейафрик. Walvisbaai англ. Walvis Bay, Walfish Bay Герб 22°56′58″ ю. ш. 14°30′25″ в. д.HGЯO Страна Намибия Глава Уилика Намбаху История и география Основан 1840 Площадь 1 124 000 000 м² Выс...
Frans LantingBorn (1951-07-13) 13 July 1951 (age 72)Rotterdam, NetherlandsNationalityDutchOccupations Photographer Author Public Speaker Websitelanting.com Frans Lanting (born 13 July 1951) is a Dutch National Geographic photographer, author and speaker. Life Lanting was born in Rotterdam in Netherlands. He studied economics at the Erasmus university in Rotterdam and later immigrated to the United States. He now lives in Santa Cruz, California, and operates a studio and gallery as well a...
SpongeBob's Last StandEpisode SpongeBob SquarePantsKartu judulNomor episodeMusim 7Episode 134SutradaraAndrew Overtoom dan Tom Yasumi[1]PenulisAaron SpringerSteven BanksDerek IversenMusikThe Jellyfishing SongGive Jellyfish Fields a ChanceTanggal siar22 April 2010 (Hari Bumi)[2]Kronologi episode ← SebelumnyaSquidward in Clarinetland Selanjutnya →Back to the Past Daftar episode SpongeBob SquarePants SpongeBob's Last Stand (bahasa Indonesia: Pertahanan T...
Strategi Solo vs Squad di Free Fire: Cara Menang Mudah!