See more IPv6 articles on AOD.

Powered by
Share this page on
Article provided by Wikipedia

See also: "IPv6 address § Stateless address autoconfiguration

IPv6 hosts can configure themselves automatically when connected to an IPv6 network using the "Neighbor Discovery Protocol via "Internet Control Message Protocol version 6 (ICMPv6) router discovery messages. When first connected to a network, a host sends a "link-local router solicitation multicast request for its configuration parameters; routers respond to such a request with a router advertisement packet that contains Internet Layer configuration parameters.[15]

If IPv6 stateless address auto-configuration is unsuitable for an application, a network may use stateful configuration with the "Dynamic Host Configuration Protocol version 6 (DHCPv6) or hosts may be configured manually using static methods.

Routers present a special case of requirements for address configuration, as they often are sources of autoconfiguration information, such as router and prefix advertisements. Stateless configuration of routers can be achieved with a special router renumbering protocol.[20]

Network-layer security[edit]

"Internet Protocol Security (IPsec) was originally developed for IPv6, but found widespread deployment first in IPv4, for which it was re-engineered. IPsec was a mandatory specification of the base IPv6 protocol suite,[2][21] but has since been made optional.[22]

Simplified processing by routers[edit]

In IPv6, the packet header and the process of packet forwarding have been simplified. Although IPv6 packet headers are at least twice the size of IPv4 packet headers, packet processing by routers is generally more efficient,[2][11] because less processing is required in routers. This furthers the "end-to-end principle of Internet design, which envisioned that most processing in the network occurs in the leaf nodes.

The packet header in IPv6 is simpler than the IPv4 header. Many rarely used fields have been moved to optional header extensions.

IPv6 routers do not perform "IP fragmentation. IPv6 hosts are required to either perform "path MTU discovery, perform end-to-end fragmentation, or to send packets no larger than the default "Maximum transmission unit (MTU), which is 1280 "octets.

The IPv6 header is not protected by a "checksum. Integrity protection is assumed to be assured by both the link layer or error detection and correction methods in higher-layer protocols, such as TCP and UDP. In IPv4, UDP may actually have a checksum of 0, indicating no checksum; IPv6 requires a checksum in UDP. Therefore, IPv6 routers do not need to recompute a checksum when header fields change, such as the "time to live (TTL) or "hop count.

The TTL field of IPv4 has been renamed to Hop Limit in IPv6, reflecting the fact that routers are no longer expected to compute the time a packet has spent in a queue.


Unlike mobile IPv4, "mobile IPv6 avoids "triangular routing and is therefore as efficient as native IPv6. IPv6 routers may also allow entire subnets to move to a new router connection point without renumbering.[23]

Options extensibility[edit]

The IPv6 packet header has a minimum size of 40 octets. Options are implemented as extensions. This provides the opportunity to extend the protocol in the future without affecting the core packet structure.[2] However, a study in 2015 indicated that there was still widespread dropping of IPv6 packets containing extension headers.[24]


IPv4 limits packets to 65,535 (216−1) octets of payload. An IPv6 node can optionally handle packets over this limit, referred to as "jumbograms, which can be as large as 4,294,967,295 (232−1) octets. The use of jumbograms may improve performance over high-"MTU links. The use of jumbograms is indicated by the Jumbo Payload Option header.[25]


Like IPv4, IPv6 supports globally unique "IP addresses by which the network activity of each device can potentially be tracked. The design of IPv6 intended to re-emphasize the end-to-end principle of network design that was originally conceived during the establishment of the early Internet. In this approach each device on the network has a unique address globally reachable directly from any other location on the Internet.

Network prefix tracking is less of a concern if the user's ISP assigns a dynamic network prefix via DHCP.[26][27] Privacy extensions do little to protect the user from tracking if the ISP assigns a static network prefix. In this scenario, the network prefix is the unique identifier for tracking and the interface identifier is secondary.

In IPv4 the effort to conserve address space with "network address translation (NAT) obfuscates network address spaces, hosts, and topologies. In IPv6 when using address auto-configuration, the Interface Identifier ("MAC address) of an interface port is used to make its public IP address unique, exposing the type of hardware used and providing a unique handle for a user's online activity.

It is not a requirement for IPv6 hosts to use address auto-configuration, however. Yet, even when an address is not based on the MAC address, the interface's address is globally unique, in contrast to NAT-masqueraded private networks. Privacy extensions for IPv6 have been defined to address these privacy concerns,[28] although "Silvia Hagen describes these as being largely due to "misunderstanding".[29] When privacy extensions are enabled, the operating system generates random host identifiers to combine with the assigned network prefix. These ephemeral addresses are used to communicate with remote hosts making it more difficult to track a single device.[30]

Privacy extensions are enabled by default in Windows (since XP SP1), OS X (since 10.7), and iOS (since version 4.3).[31][32] Some Linux distributions have enabled privacy extensions as well.[33]

In addition to the temporary address assignments, interfaces also receive a stable address.[34] Interface Identifiers are generated such that they are stable for each subnet, but change as a host moves from one network to another. In this way it is difficult to track a host as it moves from network to network, but within a particular network it will always have the same address (unless the state used in generating the address is reset and the algorithm is run again) so that network access controls and auditing can be potentially be configured.

The traditional method of generating interface identifiers in use for unique address assignments was based on MAC addressing. In favor of better privacy protection, this method has been deprecated in some operating systems with newly established methods of "RFC 7217.[35]

Privacy extensions do not protect the user from other forms of tracking at other layers, e.g. Application Layer: "tracking cookies or "browser fingerprinting and Link Layer: "IMSI-catcher or "iBeacon

Packet format[edit]

IPv6 packet
IPv6 packet header

An IPv6 packet has two parts: a "header and "payload.

The header consists of a fixed portion with minimal functionality required for all packets and may be followed by optional extensions to implement special features.

The fixed header occupies the first 40 "octets (320 bits) of the IPv6 packet. It contains the source and destination addresses, traffic classification options, a hop counter, and the type of the optional extension or payload which follows the header. This Next Header field tells the receiver how to interpret the data which follows the header. If the packet contains options, this field contains the option type of the next option. The "Next Header" field of the last option, points to the upper-layer protocol that is carried in the packet's "payload.

Extension headers carry options that are used for special treatment of a packet in the network, e.g., for routing, fragmentation, and for security using the "IPsec framework.

Without special options, a payload must be less than 64KB. With a Jumbo Payload option (in a Hop-By-Hop Options extension header), the payload must be less than 4 GB.

Unlike with IPv4, routers never fragment a packet. Hosts are expected to use "Path MTU Discovery to make their packets small enough to reach the destination without needing to be fragmented. See "IPv6 packet fragmentation.


IPv6 address

"IPv6 addresses have 128 bits. The design of the IPv6 address space implements a very different design philosophy than in IPv4, in which subnetting was used to improve the efficiency of utilization of the small address space. In IPv6, the address space is deemed large enough for the foreseeable future, and a local area subnet always uses 64 bits for the host portion of the address, designated as the interface identifier, while the most-significant 64 bits are used as the routing prefix.[36]

The identifier is only unique within the subnet to which a host is connected. IPv6 has a mechanism for automatic address detection,[37] so that address autoconfiguration always produces unique assignments.

Address representation[edit]

The 128 bits of an IPv6 address are represented in 8 groups of 16 bits each. Each group is written as four hexadecimal digits and the groups are separated by colons (:). An example of this representation is 2001:0db8:0000:0000:0000:ff00:0042:8329.

For convenience, an IPv6 address may be abbreviated to shorter notations by application of the following rules.

An example of application of these rules:

Initial address: 2001:0db8:0000:0000:0000:ff00:0042:8329
After removing all leading zeroes in each group: 2001:db8:0:0:0:ff00:42:8329
After omitting consecutive sections of zeroes: 2001:db8::ff00:42:8329

The loopback address, 0000:0000:0000:0000:0000:0000:0000:0001, may be abbreviated to ::1 by using both rules.

As an IPv6 address may have more than one representation, the IETF has issued a "proposed standard for representing them in text.[39]

Address uniqueness[edit]

Hosts verify the uniqueness of addresses assigned by sending a neighbor solicitation message asking for the Link Layer address of the IP address. If any other host is using that address, it responds. However, MAC addresses are designed to be unique on each network card which minimizes chances of duplication.[40]

The host first determines if the network is connected to any routers at all, because if not, then all nodes are reachable using the link-local address that already is assigned to the host. The host will send out a Router Solicitation message to the all-routers[41][42] multicast group with its link local address as source. If there is no answer after a predetermined number of attempts, the host concludes that no routers are connected. If it does get a response from a router, there will be network information inside that is needed to create a globally unique address. There are also two flag bits that tell the host whether it should use DHCP to get further information and addresses:

Link local address[edit]

All interfaces of IPv6 hosts require a link-local address. A link-local address is derived from the MAC address of the interface and the prefix fe80::/10. The process involves filling the address space with prefix bits left-justified to the most-significant bit, and filling the MAC address in EUI-64 format into the least-significant bits. If any bits remain to be filled between the two parts, those are set to zero.[37]

The uniqueness of the address on the subnet is tested with the "Duplicate Address Detection (DAD) method.[43]

Global addressing[edit]

The assignment procedure for global addresses is similar to local address construction. The prefix is supplied from router advertisements on the network. Multiple prefix announcements cause multiple addresses to be configured.[40]

Stateless address autoconfiguration (SLAAC) requires a /64 address block, as defined in "RFC 4291. "Local Internet registries are assigned at least /32 blocks, which they divide among subordinate networks.[44] The initial recommendation stated assignment of a /48 subnet to end-consumer sites ("RFC 3177). This was replaced by "RFC 6177, which "recommends giving home sites significantly more than a single /64, but does not recommend that every home site be given a /48 either". /56s are specifically considered. It remains to be seen if ISPs will honor this recommendation. For example, during initial trials, "Comcast customers were given a single /64 network.[45]

IPv6 addresses are classified by three types of networking methodologies: "unicast addresses identify each network interface, "anycast addresses identify a group of interfaces, usually at different locations of which the nearest one is automatically selected, and "multicast addresses are used to deliver one packet to many interfaces. The "broadcast method is not implemented in IPv6. Each IPv6 address has a scope, which specifies in which part of the network it is valid and unique. Some addresses are unique only on the local (sub-)network. Others are globally unique.

Some IPv6 addresses are reserved for special purposes, such as "loopback, "6to4 tunneling, and "Teredo tunneling, as outlined in "RFC 5156. Also, some address ranges are considered special, such as link-local addresses for use on the local link only, Unique Local addresses (ULA), as described in "RFC 4193, and solicited-node multicast addresses used in the "Neighbor Discovery Protocol.

IPv6 in the Domain Name System[edit]

In the "Domain Name System, "hostnames are mapped to IPv6 addresses by AAAA resource records, so-called quad-A records. For "reverse resolution, the IETF reserved the domain ", where the name space is hierarchically divided by the 1-digit "hexadecimal representation of "nibble units (4 bits) of the IPv6 address. This scheme is defined in "RFC 3596.

At the design stage of the IPv6 DNS architecture, the AAAA scheme faced a rival proposal. This alternate approach, designed to facilitate network renumbering, uses A6 records for the forward lookup and a number of other innovations such as bit-string labels and DNAME records. It is defined in "RFC 2874 and its references (with further discussion of the pros and cons of both schemes in "RFC 3364), but has been deprecated to experimental status ("RFC 3363).

Transition mechanisms[edit]

IPv6 transition mechanism

IPv6 is not foreseen to supplant IPv4 instantaneously. Both protocols will continue to operate simultaneously for some time. Therefore, some "IPv6 transition mechanisms are needed to enable IPv6 hosts to reach IPv4 services and to allow isolated IPv6 hosts and networks to reach each other over IPv4 infrastructure.[46]

Many of these transition mechanisms use tunneling to encapsulate IPv6 traffic within IPv4 networks. This is an imperfect solution, which reduces the "maximum transmission unit (MTU) of a link and therefore complicates "Path MTU Discovery, and may increase "latency.[47] "Tunneling protocols are a temporary solution for networks that do not support native dual-stack, where both IPv6 and IPv4 run independently.

Dual IP stack implementation[edit]

Dual-stack (or native dual-stack) IP implementations provide complete IPv4 and IPv6 protocol stacks in the same network node. This facilitates native communications between nodes using either protocol. The method is defined in "RFC 4213.[48]

This is the most desirable IPv6 implementation during the transition from IPv4 to IPv6, as it avoids the complexities of tunneling, such as security, increased latency, management overhead, and a reduced "path MTU.[49] However, it is not always possible, since outdated network equipment may not support IPv6.

Dual-stack software design is a transitional technique to facilitate the adoption and deployment of IPv6. However, it might introduce more security threats as hosts could be subject to attacks from both IPv4 and IPv6. It has been argued that dual-stack could ultimately overburden the global networking infrastructure by requiring routers to deal with IPv4 and IPv6 routing simultaneously.[50]


Many current Internet users do not have IPv6 dual-stack support, and thus cannot reach IPv6 sites directly. Instead, they must use IPv4 infrastructure to carry IPv6 packets. This is done using a technique known as "tunneling, which encapsulates IPv6 packets within IPv4, in effect using IPv4 as a link layer for IPv6.

IP protocol 41 indicates IPv4 packets which encapsulate IPv6 datagrams. Some routers or network address translation devices may block protocol 41. To pass through these devices, UDP packets may be used to encapsulate IPv6 datagrams. Other encapsulation schemes, such as "AYIYA or "Generic Routing Encapsulation, are also popular.

Conversely, on IPv6-only Internet links, when access to IPv4 network facilities is needed, tunneling of IPv4 over IPv6 protocol occurs, using the IPv6 as a link layer for IPv4.

Automatic tunneling[edit]

Automatic tunneling refers to a technique by which the routing infrastructure automatically determines the tunnel endpoints. Some automatic tunneling techniques are below.

"6to4 is recommended by "RFC 3056. It uses protocol 41 encapsulation.[51] Tunnel endpoints are determined by using a well-known IPv4 anycast address on the remote side, and embedding IPv4 address information within IPv6 addresses on the local side. 6to4 is the most common tunnel protocol currently deployed.

"Teredo is an automatic tunneling technique that uses UDP encapsulation and can allegedly cross multiple NAT nodes.[52] IPv6, including 6to4 and Teredo tunneling, are enabled by default in "Windows Vista[53] and "Windows 7. Most Unix systems implement only 6to4, but Teredo can be provided by third-party software such as "Miredo.

"ISATAP (Intra-Site Automatic Tunnel Addressing Protocol)[54] uses the IPv4 network as a virtual IPv6 local link, with mappings from each IPv4 address to a link-local IPv6 address. Unlike 6to4 and Teredo, which are inter-site tunneling mechanisms, ISATAP is an intra-site mechanism, meaning that it is designed to provide IPv6 connectivity between nodes within a single organization.

Configured and automated tunneling (6in4)[edit]

"6in4 tunneling requires the tunnel endpoints to be explicitly configured, either by an administrator manually or the operating system's configuration mechanisms, or by an automatic service known as a "tunnel broker;[55] this is also referred to as automated tunneling. Configured tunneling is usually more deterministic and easier to debug than automatic tunneling, and is therefore recommended for large, well-administered networks. Automated tunneling provides a compromise between the ease of use of automatic tunneling and the deterministic behavior of configured tunneling.

Raw encapsulation of IPv6 packets using "IPv4 protocol number 41 is recommended for configured tunneling; this is sometimes known as "6in4 tunneling. As with automatic tunneling, encapsulation within UDP may be used in order to cross NAT boxes and firewalls.

Proxying and translation for IPv6-only hosts[edit]

After the "regional Internet registries have exhausted their pools of available IPv4 addresses, it is likely that hosts newly added to the Internet might only have IPv6 connectivity. For these clients to have backward-compatible connectivity to existing IPv4-only resources, suitable "IPv6 transition mechanisms must be deployed.

One form of address translation is the use of a dual-stack application-layer "proxy server, for example a web proxy.

NAT-like techniques for application-agnostic translation at the lower layers in routers and gateways have been proposed. The NAT-PT standard was dropped because of criticisms;[56] however, more recently, the continued low adoption of IPv6 has prompted a new standardization effort of a technology called "NAT64.

IPv6 readiness[edit]

Compatibility with IPv6 networking is mainly a software or firmware issue. However, much of the older hardware that could in principle be upgraded is likely to be replaced instead. The "American Registry for Internet Numbers (ARIN) suggested that all Internet servers be prepared to serve IPv6-only clients by January 2012.[57]


Host software may have only IPv4 or only IPv6 networking software, or it may support dual-stack, or hybrid dual-stack operation. The majority of personal computers running recent "operating system versions support IPv6. Many popular applications with networking capabilities are compliant.

Some software transitioning mechanisms are outlined in "RFC 4038, "RFC 3493, and "RFC 3542.

IPv4-mapped IPv6 addresses[edit]

Hybrid dual-stack IPv6/IPv4 implementations recognize a special class of addresses, the IPv4-mapped IPv6 addresses. These addresses consist of an 80-bit prefix of zeros, the next 16 bits are one, and the remaining, least-significant 32 bits contain the IPv4 address. These addresses are typically written with a 96-bit prefix in the standard IPv6 format, and the remaining 32 bits written in the customary "dot-decimal notation of IPv4. For example, ::ffff: represents the IPv4 address A deprecated format for IPv4-compatible IPv6 addresses is ::[58]

Because of the significant internal differences between IPv4 and IPv6, some of the lower-level functionality available to programmers in the IPv6 stack does not work the same when used with IPv4-mapped addresses. Some common IPv6 stacks do not implement the IPv4-mapped address feature, either because the IPv6 and IPv4 stacks are separate implementations (e.g., "Microsoft Windows 2000, XP, and Server 2003), or because of security concerns ("OpenBSD).[59] On these operating systems, a program must open a separate socket for each IP protocol it uses. On some systems, e.g., the "Linux kernel, "NetBSD, and "FreeBSD, this feature is controlled by the socket option IPV6_V6ONLY, as specified in "RFC 3493.[60]

Hardware and embedded systems[edit]

The "CableLabs consortium published the 160 Mbit/s "DOCSIS 3.0 IPv6-ready specification for "cable modems in August 2006. DOCSIS 2.0 was updated as DOCSIS 2.0 + IPv6 to provide IPv6 support, which may be available with a firmware upgrade.[61][62]

Shadow networks[edit]

One side effect of IPv6 implementation may be the emergence of so-called shadow networks caused by IPv6 traffic flowing into IPv4 networks when IPv6 enabled nodes are added to the existing network, and the IPv4 security in place is unable to properly identify it. This may occur with operating system upgrades, when the newer OS enables IPv6 support by default, while the older one did not. Failing to update the security infrastructure to accommodate IPv6 can lead to IPv6 traffic bypassing it.[63] Shadow networks have been found occurring on business networks in which enterprises are replacing "Windows XP systems that do not have an IPv6 stack enabled by default, with "Windows 7 systems, that do.[64] Some IPv6 stack implementors have therefore recommended to disable IPv4 mapped addresses and to instead use a dual-stack network where supporting both IPv4 and IPv6 is necessary.[65]


Research has shown that the use of fragmentation can be leveraged to evade network security controls. As a result, "RFC 7112 requires that the first fragment of an IPv6 packet contains the entire IPv6 header chain, such that some very pathological fragmentation cases are forbidden. Additionally, as a result of research on the evasion of RA-Guard in "RFC 7113, "RFC 6980 has deprecated the use of fragmentation with Neighbor Discovery, and discouraged the use of fragmentation with Secure Neighbor Discovery (SEND).


IPv6 deployment

The 1993 introduction of "Classless Inter-Domain Routing (CIDR) in the routing and IP address allocation for the Internet, and the extensive use of "network address translation (NAT) delayed "IPv4 address exhaustion. The final phase of exhaustion started on 3 February 2011.[66] However, despite a decade long development and implementation history as a Standards Track protocol, general worldwide deployment of IPv6 is increasing slowly. As of September 2013, about 4% of domain names and 16.2% of the networks on the Internet have IPv6 protocol support.[67]

IPv6 has been implemented on all major operating systems in use in commercial, business, and home consumer environments. Since 2008, the "domain name system can be used in IPv6. IPv6 was first used in a major world event during the "2008 Summer Olympic Games,[68] the largest showcase of IPv6 technology since the inception of IPv6.[69] Some governments including the "Federal government of the United States and "China have issued guidelines and requirements for IPv6 capability.

In 2009, Verizon mandated IPv6 operation, and reduced IPv4 to an optional capability, for "LTE cellular hardware.[70] As of June 2012, T-Mobile USA also supports external IPv6 access.[71]

As of 2014, IPv4 still carried more than 99% of worldwide "Internet traffic.[72][73] The Internet exchange in Amsterdam is the only large exchange that publicly shows IPv6 traffic statistics, which as of December 2016 is tracking at about 1.9%, growing at about 0.8% per year.[74] As of 8 April 2017, the percentage of users reaching "Google services with IPv6 reached 17.0% for the first time, growing at about 6.0% per year, although varying widely by region.[75] As of 22 April 2015, deployment of IPv6 on web servers also varied widely, with over half of web pages available via IPv6 in many regions, with about 14% of web servers supporting IPv6.[76]

See also[edit]


  1. ^ New Zealand IPv6 Task Force. "FAQs". Retrieved 26 October 2015. 
  2. ^ a b c d e f "RFC 2460, Internet Protocol, Version 6 (IPv6) Specification, "S. Deering, R. Hinden (December 1998)
  3. ^ Google IPv6 Conference 2008: What will the IPv6 Internet look like?. Event occurs at 13:35. 
  4. ^ a b c Bradner, S.; Mankin, A. (January 1995). "The Recommendation for the IP Next Generation Protocol". "RFC 1752.  External link in |work= ("help)
  5. ^ Rashid, Fahmida. "IPv4 Address Exhaustion Not Instant Cause for Concern with IPv6 in Wings". eWeek. Retrieved 23 June 2012. 
  6. ^ Ward, Mark. "Europe hits old internet address limits". BBC. Retrieved 15 September 2012. 
  7. ^ Huston, Geoff. "IPV4 Address Report". 
  8. ^ Bradner, S.; Mankin, A. (December 1993). "IP: Next Generation (IPng) White Paper Solicitation". "RFC 1550.  External link in |work= ("help)
  9. ^ "History of the IPng Effort". Sun. 
  10. ^ "The Recommendation for the IP Next Generation Protocol – Appendix B". "RFC 1752.  External link in |work= ("help)
  11. ^ a b Partridge, C.; Kastenholz, F. (December 1994). "Technical Criteria for Choosing IP The Next Generation (IPng)". "RFC 1726.  External link in |work= ("help)
  12. ^ "Moving to IPv6: Now for the hard part (FAQ)". Deep Tech. CNET News. Retrieved 3 February 2011. 
  13. ^ Ferguson, P.; Berkowitz, H. (January 1997). "Network Renumbering Overview: Why would I want it and what is it anyway?". "RFC 2071.  External link in |work= ("help)
  14. ^ Berkowitz, H. (January 1997). "Router Renumbering Guide". "RFC 2072.  External link in |work= ("help)
  15. ^ a b Thomson, S.; Narten, T.; Jinmei, T. (September 2007). "IPv6 Stateless Address Autoconfiguration". "RFC 4862.  External link in |work= ("help)
  16. ^ "RFC 1112, Host extensions for IP multicasting, S. Deering (August 1989)
  17. ^ "RFC 3956, Embedding the Rendezvous Point (RP) Address in an IPv6 Multicast Address, P. Savola, B. Haberman (November 2004)
  18. ^ "RFC 2908, The Internet Multicast Address Allocation Architecture, D. Thaler, M. Handley, D. Estrin (September 2000)
  19. ^ "RFC 3306, Unicast-Prefix-based IPv6 Multicast Addresses, B. Haberman, D. Thaler (August 2002)
  20. ^ "RFC 2894, Router Renumbering for IPv6, M. Crawford, August 2000.
  21. ^ "RFC 4301, IPv6 Node Requirements", J. Loughney (April 2006)
  22. ^ "RFC 6434, IPv6 Node Requirements, E. Jankiewicz, J. Loughney, T. Narten (December 2011)
  23. ^ "RFC 3963, Network Mobility (NEMO) Basic Protocol Support, V. Devarapalli, R. Wakikawa, A. Petrescu, P. Thubert (January 2005)
  24. ^ Gont, F.; Linkova, J.; Chown, T.; Liu, S. (October 2015). "Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World". draft-ietf-v6ops-ipv6-ehs-in-real-world-01. 
  25. ^ "RFC 2675, IPv6 Jumbograms, D. Borman, "S. Deering, R. Hinden (August 1999)
  26. ^ Statement on IPv6 Address Privacy, Steve Deering & Bob Hinden, Co-Chairs of the IETF's IP Next Generation Working Group, 6 November 1999.
  27. ^ "Neues Internet-Protokoll erschwert anonymes Surfen". Retrieved 19 February 2012. 
  28. ^ Marten, T; Draves, R (January 2001). Privacy Extensions for Stateless Address Autoconfiguration in IPv6. 
  29. ^ IPv6 Essentials by Silvia Hagen, p. 28, chapter 3.5.
  30. ^ Privacy Extensions (IPv6), Elektronik Kompendium.
  31. ^ Overview of the Advanced Networking Pack for Windows XP, Revision: 8.14
  32. ^ IPv6: Privacy Extensions einschalten, Reiko Kaps, 13 April 2011
  33. ^ "Comment #61 : Bug #176125 : Bugs: "procps" package: Ubuntu". Retrieved 19 February 2012. 
  34. ^ Gont, F (April 2014). A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC). RFC 7217. 
  35. ^ Fernando Gont (September 2016). "Recommendation on Stable IPv6 Interface Identifiers". 
  36. ^ "RFC 4291, p. 9
  37. ^ a b "RFC 3315, R. Droms, J. Bound, B. Volz, T. Lemon, C. Perkins, and M. Carney, Dynamic Host Configuration Protocol for IPv6 (DHCPv6), July 2003 (Proposed Standard)
  38. ^ "RFC 5952, A Recommendation for IPv6 Address Text Representation, S. Kawamura (August 2010), section 4.2.2:
  39. ^ "RFC 5952, A Recommendation for IPv6 Address Text Representation, S. Kawamura (August 2010)
  40. ^ a b c Narten, T. (August 1999). "Neighbor discovery and stateless autoconfiguration in IPv6". IEEE Internet Computing. 3 (4): 54–62. "doi:10.1109/4236.780961. 
  41. ^ "RFC 4862, IPv6 Stateless Address Autoconfiguration, S.Thomson (September 2007), section 5.5.1:
  42. ^ "RFC 4861, Neighbor Discovery for IP version 6 (IPv6), T.Narten (September 2007), section 6.3.7:
  43. ^ S. Thomson, T. Narten, and T. Jinmei, ‘IPv6 Stateless Address Autoconfiguration’, Internet Request for Comments, vol. "RFC 4862 (Draft Standard), Sep. 2007 [Online]. Available:
  44. ^ "IPv6 Address Allocation and Assignment Policy". RIPE NCC. 8 February 2011. Retrieved 27 March 2011. 
  45. ^ "Comcast Activates First Users With IPv6 Native Dual Stack Over DOCSIS". "Comcast. 31 January 2011. 
  46. ^ "IPv6 Transition Mechanism / Tunneling Comparison". Retrieved 20 January 2012. 
  47. ^ "Advisory Guidelines for 6to4 Deployment". "RFC 6343. IETF.  External link in |work= ("help);
  48. ^ "Basic Transition Mechanisms for IPv6 Hosts and Routers". "RFC 4213. IETF.  External link in |work= ("help);
  49. ^ "IPv6: Dual stack where you can; tunnel where you must". 5 September 2007. Retrieved 27 November 2012. 
  50. ^ Sun, Charles C. (1 May 2014). "Stop using Internet Protocol Version 4!". Computerworld. 
  51. ^ "RFC 3056, Connection of IPv6 Domains via IPv4 Clouds, B. Carpenter, February 2001.
  52. ^ "RFC 4380, Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs), C. Huitema, Februari 2006
  53. ^ "The Windows Vista Developer Story: Application Compatibility Cookbook". 24 April 2006. Retrieved 20 January 2012. 
  54. ^ "RFC 5214, Intra-Site Automatic Tunnel Addressing Protocol (ISATAP), F. Templin, T. Gleeson, D. Thaler, March 2008.
  55. ^ "RFC 3053, IPv6 Tunnel Broker, A. Durand, P. Fasano, I. Guardini, D. Lento (January 2001)
  56. ^ "RFC 4966, Reasons to Move the Network Address Translator-Protocol Translator (NAT-PT) to Historic Status
  57. ^ "Web sites must support IPv6 by 2012, expert warns". Network World. 21 January 2010. Retrieved 30 September 2010. 
  58. ^ ""RFC 4291". "RFC 4291. IETF.  External link in |title=, |work= ("help);
  59. ^ "OpenBSD inet6(4) manual page". 13 December 2009. Retrieved 20 January 2012. 
  60. ^ "Basic Socket Interface Extensions for IPv6". "RFC 3493. IETF. Retrieved 2012-01-20.  External link in |work= ("help)
  61. ^ "DOCSIS 2.0 Interface". 29 October 2007. Archived from the original on 4 September 2009. Retrieved 31 August 2009. 
  62. ^ "" (PDF). Archived from the original (PDF) on 5 January 2012. Retrieved 20 January 2012. 
  63. ^ Mullins, Robert (April 5, 2012), Shadow Networks: an Unintended IPv6 Side Effect, retrieved March 2, 2013 
  64. ^ Cicileo, Guillermo; Gagliano, Roque; O’Flaherty, Christian; et al. (October 2009). IPv6 For All: A Guide for IPv6 Usage and Application in Different Environments (PDF). p. 5. Retrieved March 2, 2013. 
  65. ^ Jun-ichiro itojun Hagino (October 2003). "IPv4-Mapped Addresses on the Wire Considered Harmful". 
  66. ^ "IPv4 Address Report". Retrieved 20 January 2012. 
  67. ^ Mike Leber (2 October 2010). "Global IPv6 Deployment Progress Report". Hurricane Electric. Retrieved 19 October 2011. 
  68. ^ " leaps to next-generation Net" (Press release). The Beijing Organizing Committee for the Games of the XXIX Olympiad. 30 May 2008. Archived from the original on 4 February 2009. 
  69. ^ Das, Kaushik (2008). "IPv6 and the 2008 Beijing Olympics". Retrieved 15 August 2008. As thousands of engineers, technologists have worked for a significant time to perfect this (IPv6) technology, there is no doubt, this technology brings considerable promises but this is for the first time that it will showcase its strength when in use for such a mega-event. 
  70. ^ Derek Morr (9 June 2009). "Verizon Mandates IPv6 Support for Next-Gen Cell Phones". CircleID. 
  71. ^ theipv6guy (31 July 2012). "T-Mobile USA Launches External IPv6". T-Mobile. Archived from the original on 19 October 2013. 
  72. ^ van Beijnum, Iljitsch. "IPv6 adoption starting to add up to real numbers: 0.6 percent". Ars Technica. Retrieved 9 April 2015. 
  73. ^ David Frost (20 April 2011). "Ipv6 traffic volumes going backwards". iTWire. Retrieved 19 February 2012. 
  74. ^ "Amsterdam Internet Exchange Ether Type". Retrieved 2015-10-06. 
  75. ^ "IPv6". Google Statistics. Google. Retrieved 27 April 2015. 
  76. ^ "6lab IPv6 website". Retrieved 2015-01-28. 

External links[edit]

) )