17.10.2014 Views

Crosby-Signed Thesis - Alliance Digital Repository

Crosby-Signed Thesis - Alliance Digital Repository

Crosby-Signed Thesis - Alliance Digital Repository

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IMPACT OF IPV6 TRANSITION MECHANISMS ON THE NETWORK FORENSIC<br />

29<br />

Tunneling.<br />

Tunneling involves creating a temporary virtual path between two endpoints for the<br />

purpose of exchanging data. The research by Hsieh and Kao (2005), Jamhour and Storoz (2002),<br />

and Tantayakul, et al. (2008) illustrated the use of tunneling as an IPv6 transition mechanism.<br />

IPv6 tunnels utilize an existing IPv4 infrastructure and encapsulate or decapsulate IPv4 and IPv6<br />

packets between two endpoints. These endpoints can be either a host or a router; however, Yange,<br />

et al. (2009) pointed out that both endpoints must have implemented the same type of tunnel.<br />

The typography and types of tunnels for IPv6 transition are discussed by Gilligan and<br />

Nordmark (2000). Tunnels can be created between a router and host, host and router, host and<br />

host, or router and host. Additionally, Gilligan and Nordmark classified tunnels as either<br />

configured, semi-automatic, or automatic. Configured tunnels require prior setup to function and<br />

require the tunnel creator to specify the tunnel endpoint. Semi-automatic tunnels, like Tunnel-<br />

Brokers, require prior configuration but, operate independently after they are configured by the<br />

user. Automatic tunnels, like 6to4, ISATAP, and Teredo operate transparently and require little<br />

interaction from the user to configure the tunnel.<br />

Gilligan and Nordmark (2000) outlined the encapsulation and decapsulation process.<br />

During this process, the sending node encapsulates the IPv6 packet inside of an IPv4 header and<br />

sends the frame to the tunnel endpoint while fragmenting and maintaining the connection state if<br />

necessary. The tunnel endpoint decapsulates the packet by removing the IPv4 header and sending<br />

the packet through the IPv6 network. Encapsulated packets are identified by observing the<br />

protocol number 41 in the IP header protocol field. Gilligan and Nordmark recommended that<br />

packets bearing invalid source IPv4 or IPv6 addresses should be discarded and that virtual<br />

interfaces used by tunnels should be link-local addresses with the address scheme of

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!