The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Challenges and Mitigation Strategies for Transition from IPv4 Network to Virtualized Next-Generation IPv6 Network

The rapid proliferation of the Internet has exhausted Internet Protocol version 4 (IPv4) addresses offered by Internet Assigned Number Authority (IANA). The new version of the IP i.e. IPv6 was launched by Internet Engineering Task Force (IETF) with new features, such as a simpler packet header, larger address space, new anycast addressing type, integrated security, efficient segment routing, and better Quality of Services (QoS). Virtualized network architectures such as Network Function Virtualization (NFV) and Software Defined Network (SDN) have been introduced. These new paradigms have entirely changed the way of internetworking and provide a lot of benefits in multiple domains of applications that have used SDN and NFV. ISPs are trying to move from existing IPv4 physical networks to virtualized next-generation IPv6 networks gradually. The transition from physical IPv4 to software-based IPv6 is very slow due to the usage of IPv4 addresses by billions of devices around the globe. IPv4 and IPv6 protocols are different in format and behaviour. Therefore, direct communication between IPv4 and IPv6 is not possible. Both protocols will co-exist for a long time during transition despite the incompatibility issues. The core issues between IPv4 and IPv6 protocols are compatibility, interoperability, and security. The transition creates many challenges for ISPs during shifting the network toward a software-based IPv6 network. Packet traversing, routing scalability, the guarantee of performance, and security are the main challenges faced by ISPs. In this research, we focused on a qualitative and comprehensive survey. We summarize the challenges during the transition process, recommended appropriate solutions, and an in-depth analysis of their mitigations during moving towards the next-generation virtual IPv6 network.

[1] Aazam M. and Huh E., “Impact of Ipv4-Ipv6 Coexistence in Cloud Virtualization Environment,” Annals of Telecommunications- Annales Des Télécommunications, vol. 69, no. 9, pp. 485-496, 2014.

[2] Aazam M., Syed A., Shah S., Khan I., and Alam M., “Evaluation of 6to4 and ISATAP on a Test LAN,” in Procceding of IEEE Symposium on Computers and Informatics, Kuala Lumpur, pp. 46-50, 2011.

[3] Al-Farizky R., “Routing Protocol Ripng, Ospfv3, And EIGRP on Ipv6 for Video Streaming Services,” in Proceeding of 5th International Conference on Cyber and IT Service Management, Denpasar, pp. 1-6, 2017.

[4] Al-Mashhadani M. and Shujaa M., “IoT Security Using AES Encryption Technology based ESP32 Platform,” The International Arab Journal of Information Technology, vol. 19, no. 2, pp. 214- 223, 2022.

[5] Amr P. and Abdelbaki N., “Convergence Study of Ipv6 Tunneling Techniques,” in Proceeding of 10th International Conference on Communications, Bucharest, pp. 1-6, 2014.

[6] Arkko J. and Baker F., Guidelines for Using IPv6 Transition Mechanisms during IPv6 Deployment, Technical Report, RFC 6180, 2011.

[7] Ashraf Z. and Yousaf M., “Optimized Convergence of OSPFv3 in Large Scale Hybrid IPv4-IPv6 Network,” in Proceeding of 14th International Conference on Emerging Technologies, Islamabad, pp. 1-6, 2018.

[8] Ashraf Z. and Yousaf M., “Optimized Routing Information Exchange in Hybrid IPv4-IPv6 Network using OSPFv3 and EIGRPv6,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 4, pp. 220- 229, 2017.

[9] Ashraf Z. and Yousaf M., “Secure Inter-VLAN IPv6 Routing: Implementation and Evaluation,” Science International, vol. 28, no. 3, pp. 3007- 3014, 2016.

[10] Ashraf Z., Ipv6 Routing: A Practitioner Approach, LAP-LAMBERT, 2013.

[11] Ashraf Z., Sohail A., and Yousaf M., “Performance Analysis of Network Applications on IPv6 Cloud Connected Virtual Machine,” International Journal of Computer Network and Information Security, vol. 11, no. 12, pp. 1-9, 2019.

[12] Ashraf Z., Virtual Private Networks in Theory and Practice, Grin Verlag, 2018.

[13] Balasubramanian V., Aloqaily M., and Reisslein M., “An SDN Architecture for Time Sensitive Industrial IoT,” Computer Networks, vol. 186, p. 107739, 2021.

[14] Ballani H., Costa P., Karagiannis T., and Rowstron A., “Towards Predictable Datacenter Networks,” in ACM SIGCOMM Computer Communication Review, vol. 41, no. 4, pp. 242- 253, 2011.

[15] Bari M., Boutaba R., Esteves R., Granville L., Podlesny M., Rabbani M., Zhang Q., and Zhani, M “Data Center Network Virtualization: A Survey,” IEEE Communications Surveys and Tutorials, vol. 15, no. 2, pp. 909-928, 2013.

[16] Batalle J., Riera J., Escalona E., and Garcia- Espin J., “On the implementation of NFV over an OpenFlow infrastructure: Routing function virtualization,” in Proceeding of IEEE SDN for Future Networks and Services, Trento, pp. 1-6, 2013.

[17] Benson T., Akella A., Shaikh A., and Sahu S., “Cloudnaas: A Cloud Networking Platform for Enterprise Applications,” in Proceedings of the 2nd ACM Symposium on Cloud Computing, Cascais, pp. 1-8, 2011.

[18] Chauhan D. and Sharma S., “Performance Evaluation of Different Routing Protocols in Ipv4 and Ipv6 Networks on The Basis of Packet Sizes,” Procedia Computer Science, vol. 46, pp. 1072-1078, 2015.

[19] Cheshire S., Aboba B., and Guttman E., “Dynamic Configuration of Ipv4 Link-Local Addresses,” RFC 3927, 2005.

[20] Chowdhury N. and Boutaba R., “Network Virtualization: State of The Art and Research Challenges,” IEEE Communications Magazine, vol. 47, no. 7, pp. 20-26, 2009.

[21] Clark A. and Claise B., “Guidelines for Considering New Performance Metric Development,” RFC 6390, 2011.

[22] Coltun R., Ferguson D., Moy J., and Lindem A., “OSPF for IPv6,” RFC 5340, 2008.

[23] Davies E., Krishnan S., and Savola P., “Ipv6 Transition/Co-Existence Security Considerations,” RFC 4942, 2007.

[24] Deering S. and Hinden R., “Internet Protocol, Version 6 (Ipv6) Specification,” RFC 8200, 2017.

[25] Durdağı E. and Buldu A., “Ipv4/Ipv6 Security and Threat Comparisons,” Procedia-Social and Behavioral Sciences, vol. 2, no. 2, pp. 5285- 5291, 2010.

[26] Filsfils C., Previdi S., Ginsberg L., Shakir R., Decraene B., and Litkowski S., “Segment Routing Architecture,” RFC 8402, 2018.

[27] Firoozjaei M., Jeong J., Ko H., and Kim H., “Security Challenges with Network Functions Virtualization,” Future Generation Computer Systems, vol. 67, pp. 315-324, 2017. Challenges and Mitigation Strategies for Transition from IPv4 Network to ... 89

[28] Frankel S. and Krishnan S., “IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap,” RFC 6071, 2011.

[29] Gharehpasha S., Masdari M., and Jafarian A., “Virtual Machine Placement in Cloud Data Centers Using A Hybrid Multi-Verse Optimization Algorithm,” Artificial Intelligence Review, vol. 54, no. 3, pp. 2221-2257, 2021.

[30] Gont F. and Liu W., “Security Implications of Ipv6 On Ipv4 Networks,” RFC 7123, 2014.

[31] Gont F. and Chown T., “Network Reconnaissance in IPv6 Networks,” RFC 7707, 2016.

[32] Goyal M., Soperi M., Baccelli E., Choudhury G., Shaikh A., Hosseini H., and Trivedi K., “Improving Convergence Speed and Scalability in OSPF: A Survey,” IEEE Communications Surveys and Tutorials, vol. 14, no. 2, pp. 443- 463, 2012.

[33] Graveman R., Parthasarathy M., Savola P., and Tschofenig H., “Using IPsec to Secure IPv6-in- IPv4 Tunnels,” RFC 4891, 2007.

[34] Gu K., Zhang L., Wang Z., and Kong Y., “Comparative Studies of IPv6 Tunnel Security,” in Proceeding of the 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC- FSKD), Guilin, pp. 2799-2804, 2017.

[35] Guo C., Lu G., Wang H., Yang S., Kong C., Sun P., Wu W., and Zhang Y., “Secondnet: A Data Center Network Virtualization Architecture with Bandwidth Guarantees,” in Proceedings of the 6th International Conference, Philadelphia, pp. 1-12, 2010.

[36] Haleplidis E., Pentikousis K., Denazis S., Salim J., Meyer D., and Koufopavlou O., “Software- Defined Networking (SDN): Layers and Architecture Terminology,” RFC 7426, 2015.

[37] Han B., Gopalakrishnan V., Ji L., and Lee S., “Network Function Virtualization: Challenges and Opportunities for Innovations,” IEEE Communications Magazine, vol. 53, no. 2, pp. 90-97, 2015.

[38] Hawilo H., Shami A., Mirahmadi M., and Asal R., “NFV: State of the Art, Challenges and Implementation in Next Generation Mobile Networks (vepc),” IEEE Network, vol. 28, no. 6, pp. 18-26, 2014.

[39] IPv4 Address Report”, https://ipv4.potaroo.net, Last Visited, 2022.

[40] “IPv6 Adoption”, http://www.google.com/intl/en/ipv6/statistics.htm l, Last Visited, 2022.

[41] Jaafar A., Salim S., Tiron L., and Hussin Z., “Performance Evaluation of OSPFv3 and IS-IS Routing Protocol on ipv6 Network,” in Proceeding of the International Conference on Engineering Technology and Technopreneurship, Kuala Lumpur, pp. 1-5, 2017.

[42] Kawamura S. and Kawashima M., “A Recommendation for IPv6 Address Text Representation,” Technical Report RFC 5952, 2010.

[43] Kent S. and Seo K., “Security Architecture for the internet protocol,” RFC 4301, 2005.

[44] Krishnan S., Thaler D., and Hoagland J., “Security Concerns with IP Tunneling,” RFC 6169, 2011.

[45] Lal S., Taleb T., and Dutta A., “NFV: Security Threats and best Practices,” IEEE Communications Magazine, vol. 55, no. 8, pp. 211-217, 2017.

[46] Lu T., Wu C., Lin W., Chen H., and Hsueh K., “Comparison of IPv4-Over-IPv6 (4over6) and Dual Stack Technologies in Dynamic Configuration for IPv4/IPv6 Address,” Advances in Intelligent Information Hiding and Multimedia Signal Processing, vol. 63, pp. 259-269, 2017.

[47] Malkin G. and Minnear R., “RIPng for IPv6,” RFC 2080, 1997.

[48] Manimozhi S. and Jayanthi J., “Performance Study of IPv6/IPv4 MANET (64MANET) Architecture,” in Proceedings of International Conference on Artificial Intelligence, Smart Grid and Smart City Applications, Coimbatore, pp. 645-658, 2019.

[49] Masruroh S., Robby F., and Hakiem N., “Performance Evaluation of Routing Protocols RIPng, OSPFv3, and EIGRP in an IPv6 Network,” in Proceedings of International Conference on Informatics and Computing, Mataram, pp. 111-116, 2016.

[50] Mijumbi R., Serrat J., Gorricho J., Bouten N., De Turck F., and Boutaba R., “Network Function Virtualization: State-Of-The-Art and Research Challenges,” IEEE Communications Surveys and Tutorials, vol. 18, no. 1, pp. 236-262, 2016.

[51] Morton A., “Considerations for Benchmarking Virtual Network Functions and Their Infrastructure,” RFC 8172, 2017.

[52] Nadas S., “Virtual Router Redundancy Protocol (vrrp) version 3 for ipv4 and IPv6,” RFC 5798, 2010.

[53] Nordmark E. and Gilligan R., “Basic Transition Mechanisms for Ipv6 Hosts and Routers,” RFC 4213, 2005.

[54] Ordabayeva G., Othman M., Kirgizbayeva B., Iztaev Z., and Bayegizova A., “A Systematic Review of Transition from IPv4 To IPv6,” in Proceedings of the 6th International Conference on Engineering and MIS, Almaty, pp. 1-15, 2020.

[55] Prabakaran D., Nizar S., and Kumar K., Design Methodologies and Tools for 5G Network Development and Application, IGI Global, 2021.

[56] Rahman R., Zahari N., Kassim M., and Yusof M., “Virtual Routing and Forwarding-lite Traffic 90 The International Arab Journal of Information Technology, Vol. 20, No. 1, January 2023 Management over Multi-protocol Layer Switching-Virtual Private Network,” Journal of Telecommunication, Electronic and Computer Engineering, vol. 8, no. 3, pp. 107-113, 2016.

[57] Ray P. and Kumar N., “SDN/NFV Architectures for Edge-Cloud Oriented Iot: A Systematic Review,” Computer Communications, vol. 169, no. 4, pp. 129-153, 2021.

[58] Rekhter Y., Moskowitz B., Karrenberg D., de Groot G., and Lear E., “Address Allocation for Private Internets,” RFC 1918, 1996.

[59] Rodrigues H., Santos J., Turner Y., Soares P., and Guedes D., “Gatekeeper: Supporting Bandwidth Guarantees for Multi-tenant Datacenter Networks,” in Proceedings of the 3rd Conference on I/O Virtualization, Portland, pp. 1-6, 2011.

[60] Saraj T., Hanan A., Akbar M., Yousaf M., Qayyum A., and Tufail M., “Ipv6 Tunneling Protocols: Mathematical and Testbed Setup Performance Analysis,” in Proceedings of Conference on Information Assurance and Cyber Security, Rawalpindi, pp. 62-68, 2015.

[61] Sathu H., Shah M., and Ganeshan K., “Performance Comparison of Video Protocols Using Dual-Stack and Tunnelling Mechanisms,” in Proceedings of International Conference on Advances in Computing and Communications, Berlin, pp. 501-511, 2011.

[62] Savage D., Ng J., Moore S., Slice D., Paluch P., and White R., “Cisco's Enhanced Interior Gateway Routing Protocol (EIGRP),” RFC 7868, 2016.

[63] Savola P. and Haberman B., “Embedding the Rendezvous Point (RP) Address in an IPv6 Multicast address,” RFC 3956, 2004.

[64] Serral-Gracià R., Cerqueira E., Curado M., Yannuzzi M., Monteiro E., and Masip-Bruin X., “An Overview of Quality of Experience Measurement Challenges for Video Applications in IP Networks,” in Proceeding of the International Conference on Wired/Wireless Internet Communications, Luleå, pp. 252-263, 2010.

[65] Shieh A., Kandula S., Greenberg A., Kim C., and Saha B., “Sharing the Data Center Network,” in Proceeding of the 8th USENIX Symposium on Networked Systems Design and Implementation, Boston, pp. 23-23, 2011.

[66] Shiranzaei A. and Khan R., “IPv6 Security Issues-A Systematic Review,” Next-Generation Networks, vol. 638, pp. 41-49, 2018.

[67] Srisuresh P. and Holdrege M., “IP Network Address Translator (NAT) Terminology and Considerations,” RFC 2663, 1999.

[68] Tesfamicael A., Liu V., Foo E., and Caelli B., “QoE Estimation Model for a Secure Real-Time Voice Communication System in the Cloud,” in Proceeding of the Australasian Computer Science Week Multiconference, Sydney, pp. 1-10, 2019.

[69] Thomson S., Narten T., and Jinmei T., “IPv6 Stateless Address Autoconfiguration,” RFC 4862, 2007.

[70] Wahanani H., Saputra W., and Freitas E., “Performance Analysis of Video on Demand and Video Streaming on the Network MPLS Traffic Engineering,” Geomate Journal, vol. 15, no. 50, pp. 141-148, 2018.

[71] Whitfield R. and Zhu S., “A Comparison of OSPFv3 and EIGRPv6 in a Small IPv6 Enterprise Network,” International Journal of Advanced Computer Science and Applications, vol. 6, no. 1, pp. 162-167, 2015.

[72] Yang W. and Fung C., “A Survey on Security in Network Functions Virtualization,” in Proceeding of the IEEE NetSoft Conference and Workshops, Seoul, pp. 15-19, 2016.

[73] Yu J., “Scalable Routing Design Principles,” RFC 2791, 2000.

[74] Žagar D., Grgić K., and Rimac-Drlje S., “Security Aspects in IPv6 Networks- Implementation and Testing,” Computers and Electrical Engineering, vol. 33, no. 5-6, pp. 425- 437, 2007.

[75] Zhan J., Dong S., and Hu W., “IoE-supported Smart Logistics Network Communication with Optimization and Security,” Sustainable Energy Technologies and Assessments, vol. 52, p. 102052, 2022.

[76] Zimmermann H., “OSI Reference Model-The ISO Model of Architecture for Open Systems Interconnection,” IEEE Transactions on communications, vol. 28, no. 4, pp. 425-432, 1980.