1
《计算机系统与网络技术》
课程大作业
<Computer systems and network technology>
Course assignment
题目 Subject Ipv4 and ipv6 Double
stack network design
学生姓名 Name
学 号 ID
学 院 College 国际教育学院
专 业 Major 数字媒体技术
完成日期 Expire 2023 年 1 月 9 日
2
目录 Table of Contents
总体要求 General Requirements...............................................................................................3
具体要求 Specific Requirements ..............................................................................................3
1) 课题意义 Significance of the Project(15%)............................................................3
2) 网络理论基础 Basic Theory of Network(20%) ....................................................3
3) 网络结构 Network Structure(20%) ........................................................................3
4) 网络管理与网络安全 Network Management and Network Security(20%) ..........3
5) 总结 Summary(10%) ..............................................................................................3
6) 格式规范 Format Specification(15% ........................................................................3
7) 不得抄袭,不得复制 No Plagiarism, No Reproduction.............................................3
3
总体要求 General Requirements
学生结合《计算机系统与网络技术》课堂所学内容,按照计算机系统与网络技术的知识,
选择校园局域网、网络层次化(IPv4 或 IPv6)、无线网络、和移动网络题目,经过学生自己
查找资料、调查与分析,撰写相关题目论文。文章采用英文书写(字体:Times New
Roman,标题大小:14,内容大小 11),2000 英文字数。各章题目字体采用标题 2,论文内
容字体采用正文,用 Word 生成目录。
Combined with the content learned in the "Computer Systems and Network Technology"
course, students will select a topic that may be; a campus local area network, the network
hierarchies (IPv4 or IPv6), a wireless network, or a mobile network. The students will use their
knowledge of computer systems and network technologies to find information, investigate, and
analyze the topic. The paper will be written in English with 2000 words (Font: Times New Roman,
title size: 14, content size 11). Its title font for each chapter is “Heading 2”. Its content font of the
paper is “Normal”, and a table of contents is generated with Word.
具体要求 Specific Requirements
论文包含以下几部分内容:
The paper contains the following parts:
1) 课题意义 Significance of the Project(15%)
2) 网络理论基础 Basic Theory of Network(20%)
3) 网络结构 Network Structure(20%)
4) 网络管理与网络安全 Network Management and Network Security(20%)
5) 总结 Summary(10%)
6) 格式规范 Format Specification(15%)
7) 不得抄袭,不得复制 No Plagiarism, No Reproduction
4
Ipv4 and ipv6 Double stack network design
1. Significance of the Project
With the rapid development of the Internet, IPv4 address resources have been exhausted., The
development of the next generation IPv6 technology has become more and more urgent. IPv6
has made a lot of improvements to IPv4. The most significant feature is that compared with
IPv4, the number of 32-bit addresses is about 4.3 billion, increasing to 128 bits, that is, 128
power of 2. It is said that every grain of sand on the earth can be assigned an ipv6 address. In
addition, Ipv6 has also enhanced Ipv4 in terms of security and functionality.
However, at present, a large number of networks are still in the stage of IPv4 deployment. If
IPv6 is completely redeployed directly, it will bring great inconvenience. In order to solve
this problem, this design adopts a transition scheme, namely the dual protocol stack of IPv4
and IPv6.
In principle, it is very easy to understand, that is, to deploy the IPv6 protocol again in the
network while ensuring that the existing Ipv4 network architecture remains unchanged. Both
network devices and terminals run IPv4 and IPv6 dual protocols at the same time. In this way,
whether users want to access the target with Ipv4 address or IPv6 address, they can achieve
this. Finally, the network environment will smoothly transition from IPv4 to IPv6.
The evolution of the entire network protocol is shown as follows
IPv4->IPv4/IPv6->IPv6
This design will be reflected in the addition of IPv6 protocol in the IPv4 network environment.
The PC can access the IPv4 Internet www.world.com server through the IPv4 address at the
same time. And can access www.ipv6.com Internet http server through Ipv6 address.
2. Basic Theory of Network
Part of IPv4
STP
STP technology is used to solve the loop problem caused by redundant lines in the LAN. STP
uses root bridge and port election to determine which devices forward BPDU and which ports
need to be blocked under normal conditions.
In case of failure, STP protocol will start those blocked ports, that is, backup redundant lines,
to restore network communication
Vlan
The full name of Vlan is Virtual Local area Networks It can create a logical local area
network on the switch, which can be isolated from other devices connected to the same switch.
The biggest advantage of Vlan is that it can isolate the broadcast domain. VLAN capable
switches allow multiple virtual LANs to be defined on a single physical LAN infrastructure.
5
Host communication within the VLAN is just like they (no other host) are connected to the
switch. The ports in each VLAN form a broadcast domain (that is, broadcast traffic from one
port can only reach other ports in the group).
However, in most cases, PCs connected to different Vlan interfaces should be able to access
and communicate with each other. At this point, the switch's solution to this requirement is
the trunk of Vlan. The switch interface configured as Trunk can allow multiple Vlan data
frames to carry labels through.
Route
There are many different IP network segments in the LAN. The network equipment needs to
decide how to forward the data packets sent by the PC. The network engineer can configure
static routing on the device to tell the network device how to forward the corresponding data
packets. However, this method has the problem of large workload and easy to make mistakes.
Therefore, the most common situation is that engineers will configure dynamic routing
protocols to let network devices learn the routing entries of each network segment by
themselves. Common routing protocols are OSPF, EIGRP, ISIS and BGP.
DHCP/DNS
All devices in the network need IP addresses to communicate with each other. Take the most
common PC for example, users or administrators need to configure IP addresses, masks,
gateways, DNS and other information before they can access the Internet without obstacles
If users need to configure by themselves, they may encounter many difficulties, especially the
end users who do not understand the network. They may not be able to configure or configure
the wrong IP address. This may lead to critical device IP address conflicts and interrupt the
entire network communication.
DHCP can solve this problem. It can uniformly manage addresses through the server, and the
end users can dynamically obtain addresses, greatly reducing the workload of administrators
and the probability of causing errors.
DNS is a technology for users to visit websites on the Internet. We all know that all devices
need IP addresses to communicate with each other, so do websites. But the IP address is a
string of numbers or letters. It is very difficult for users to remember. The DNS server records
the mapping relationship between IP address and domain name. After the user enters a
domain name that is easy to remember, the PC will request the corresponding IP from the
server, and the server will respond if it can query. In this way, users can access the website by
entering the domain name.
SSH
In the LAN, most administrators will log in to the device remotely for convenience. There are
two general options, telnet and ssh. Generally, ssh is chosen because it encrypts the
communication and avoids the disclosure of the administrator's user name and password
Part of IPv6
IPv6 address format
The IPv6 address is 128 bits in total, consisting of eight 16 bit hexadecimal fields, separated