SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME
211
COMPATIBILITY BETWEEN THE NEW AND THE CURRENT IPV6
PACKET HEADERS
Fahim A. Ahmed Ghanem1
, Vilas M. Thakare2
1
Research Student, School of Computational Sciences,
Swami Ramanand Teerth Marathwada University, Nanded, India.
2
Professor and Head of Computer Science, Faculty of Engineering &Technology
Post Graduate Department of Computer Science, SGB, Amravati University, Amravati.
ABSTRACT
This paper aims to compatible between the new approach of IPv6 Packets’ header and
transmission with the existing one. This compatibility will give us the ability to combine and
execute both approaches in one network environment and give us the flexibility to gradual
migration from the existing to new approach without affecting the current network
environment.
KEYWORDS: TCP/IP, UDP, IPv6, Ethernet Frame.
1. INTRODUCTION
The new “IPv6 Packet’s header and transmission”approach which was proposed by us
previously [1] has reduced the headers of the packet and reduced the header processing time
which was worthy to be implemented in network environment.
Network environment has billions of devices work on current IPv6 packet scheme which
makes the implementationof new approach practically not possible at all. The practical way
for implementing the new approach is to find compatibility way between the new and the
existing approach and start implementing the new approach gradually.
2. OBJECTIVE OF THIS STUDY
The objective of this paper is the compatibility between the new approachof
“IPv6Packetheaders and transmission” which was proposed by us in the previous paper [2]
with existing OSImodule. This compatibility willgive us the ability to gradually migratefrom
INTERNATIONAL JOURNAL OF ELECTRONICS AND
COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Volume 4, Issue 3, May – June, 2013, pp. 211-219
© IAEME: www.iaeme.com/ijecet.asp
Journal Impact Factor (2013): 5.8896 (Calculated by GISI)
www.jifactor.com
IJECET
© I A E M E
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976
the exiting IPv6 approach to the new
devices which are working on current
by reducing the cost of replacement the existing
without extra investment. This will help organization to migrate the devices which have an
expired support licenses or reach the default work years.
3. EXISTING AND NEW IPV6 PACKET’S APPROACH
Before we start with compatibility, it
existing and the packet header’s approaches.
3.1 CurrentIPv6 Packet’s Approach (
As we have gone through existing approach in the previous paper
section we will have a quick look
deeply in the functionality of theheader
a. Variable Fields: fields that it is information from
in each packet.
b. Invariable Fields (Tagged with Inv.):
to other and doesn’t have to be repeated in each packet
Open Systems Interconnection (OSI) model
Systems Interconnection effort at the
prescription of characterizing and standardizing the functions of a
terms of abstraction. Similar communication functions are grouped into logical layers. A
layer serves the layer above it and is served by the layer below it.
There are seven interconnection layers start from up to down (layer 7 to layer 1
prospectively:
Application forwards user data to Presentation layer which forwards it to
Session layer forwards data user to Transportation layer.
sent the segment to Network layer which adds header and forward the packet to
layer. Data link adds the header and forward the frame to
Fig.
3.1.1 TCP Packet’s Headers
The Transmission Control Protocol (TCP) is one of the core
Protocol Suiteprovides reliable, ordered
computer to another program on another computer. TCP is the protocol that major Internet
applications such as the World Wide
on.
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME
212
to the new approach without needing to remove all the existing
devices which are working on currentIPv6 approach. This approach will be useful financially
by reducing the cost of replacement the existing IPv6 devices to the new proposed
will help organization to migrate the devices which have an
expired support licenses or reach the default work years.
EXISTING AND NEW IPV6 PACKET’S APPROACH
Before we start with compatibility, it will be helpful to have a quick review of the
existing and the packet header’s approaches.
Packet’s Approach (OSI Model Layers)
As we have gone through existing approach in the previous paper [3
look through OSI model packet construction without digging
deeply in the functionality of theheader files.There are two types of header fields:
it is information from packet to packet and has to be repeated
(Tagged with Inv.): fieldthat it is information doesn’t vary
have to be repeated in each packet.
Open Systems Interconnection (OSI) model (ISO/IEC 7498-1) is a product of the
effort at the International organization for Standardization
prescription of characterizing and standardizing the functions of a communications system
terms of abstraction. Similar communication functions are grouped into logical layers. A
layer serves the layer above it and is served by the layer below it.
There are seven interconnection layers start from up to down (layer 7 to layer 1
forwards user data to Presentation layer which forwards it to Session
Session layer forwards data user to Transportation layer. Transport layer adds the header and
layer which adds header and forward the packet to
link adds the header and forward the frame to Physical layer.
Fig.1 OSI 7 layers’ hierarchy
The Transmission Control Protocol (TCP) is one of the core protocols of the
provides reliable, ordered delivery of a stream of bytes from a program on one
computer to another program on another computer. TCP is the protocol that major Internet
World Wide Web, email, remote administration and file transfer
International Journal of Electronics and Communication Engineering & Technology (IJECET),
June (2013), © IAEME
ach without needing to remove all the existing
This approach will be useful financially
devices to the new proposed IPv6
will help organization to migrate the devices which have an
will be helpful to have a quick review of the
3], so in this
packet construction without digging
of header fields:
to be repeated
it is information doesn’t vary from packet
1) is a product of the Open
rganization for Standardization. It is a
cations system in
terms of abstraction. Similar communication functions are grouped into logical layers. A
There are seven interconnection layers start from up to down (layer 7 to layer 1)
Session layer.
adds the header and
layer which adds header and forward the packet to Data link
of the Internet
delivery of a stream of bytes from a program on one
computer to another program on another computer. TCP is the protocol that major Internet
file transfer rely
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976
3.1.1 UDP Packet’s Header
UDP is a connectionless protocol that provides an unreliable data services [
applications must generally be willing to accept some loss, errors or duplication. Some
applications such as TFTP may add rudimentary reliability mechanisms into the application
layer as needed [5]. UDP provides application
verification (via checksum) of the header and payload [
where error checking and correction is either not necessary or performed in the application,
avoiding the overhead of such processing at the network interface level [
Fig. 2 OSI TCP frame
3.2 New IPv6 Packet’s Approach
New IPv6 approachconsists of two
1- TCP/UDP HeadersOptimization:
It contains creationof master
2- TCP/UDP Packet Transmission:
Packet’s processingdivided into two steps
a. Processing of Master packet.
b. Processing of Slave packet.
3.2.1 TCP/UDP Header Optimization
TCP/UDP headers optimization divides the packet into two groups; master and slave packets
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME
213
UDP is a connectionless protocol that provides an unreliable data services [
applications must generally be willing to accept some loss, errors or duplication. Some
may add rudimentary reliability mechanisms into the application
]. UDP provides application multiplexing (via port numbers) and integrity
the header and payload [6]. UDP is suitable for purposes
where error checking and correction is either not necessary or performed in the application,
avoiding the overhead of such processing at the network interface level [7].
frame Fig. 3 OSI UDP frame
Packet’s Approach
consists of two stages:
Optimization:
aster and slave packet.
Transmission:
divided into two steps
Master packet.
Processing of Slave packet.
Header Optimization
TCP/UDP headers optimization divides the packet into two groups; master and slave packets
International Journal of Electronics and Communication Engineering & Technology (IJECET),
June (2013), © IAEME
UDP is a connectionless protocol that provides an unreliable data services [4]. UDP
applications must generally be willing to accept some loss, errors or duplication. Some
may add rudimentary reliability mechanisms into the application
) and integrity
UDP is suitable for purposes
where error checking and correction is either not necessary or performed in the application,
TCP/UDP headers optimization divides the packet into two groups; master and slave packets.
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976
3.2.1.1 TCP/UDP Master Packet
The proposed Master packet contains all header fields (Variables, Invar
ID and Tag Fields) but without user data field.
same contents of OSI TCP/UDP
a. ID: 1 bit indicates the type of the packet, as value 1 indicates Master segment and value 0
indicate slave packet.
b. Tag: 31 bits, is a unique ID for each session, th
session.
Fig. 4
Fig. 5
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME
214
TCP/UDP Master Packet
Master packet contains all header fields (Variables, Invariable, along with
ID and Tag Fields) but without user data field.The contents of Master TCP/UDPPacket
header with extra two fields:
ID: 1 bit indicates the type of the packet, as value 1 indicates Master segment and value 0
Tag: 31 bits, is a unique ID for each session, thisvaluewill be maintained till
Fig. 4 Proposed TCP master frame
Fig. 5 Proposed UDP master frame
International Journal of Electronics and Communication Engineering & Technology (IJECET),
June (2013), © IAEME
iable, along with
/UDPPacket are
ID: 1 bit indicates the type of the packet, as value 1 indicates Master segment and value 0
aluewill be maintained till end of the
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976
3.2.1.2 TCP/UDP Slave Packet
Slave packet contains only i
along with user data.
Fig. 6
Fig.
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME
215
TCP/UDP Slave Packet
only invariable header fields in addition to ID and
Fig. 6 Proposed TCP slave frame
Fig. 7 Proposed UDP slave frame
International Journal of Electronics and Communication Engineering & Technology (IJECET),
June (2013), © IAEME
and Tag fields
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME
216
3.2.2 Packet Transmission
Packet transmission includes the process of transmission of master and slave packets from
source to destination.
3.2.2.1 Master PacketTransmission
3.2.2.1.1 Master TCP Packet Transmission
a. Application layer of the source stationforwardsuser data to Presentation which forwards it
to Session which also forwards it to transport layer.
b. Transport layer buffers the received user data, creates one master TCP segment and
forward it to network layer.
c. Network layeradds Network layer master header to the received segmentand send the
packet to Ethernet layer.
d. Ethernet layer adds Ethernet master header and tailor and sends the frame to physical
layer.
e. Physical layeradds it is header sends it to another station or middle devices towards
destination.
f. Ethernet layer in layer 2 devicechecks the packet ID and identify whether it is Master
packet or Slave packet by value of ID (1= master and 0 = slave).
g. If the value ID is 1, Ethernet layerprocesses Master packet asthe processing of OSI model
packet based on source, destination and content etc. anddecide the next hop MAC.
h. Ethernet layercashes the frame processing result, save it in the forwarding table along
with frame’s Tag and send the frametowards the destination.
i. If the next hop is layer 2, steps f,g, and h will be repeated.
j. If the next hop is layer 3device,layer 3 checks the packet ID and identify whether it is
Master Packet or Slave Packet by value of ID (1= master and 0 = slave).
k. If value ID is 1, layer 3, layer 3 processes master packet as OSI model processing based
on source, destination and content etc. anddecide the next hop IP.
l. Layers 3 cashes the processing result, save it in the forwarding table along with packet’s
Tag and forwards the packet towards the destination.
m. If the next hop is layer 3, steps j, k, and l will be repeated.
n. If the next hop is layer 4, layer 4processes the segment as per layer 2 and layer 3 and
forwards it to next hop or layer.
o. Steps f – n will be repeated till packet reaches the destination.
p. Once Transport layer of source station receives the acknowledgement about receiving
Master packet from the destination, it startscreating and sending slave segments.
Note: master TCP packet was sent only one time per each session.
3.2.2.1.2 MasterUDPPacket Transmission
Transmission of master UDP packet takes steps from a - n of TCP packetbut not step
o, because UDP packet doesn’t rely on acknowledgment.
Note: master UDP packet being transmitted every 5 seconds in order to insure continuously
delivering of packets in case there is any transmission or processing issue in the middle
devices.
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME
217
3.2.2.2 Slave Packet’s Transmission
3.2.2.2.1 Slave TCP Packet Transmission
a. Source transport layer creates either TCP or UDP slave header and sends the segment to
Network layer.
b. Network layeradds it is slave header and sendsthe packet to Ethernet layer.
c. Ethernet layeradds it is slave header and tailor and sends it to physical layer.
d. Physical layer adds it isheader and forwards it towards the destination.
e. Ethernet layer of the destination stationor middle devices checks the packet ID and
identify whether it is Master Frame or Slave Frame by value ID (1= master and 0 =
slave).
f. If the value ID is 0, layer 2matches the Tag with forwarding table information and
forwardsitto the next hope without any extra processing.
g. If there is no information about the Tag in the forwarding table, layer 2simply drops the
packet.
h. If the next hope is layer 2, step e and f will be repeated.
i. If the next hope is layer 3deviceof the destination station, layer 3 will check the packet ID
and identify whether it is Master Frame or Slave Frame by value ID (1= master and 0 =
slave).
j. If the value ID is 0, layer 3matchespacketTag with forwarding table information and
forwards it to the next hope without any extra processing.
k. If there is no information about the Tag in the forwarding table, layer 3 simply drops the
packet.
l. If the next hope is layer 3, step iand j will be repeated.
m. If the next hop is layer 4, layer 4processes the segment like layer 2 and layer 3 and
forwards it to next layer.
n. Steps etomwas repeated till packet reaches the destination.
o. Packet acknowledgment wassent as OSI model.
3.2.2.2.2 Slave UDPPacket Transmission:
Transmission of slave UDP segment, packet and frame takes is same as steps from a -
n of TCP packet but not step o, because UDP packet doesn’t rely on acknowledgment.
Note: master UDP packet is sent every 5 seconds in order to insure continuously delivering of
the packets in case there is any transmission or processing issue in the middle devices. [8]
4. Compatibility approach
New approach headers construction and packet transmission differs than the existing header
construction and transmission. In any network environment there will benew approach based
devices and existing approach based devices. Transmission of data between those devices
basically will not be doable unless there is compatibility between those devices. There are
four scenarios for this compatibility as the following:
1- New IPv6 approach device hands over TCP data to current IPv6 approach device.
2- Current IPv6 approach device hands over TCP data to new IPv6device.
3- New IPv6 approach device hands over UDP data to current IPv6 approach device.
4- Current IPv6 approach device hands over UDP data to new IPv6 device.
In the first scenario; new IPv6approach device will send master TCP packet to current
approach device and wait for acknowledgment. If it doesn’t receive the acknowledgement
within widow time, it will assume the neighbor doesn’t support new approach and will send
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976
the packets based on the current approach.
In the second scenario; new IPv6
data for first packet, create master TCP packet and send it to its neighbor. If its neighbor
supports IPv6 new approach, this device will change the header
approach packet and send it to the neighbor. If its neighbor doesn’t support new
approach packet, the device will bypass the current
modification.
For third scenario and as per UDP
this scenario, the new device will send test
order to check the ability of its neighbor whether it sup
neighbor supports new IPv6 approach, the device will send new
doesn’t support new IPv6 approach, the device will send current
In the fourth scenario; newIPv6
data for first packet, create test master TCP
neighbor supports IPv6 new approach,
received packet to new IPv6 appr
doesn’t support new IPv6 approach packet,
packet to its neighbor without any modification.
Fig. 8 compatibility scenario 1 and 3
Fig. 9 compatibility
5. CONCLUSION
Compatibility between new
ability to gradually migrate from the current
devices without needing to retire the existing devices or to invest more for th
This compatibility helps financially as we don’t have to create 100% new network
environment, the migration will be don’t for
devices which have expired support. Compatibility also
enterprise companies to move forward the new
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME
218
based on the current approach.
IPv6approach device will receive current IPv6 packet, cash the
data for first packet, create master TCP packet and send it to its neighbor. If its neighbor
new approach, this device will change the headers of thepackets to new
send it to the neighbor. If its neighbor doesn’t support new
will bypass the current IPv6packet to its neighbor without
For third scenario and as per UDP nature, there is no acknowledgment for UDP packet. In
this scenario, the new device will send test master TCP not UDP packet to it is neighbor in
order to check the ability of its neighbor whether it supports current or new IPv6
approach, the device will send new IPv6 packet approach
approach, the device will send current IPv6 approach.
IPv6 approach device will receive current IPv6 packet, cash the
master TCP not UDP packet and send it to its neighbor. If its
new approach, then the device will change the header of each
approach packet and send it to the neighbor. If its neighbor
approach packet, then the device will bypass the current
packet to its neighbor without any modification.
Fig. 8 compatibility scenario 1 and 3
Fig. 9 compatibility scenario 2 and 4
between new IPv6 approach and current IPv6 approach gives us the
ability to gradually migrate from the current IPv6 approach devices to the new IPv6
devices without needing to retire the existing devices or to invest more for this migration.
This compatibility helps financially as we don’t have to create 100% new network
environment, the migration will be don’t for the devices which reach theend-of-
devices which have expired support. Compatibility also encourages the vendors and
enterprise companies to move forward the new IPv6 approach without extra investments
International Journal of Electronics and Communication Engineering & Technology (IJECET),
June (2013), © IAEME
packet, cash the
data for first packet, create master TCP packet and send it to its neighbor. If its neighbor
thepackets to new IPv6
send it to the neighbor. If its neighbor doesn’t support new IPv6
to its neighbor without any
there is no acknowledgment for UDP packet. In
TCP not UDP packet to it is neighbor in
IPv6 approach. If
approach. If it
packet, cash the
packet and send it to its neighbor. If its
device will change the header of each
and send it to the neighbor. If its neighbor
bypass the current IPv6
approach gives us the
IPv6 approach
migration.
This compatibility helps financially as we don’t have to create 100% new network
-life or for the
the vendors and
investments.
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976
6. REFERENCES
[1][2][3][8] Fahim A. Ahmed Ghanem, Vilas M. Thakare
Headers”, IJCSI International Journal of Computer Science Issues, Vol. 10. Issue 1, No 2,
January 2013, IJCSI-10-1-2-294-
[4] Michael A. Gallo, William M. Hancock, “Computer Communications and Networking
Technologies”, New Delhi, India, Cengage Learning India Private Limited
[5]Forouzan, B.A. “TCP/IP: Protocol Suite, 1st edition”, New Delhi, India, Tata McGraw
Hill Publishing Company Ltd.
[6] Clark, M.P., “Data Networks IP and the Internet, 1st edition”, West Sussex, England,
John Wiley & Sons Ltd.
[7]Andrew S. Tanenbaum, “Computer Networks 4th Edition”
Prentice Hall PTR.
[9] Mustafa Alaa Qasim and Dipak Pawar
Address”, International Journal of Computer Engineering & Technology (IJCET),
Volume 4, Issue 2, 2013, pp.
0976 – 6375.
[10] Fahim A. Ahmed Ghanem and Vilas M. Thakare, “Optimization of Ipv6 Packet’s
Headers Over Ethernet Frame”, International Journal of Electronics and Communication
Engineering & Technology (IJECET), Volume 4, Issue 1, 2013, pp. 99
0976- 6464, ISSN Online: 0976
AUTHORS
Mr. Fahim A. Ahmed Ghanem
Computational Sciences,
MARATHWADA UNIVERSITY, Nanded,
in field of IP Network Optimization. He received MSC
SMU, India 2005
Senior Network
(Supervisor)
M.E. degree in field of
in field of Applied Electronics, Diploma in Computer Management
was obtained his PhD in field of Computer Science.
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME
219
Fahim A. Ahmed Ghanem, Vilas M. Thakare, “Optimization OfIPv6
IJCSI International Journal of Computer Science Issues, Vol. 10. Issue 1, No 2,
-302.
Michael A. Gallo, William M. Hancock, “Computer Communications and Networking
Technologies”, New Delhi, India, Cengage Learning India Private Limited.
Forouzan, B.A. “TCP/IP: Protocol Suite, 1st edition”, New Delhi, India, Tata McGraw
ompany Ltd.
Clark, M.P., “Data Networks IP and the Internet, 1st edition”, West Sussex, England,
Computer Networks 4th Edition”, Amsterdam, the Netherland,
Dipak Pawar, “Encryption & Steganography in Ipv6 Sou
ournal of Computer Engineering & Technology (IJCET),
, pp. 315 - 324, ISSN Print: 0976 – 6367, ISSN Online:
Fahim A. Ahmed Ghanem and Vilas M. Thakare, “Optimization of Ipv6 Packet’s
Headers Over Ethernet Frame”, International Journal of Electronics and Communication
Technology (IJECET), Volume 4, Issue 1, 2013, pp. 99 - 111, ISSN Print:
ISSN Online: 0976 –6472.
Mr. Fahim A. Ahmed Ghanem is a Ph.D. student at
Computational Sciences, SWAMI RAMANAND TEERTH
MARATHWADA UNIVERSITY, Nanded, India. He is doing research
in field of IP Network Optimization. He received MSC-IT degree from
SMU, India 2005 – 2007. He is a dual CCIE R&S and SP.He
Network Engineer in mobily SPK.S.A.
(Supervisor) Mr. Vilas Mahadeorao Thakare, has received his
degree in field of Advance Electronics, received his
Applied Electronics, Diploma in Computer Management
was obtained his PhD in field of Computer Science.
International Journal of Electronics and Communication Engineering & Technology (IJECET),
June (2013), © IAEME
IPv6 Packet’s
IJCSI International Journal of Computer Science Issues, Vol. 10. Issue 1, No 2,
Michael A. Gallo, William M. Hancock, “Computer Communications and Networking
Forouzan, B.A. “TCP/IP: Protocol Suite, 1st edition”, New Delhi, India, Tata McGraw-
Clark, M.P., “Data Networks IP and the Internet, 1st edition”, West Sussex, England,
, Amsterdam, the Netherland,
n Ipv6 Source
ournal of Computer Engineering & Technology (IJCET),
6367, ISSN Online:
Fahim A. Ahmed Ghanem and Vilas M. Thakare, “Optimization of Ipv6 Packet’s
Headers Over Ethernet Frame”, International Journal of Electronics and Communication
111, ISSN Print:
is a Ph.D. student at School of
SWAMI RAMANAND TEERTH
India. He is doing research
IT degree from
He works as a
, has received his
, received his M.Sc. degree
Applied Electronics, Diploma in Computer Management. He

More Related Content

What's hot

Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos incaijjournal
 
A survey report on mapping of networks
A survey report on mapping of networksA survey report on mapping of networks
A survey report on mapping of networksIRJET Journal
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...IJMER
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationiaemedu
 
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
 
Capacity Improvement and Protection of LTE Network on Ethernet Based Technique
Capacity Improvement and Protection of LTE Network on Ethernet Based TechniqueCapacity Improvement and Protection of LTE Network on Ethernet Based Technique
Capacity Improvement and Protection of LTE Network on Ethernet Based TechniqueTELKOMNIKA JOURNAL
 
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONCONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONcseij
 
Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challengesiaemedu
 
Understanding tcp=ip
Understanding tcp=ipUnderstanding tcp=ip
Understanding tcp=ipIlaya Raja
 
High performance energy efficient multicore embedded computing
High performance energy efficient multicore embedded computingHigh performance energy efficient multicore embedded computing
High performance energy efficient multicore embedded computingAnkit Talele
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
 
Final PhD Defense Presentation
Final PhD Defense PresentationFinal PhD Defense Presentation
Final PhD Defense PresentationDr Piyush Charan
 
Energy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of ThingsEnergy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of ThingsIJAAS Team
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
 
Chapter 7 principles of data communication
Chapter 7   principles of data communicationChapter 7   principles of data communication
Chapter 7 principles of data communicationN. A. Sutisna
 

What's hot (20)

Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
A survey report on mapping of networks
A survey report on mapping of networksA survey report on mapping of networks
A survey report on mapping of networks
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
 
Capacity Improvement and Protection of LTE Network on Ethernet Based Technique
Capacity Improvement and Protection of LTE Network on Ethernet Based TechniqueCapacity Improvement and Protection of LTE Network on Ethernet Based Technique
Capacity Improvement and Protection of LTE Network on Ethernet Based Technique
 
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONCONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
 
Cw25585588
Cw25585588Cw25585588
Cw25585588
 
Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challenges
 
Understanding tcp=ip
Understanding tcp=ipUnderstanding tcp=ip
Understanding tcp=ip
 
High performance energy efficient multicore embedded computing
High performance energy efficient multicore embedded computingHigh performance energy efficient multicore embedded computing
High performance energy efficient multicore embedded computing
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
 
Final PhD Defense Presentation
Final PhD Defense PresentationFinal PhD Defense Presentation
Final PhD Defense Presentation
 
Energy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of ThingsEnergy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of Things
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
 
Chapter 7 principles of data communication
Chapter 7   principles of data communicationChapter 7   principles of data communication
Chapter 7 principles of data communication
 

Viewers also liked

Characterization of fog attenuation for free space optical
Characterization of fog attenuation for free space opticalCharacterization of fog attenuation for free space optical
Characterization of fog attenuation for free space opticalIAEME Publication
 
Mergers and acquisitions the hr issues
Mergers and acquisitions the hr issuesMergers and acquisitions the hr issues
Mergers and acquisitions the hr issuesIAEME Publication
 
Investigation of heat transfer through cnt composites focusing on conduction ...
Investigation of heat transfer through cnt composites focusing on conduction ...Investigation of heat transfer through cnt composites focusing on conduction ...
Investigation of heat transfer through cnt composites focusing on conduction ...IAEME Publication
 
Investigation of the abrasive wear behaviour of graphite filled carbon fabric...
Investigation of the abrasive wear behaviour of graphite filled carbon fabric...Investigation of the abrasive wear behaviour of graphite filled carbon fabric...
Investigation of the abrasive wear behaviour of graphite filled carbon fabric...IAEME Publication
 
Moim a novel design of cryptographic hash function
Moim a novel design of cryptographic hash functionMoim a novel design of cryptographic hash function
Moim a novel design of cryptographic hash functionIAEME Publication
 
Flexural behavior of composite reinforced concrete t beams cast in steel cha...
Flexural behavior of composite reinforced  concrete t beams cast in steel cha...Flexural behavior of composite reinforced  concrete t beams cast in steel cha...
Flexural behavior of composite reinforced concrete t beams cast in steel cha...IAEME Publication
 
Medical image fusion using curvelet transform 2-3-4-5
Medical image fusion using curvelet transform 2-3-4-5Medical image fusion using curvelet transform 2-3-4-5
Medical image fusion using curvelet transform 2-3-4-5IAEME Publication
 

Viewers also liked (8)

Characterization of fog attenuation for free space optical
Characterization of fog attenuation for free space opticalCharacterization of fog attenuation for free space optical
Characterization of fog attenuation for free space optical
 
Mergers and acquisitions the hr issues
Mergers and acquisitions the hr issuesMergers and acquisitions the hr issues
Mergers and acquisitions the hr issues
 
Investigation of heat transfer through cnt composites focusing on conduction ...
Investigation of heat transfer through cnt composites focusing on conduction ...Investigation of heat transfer through cnt composites focusing on conduction ...
Investigation of heat transfer through cnt composites focusing on conduction ...
 
Investigation of the abrasive wear behaviour of graphite filled carbon fabric...
Investigation of the abrasive wear behaviour of graphite filled carbon fabric...Investigation of the abrasive wear behaviour of graphite filled carbon fabric...
Investigation of the abrasive wear behaviour of graphite filled carbon fabric...
 
Petic Secc 2.0
Petic Secc 2.0Petic Secc 2.0
Petic Secc 2.0
 
Moim a novel design of cryptographic hash function
Moim a novel design of cryptographic hash functionMoim a novel design of cryptographic hash function
Moim a novel design of cryptographic hash function
 
Flexural behavior of composite reinforced concrete t beams cast in steel cha...
Flexural behavior of composite reinforced  concrete t beams cast in steel cha...Flexural behavior of composite reinforced  concrete t beams cast in steel cha...
Flexural behavior of composite reinforced concrete t beams cast in steel cha...
 
Medical image fusion using curvelet transform 2-3-4-5
Medical image fusion using curvelet transform 2-3-4-5Medical image fusion using curvelet transform 2-3-4-5
Medical image fusion using curvelet transform 2-3-4-5
 

Similar to Compatibility between the new and the current ipv6 packet headers

Optimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetOptimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetIAEME Publication
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall techniqueIAEME Publication
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall techniqueIAEME Publication
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall techniqueIAEME Publication
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )AAKASH S
 
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGPERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGijesajournal
 
Paper id 36201527
Paper id 36201527Paper id 36201527
Paper id 36201527IJRAT
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment David Parker
 
3G Wireless Access, Abstract
3G Wireless Access, Abstract3G Wireless Access, Abstract
3G Wireless Access, AbstractVictoria Burke
 
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismSurvey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismIRJET Journal
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...IJERA Editor
 
Mode of Data Flow in the OSI Model
Mode of Data Flow in the OSI ModelMode of Data Flow in the OSI Model
Mode of Data Flow in the OSI Modelijiert bestjournal
 

Similar to Compatibility between the new and the current ipv6 packet headers (20)

Optimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetOptimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernet
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
 
50120130404054
5012013040405450120130404054
50120130404054
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
50120130406009 2
50120130406009 250120130406009 2
50120130406009 2
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
50120140505008
5012014050500850120140505008
50120140505008
 
50120140502004
5012014050200450120140502004
50120140502004
 
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGPERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
 
J0343073079
J0343073079J0343073079
J0343073079
 
Hy3313681373
Hy3313681373Hy3313681373
Hy3313681373
 
Paper id 36201527
Paper id 36201527Paper id 36201527
Paper id 36201527
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 
3G Wireless Access, Abstract
3G Wireless Access, Abstract3G Wireless Access, Abstract
3G Wireless Access, Abstract
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismSurvey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
 
Mode of Data Flow in the OSI Model
Mode of Data Flow in the OSI ModelMode of Data Flow in the OSI Model
Mode of Data Flow in the OSI Model
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 

Recently uploaded (20)

VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 

Compatibility between the new and the current ipv6 packet headers

  • 1. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 211 COMPATIBILITY BETWEEN THE NEW AND THE CURRENT IPV6 PACKET HEADERS Fahim A. Ahmed Ghanem1 , Vilas M. Thakare2 1 Research Student, School of Computational Sciences, Swami Ramanand Teerth Marathwada University, Nanded, India. 2 Professor and Head of Computer Science, Faculty of Engineering &Technology Post Graduate Department of Computer Science, SGB, Amravati University, Amravati. ABSTRACT This paper aims to compatible between the new approach of IPv6 Packets’ header and transmission with the existing one. This compatibility will give us the ability to combine and execute both approaches in one network environment and give us the flexibility to gradual migration from the existing to new approach without affecting the current network environment. KEYWORDS: TCP/IP, UDP, IPv6, Ethernet Frame. 1. INTRODUCTION The new “IPv6 Packet’s header and transmission”approach which was proposed by us previously [1] has reduced the headers of the packet and reduced the header processing time which was worthy to be implemented in network environment. Network environment has billions of devices work on current IPv6 packet scheme which makes the implementationof new approach practically not possible at all. The practical way for implementing the new approach is to find compatibility way between the new and the existing approach and start implementing the new approach gradually. 2. OBJECTIVE OF THIS STUDY The objective of this paper is the compatibility between the new approachof “IPv6Packetheaders and transmission” which was proposed by us in the previous paper [2] with existing OSImodule. This compatibility willgive us the ability to gradually migratefrom INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June, 2013, pp. 211-219 © IAEME: www.iaeme.com/ijecet.asp Journal Impact Factor (2013): 5.8896 (Calculated by GISI) www.jifactor.com IJECET © I A E M E
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 the exiting IPv6 approach to the new devices which are working on current by reducing the cost of replacement the existing without extra investment. This will help organization to migrate the devices which have an expired support licenses or reach the default work years. 3. EXISTING AND NEW IPV6 PACKET’S APPROACH Before we start with compatibility, it existing and the packet header’s approaches. 3.1 CurrentIPv6 Packet’s Approach ( As we have gone through existing approach in the previous paper section we will have a quick look deeply in the functionality of theheader a. Variable Fields: fields that it is information from in each packet. b. Invariable Fields (Tagged with Inv.): to other and doesn’t have to be repeated in each packet Open Systems Interconnection (OSI) model Systems Interconnection effort at the prescription of characterizing and standardizing the functions of a terms of abstraction. Similar communication functions are grouped into logical layers. A layer serves the layer above it and is served by the layer below it. There are seven interconnection layers start from up to down (layer 7 to layer 1 prospectively: Application forwards user data to Presentation layer which forwards it to Session layer forwards data user to Transportation layer. sent the segment to Network layer which adds header and forward the packet to layer. Data link adds the header and forward the frame to Fig. 3.1.1 TCP Packet’s Headers The Transmission Control Protocol (TCP) is one of the core Protocol Suiteprovides reliable, ordered computer to another program on another computer. TCP is the protocol that major Internet applications such as the World Wide on. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 212 to the new approach without needing to remove all the existing devices which are working on currentIPv6 approach. This approach will be useful financially by reducing the cost of replacement the existing IPv6 devices to the new proposed will help organization to migrate the devices which have an expired support licenses or reach the default work years. EXISTING AND NEW IPV6 PACKET’S APPROACH Before we start with compatibility, it will be helpful to have a quick review of the existing and the packet header’s approaches. Packet’s Approach (OSI Model Layers) As we have gone through existing approach in the previous paper [3 look through OSI model packet construction without digging deeply in the functionality of theheader files.There are two types of header fields: it is information from packet to packet and has to be repeated (Tagged with Inv.): fieldthat it is information doesn’t vary have to be repeated in each packet. Open Systems Interconnection (OSI) model (ISO/IEC 7498-1) is a product of the effort at the International organization for Standardization prescription of characterizing and standardizing the functions of a communications system terms of abstraction. Similar communication functions are grouped into logical layers. A layer serves the layer above it and is served by the layer below it. There are seven interconnection layers start from up to down (layer 7 to layer 1 forwards user data to Presentation layer which forwards it to Session Session layer forwards data user to Transportation layer. Transport layer adds the header and layer which adds header and forward the packet to link adds the header and forward the frame to Physical layer. Fig.1 OSI 7 layers’ hierarchy The Transmission Control Protocol (TCP) is one of the core protocols of the provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer. TCP is the protocol that major Internet World Wide Web, email, remote administration and file transfer International Journal of Electronics and Communication Engineering & Technology (IJECET), June (2013), © IAEME ach without needing to remove all the existing This approach will be useful financially devices to the new proposed IPv6 will help organization to migrate the devices which have an will be helpful to have a quick review of the 3], so in this packet construction without digging of header fields: to be repeated it is information doesn’t vary from packet 1) is a product of the Open rganization for Standardization. It is a cations system in terms of abstraction. Similar communication functions are grouped into logical layers. A There are seven interconnection layers start from up to down (layer 7 to layer 1) Session layer. adds the header and layer which adds header and forward the packet to Data link of the Internet delivery of a stream of bytes from a program on one computer to another program on another computer. TCP is the protocol that major Internet file transfer rely
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 3.1.1 UDP Packet’s Header UDP is a connectionless protocol that provides an unreliable data services [ applications must generally be willing to accept some loss, errors or duplication. Some applications such as TFTP may add rudimentary reliability mechanisms into the application layer as needed [5]. UDP provides application verification (via checksum) of the header and payload [ where error checking and correction is either not necessary or performed in the application, avoiding the overhead of such processing at the network interface level [ Fig. 2 OSI TCP frame 3.2 New IPv6 Packet’s Approach New IPv6 approachconsists of two 1- TCP/UDP HeadersOptimization: It contains creationof master 2- TCP/UDP Packet Transmission: Packet’s processingdivided into two steps a. Processing of Master packet. b. Processing of Slave packet. 3.2.1 TCP/UDP Header Optimization TCP/UDP headers optimization divides the packet into two groups; master and slave packets International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 213 UDP is a connectionless protocol that provides an unreliable data services [ applications must generally be willing to accept some loss, errors or duplication. Some may add rudimentary reliability mechanisms into the application ]. UDP provides application multiplexing (via port numbers) and integrity the header and payload [6]. UDP is suitable for purposes where error checking and correction is either not necessary or performed in the application, avoiding the overhead of such processing at the network interface level [7]. frame Fig. 3 OSI UDP frame Packet’s Approach consists of two stages: Optimization: aster and slave packet. Transmission: divided into two steps Master packet. Processing of Slave packet. Header Optimization TCP/UDP headers optimization divides the packet into two groups; master and slave packets International Journal of Electronics and Communication Engineering & Technology (IJECET), June (2013), © IAEME UDP is a connectionless protocol that provides an unreliable data services [4]. UDP applications must generally be willing to accept some loss, errors or duplication. Some may add rudimentary reliability mechanisms into the application ) and integrity UDP is suitable for purposes where error checking and correction is either not necessary or performed in the application, TCP/UDP headers optimization divides the packet into two groups; master and slave packets.
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 3.2.1.1 TCP/UDP Master Packet The proposed Master packet contains all header fields (Variables, Invar ID and Tag Fields) but without user data field. same contents of OSI TCP/UDP a. ID: 1 bit indicates the type of the packet, as value 1 indicates Master segment and value 0 indicate slave packet. b. Tag: 31 bits, is a unique ID for each session, th session. Fig. 4 Fig. 5 International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 214 TCP/UDP Master Packet Master packet contains all header fields (Variables, Invariable, along with ID and Tag Fields) but without user data field.The contents of Master TCP/UDPPacket header with extra two fields: ID: 1 bit indicates the type of the packet, as value 1 indicates Master segment and value 0 Tag: 31 bits, is a unique ID for each session, thisvaluewill be maintained till Fig. 4 Proposed TCP master frame Fig. 5 Proposed UDP master frame International Journal of Electronics and Communication Engineering & Technology (IJECET), June (2013), © IAEME iable, along with /UDPPacket are ID: 1 bit indicates the type of the packet, as value 1 indicates Master segment and value 0 aluewill be maintained till end of the
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 3.2.1.2 TCP/UDP Slave Packet Slave packet contains only i along with user data. Fig. 6 Fig. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 215 TCP/UDP Slave Packet only invariable header fields in addition to ID and Fig. 6 Proposed TCP slave frame Fig. 7 Proposed UDP slave frame International Journal of Electronics and Communication Engineering & Technology (IJECET), June (2013), © IAEME and Tag fields
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 216 3.2.2 Packet Transmission Packet transmission includes the process of transmission of master and slave packets from source to destination. 3.2.2.1 Master PacketTransmission 3.2.2.1.1 Master TCP Packet Transmission a. Application layer of the source stationforwardsuser data to Presentation which forwards it to Session which also forwards it to transport layer. b. Transport layer buffers the received user data, creates one master TCP segment and forward it to network layer. c. Network layeradds Network layer master header to the received segmentand send the packet to Ethernet layer. d. Ethernet layer adds Ethernet master header and tailor and sends the frame to physical layer. e. Physical layeradds it is header sends it to another station or middle devices towards destination. f. Ethernet layer in layer 2 devicechecks the packet ID and identify whether it is Master packet or Slave packet by value of ID (1= master and 0 = slave). g. If the value ID is 1, Ethernet layerprocesses Master packet asthe processing of OSI model packet based on source, destination and content etc. anddecide the next hop MAC. h. Ethernet layercashes the frame processing result, save it in the forwarding table along with frame’s Tag and send the frametowards the destination. i. If the next hop is layer 2, steps f,g, and h will be repeated. j. If the next hop is layer 3device,layer 3 checks the packet ID and identify whether it is Master Packet or Slave Packet by value of ID (1= master and 0 = slave). k. If value ID is 1, layer 3, layer 3 processes master packet as OSI model processing based on source, destination and content etc. anddecide the next hop IP. l. Layers 3 cashes the processing result, save it in the forwarding table along with packet’s Tag and forwards the packet towards the destination. m. If the next hop is layer 3, steps j, k, and l will be repeated. n. If the next hop is layer 4, layer 4processes the segment as per layer 2 and layer 3 and forwards it to next hop or layer. o. Steps f – n will be repeated till packet reaches the destination. p. Once Transport layer of source station receives the acknowledgement about receiving Master packet from the destination, it startscreating and sending slave segments. Note: master TCP packet was sent only one time per each session. 3.2.2.1.2 MasterUDPPacket Transmission Transmission of master UDP packet takes steps from a - n of TCP packetbut not step o, because UDP packet doesn’t rely on acknowledgment. Note: master UDP packet being transmitted every 5 seconds in order to insure continuously delivering of packets in case there is any transmission or processing issue in the middle devices.
  • 7. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 217 3.2.2.2 Slave Packet’s Transmission 3.2.2.2.1 Slave TCP Packet Transmission a. Source transport layer creates either TCP or UDP slave header and sends the segment to Network layer. b. Network layeradds it is slave header and sendsthe packet to Ethernet layer. c. Ethernet layeradds it is slave header and tailor and sends it to physical layer. d. Physical layer adds it isheader and forwards it towards the destination. e. Ethernet layer of the destination stationor middle devices checks the packet ID and identify whether it is Master Frame or Slave Frame by value ID (1= master and 0 = slave). f. If the value ID is 0, layer 2matches the Tag with forwarding table information and forwardsitto the next hope without any extra processing. g. If there is no information about the Tag in the forwarding table, layer 2simply drops the packet. h. If the next hope is layer 2, step e and f will be repeated. i. If the next hope is layer 3deviceof the destination station, layer 3 will check the packet ID and identify whether it is Master Frame or Slave Frame by value ID (1= master and 0 = slave). j. If the value ID is 0, layer 3matchespacketTag with forwarding table information and forwards it to the next hope without any extra processing. k. If there is no information about the Tag in the forwarding table, layer 3 simply drops the packet. l. If the next hope is layer 3, step iand j will be repeated. m. If the next hop is layer 4, layer 4processes the segment like layer 2 and layer 3 and forwards it to next layer. n. Steps etomwas repeated till packet reaches the destination. o. Packet acknowledgment wassent as OSI model. 3.2.2.2.2 Slave UDPPacket Transmission: Transmission of slave UDP segment, packet and frame takes is same as steps from a - n of TCP packet but not step o, because UDP packet doesn’t rely on acknowledgment. Note: master UDP packet is sent every 5 seconds in order to insure continuously delivering of the packets in case there is any transmission or processing issue in the middle devices. [8] 4. Compatibility approach New approach headers construction and packet transmission differs than the existing header construction and transmission. In any network environment there will benew approach based devices and existing approach based devices. Transmission of data between those devices basically will not be doable unless there is compatibility between those devices. There are four scenarios for this compatibility as the following: 1- New IPv6 approach device hands over TCP data to current IPv6 approach device. 2- Current IPv6 approach device hands over TCP data to new IPv6device. 3- New IPv6 approach device hands over UDP data to current IPv6 approach device. 4- Current IPv6 approach device hands over UDP data to new IPv6 device. In the first scenario; new IPv6approach device will send master TCP packet to current approach device and wait for acknowledgment. If it doesn’t receive the acknowledgement within widow time, it will assume the neighbor doesn’t support new approach and will send
  • 8. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 the packets based on the current approach. In the second scenario; new IPv6 data for first packet, create master TCP packet and send it to its neighbor. If its neighbor supports IPv6 new approach, this device will change the header approach packet and send it to the neighbor. If its neighbor doesn’t support new approach packet, the device will bypass the current modification. For third scenario and as per UDP this scenario, the new device will send test order to check the ability of its neighbor whether it sup neighbor supports new IPv6 approach, the device will send new doesn’t support new IPv6 approach, the device will send current In the fourth scenario; newIPv6 data for first packet, create test master TCP neighbor supports IPv6 new approach, received packet to new IPv6 appr doesn’t support new IPv6 approach packet, packet to its neighbor without any modification. Fig. 8 compatibility scenario 1 and 3 Fig. 9 compatibility 5. CONCLUSION Compatibility between new ability to gradually migrate from the current devices without needing to retire the existing devices or to invest more for th This compatibility helps financially as we don’t have to create 100% new network environment, the migration will be don’t for devices which have expired support. Compatibility also enterprise companies to move forward the new International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 218 based on the current approach. IPv6approach device will receive current IPv6 packet, cash the data for first packet, create master TCP packet and send it to its neighbor. If its neighbor new approach, this device will change the headers of thepackets to new send it to the neighbor. If its neighbor doesn’t support new will bypass the current IPv6packet to its neighbor without For third scenario and as per UDP nature, there is no acknowledgment for UDP packet. In this scenario, the new device will send test master TCP not UDP packet to it is neighbor in order to check the ability of its neighbor whether it supports current or new IPv6 approach, the device will send new IPv6 packet approach approach, the device will send current IPv6 approach. IPv6 approach device will receive current IPv6 packet, cash the master TCP not UDP packet and send it to its neighbor. If its new approach, then the device will change the header of each approach packet and send it to the neighbor. If its neighbor approach packet, then the device will bypass the current packet to its neighbor without any modification. Fig. 8 compatibility scenario 1 and 3 Fig. 9 compatibility scenario 2 and 4 between new IPv6 approach and current IPv6 approach gives us the ability to gradually migrate from the current IPv6 approach devices to the new IPv6 devices without needing to retire the existing devices or to invest more for this migration. This compatibility helps financially as we don’t have to create 100% new network environment, the migration will be don’t for the devices which reach theend-of- devices which have expired support. Compatibility also encourages the vendors and enterprise companies to move forward the new IPv6 approach without extra investments International Journal of Electronics and Communication Engineering & Technology (IJECET), June (2013), © IAEME packet, cash the data for first packet, create master TCP packet and send it to its neighbor. If its neighbor thepackets to new IPv6 send it to the neighbor. If its neighbor doesn’t support new IPv6 to its neighbor without any there is no acknowledgment for UDP packet. In TCP not UDP packet to it is neighbor in IPv6 approach. If approach. If it packet, cash the packet and send it to its neighbor. If its device will change the header of each and send it to the neighbor. If its neighbor bypass the current IPv6 approach gives us the IPv6 approach migration. This compatibility helps financially as we don’t have to create 100% new network -life or for the the vendors and investments.
  • 9. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 6. REFERENCES [1][2][3][8] Fahim A. Ahmed Ghanem, Vilas M. Thakare Headers”, IJCSI International Journal of Computer Science Issues, Vol. 10. Issue 1, No 2, January 2013, IJCSI-10-1-2-294- [4] Michael A. Gallo, William M. Hancock, “Computer Communications and Networking Technologies”, New Delhi, India, Cengage Learning India Private Limited [5]Forouzan, B.A. “TCP/IP: Protocol Suite, 1st edition”, New Delhi, India, Tata McGraw Hill Publishing Company Ltd. [6] Clark, M.P., “Data Networks IP and the Internet, 1st edition”, West Sussex, England, John Wiley & Sons Ltd. [7]Andrew S. Tanenbaum, “Computer Networks 4th Edition” Prentice Hall PTR. [9] Mustafa Alaa Qasim and Dipak Pawar Address”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 0976 – 6375. [10] Fahim A. Ahmed Ghanem and Vilas M. Thakare, “Optimization of Ipv6 Packet’s Headers Over Ethernet Frame”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 4, Issue 1, 2013, pp. 99 0976- 6464, ISSN Online: 0976 AUTHORS Mr. Fahim A. Ahmed Ghanem Computational Sciences, MARATHWADA UNIVERSITY, Nanded, in field of IP Network Optimization. He received MSC SMU, India 2005 Senior Network (Supervisor) M.E. degree in field of in field of Applied Electronics, Diploma in Computer Management was obtained his PhD in field of Computer Science. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6472(Online) Volume 4, Issue 3, May – June (2013), © IAEME 219 Fahim A. Ahmed Ghanem, Vilas M. Thakare, “Optimization OfIPv6 IJCSI International Journal of Computer Science Issues, Vol. 10. Issue 1, No 2, -302. Michael A. Gallo, William M. Hancock, “Computer Communications and Networking Technologies”, New Delhi, India, Cengage Learning India Private Limited. Forouzan, B.A. “TCP/IP: Protocol Suite, 1st edition”, New Delhi, India, Tata McGraw ompany Ltd. Clark, M.P., “Data Networks IP and the Internet, 1st edition”, West Sussex, England, Computer Networks 4th Edition”, Amsterdam, the Netherland, Dipak Pawar, “Encryption & Steganography in Ipv6 Sou ournal of Computer Engineering & Technology (IJCET), , pp. 315 - 324, ISSN Print: 0976 – 6367, ISSN Online: Fahim A. Ahmed Ghanem and Vilas M. Thakare, “Optimization of Ipv6 Packet’s Headers Over Ethernet Frame”, International Journal of Electronics and Communication Technology (IJECET), Volume 4, Issue 1, 2013, pp. 99 - 111, ISSN Print: ISSN Online: 0976 –6472. Mr. Fahim A. Ahmed Ghanem is a Ph.D. student at Computational Sciences, SWAMI RAMANAND TEERTH MARATHWADA UNIVERSITY, Nanded, India. He is doing research in field of IP Network Optimization. He received MSC-IT degree from SMU, India 2005 – 2007. He is a dual CCIE R&S and SP.He Network Engineer in mobily SPK.S.A. (Supervisor) Mr. Vilas Mahadeorao Thakare, has received his degree in field of Advance Electronics, received his Applied Electronics, Diploma in Computer Management was obtained his PhD in field of Computer Science. International Journal of Electronics and Communication Engineering & Technology (IJECET), June (2013), © IAEME IPv6 Packet’s IJCSI International Journal of Computer Science Issues, Vol. 10. Issue 1, No 2, Michael A. Gallo, William M. Hancock, “Computer Communications and Networking Forouzan, B.A. “TCP/IP: Protocol Suite, 1st edition”, New Delhi, India, Tata McGraw- Clark, M.P., “Data Networks IP and the Internet, 1st edition”, West Sussex, England, , Amsterdam, the Netherland, n Ipv6 Source ournal of Computer Engineering & Technology (IJCET), 6367, ISSN Online: Fahim A. Ahmed Ghanem and Vilas M. Thakare, “Optimization of Ipv6 Packet’s Headers Over Ethernet Frame”, International Journal of Electronics and Communication 111, ISSN Print: is a Ph.D. student at School of SWAMI RAMANAND TEERTH India. He is doing research IT degree from He works as a , has received his , received his M.Sc. degree Applied Electronics, Diploma in Computer Management. He