Internet DRAFT - draft-eddy-ipv6-ip4-comparison

draft-eddy-ipv6-ip4-comparison






Network Working Group                                            W. Eddy
Internet-Draft                           Verizon Federal Network Systems
Expires: November 10, 2006                                      J. Ishac
                                              NASA Glenn Research Center
                                                             May 9, 2006


                  Comparison of IPv6 and IPv4 Features
                   draft-eddy-ipv6-ip4-comparison-00

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on November 10, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2006).

Abstract

   This document collects and comments on several aspects IPv6 that
   differ from IPv4, and what practical impacts these differences might
   have to an organization.  This data can be used in decision-making
   processes where the business case for deploying IPv6 is under
   consideration.





Eddy & Ishac            Expires November 10, 2006               [Page 1]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Addressing and Routing . . . . . . . . . . . . . . . . . . . .  4
   3.  Quality of Service . . . . . . . . . . . . . . . . . . . . . .  7
   4.  Security . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
   5.  Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
   6.  Multicast and Anycast  . . . . . . . . . . . . . . . . . . . . 11
   7.  Flexibility and Growth . . . . . . . . . . . . . . . . . . . . 13
   8.  Security Considerations  . . . . . . . . . . . . . . . . . . . 14
   9.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 15
   10.   Informative References . . . . . . . . . . . . . . . . . . . 15
       Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 18
       Intellectual Property and Copyright Statements . . . . . . . . 19





































Eddy & Ishac            Expires November 10, 2006               [Page 2]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


1.  Introduction

   While IPv4 has achieved widespread use and acclaim, its intended
   successor, IPv6, is still facing some hurdles in large-scale
   deployment.  In both aeronautical networking and space networks a
   move towards network-centric operations and away from application-
   specific point-to-point links is occuring.  In multiple groups that
   are attempting to define aeronautical or space networking
   architectures, the use of Internet protocols is well-accepted, but
   there is considerable uncertainty on whether to use IPv4, IPv6, or a
   dual-stack.

   It is the technical opinion of many that IPv6 is favorable, due to
   some of its features (mobility and security are particularly
   important for network-centric operations).  However, some decision-
   makers have been misinformed that IPv6 is equivalent to IPv4 with
   larger addresses.  This document sheds light on the reality that IPv6
   contains several additional features which may give it an improved
   business case over IPv4.  Companion documents debunk arguments where
   IPv4 is brought forward as a favored choice based on the logic that
   it has lower "overhead" than IPv6 [Eddy06], and provide evidence that
   IPv6 is currently mature enough for widespread use [EI06].

   This document is broken down as follows.  Section 2 compares the
   addressing and routing functions and capabilities in IPv4 and IPv6.
   Section 3 describes Quality of Service (QoS) features in both
   protocols.  Section 5 considers the mobility extensions to each
   protocol.  Section 6 discusses the multicast and anycast capabilities
   of IPv4 and IPv6, and Section 7 examines flexibility and
   extensibility.





















Eddy & Ishac            Expires November 10, 2006               [Page 3]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


2.  Addressing and Routing

   The most obvious difference between IPv4 and IPv6 is the change in
   the address size from 32 bits in IPv4 [RFC0791] to 128 bits in IPv6
   [RFC2460].  This increase in the raw number of bits means that there
   is a factor of 2^96 more addresses available in IPv6 than in IPv4.
   Due to the way that the address spaces are subnetted, scoped, and
   defined for multicast, private/experimental use, and other factors,
   however, the actual contrast is less direct than this simple factor.

   Aside from a few specific blocks for local-use, multicast, or other
   specific functions, the majority of the IPv4 32-bit address space is
   designated for global unicast addresses [RFC3330].  In the IPv4
   addressing architecture, IANA delegates Regional Internet Registries
   (RIRs) /8 address blocks (8-bit network identifiers), which the RIRs
   can then divide into variable-length blocks for further assignment to
   ISPs or other registries [RFC2050] [RFC1519].  The maximum address
   block that a site could ever be given is a /8, which leaves only 24-
   bits for subnetting and addressing within the organization.
   Historically, large or complexly-organized groups required multiple
   /8s.  For instance, at least 7 /8s belong to the US Department of
   Defense.  Considering there are only 256 such blocks, the IPv4
   address space can be seen as severely limited.  To compound matters,
   even using multiple /8s is a poor solution, since there is no
   guarantee that they will be numerically continuous, and if they are
   not, then both the local numbering scheme may be awkward, and
   multiple global routing table entries will be stored and propagated.
   In recent years, many IPv4 users have circumented these issues by
   using Network Address Translators (NATs), although this practice is
   known to be frought with problems of its own [RFC2993] [RFC3027].

   According to the IPv6 addressing architecture [RFC4291], the prefix
   of 001 identifies IPv6 global unicast addresses, so 1/8 of the
   address space, or 2^125 such addresses are available.  To date, IANA
   has given IPv6 address blocks varying from /16 to /23 in size to the
   RIRs.  The documented policy for the downstream assignment from RIRs
   to LIRs is that each LIR receive a minimum of a /32.  The minimum
   sized address block that an LIR can then give to a site is a /48.
   For more details see:
   http://www.iana.org/ipaddress/ipv6-allocation-policy-26jun02.  Since
   an IPv6 site can expect a *minimum* of a /48, this gives 16 bits of
   subneting space and 64 bits of interface identifier within a subnet
   (80 bits combined).  Contrast this to an IPv4 site that can expect a
   *maximum* of a /8, leaving only 24 bits of space to be used for
   subnetting and host addressing combined.  Since in reality, most
   sites do not get /8s, but rather /16s or /24s, there are more likely
   to be only 4-8 bits for subneting and 4-8 bits for identifying hosts
   within a subnet.



Eddy & Ishac            Expires November 10, 2006               [Page 4]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


   The IPv6 addressing architecture includes scoped-addresses, including
   scoped multicast addresses.  Support for scoping in IPv6 is more
   fully defined and has some features that IPv4 has no analogues to.
   As a simple example, IPv6 has all-routers addresses, which allow a
   node to find or communicate with routers without knowing their
   unicast address ahead of time.  In IPv4, this is not possible without
   the assistance of other protocols.

   Configuring and managing addresses in IPv6 and IPv4 can both be
   accomplished using versions of the DHCP protocol.  However, IPv6 has
   mechanisms that allow a node to configure its own globally routable
   address, without the need for DHCP [RFC2462], and IPv4 has no
   counterpart to this functionality.  DHCP is still of practical use in
   both protocols though, due to its ability to provide other
   configuration data, such as DNS server addresses.

   Due to the fact that LIRs assign subnet addresses in IPv6, rather
   than simply end-node addresses (as often done in IPv4), DHCP supports
   prefix-delegation extensions for IPv6.  Prefix-delegation allows DHCP
   to manage the assignment of subnet prefixes in an automated fashion,
   and allows IPv6 routers to be automatically configured.  IPv4 has no
   comparable feature.

   In conjunction with the depletion of the IPv4 address pool, a second
   major driver in the design of IPv6 is that IPv4 inter-domain routing
   tables are very large.  This is due to the inability to aggregate
   addresses based on the way that IPv4 blocks have been assigned.  The
   IPv6 addressing architecture and assignment policy is designed such
   that subnet addresses can potentially be aggregated very effectively.
   Essentially, the idea is that the global routing table only has to
   know how to reach a small number of large backbone networks, and the
   subnet addresses belonging to millions of end-sites can be aggregated
   hierarchically under the backbone provider addresses.  This prevents
   routers from using large amounts of memory on the routing table, thus
   allowing lookups to be faster, and network operators to spend less
   money on expensive router memory upgrades.  Recent developments
   indicate that Provider Independent addressing may become more
   prevalent in IPv6 assignments, and so this feature could be negated.

   In the effort to build faster router platforms, two well-known speed-
   bumps in IPv4 were performing the checksum operations, and
   fragmenting datagrams, when required.  While relatively efficient
   means of computing the IPv4 checksum [RFC1624], and even implementing
   it in hardware [RFC1936], were developed, it was decided to improve
   speed by not including any checksum at all in IPv6.  The rationale
   behind this is that most link-layer protocols have at least their own
   checksum (and often their own retransmission protocols and error-
   correcting codes), and reliable application or transport protocols



Eddy & Ishac            Expires November 10, 2006               [Page 5]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


   also implement checksums.  Since some of the link and higher-layer
   checksums in use were actually more powerful than the simple IPv4
   checksum, it was of relatively little utility.  Typical IPv4 router
   designs are incapable of performing fragmentation operations in their
   optimized "fast-path", and instead have to resort to the "slow-path"
   when fragmentation is required.  This can represent a bottleneck that
   limits throughput and loads the central processor (also used for
   routing table maintenance and general device control).  Since this is
   exploitable merely by users at any point in the network sending
   packets larger than a particular link's MTU, this could be seen as a
   weakness.  In IPv6, routers never fragment packets; packets larger
   than an outgoing link's MTU are dropped.  It is a source node's duty
   to pro-actively fragment its own packets.  The lack of checksum and
   fragmentation responsibilties potentially allow IPv6 routers to
   perform slightly faster and with lower power requirements, but these
   differences are likely to be fairly minimal under typical use cases.

   Another difference between IPv4 and IPv6 is in the way that IP
   addresses within a subnet are resolved into link-layer protocol
   addresses.  IPv4 used the ARP [RFC0826] mechanism for this, while
   IPv6 uses Neighbor Discovery (ND) [RFC2461].  There are at least two
   key differences betwen ARP and ND.  The first is that ARP operates
   directly on top of the link layer, while ND operates using ICMPv6, on
   top of IPv6, on top of the link layer.  Practically, this means that
   in the design of link layer protocols, distinct codes identifying ND
   and IPv6 payload types do not have to be defined, whereas IPv4 and
   ARP require separate codepoints.  This is of only marginal
   importance.  The main difference between ARP and ND, is that IPv6's
   ND is highly extensible and this extensibility has been used for a
   number of purposes, including security (authentication of network
   elements and resolution protocol messages), automatic prefix and
   interface identifier configuration, and advertisement of the MTU.
   IPv4's ARP has no such facilities and no means for extension.

   Altogether, in terms of addressing, routing, and forwarding features,
   IPv6 has advantages over IPv4 in every respect considered.















Eddy & Ishac            Expires November 10, 2006               [Page 6]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


3.  Quality of Service

   The Differentiated Services QoS architecture utilizes the IPv4 Type
   of Service byte and the IPv6 Traffic Class byte in the same way
   [RFC2474].  In this respect, IPv4 and IPv6 are equivalent.

   A significant capability that is part of the standard IPv6 header,
   and is not present in IPv4, is the ability to classify traffic into
   flows based on a flow label header field.  This can be used as a
   basic building block to efficiently support QoS policies and
   protocols.  In IPv4, flows can only be classified by the relatively
   expensive process of examining (and possibly parsing) header fields.
   Thus, certain types of per-flow QoS can be enabled in routers with
   lower computational overhead when using IPv6.





































Eddy & Ishac            Expires November 10, 2006               [Page 7]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


4.  Security

   Both IPv4 and IPv6 can be used in conjunction with the IPsec suite of
   protocols [RFC4301].  In fact, the operation of the IPsec protocols
   is basically identical whether they are being used with IPv4 or IPv6.
   Since the Transport Layer Security (TLS) protocol [RFC4346] runs over
   top of the transport layer, and does not interface directly with IP,
   it is similarly mostly agnostic to the version of IP that is used.
   Both TCP and SCTP can run TLS, and both will run over IPv4 and IPv6.
   Additionally, the X.509 format for certificates that is often used in
   IPsec and TLS, has encoding methods for both IPv4 and IPv6 addresses
   [RFC3779].  So, the two most prevalent security architectures in the
   Internet suite, IPsec and TLS, have no significant differences
   between use with IPv4 and IPv6.

   It is often touted that IPv6 has superior security properties to
   IPv4.  In the majority of cases, the reasoning used to justify this
   is that IPsec is a part of IPv6, because in early IPsec
   specifications [RFC1825], it was stated that all IPv6-capable hosts
   MUST implement the IPsec Authentication Header in a basic
   configuration (keyed-MD5 with 128-bit key [RFC1828]), while for IPv4
   supporting any part of IPsec was optional.  In fact, current IPv6
   node requirements mandate that IPv6 nodes MUST support both
   Authentication Header and Encapsulating Security Payload portions of
   IPsec [RFC4294].  However, since IPv6's core functions do not rely on
   IPsec, and only support for manual keying is required, the argument
   that IPv6 is more secure than IPv4 based on the requirement to
   support IPsec is not well-founded.  The reality of the situation is
   that IPv6-conformant implementations can more certainly be expected
   to have support for IPsec, but it is still up to the users and
   network managers to configure them, and the exact same IPsec features
   are also readily available in IPv4 implementations, but not required
   by IETF fiat to be present.

   Outside of IPsec, there are other features of IPv6 that are not found
   in IPv4, and can potentially give IPv6 better security properties.  A
   couple of the features included under the Network Architecture
   Protection umbrella [VHDCK05] that are relevent to security are end-
   system privacy and topology hiding.  End-system privacy refers to the
   ability of an IPv6 end-system to generate and change its own IPv6
   address through selection of the Interface Identifier portion of the
   address.  A node can use this capability to change its address
   periodically to avoid things like easily being able to correllate
   remote log files of world-wide web activity [RFC3041].  IPv4 has no
   equivalent capability.  IPv4 nodes can dynamically change their
   public addresses using DHCP, but DHCP servers are rarely configured
   to permit this, and it requires a DHCP server, whereas the IPv6
   solution is end-host based.  Topology hiding is a similar technique



Eddy & Ishac            Expires November 10, 2006               [Page 8]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


   that involves changing the prefix refering to a subnet, rather than
   the interface identifier.  This prevents an attacker from being able
   to easily determine other related addresses from a known address.

   In addition, IPv6 has the optional secure neighbor discovery
   extension, which allows hosts to authenticate the ND messages
   [RFC3971], and uses cryptographically-generated addresses to prove
   address ownership without any certificate management or other
   security infrastructure [RFC3972].  IPv4 has no comparable features,
   and its address space is too small for the features to be portable to
   IPv4.

   In summary, IPv6 does have superior security features in comparison
   to IPv4, but these have little to do with IPsec, and both the IPsec
   and TLS functionalities are equivalent without regard to the
   underlying IP version.



































Eddy & Ishac            Expires November 10, 2006               [Page 9]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


5.  Mobility

   Support for node mobility is not required in either IPv4 or IPv6,
   however, both protocols support mobility extensions [RFC3344]
   [RFC3775].  The means of supporting mobility, and the features of
   each mobility protocol differ.  Mobile IPv4 uses UDP for signaling,
   whereas Mobile IPv6 uses IPv6 extension headers.  This allows for a
   cleaner implementation, since the code can fully integrated with the
   IP-processing where it belongs, and no transport protocol port
   numbers need to be bound for special use.

   Mobile IPv4 has two basic modes of operation, triangle routing and
   bi-directional tunneling.  Mobile IPv6 supports an optional route
   optimization mode that is more efficient than the alternatives
   available in Mobile IPv4.  Route optimization avoids both the header
   overhead of tunneling and the latency involved in the routing
   indirection that Mobile IPv4 depends on for reaching mobile nodes.
   In certain business scenarios, the Mobile IPv6 route optimization
   feature might actually result in saving money, since it greatly
   reduces the amount of traffic to and from the home network.

   Mobile routers (and correspondingly, the mobile networks behind them)
   are supported in Mobile IPv4, but their operation is not particularly
   well specified.  In contrast, Mobile IPv6 mobile routers, called NEMO
   routers, have been specified very clearly in their own standards
   documents [RFC3963].  Many of the complications and difficulties that
   arise only in mobile router scenarios, but not with simple mobile
   nodes, are only being solved actively in the IETF in the context of
   NEMO, and not in the context of Mobile IPv4.

   In summary, based on cleaner design, support for route optimization,
   and NEMO extensions, IPv6 has superior mobility features than IPv4.



















Eddy & Ishac            Expires November 10, 2006              [Page 10]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


6.  Multicast and Anycast

   IPv4 and IPv6 are both capable of supporting network-layer multicast
   communications.  The major differences between IPv4 and IPv6 in terms
   of multicast lie mainly in the fact that multicast support is
   considered an "additional" part of IPv4, whereas in IPv6 it is
   integral.  IPv6's addressing architecture defines certain commonly
   useful multicast addresses (e.g. all-routers), and describes the
   ability to scope multicast addresses (e.g. there is a link-local
   scope that can refer only to neighbors, along with scopes for
   interface-local, admin-local, site-local, organization-local, and
   global) [RFC4291].  This is used as a building block for the ND
   service for autoconfiguration in IPv6.  Broadcast addresses as used
   in IPv4 are then replaced with multicast addresss of the appropriate
   scope.

   The basic host to router multicast protocol in IPv4 is IGMPv3
   [RFC3376].  In IPv6, this function is filled by MLDv2 [RFC3810],
   which is functionally equivalent.  The main difference between the
   two protocols is similar to one of the differences between ARP and
   ND, in that IGMPv3 messages are encapsulated directly in IPv4
   datagrams, whereas MLDv2 messages are carried by ICMPv6 inside IPv6.
   The difference is in the reuse of ICMPv6 as a general purpose control
   messaging/signaling protocol, rather than defining a new protocol
   number with separate processing.

   In theory the IPv4 and IPv6 multicast features might be seen as
   comparable, but in reality, IPv6 has a large advantage in that it was
   designed from the start with multicast as a consideration.  As
   deployed, IPv4 routers on the public Internet are usually not
   configured to support much if any multicast traffic, whereas IPv6
   routers must support multicast to perform basic functions.  IPv6
   multicast also does not rely on the ungainly tunnels that are used in
   IPv4 multicast to get around the common one-to-one mapping between
   interfaces and IPv4 addresses.  Since IPv6 specifically supports
   assigning several addresses to an interface, multicast support is
   more straightforward.

   While the early work on the concept of anycast involved IPv4
   [RFC1546], and in the IPv4 Internet, anycast is actively being used
   in particular niches [Woodcock02], anycast features are not formally
   a feature of the IPv4 standard, but are supported in the IPv6
   standard.  Technically, most unicast routing protocols can support
   anycast without any changes, since routing messages advertising
   anycast groups have similar semantics as those advertising multihomed
   sites.  However, due to the difference in nature between unicast and
   anycast communications, changes at other layers of the protocol stack
   are required to properly use anycast.  Anycast continues to be a



Eddy & Ishac            Expires November 10, 2006              [Page 11]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


   research area with several challenging topics.  Particularly it is
   not clear how IPv6 anycast will be used on a global scale [WC04].
   Given the degree of uncertainty in what the utility of anycast is,
   and how technical barriers for global use could be overcome, it does
   not seem to be possible to assess IPv4 versus IPv6 anycast features
   at this time.













































Eddy & Ishac            Expires November 10, 2006              [Page 12]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


7.  Flexibility and Growth

   Enterprise network designers have a strong desire for their networks
   to be able to grow with an organizations needs and be flexible enough
   to allow for rapid deployment of new applications and services.  IPv6
   currently seems much more capable than IPv4 in meeting these demands.
   For instance, the limited amount of space available for subnetting in
   IPv4 makes networks relatively inflexible.  Renumbering in IPv4 is a
   difficult operation that the protocol was not designed for, whereas
   IPv6's design has a number of features that allow automatic
   renumbering to be smoothly and efficiently supported [Chown04].

   As noted in the companion IPv6 maturity study [EI06], there is
   currently only one IETF working group that seems to be chartered to
   provide an IPv4-specific solution, while there are many groups
   working on IPv6-specific solutions.  This indicates that in the
   future, it is possible that a number of specific network layer
   enhancements may only be available for IPv6 networks.  It should be
   noted however, that the vast majority of IETF groups are pursuing
   solutions that work in conjunction with both IPv4 and IPv6.

   In many IPv4 end-sites, the use of NAT is popular for a number of
   reasons.  However, NAT is known to have many poor architectural
   properties [RFC2993] [RFC3027].  In IPv6, the common NAT
   functionalities that network administrators are interested in can all
   be performed without any of the negative repercusions [VHDCK05].  The
   ability to deploy new applications without any concern for
   application layer gateways in the NAT, or complex tunneling
   mechanisms [RFC3489] [RFC4380] alone is large practical benefit of
   IPv6.





















Eddy & Ishac            Expires November 10, 2006              [Page 13]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


8.  Security Considerations

   This informational document only contains informational text about
   IPv6 and IPv4 features.  There are no new security considerations
   raised by this material.














































Eddy & Ishac            Expires November 10, 2006              [Page 14]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


9.  Acknowledgements

   Work on this document was performed at NASA's Glenn Research Center,
   in support of the NASA Space Communications Architecture Working
   Group (SCAWG), and the FAA/Eurocontrol Future Communications Study
   (FCS).  Will Ivancic of NASA contributed useful comments on this
   document.

10.  Informative References

   [Chown04]  Chown, T., "Things to Think About When Renumbering an IPv6
              Network",
              draft-chown-v6ops-renumber-thinkabout-00 Internet-Draft
              (expired), October 2004.

   [EI06]     Eddy, W. and W. Ivancic, "Assessment of IPv6 Maturity",
              draft-eddy-ipv6-maturity-00 Internet-Draft (work in
              progress), May 2006.

   [Eddy06]   Eddy, W., "Comparison of IPv4 and IPv6 Header Overhead",
              draft-eddy-ip-overhead-00 Internet-Draft (work in
              progress), May 2006.

   [RFC0791]  Postel, J., "Internet Protocol", STD 5, RFC 791,
              September 1981.

   [RFC0826]  Plummer, D., "Ethernet Address Resolution Protocol: Or
              converting network protocol addresses to 48.bit Ethernet
              address for transmission on Ethernet hardware", STD 37,
              RFC 826, November 1982.

   [RFC1519]  Fuller, V., Li, T., Yu, J., and K. Varadhan, "Classless
              Inter-Domain Routing (CIDR): an Address Assignment and
              Aggregation Strategy", RFC 1519, September 1993.

   [RFC1546]  Partridge, C., Mendez, T., and W. Milliken, "Host
              Anycasting Service", RFC 1546, November 1993.

   [RFC1624]  Rijsinghani, A., "Computation of the Internet Checksum via
              Incremental Update", RFC 1624, May 1994.

   [RFC1825]  Atkinson, R., "Security Architecture for the Internet
              Protocol", RFC 1825, August 1995.

   [RFC1828]  Metzger, P. and W. Simpson, "IP Authentication using Keyed
              MD5", RFC 1828, August 1995.

   [RFC1936]  Touch, J. and B. Parham, "Implementing the Internet



Eddy & Ishac            Expires November 10, 2006              [Page 15]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


              Checksum in Hardware", RFC 1936, April 1996.

   [RFC2050]  Hubbard, K., Kosters, M., Conrad, D., Karrenberg, D., and
              J. Postel, "INTERNET REGISTRY IP ALLOCATION GUIDELINES",
              BCP 12, RFC 2050, November 1996.

   [RFC2460]  Deering, S. and R. Hinden, "Internet Protocol, Version 6
              (IPv6) Specification", RFC 2460, December 1998.

   [RFC2461]  Narten, T., Nordmark, E., and W. Simpson, "Neighbor
              Discovery for IP Version 6 (IPv6)", RFC 2461,
              December 1998.

   [RFC2462]  Thomson, S. and T. Narten, "IPv6 Stateless Address
              Autoconfiguration", RFC 2462, December 1998.

   [RFC2474]  Nichols, K., Blake, S., Baker, F., and D. Black,
              "Definition of the Differentiated Services Field (DS
              Field) in the IPv4 and IPv6 Headers", RFC 2474,
              December 1998.

   [RFC2993]  Hain, T., "Architectural Implications of NAT", RFC 2993,
              November 2000.

   [RFC3027]  Holdrege, M. and P. Srisuresh, "Protocol Complications
              with the IP Network Address Translator", RFC 3027,
              January 2001.

   [RFC3041]  Narten, T. and R. Draves, "Privacy Extensions for
              Stateless Address Autoconfiguration in IPv6", RFC 3041,
              January 2001.

   [RFC3330]  IANA, "Special-Use IPv4 Addresses", RFC 3330,
              September 2002.

   [RFC3344]  Perkins, C., "IP Mobility Support for IPv4", RFC 3344,
              August 2002.

   [RFC3376]  Cain, B., Deering, S., Kouvelas, I., Fenner, B., and A.
              Thyagarajan, "Internet Group Management Protocol, Version
              3", RFC 3376, October 2002.

   [RFC3489]  Rosenberg, J., Weinberger, J., Huitema, C., and R. Mahy,
              "STUN - Simple Traversal of User Datagram Protocol (UDP)
              Through Network Address Translators (NATs)", RFC 3489,
              March 2003.

   [RFC3775]  Johnson, D., Perkins, C., and J. Arkko, "Mobility Support



Eddy & Ishac            Expires November 10, 2006              [Page 16]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


              in IPv6", RFC 3775, June 2004.

   [RFC3779]  Lynn, C., Kent, S., and K. Seo, "X.509 Extensions for IP
              Addresses and AS Identifiers", RFC 3779, June 2004.

   [RFC3810]  Vida, R. and L. Costa, "Multicast Listener Discovery
              Version 2 (MLDv2) for IPv6", RFC 3810, June 2004.

   [RFC3963]  Devarapalli, V., Wakikawa, R., Petrescu, A., and P.
              Thubert, "Network Mobility (NEMO) Basic Support Protocol",
              RFC 3963, January 2005.

   [RFC3971]  Arkko, J., Kempf, J., Zill, B., and P. Nikander, "SEcure
              Neighbor Discovery (SEND)", RFC 3971, March 2005.

   [RFC3972]  Aura, T., "Cryptographically Generated Addresses (CGA)",
              RFC 3972, March 2005.

   [RFC4291]  Hinden, R. and S. Deering, "IP Version 6 Addressing
              Architecture", RFC 4291, February 2006.

   [RFC4294]  Loughney, J., "IPv6 Node Requirements", RFC 4294,
              April 2006.

   [RFC4301]  Kent, S. and K. Seo, "Security Architecture for the
              Internet Protocol", RFC 4301, December 2005.

   [RFC4346]  Dierks, T. and E. Rescorla, "The Transport Layer Security
              (TLS) Protocol Version 1.1", RFC 4346, April 2006.

   [RFC4380]  Huitema, C., "Teredo: Tunneling IPv6 over UDP through
              Network Address Translations (NATs)", RFC 4380,
              February 2006.

   [RFC4489]  Park, J-S., Shin, M-K., and H-J. Kim, "A Method for
              Generating Link-Scoped IPv6 Multicast Addresses",
              RFC 4489, April 2006.

   [VHDCK05]  de Velde, G., Hain, T., Droms, R., Carpenter, B., and E.
              Klein, "IPv6 Network Architecture Protection",
              draft-ietf-v6ops-nap-02 Internet-Draft (work in progress),
              October 2005.

   [WC04]     Weber, S. and L. Cheng, "A Survey of Anycast in IPv6
              Networks", IEEE Communications Magazine , January 2004.

   [Woodcock02]
              Woodcock, B., "Best Practices in IPv4 Anycast Routing",



Eddy & Ishac            Expires November 10, 2006              [Page 17]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


              presentation slides version 0.9, August 2002.


Authors' Addresses

   Wesley M. Eddy
   Verizon Federal Network Systems
   21000 Brookpark Rd, MS 54-5
   Cleveland, OH  44135

   Phone: 216-433-6682
   Email: weddy@grc.nasa.gov


   Joseph Ishac
   NASA Glenn Research Center
   21000 Brookpark Rd, MS 54-5
   Cleveland, OH  44135

   Phone: 216-433-3494
   Email: jishac@grc.nasa.gov






























Eddy & Ishac            Expires November 10, 2006              [Page 18]

Internet-Draft        IPv6-IPv4 Feature Comparison              May 2006


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Copyright Statement

   Copyright (C) The Internet Society (2006).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.




Eddy & Ishac            Expires November 10, 2006              [Page 19]