Interactive end-of-chapter exercises


IPv6 Tunneling and Encapsulation

Consider the network shown below which contains four IPv6 subnets, connected by a mix of IPv6-only routers(shaded blue), IPv4-only routers (shaded red) and dual-capable IPv6/IPv4 routers (shaded blue with red interfaces to IPv4 routers). You might want to review Section 4.3.4 in the textbook before doing this problem.


Suppose that a host of subnet A wants to send an IPv6 datagram to a host on subnet D. Assume that the forwarding between these two hosts goes along the path: A --> C --> a --> b --> F --> D



Question List


1. Is the datagram being forwarded from A to C an IPv4 or IPv6 datagram?

2. What is the source address of this A to C datagram?

3. What is the destination address of this A to C datagram?

4. Is this A to C datagram encapsulating another datagram? Yes or No.

5. Is the datagram being forwarded from C to a an IPv4 or IPv6 datagram?

6. What is the source address of this C to a datagram?

7. What is the destination address of this C to a datagram?

8. Is this C to a datagram encapsulating another datagram? Yes or No.

9. What is the source address of this encapsulated datagram?

10. What is the destination address of this encapsulated datagram?

11. Is the datagram being forwarded from a to b an IPv4 or IPv6 datagram?

12. What is the source address of this a to b datagram?

13. What is the destination address of this a to b datagram?

14. Is this a to b datagram encapsulating another datagram? Yes or No.

15. What is the source address of this encapsulated datagram?

16. What is the destination address of this encapsulated datagram?

17. Is the datagram being forwarded from b to F an IPv4 or IPv6 datagram?

18. What is the source address of this b to F datagram?

19. What is the destination address of this b to F datagram?

20. Is this b to F datagram encapsulating another datagram? Yes or No.

21. What is the source address of this encapsulated datagram?

22. What is the destination address of this encapsulated datagram?

23. Is the datagram being forwarded from F to D an IPv4 or IPv6 datagram?

24. What is the source address of this F to D datagram?

25. What is the destination address of this F to D datagram?

26. Is this F to D datagram encapsulating another datagram? Yes or No.

27. What router is the 'tunnel entrance'? Give the router's letter

28. What router is the 'tunnel exit'? Give the router's letter

29. Which protocol encapsulates the other, IPv4 or IPv6?




Solution


1. The datagram is an IPv6 datagram.

2. The source IP address is 2922:F58B:5C14:4A61:12B2:1B1F:3997:ADD8

3. The destination IP address is C3F4:58BC:EB16:F94F:C294:FDFB:462C:185E

4. No, the datagram is NOT encapsulated.

5. The datagram is an IPv4 datagram.

6. The source IP address is 42.102.157.190

7. The destination IP address is 144.214.183.221

8. Yes, the datagram is encapsulated.

9. The source address of this encapsulated datagram is 2922:F58B:5C14:4A61:12B2:1B1F:3997:ADD8

10. The destination address of this encapsulated datagram is C3F4:58BC:EB16:F94F:C294:FDFB:462C:185E

11. The datagram is an IPv4 datagram.

12. The source IP address is 42.102.157.190

13. The destination IP address is 144.214.183.221

14. Yes, the datagram is encapsulated.

15. The source address of this encapsulated datagram is 2922:F58B:5C14:4A61:12B2:1B1F:3997:ADD8

16. The destination address of this encapsulated datagram is C3F4:58BC:EB16:F94F:C294:FDFB:462C:185E

17. The datagram is an IPv4 datagram.

18. The source IP address is 42.102.157.190

19. The destination IP address is 144.214.183.221

20. Yes, the datagram is encapsulated.

21. The source address of this encapsulated datagram is 2922:F58B:5C14:4A61:12B2:1B1F:3997:ADD8

22. The destination address of this encapsulated datagram is C3F4:58BC:EB16:F94F:C294:FDFB:462C:185E

23. The datagram is an IPv6 datagram.

24. The source IP address is 2922:F58B:5C14:4A61:12B2:1B1F:3997:ADD8

25. The destination IP address is C3F4:58BC:EB16:F94F:C294:FDFB:462C:185E

26. No, the datagram is NOT encapsulated.

27. The tunnel entrance is router C

28. The tunnel exit is router F

29. IPv4, in order to maintain compatibility with existing IPv4 infrastructure, IPv6 datagrams are put in the payload of an IPv4 datagram. These IPv4 datagrams are passed on until it reaches a router which supports IPv6, where the IPv6 datagram is decapsulated and passed on.



That's incorrect

That's correct

The answer was: IPv6

Question 1 of 29

The answer was: 2922:F58B:5C14:4A61:12B2:1B1F:3997:ADD8

Question 2 of 29

The answer was: C3F4:58BC:EB16:F94F:C294:FDFB:462C:185E

Question 3 of 29

The answer was: No

Question 4 of 29

The answer was: IPv4

Question 5 of 29

The answer was: 42.102.157.190

Question 6 of 29

The answer was: 144.214.183.221

Question 7 of 29

The answer was: Yes

Question 8 of 29

The answer was: 2922:F58B:5C14:4A61:12B2:1B1F:3997:ADD8

Question 9 of 29

The answer was: C3F4:58BC:EB16:F94F:C294:FDFB:462C:185E

Question 10 of 29

The answer was: IPv4

Question 11 of 29

The answer was: 42.102.157.190

Question 12 of 29

The answer was: 144.214.183.221

Question 13 of 29

The answer was: Yes

Question 14 of 29

The answer was: 2922:F58B:5C14:4A61:12B2:1B1F:3997:ADD8

Question 15 of 29

The answer was: C3F4:58BC:EB16:F94F:C294:FDFB:462C:185E

Question 16 of 29

The answer was: IPv4

Question 17 of 29

The answer was: 42.102.157.190

Question 18 of 29

The answer was: 144.214.183.221

Question 19 of 29

The answer was: Yes

Question 20 of 29

The answer was: 2922:F58B:5C14:4A61:12B2:1B1F:3997:ADD8

Question 21 of 29

The answer was: C3F4:58BC:EB16:F94F:C294:FDFB:462C:185E

Question 22 of 29

The answer was: IPv6

Question 23 of 29

The answer was: 2922:F58B:5C14:4A61:12B2:1B1F:3997:ADD8

Question 24 of 29

The answer was: C3F4:58BC:EB16:F94F:C294:FDFB:462C:185E

Question 25 of 29

The answer was: No

Question 26 of 29

The answer was: C

Question 27 of 29

The answer was: F

Question 28 of 29

The answer was: IPv4

Question 29 of 29

Try Another Problem

We’d appreciate your leave us feedback on this networking tutor.

We gratefully acknowledge the programming and problem design work of John Broderick (UMass '21), which has really helped to substantially improve this site. The networking tutor was designed and implemented by Hashim Zia and Shayan Ahmad from New York University Abu Dhabi.

Copyright © 2010-2025 J.F. Kurose, K.W. Ross
Comments welcome and appreciated: kurose@cs.umass.edu