Compatibility between the new and the current ipv6 packet headers
Upcoming SlideShare
Loading in...5
×
 

Compatibility between the new and the current ipv6 packet headers

on

  • 417 views

 

Statistics

Views

Total Views
417
Views on SlideShare
417
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Compatibility between the new and the current ipv6 packet headers Compatibility between the new and the current ipv6 packet headers Document Transcript

    • International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 211 COMPATIBILITY BETWEEN THE NEW AND THE CURRENT IPV6 PACKET HEADERS Fahim A. Ahmed Ghanem1 , Vilas M. Thakare2 1 Research Student, School of Computational Sciences, Swami Ramanand Teerth Marathwada University, Nanded, India. 2 Professor and Head of Computer Science, Faculty of Engineering &Technology Post Graduate Department of Computer Science, SGB, Amravati University, Amravati. ABSTRACT This paper aims to compatible between the new approach of IPv6 Packets’ header and transmission with the existing one. This compatibility will give us the ability to combine and execute both approaches in one network environment and give us the flexibility to gradual migration from the existing to new approach without affecting the current network environment. KEYWORDS: TCP/IP, UDP, IPv6, Ethernet Frame. 1. INTRODUCTION The new “IPv6 Packet’s header and transmission”approach which was proposed by us previously [1] has reduced the headers of the packet and reduced the header processing time which was worthy to be implemented in network environment. Network environment has billions of devices work on current IPv6 packet scheme which makes the implementationof new approach practically not possible at all. The practical way for implementing the new approach is to find compatibility way between the new and the existing approach and start implementing the new approach gradually. 2. OBJECTIVE OF THIS STUDY The objective of this paper is the compatibility between the new approachof “IPv6Packetheaders and transmission” which was proposed by us in the previous paper [2] with existing OSImodule. This compatibility willgive us the ability to gradually migratefrom INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June, 2013, pp. 211-219 © IAEME: www.iaeme.com/ijecet.asp Journal Impact Factor (2013): 5.8896 (Calculated by GISI) www.jifactor.com IJECET © I A E M E
    • International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 the exiting IPv6 approach to the new devices which are working on current by reducing the cost of replacement the existing without extra investment. This will help organization to migrate the devices which have an expired support licenses or reach the default work years. 3. EXISTING AND NEW IPV6 PACKET’S APPROACH Before we start with compatibility, it existing and the packet header’s approaches. 3.1 CurrentIPv6 Packet’s Approach ( As we have gone through existing approach in the previous paper section we will have a quick look deeply in the functionality of theheader a. Variable Fields: fields that it is information from in each packet. b. Invariable Fields (Tagged with Inv.): to other and doesn’t have to be repeated in each packet Open Systems Interconnection (OSI) model Systems Interconnection effort at the prescription of characterizing and standardizing the functions of a terms of abstraction. Similar communication functions are grouped into logical layers. A layer serves the layer above it and is served by the layer below it. There are seven interconnection layers start from up to down (layer 7 to layer 1 prospectively: Application forwards user data to Presentation layer which forwards it to Session layer forwards data user to Transportation layer. sent the segment to Network layer which adds header and forward the packet to layer. Data link adds the header and forward the frame to Fig. 3.1.1 TCP Packet’s Headers The Transmission Control Protocol (TCP) is one of the core Protocol Suiteprovides reliable, ordered computer to another program on another computer. TCP is the protocol that major Internet applications such as the World Wide on. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 212 to the new approach without needing to remove all the existing devices which are working on currentIPv6 approach. This approach will be useful financially by reducing the cost of replacement the existing IPv6 devices to the new proposed will help organization to migrate the devices which have an expired support licenses or reach the default work years. EXISTING AND NEW IPV6 PACKET’S APPROACH Before we start with compatibility, it will be helpful to have a quick review of the existing and the packet header’s approaches. Packet’s Approach (OSI Model Layers) As we have gone through existing approach in the previous paper [3 look through OSI model packet construction without digging deeply in the functionality of theheader files.There are two types of header fields: it is information from packet to packet and has to be repeated (Tagged with Inv.): fieldthat it is information doesn’t vary have to be repeated in each packet. Open Systems Interconnection (OSI) model (ISO/IEC 7498-1) is a product of the effort at the International organization for Standardization prescription of characterizing and standardizing the functions of a communications system terms of abstraction. Similar communication functions are grouped into logical layers. A layer serves the layer above it and is served by the layer below it. There are seven interconnection layers start from up to down (layer 7 to layer 1 forwards user data to Presentation layer which forwards it to Session Session layer forwards data user to Transportation layer. Transport layer adds the header and layer which adds header and forward the packet to link adds the header and forward the frame to Physical layer. Fig.1 OSI 7 layers’ hierarchy The Transmission Control Protocol (TCP) is one of the core protocols of the provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer. TCP is the protocol that major Internet World Wide Web, email, remote administration and file transfer International Journal of Electronics and Communication Engineering & Technology (IJECET), June (2013), © IAEME ach without needing to remove all the existing This approach will be useful financially devices to the new proposed IPv6 will help organization to migrate the devices which have an will be helpful to have a quick review of the 3], so in this packet construction without digging of header fields: to be repeated it is information doesn’t vary from packet 1) is a product of the Open rganization for Standardization. It is a cations system in terms of abstraction. Similar communication functions are grouped into logical layers. A There are seven interconnection layers start from up to down (layer 7 to layer 1) Session layer. adds the header and layer which adds header and forward the packet to Data link of the Internet delivery of a stream of bytes from a program on one computer to another program on another computer. TCP is the protocol that major Internet file transfer rely
    • International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 3.1.1 UDP Packet’s Header UDP is a connectionless protocol that provides an unreliable data services [ applications must generally be willing to accept some loss, errors or duplication. Some applications such as TFTP may add rudimentary reliability mechanisms into the application layer as needed [5]. UDP provides application verification (via checksum) of the header and payload [ where error checking and correction is either not necessary or performed in the application, avoiding the overhead of such processing at the network interface level [ Fig. 2 OSI TCP frame 3.2 New IPv6 Packet’s Approach New IPv6 approachconsists of two 1- TCP/UDP HeadersOptimization: It contains creationof master 2- TCP/UDP Packet Transmission: Packet’s processingdivided into two steps a. Processing of Master packet. b. Processing of Slave packet. 3.2.1 TCP/UDP Header Optimization TCP/UDP headers optimization divides the packet into two groups; master and slave packets International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 213 UDP is a connectionless protocol that provides an unreliable data services [ applications must generally be willing to accept some loss, errors or duplication. Some may add rudimentary reliability mechanisms into the application ]. UDP provides application multiplexing (via port numbers) and integrity the header and payload [6]. UDP is suitable for purposes where error checking and correction is either not necessary or performed in the application, avoiding the overhead of such processing at the network interface level [7]. frame Fig. 3 OSI UDP frame Packet’s Approach consists of two stages: Optimization: aster and slave packet. Transmission: divided into two steps Master packet. Processing of Slave packet. Header Optimization TCP/UDP headers optimization divides the packet into two groups; master and slave packets International Journal of Electronics and Communication Engineering & Technology (IJECET), June (2013), © IAEME UDP is a connectionless protocol that provides an unreliable data services [4]. UDP applications must generally be willing to accept some loss, errors or duplication. Some may add rudimentary reliability mechanisms into the application ) and integrity UDP is suitable for purposes where error checking and correction is either not necessary or performed in the application, TCP/UDP headers optimization divides the packet into two groups; master and slave packets.
    • International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 3.2.1.1 TCP/UDP Master Packet The proposed Master packet contains all header fields (Variables, Invar ID and Tag Fields) but without user data field. same contents of OSI TCP/UDP a. ID: 1 bit indicates the type of the packet, as value 1 indicates Master segment and value 0 indicate slave packet. b. Tag: 31 bits, is a unique ID for each session, th session. Fig. 4 Fig. 5 International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 214 TCP/UDP Master Packet Master packet contains all header fields (Variables, Invariable, along with ID and Tag Fields) but without user data field.The contents of Master TCP/UDPPacket header with extra two fields: ID: 1 bit indicates the type of the packet, as value 1 indicates Master segment and value 0 Tag: 31 bits, is a unique ID for each session, thisvaluewill be maintained till Fig. 4 Proposed TCP master frame Fig. 5 Proposed UDP master frame International Journal of Electronics and Communication Engineering & Technology (IJECET), June (2013), © IAEME iable, along with /UDPPacket are ID: 1 bit indicates the type of the packet, as value 1 indicates Master segment and value 0 aluewill be maintained till end of the
    • International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 3.2.1.2 TCP/UDP Slave Packet Slave packet contains only i along with user data. Fig. 6 Fig. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 215 TCP/UDP Slave Packet only invariable header fields in addition to ID and Fig. 6 Proposed TCP slave frame Fig. 7 Proposed UDP slave frame International Journal of Electronics and Communication Engineering & Technology (IJECET), June (2013), © IAEME and Tag fields
    • International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 216 3.2.2 Packet Transmission Packet transmission includes the process of transmission of master and slave packets from source to destination. 3.2.2.1 Master PacketTransmission 3.2.2.1.1 Master TCP Packet Transmission a. Application layer of the source stationforwardsuser data to Presentation which forwards it to Session which also forwards it to transport layer. b. Transport layer buffers the received user data, creates one master TCP segment and forward it to network layer. c. Network layeradds Network layer master header to the received segmentand send the packet to Ethernet layer. d. Ethernet layer adds Ethernet master header and tailor and sends the frame to physical layer. e. Physical layeradds it is header sends it to another station or middle devices towards destination. f. Ethernet layer in layer 2 devicechecks the packet ID and identify whether it is Master packet or Slave packet by value of ID (1= master and 0 = slave). g. If the value ID is 1, Ethernet layerprocesses Master packet asthe processing of OSI model packet based on source, destination and content etc. anddecide the next hop MAC. h. Ethernet layercashes the frame processing result, save it in the forwarding table along with frame’s Tag and send the frametowards the destination. i. If the next hop is layer 2, steps f,g, and h will be repeated. j. If the next hop is layer 3device,layer 3 checks the packet ID and identify whether it is Master Packet or Slave Packet by value of ID (1= master and 0 = slave). k. If value ID is 1, layer 3, layer 3 processes master packet as OSI model processing based on source, destination and content etc. anddecide the next hop IP. l. Layers 3 cashes the processing result, save it in the forwarding table along with packet’s Tag and forwards the packet towards the destination. m. If the next hop is layer 3, steps j, k, and l will be repeated. n. If the next hop is layer 4, layer 4processes the segment as per layer 2 and layer 3 and forwards it to next hop or layer. o. Steps f – n will be repeated till packet reaches the destination. p. Once Transport layer of source station receives the acknowledgement about receiving Master packet from the destination, it startscreating and sending slave segments. Note: master TCP packet was sent only one time per each session. 3.2.2.1.2 MasterUDPPacket Transmission Transmission of master UDP packet takes steps from a - n of TCP packetbut not step o, because UDP packet doesn’t rely on acknowledgment. Note: master UDP packet being transmitted every 5 seconds in order to insure continuously delivering of packets in case there is any transmission or processing issue in the middle devices.
    • International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 217 3.2.2.2 Slave Packet’s Transmission 3.2.2.2.1 Slave TCP Packet Transmission a. Source transport layer creates either TCP or UDP slave header and sends the segment to Network layer. b. Network layeradds it is slave header and sendsthe packet to Ethernet layer. c. Ethernet layeradds it is slave header and tailor and sends it to physical layer. d. Physical layer adds it isheader and forwards it towards the destination. e. Ethernet layer of the destination stationor middle devices checks the packet ID and identify whether it is Master Frame or Slave Frame by value ID (1= master and 0 = slave). f. If the value ID is 0, layer 2matches the Tag with forwarding table information and forwardsitto the next hope without any extra processing. g. If there is no information about the Tag in the forwarding table, layer 2simply drops the packet. h. If the next hope is layer 2, step e and f will be repeated. i. If the next hope is layer 3deviceof the destination station, layer 3 will check the packet ID and identify whether it is Master Frame or Slave Frame by value ID (1= master and 0 = slave). j. If the value ID is 0, layer 3matchespacketTag with forwarding table information and forwards it to the next hope without any extra processing. k. If there is no information about the Tag in the forwarding table, layer 3 simply drops the packet. l. If the next hope is layer 3, step iand j will be repeated. m. If the next hop is layer 4, layer 4processes the segment like layer 2 and layer 3 and forwards it to next layer. n. Steps etomwas repeated till packet reaches the destination. o. Packet acknowledgment wassent as OSI model. 3.2.2.2.2 Slave UDPPacket Transmission: Transmission of slave UDP segment, packet and frame takes is same as steps from a - n of TCP packet but not step o, because UDP packet doesn’t rely on acknowledgment. Note: master UDP packet is sent every 5 seconds in order to insure continuously delivering of the packets in case there is any transmission or processing issue in the middle devices. [8] 4. Compatibility approach New approach headers construction and packet transmission differs than the existing header construction and transmission. In any network environment there will benew approach based devices and existing approach based devices. Transmission of data between those devices basically will not be doable unless there is compatibility between those devices. There are four scenarios for this compatibility as the following: 1- New IPv6 approach device hands over TCP data to current IPv6 approach device. 2- Current IPv6 approach device hands over TCP data to new IPv6device. 3- New IPv6 approach device hands over UDP data to current IPv6 approach device. 4- Current IPv6 approach device hands over UDP data to new IPv6 device. In the first scenario; new IPv6approach device will send master TCP packet to current approach device and wait for acknowledgment. If it doesn’t receive the acknowledgement within widow time, it will assume the neighbor doesn’t support new approach and will send
    • International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 the packets based on the current approach. In the second scenario; new IPv6 data for first packet, create master TCP packet and send it to its neighbor. If its neighbor supports IPv6 new approach, this device will change the header approach packet and send it to the neighbor. If its neighbor doesn’t support new approach packet, the device will bypass the current modification. For third scenario and as per UDP this scenario, the new device will send test order to check the ability of its neighbor whether it sup neighbor supports new IPv6 approach, the device will send new doesn’t support new IPv6 approach, the device will send current In the fourth scenario; newIPv6 data for first packet, create test master TCP neighbor supports IPv6 new approach, received packet to new IPv6 appr doesn’t support new IPv6 approach packet, packet to its neighbor without any modification. Fig. 8 compatibility scenario 1 and 3 Fig. 9 compatibility 5. CONCLUSION Compatibility between new ability to gradually migrate from the current devices without needing to retire the existing devices or to invest more for th This compatibility helps financially as we don’t have to create 100% new network environment, the migration will be don’t for devices which have expired support. Compatibility also enterprise companies to move forward the new International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 218 based on the current approach. IPv6approach device will receive current IPv6 packet, cash the data for first packet, create master TCP packet and send it to its neighbor. If its neighbor new approach, this device will change the headers of thepackets to new send it to the neighbor. If its neighbor doesn’t support new will bypass the current IPv6packet to its neighbor without For third scenario and as per UDP nature, there is no acknowledgment for UDP packet. In this scenario, the new device will send test master TCP not UDP packet to it is neighbor in order to check the ability of its neighbor whether it supports current or new IPv6 approach, the device will send new IPv6 packet approach approach, the device will send current IPv6 approach. IPv6 approach device will receive current IPv6 packet, cash the master TCP not UDP packet and send it to its neighbor. If its new approach, then the device will change the header of each approach packet and send it to the neighbor. If its neighbor approach packet, then the device will bypass the current packet to its neighbor without any modification. Fig. 8 compatibility scenario 1 and 3 Fig. 9 compatibility scenario 2 and 4 between new IPv6 approach and current IPv6 approach gives us the ability to gradually migrate from the current IPv6 approach devices to the new IPv6 devices without needing to retire the existing devices or to invest more for this migration. This compatibility helps financially as we don’t have to create 100% new network environment, the migration will be don’t for the devices which reach theend-of- devices which have expired support. Compatibility also encourages the vendors and enterprise companies to move forward the new IPv6 approach without extra investments International Journal of Electronics and Communication Engineering & Technology (IJECET), June (2013), © IAEME packet, cash the data for first packet, create master TCP packet and send it to its neighbor. If its neighbor thepackets to new IPv6 send it to the neighbor. If its neighbor doesn’t support new IPv6 to its neighbor without any there is no acknowledgment for UDP packet. In TCP not UDP packet to it is neighbor in IPv6 approach. If approach. If it packet, cash the packet and send it to its neighbor. If its device will change the header of each and send it to the neighbor. If its neighbor bypass the current IPv6 approach gives us the IPv6 approach migration. This compatibility helps financially as we don’t have to create 100% new network -life or for the the vendors and investments.
    • International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 6. REFERENCES [1][2][3][8] Fahim A. Ahmed Ghanem, Vilas M. Thakare Headers”, IJCSI International Journal of Computer Science Issues, Vol. 10. Issue 1, No 2, January 2013, IJCSI-10-1-2-294- [4] Michael A. Gallo, William M. Hancock, “Computer Communications and Networking Technologies”, New Delhi, India, Cengage Learning India Private Limited [5]Forouzan, B.A. “TCP/IP: Protocol Suite, 1st edition”, New Delhi, India, Tata McGraw Hill Publishing Company Ltd. [6] Clark, M.P., “Data Networks IP and the Internet, 1st edition”, West Sussex, England, John Wiley & Sons Ltd. [7]Andrew S. Tanenbaum, “Computer Networks 4th Edition” Prentice Hall PTR. [9] Mustafa Alaa Qasim and Dipak Pawar Address”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 0976 – 6375. [10] Fahim A. Ahmed Ghanem and Vilas M. Thakare, “Optimization of Ipv6 Packet’s Headers Over Ethernet Frame”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 4, Issue 1, 2013, pp. 99 0976- 6464, ISSN Online: 0976 AUTHORS Mr. Fahim A. Ahmed Ghanem Computational Sciences, MARATHWADA UNIVERSITY, Nanded, in field of IP Network Optimization. He received MSC SMU, India 2005 Senior Network (Supervisor) M.E. degree in field of in field of Applied Electronics, Diploma in Computer Management was obtained his PhD in field of Computer Science. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 219 Fahim A. Ahmed Ghanem, Vilas M. Thakare, “Optimization OfIPv6 IJCSI International Journal of Computer Science Issues, Vol. 10. Issue 1, No 2, -302. Michael A. Gallo, William M. Hancock, “Computer Communications and Networking Technologies”, New Delhi, India, Cengage Learning India Private Limited. Forouzan, B.A. “TCP/IP: Protocol Suite, 1st edition”, New Delhi, India, Tata McGraw ompany Ltd. Clark, M.P., “Data Networks IP and the Internet, 1st edition”, West Sussex, England, Computer Networks 4th Edition”, Amsterdam, the Netherland, Dipak Pawar, “Encryption & Steganography in Ipv6 Sou ournal of Computer Engineering & Technology (IJCET), , pp. 315 - 324, ISSN Print: 0976 – 6367, ISSN Online: Fahim A. Ahmed Ghanem and Vilas M. Thakare, “Optimization of Ipv6 Packet’s Headers Over Ethernet Frame”, International Journal of Electronics and Communication Technology (IJECET), Volume 4, Issue 1, 2013, pp. 99 - 111, ISSN Print: ISSN Online: 0976 –6472. Mr. Fahim A. Ahmed Ghanem is a Ph.D. student at Computational Sciences, SWAMI RAMANAND TEERTH MARATHWADA UNIVERSITY, Nanded, India. He is doing research in field of IP Network Optimization. He received MSC-IT degree from SMU, India 2005 – 2007. He is a dual CCIE R&S and SP.He Network Engineer in mobily SPK.S.A. (Supervisor) Mr. Vilas Mahadeorao Thakare, has received his degree in field of Advance Electronics, received his Applied Electronics, Diploma in Computer Management was obtained his PhD in field of Computer Science. International Journal of Electronics and Communication Engineering & Technology (IJECET), June (2013), © IAEME IPv6 Packet’s IJCSI International Journal of Computer Science Issues, Vol. 10. Issue 1, No 2, Michael A. Gallo, William M. Hancock, “Computer Communications and Networking Forouzan, B.A. “TCP/IP: Protocol Suite, 1st edition”, New Delhi, India, Tata McGraw- Clark, M.P., “Data Networks IP and the Internet, 1st edition”, West Sussex, England, , Amsterdam, the Netherland, n Ipv6 Source ournal of Computer Engineering & Technology (IJCET), 6367, ISSN Online: Fahim A. Ahmed Ghanem and Vilas M. Thakare, “Optimization of Ipv6 Packet’s Headers Over Ethernet Frame”, International Journal of Electronics and Communication 111, ISSN Print: is a Ph.D. student at School of SWAMI RAMANAND TEERTH India. He is doing research IT degree from He works as a , has received his , received his M.Sc. degree Applied Electronics, Diploma in Computer Management. He