Alex Lightman, Publisher
2005 is a crucial year for IPv6, especially in the
United States. Either the power people in US government
and industry speak out and budget for IPv6, supporting
the wealth of IPv6 talent that has positioned IPv6
for commercial take off, or Asia and Europe will take
a lead that over the US that may stretch out and become
Just a few days ago, IPv6 made a major splash at
the largest trade show in the US, the Consumer Electronics
Show in Las Vegas. The second annual IPv6 event at
CES featured a panel moderated by ICANN CTO John Crain,
with panelists including Ted Tanner, Architectural
Strategist, Strategic Relations and Policy Group,
Microsoft Corporation, Alex Ramia of Panasonic, in
charge of the IPv6 efforts at Panasonic (aka Matsushita),
and John Kneuer, Deputy Assistant Secretary of the
US Commerce Department for Communications and Information.
We were pleased to have almost over 100 people attend,
and even happier to hear that we had one of the largest
panel sessions out of the many dozens at the entire
CES, even with the stiff competition from FCC chairman
Michael Powell speaking at the same time.
Panasonic was my hero at the CES, for introducing
IPv6 enabled webcams. It was great, for the first
time, to be able to bring VIPs to the huge Panasonic
booth and show them IPv6 in use. Panasonic put us
on stage to help demonstrate a four-way video conference
between a mobile phone, a car dashboard display, a
PC and a laptop (which will use IPv6 upon release).
IPv6-enabled printers and fax machines are coming
soon. Go, Panasonic! Please consider buying these
IPv6 enabled products and writing Panasonic to tell
them how much you appreciate their foresight. If you
are really motivated, contact the CEOs of companies
you buy products from and ask them what their plans
are for following the leader, Panasonic, in implementing
IPv6. (Panasonic did not ask me for these kudos. They
brought IPv6 to the consumer, and that's about the
greatest service any company can do for the New Internet
at this crucial time.)
The other highlights of CES for me were being quoted
in the future trends section of the official CES publication;
talking to smart folks from Microsoft, including a
cool XBox developer (please do follow up and put IPv6
in the XBox developers kit, Microsoft!); discussing
IPv6 with a US Senator; and, thanking the US CTO of
Panasonic for his IPv6 support when we met at dinner,
along with executives from the FCC and the CEA (which
In this issue are several articles that give
the whys and hows of IPv6 deployment, including
contributions from Rod Murchison
of Juniper (a Grand Sponsor of the US IPv6 Summit
2004 a few weeks ago); Sue Hares,
founder of NextHop; Qing Li of Blue
Coat (a returning contributor); and Kent
Gladstone. This January edition concludes with
my ten goals and wishes for IPv6 this year.
Please make plans to join us at the Coalition Summit
for IPv6 this May 23-26, 2005. We strongly encourage
Please send us your submissions for 6Sense so that
they can expand the knowledge of the IPv6 community.
This is a wonderful way to outreach to the community,
so start building your track record for IPv6 contributions
The Global Information Grid, IPv6 and Web Services
The Force Transformation's success depends on the
success of the Global Information Grid (GIG). The
GIG appears unwieldy at first glance, but after defining
all of the various components, it seems much more
manageable. Each component has its own unique set
of challenges and opportunities associated with it.
All parts are intertwined; some may stand alone, and
others may have dependencies. The bottom line is that
they all support the data.
The GIG is the basis for Network Centric Operations.
Network Centric Operations "refers to the combination
of emerging tactics, techniques, and technologies
that a networked force employs to create a decisive
...advantage."i This concept requires
us to visit all layers of communications to ensure
success. Currently, the DoD is visiting several of
these layers, as seen in Figure 1, in order to optimally
share information among the network's constituents.
Figure 1: 7 Layers of Communications
The adage "it is all about the data" holds
more truth today than ever before. Force Transformation
means Net Centric Operations get the data to the edge
users precisely when they need it. Net Centric Operations
have created a new metaphor of data usage by posting
it before it is fully processed, allowing for near
real-time use, with each user become both a consumer
and producer. This concept is becoming known as the
Net Centric Operating Environment.
Got IPv6 Proxy?
Blue Coat Systems, Inc.
A proxy does your organization good, especially the
ones with IPv6 capabilities. A proxy by definition
is an intermediary that is situated between a requestor
and a responder of a transaction. There exist various
types of proxies. In Web access a proxy is well-known
for its caching capabilities to reduce information
access latency and bandwidth consumption. A proxy
that is located in front of a group of origin servers,
which is known as a reverse proxy or surrogate offers
load balancing capability and hides the identities
of those servers. In addition to the caching functionality,
proxies provide many other types of services including
user authentication, connection acceleration, redirect,
request and response filtering, access logging, translation
and transcoding, virus scanning and spyware removal.
For example, a proxy can accelerate SSL connections
by offloading computation intensive cryptographic
operations to the built-in crypto hardware; a proxy
can translate web page content from one language into
another before presenting the information to the user;
a proxy can perform compression and decompression
over slow or cost sensitive links. Proxies are also
known to act as provisioned service access points
to traverse firewalls. An intelligent information
security proxy is a complex network appliance that
is comprised of both hardware and software, which
facilitates the construction of intelligent and fine-grained
policy rules, and is the ultimate enforcer of those
policies. The transition of an intelligent proxy from
the IPv4 domain to the IPv6 world is not a straightforward
syntactical conversion; rather, the transition requires
thorough analysis of the necessary information security
policies and the underlying protocols in the context
of IPv6 semantically.
ENTIRE ARTICLE [PDF]
Naming, Addressing, and IPv6
The IETF has always been somewhat unorthodox in their
use of the term address. In IPv4, one
32-bit field (dubbed an address) is used for both
routing and identification. In IPv6, the address has
been significantly updated (to 128 bits) but the confusing
use of the term address has been maintained.
This article will attempt to clarify the issue.
In standard usage, a name or identification points
to a particular person (or piece of equipment). If
the person moves to a new location, their name stays
An address tells one how to find a particular location.
If I first live in Virginia and then move to California,
I keep my name but change my address so mail or visitors
can find me. The function of an address is to enable
a package (or packet) to be routed to that location.
The address must be assigned in accordance with the
way the network works or certain "expenses"
are increased. This will be discussed below.
Goals and Wishes for IPv6 in 2005:
The Groundwork Must Be in Place this Year
Lightman, CEO, IPv6 Summit, Inc.
If you dont know where you are going you will
probably end up somewhere else.
The Internet will turn 32 years old (as IPv4) this
year, and 99% of its growth has occurred in the last
12 years. Given that economists estimate that 1/3
to 1/2 of the growth in Gross Domestic Product during
the 90s was directly or indirectly a result of the
Internet (presumably including corporate networking
using TCP/IP), America and many other countries could
have added trillions of dollars in wealth if we could
have had the Internet boom happen after ten years
instead of twenty years. I challenge readers to come
up with one other shift that was within our capacity
(since PCs and Macs and dial-up were all readily available
from 1984 onwards) that could have added more wealth
than moving up the Internet boom by a decade.
I learned recently from Dr. Larry Roberts, director
of ARPAnet, that the US federal government spent a
mere $15 million on the project that became the Internet,
with the total federal investment estimated at only
about $50 million. I find it typical of a government
that is blind to the distinction between investing
vs. consumption that there is actually no reliable
number for what was spent on the Internet. Had such
a distinction existed, it is very likely that the
Internet would be the greatest Return On Investment
of any project in history, and that is including the
Louisiana Purchase or Alaska, given that the Internets
return was so soon, and the land acquistions were
made over two centuries ago and one century ago, respectively.
Between fiscal year 1990 and 2000 the US federal government
increased its revenue from about $1 trillion to $2
trillion, and if the economists are right and the
Internet accounted for 1/3 to 1/2 of the GDP increase,
which the federal government would get between 20
and 30% in taxes, then the $50 million investment
in IPv4 infrastructure would be worth between $300
and $500 billion every year! This is a million-fold
return again, every year.
Is Your Firewall Ready for Voice Over IPv6?
Network Security a Practical Approach
Zlata Trhulj, Agilent Technologies
IPv6 Network Security Challenges
Developing and deploying IPv6-capable network security
devices and services is one of the key challenges
faced by network equipment manufacturers, network
operators and ISPs worldwide.
Industry debate on IPv6 security is heating up: millions
have been awarded for next-generation security research.
Independent academic and commercial forums, industry
standards bodies, large corporations and military
organizations are all engaged in a full debate over
emerging network security architectures, new firewall
models and end-to-end encryption methods. Along with
interoperability and reliability, security is regarded
as the key prerequisite for long-term IPv6 adoption.
The requirement to support hybrid (dual-stack) IPv4
and IPv6 environments introduces a whole new level
of complexity, no longer making the Internet simple.
Hundreds of millions of hosts and services worldwide
run IPv4 and will continue to do so for a long time.
And last but not least, it is no longer just data
application traffic carried over the Internet: Voice
over IP (VoIP) is here today, driven by a clear consumer
demand for converged network services.
Facing this emerging complexity, what should a security
appliance vendor, a service provider or a large corporation
do today? The emerging IP networking world is faced
with combinations of IPv4, IPv6, IPv4 and v6, data
and voice, network attacks (DoS), and legacy issues
such as network address translation (NAT) for IPv4,
all in the one equation.
The Why and How of IPv6
Murchison, Juniper Networks
you remember the operator-assisted phone systems now
only alive in old black and white movies? An operator
sitting behind a large board of plugs would literally
connect you to your call. Imagine how cumbersome a
system like that would be today, where the majority
of people not only have access to a phone but also
carry a cell phone. A system like this has definite
limitations for the demands of todays users
(and probably did then), which is why it is no longer
Eventually the current Internet technology, Internet
Protocol version 4 (IPv4), will be as restricting
to people, businesses and the implementation of new
technologies as the old phone system would be in todays
work environment. As many of you know, IPv4 has limitations
that will hinder developments in Voice over IP (VoIP),
mobile applications and devices, and network centric
war fighter communications for the military. Specifically,
the limitations are the need for Network Address Translation
(NAT) and the limitation on the number of available
IP addresses. By transitioning a network to IPv6,
these issues can be more easily addressed.
In this article we will take a look at what specifically
is driving the transition to IPv6 and what you need
to know about IPv6 to ensure a successful transition.
IPv6 - The Path to Secure Converged Networks
Shaikh, Product Management, Nortel
IPv6 has numerous improvements over IPv4. Future
converged networks can also benefit from IPv6 technology
- how can IPv6 pave the way for future secure converged
networks? IPv6 is designed to allow converged networks.
IPv6 also enables greater security to the medium and
provide enhanced infrastructure for emerging peer-to-peer
applications. It will enable the Internet to continue
to grow, accommodating new addresses for users and
destinations on the Internet that would otherwise
be unavailable with IPv4.
Originally, IPv6 was created because the IPv4 address
space was not large enough to support a global network
with billions of uniquely addressed devices. While
IPv6 has been around for over several years, it has
seen limited deployment. This is because the address
exhaustion problem has been ameliorated by the design
and deployment of ad hoc solutions, e.g., network
address translators (NATs). It should be noted that
these solutions are often complex, hard to extend
when new services are developed and can't support
basic Internet functions such as end-to-end IP security
(commonly called IPSec).
The explosion of Internet-capable wireless devices,
such as cell phones, PDAs, etc. has brought IPv6 to
the forefront. Notably, the 3GPP standard (R5) for
next generation wireless devices mandates IPv6 support
in the Internet Multimedia Subsystem (IM Subsystem)
and the UMTS Terrestrial Remote Access Network (UTRAN).
IPv6 was selected because it will allow every device
to have its own unique IP address. In addition, IPv6
has auto-configuration, integrated security, flow
labels for QoS support, mobility, simplified packet
handling and improved multicast support.
Indicators for Development with IPv6: Where is IPv6
Hares, Founder and CTO, NextHop Technologies
deployments of IPv6 and IPv6-based killer applications
and predicted mobile phone or wireless technology
breakthroughs are looming on the horizon. Deployments
of IPv6 in Europe and particularly in Asia have grown.
Many of these deployments are extensions of the early
academic work on IPv6. IPv6 adoption has many expectations
-- but what are the realities? What are the forces
that are impeding adoption, and what are the indicators
that signal its growth? Find out more read
this white paper written by Sue Hares, CTO and Co-founder
of NextHop Technologies.
WHITE PAPER [PDF]