SlideShare a Scribd company logo
1 of 7
Download to read offline
IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org 
ISSN (e): 2250-3021, ISSN (p): 2278-8719 
Vol. 04, Issue 08 (August. 2014), ||V4|| PP 51-57 
International organization of Scientific Research 51 | P a g e 
Evaluation and Comparisons of Migration Techniques From IPv4 To IPv6 Using GNS3 Simulator Ghaida Yagoub Ahmed Yosif Al-Gadi 1, Dr. Amin Babiker A/Nabi Mustafa 2, Mahmoud Ahmed Hamied3 1Faculty Of Engineering, Neelain University ,Khartoum -Sudan 2Faculty Of Engineering Neelain University ,Khartoum-Sudan 
3 Mysore University (India) SUDACAD -Sudan Abstract: - The enormous boom of the internet services and with the increased number of the devices, and applications that use the Internet, major changes in the overall architecture has required the use of new technologies. In this day became necessary to find a version of IPv6 (Internet Protocol Version 6) in order to reach out to the product meets all of these requirements and enable a global environment where processing rules clasped all applications. This paper discusses ways to migrate from IPv4 to IPv6,It uses GNS3 to simulate three ways used in transition to IP6 and Svolarwinds to analysis three parameters of network performance Latency, Packet loss.We tried to present in this paper a groundwork examination of IPv6 in Network migration and performance analysis, in which determine that network migration process is a very essential footstep in shaping how the communication will occur and will support with or detract from the enforcement of IPv6 policies[1]. Keywords: - IPv4, IPv6, GNS3, Tunneling,Dual Stack, NAT-PT 
I. INTRODUCTION 
The great expansion of the internet, these days, creates more significant challenges. Not only the addressing of new hosts like computer, tablets, laptop, cell phone but also the technologies. This requires an improvement in the overall architecture of the Internet to support the increase number of users, application, and services that use the Internet. Internet Protocol version 6 (IPv6) came to meet the needs that enable us to get all the applications with high transparency and enable inside network environment rules. IPv6 makes important improvements to network topologies dynamically (exp. Peer to peer, client/server or mesh networks). Also, it improves most of networks functions like, notably in security, mobility, auto configuration, quality of service (QOS) and multicasting [2]. IPv6 is proposed to provide Internet with a larger address space and better performance [3]. In the past ten years, a lot of work has been done on the protocol design, connection and routing mechanism, and transition mechanism of IPv6. As the demand of IPv6-supported network equipment increases, some proposals are introduced to recommend methods for the evaluation of performance and platforms that focus on hardware and compatibility with IPv6 protocols [2]. After its first decade of protocol design and testing, the IPv6 Internet is now in a transition phase from experimental research networks of global operational networks. Once a network begins to provide public services, its performance is always a big issue. As forIPv6, it is even more complex question mark. 
II. TRANSITION 
Moving from IPv4 to IPv6 will not need to be over all areas at the same time because such approach is difficult and it will take time. In addition, public networks now days has no single point of control so it is not possible to enforce like this change. In addition, such change to most companies and organizations already connected to the internet is unwelcome and unprofitable. The best approach for this move is to implementIPv6 along with existing IPv4.To make this approach much easier and coexist with existing IPv4 many transition techniques have been implemented [4]. There are three types: Dual Stack, Tunneling and Translation (NAT- PT). 
A. Dual Stack 
Dual Stack in simple way mean two protocols stack work in the same time or in parallel, the device will have both IPv4 and IPv6 protocol stacks [4]. For example, IPv4 will be used to communicate with IPv4 destinations, and IPv6 will be used to communicate with IPv6 destinations.
Evaluation and Comparisons Of Migration Techniques From IPv4 To IPv6 Using GNS3 Simulator 
International organization of Scientific Research 52 | P a g e 
B. Tunneling 
When packets move between different places it will be encapsulated that is mean IPv6 packet inside IPv4packet, orIPv4 packet inside IPv6 packet [6]. 
C. Translation 
Translation is a way to make a connection between networks that is used, differentprotocols;ittranslatesIPv6 traffic to IPv4 and IPv4 traffic to IPv6 when needed. One of translation methods is Network Address Translation—Protocol (NAT-PT) [5]. With this method of translation can be configured statically or dynamically to translate IPv6 address to IPv4 or IPv4 address to IPv6. 
III. METHOD 
We use GNS3 [7], software to simulate three different methods in the transition from IPv4 to IPv6 (Tunneling, Dual Stack, NAT-PT). In addition, using Solarwinds software for analysis the traffic between multiple destination, sand to measure the performance of the network at every one of the transition methods according to three parameters (Latency, Packet loss, response time). 
A. Simulation Environment Dual Stack 
The below Figure.1 illustrate the Dual Stack Connections. 
In this simulation the components are: 
 Two routers (using Cisco routers 3700). two switches-with Ethernet cabling (Fast Ethernet). 
 Host windows server 2008 (with Solarwinds installation for analysis requirements) host windows 7 clients. (Using virtual box installation in both hosts for client and server) 
 Addressing between router - PC addressing: IPv6 
 Addressing protocol between router 1 and Router 2: Dual Stackboth (IPv4, IPv6). 
Figure 1: Dual-stack
Evaluation and Comparisons Of Migration Techniques From IPv4 To IPv6 Using GNS3 Simulator 
International organization of Scientific Research 53 | P a g e 
B. Simulation Environment Tunneling This Figure.2 show the Tunnel technique ofIPv6 to IPv6 network, while the transit network use IPV4. 
GNS3 topology implemented to test the tunneling can be seen in Figure (2) the test consists of six family Cisco routers (Cisco routers 3700) two computers. Two switches. Implemented through VirtualBox represented by the two computers. Devices used: 
 6 Routers R1, R2 IPv4 backbone 
1) Addressing protocol between R1, R3: IPV4 only 
2) Addressing protocol between R2, R4: IPV4 only 
3) Addressing protocol between R3, R6: IPV6 only 
4) Addressing protocol between R4, R5: IPV6 only 
Tunneling will take place from R3 to R4 (tunnel technique GRE). C. Simulation environment NAT-PT In this Figure.3 shows the NAT-PT, IPV4 to IPV6 dynamic NAT translation. 
Figure 3: NAT-PT 
Figure 2: Tunnel
Evaluation and Comparisons Of Migration Techniques From IPv4 To IPv6 Using GNS3 Simulator 
International organization of Scientific Research 54 | P a g e 
Components in the NAT-PT network. 
 1 host, windows server 2008 (with solarwind installation for analysis requirements) 
 2 switches for connecting. 
2 hosts win 7 operating system as a client. (Using virtual box installation in both hosts for client and server) Can be seen GNS3 topology NAT-PT translation configuration from IPv4 to IPv6 and from IPv6 to IPv4) implementation of the test in Figure 3, the test consists of a family: 
 Two Router (using Cisco routers 3700) 
 Two switches for connecting. 
 Server (NAT-PT server) installed with solar winds) and connected to the computer running windows server. The first portion of the topology is using IPv4 (host wins 7 + R3) the second part is using IPv6 (host c3 + R2). 
IV. RESULT 
A. Dual Stack network result 
The average response time of dual stack 238 ms was measured in the above Figure.4 and the results show as packet size increase the response time increases. 
The average response time of Dual Stack high and packet loss high, show Figure.5. 
Figure 4: average response time of dual stack 
Figure 5: Network latency& packet loss of Dual Stack
Evaluation and Comparisons Of Migration Techniques From IPv4 To IPv6 Using GNS3 Simulator 
International organization of Scientific Research 55 | P a g e 
B. Tunnel network result 
The average response time of Tunnel = 36 ms in the Previous Figure.6. 
In Figure.7, there are fewlatency& packet losses of the tunnel. 
In the Figure. 6, 7 we find that the average response time is equal to 28.5 ms and the loss of packets is equal to zero. 
Figure 6: average response time of Tunnel 
Figure 7: Networklatency& packet loss of Tunnel
Evaluation and Comparisons Of Migration Techniques From IPv4 To IPv6 Using GNS3 Simulator 
International organization of Scientific Research 56 | P a g e 
C. NAT-PT network result 
In the above Figure.8, we measured network latency in ms. The packet loss of NAT-PT was high; this is because of the above-mentioned facts The MTU and dual Translation. 
In Figure.9 the average response time in of NAT-PT=800 ms as measured in the above figure10. Moreover, the result shows as packet size increases the response time increases. We absorb high packet loss and latency of the three proposed migration techniques in NAT-PT, these due to that the fact dual (two-way) translation technique and tunneling. 
V. CONCLUSIONS 
Figure 8: Networklatency& packet loss of NAT-PT 
Figure 9: AVERAGE RESPONSE TIME NAT-PT
Evaluation and Comparisons Of Migration Techniques From IPv4 To IPv6 Using GNS3 Simulator 
International organization of Scientific Research 57 | P a g e 
The migration from IPv4 to IPv6 is a something of an evident in the long term, however, IPv6 does not only provides IP address space - there are some other advantages including long-term cost savings and better performance. In addition to the realization of true interoperability and mobility of networks. In this paper, we conducted three scenarios, models of transition technique. Tunnel, NAT-PT and Dual Stack. We have implemented the experiment by using GNS 3 and analyze the work of the three networks through the Solarwinds program .And we measure packet loss and latency and Response Time. We have found that the average response time is different from one network to the other, and that the adoption of the topology used by each network and the number of machines in it. We find that the average response time in the tunnel is equal to 28.5 ms and in the Dual Stack is 283 ms As far as NAT-PT an average response time of 800 ms. The higher average response time resulted in higher latency. There is higher latency in NAT-PT fellows Dual Stack and last tunnel. We conclude that from the simulation of these three techniques, that the tunneling technique is the best in terms of latency, packet loss, and RRT. REFERENCE [1] MD. tarig Aziz, Mohamed Saiful Islam, MD. nazmul Islam khan. Throughput performance evolution of video /voice traffic in IPv4/IPv6 network. International journal of computer applications. December 2, 2011, p, 1. [2] A.Dutta, J.ALberi, A.Cheng, B.Horgan, T.McAuley, D.Chee, B.Lyles, "IPv6TRANSITIONTECHNIQUSFORLEGACY APPLICATION":582, MILCOM 2006. [3] Ali, Amer nizar abu. Comparison study between IPv4&IPv6. International journal of computer science issue. May 1, 2013. [4] Internet Engineering Task Force (IETF) RFC6052, 3513, 4291, 6104, HTTP://tools.ietf. Or/htm/ [5] P. Loshin, IPv6: Theory, Protocol and Practice, Second Edition, 500 Sansome Street, Suite 400, San Francisco, CA 94111: Morgan Kaufmann Publishers, 2004. [6] GNS3. “Hardware that GNS3 can emulate”, http://www.gns3.org/hardware/. [7] C. Bouras, P. Guanos, and A. Karaliotas, "The Deployment Of IPv6 in an IPv4 world and Transition strategies," Internet Research: Electronic Networking Applications and Policy, Vol. 13, no. 2, pp. 86-93, 2003.

More Related Content

What's hot

Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioIJECEIAES
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...IRJET Journal
 
Transfer of ut information from fpga through ethernet interface
Transfer of ut information from fpga through ethernet interfaceTransfer of ut information from fpga through ethernet interface
Transfer of ut information from fpga through ethernet interfaceeSAT Publishing House
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET Journal
 
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...ijceronline
 
Computer Network Performance Evaluation Based on Different Data Packet Size U...
Computer Network Performance Evaluation Based on Different Data Packet Size U...Computer Network Performance Evaluation Based on Different Data Packet Size U...
Computer Network Performance Evaluation Based on Different Data Packet Size U...Jaipal Dhobale
 
Dcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless networkDcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless networkIJCNCJournal
 
Scheduling Algorithm Based Simulator for Resource Allocation Task in Cloud Co...
Scheduling Algorithm Based Simulator for Resource Allocation Task in Cloud Co...Scheduling Algorithm Based Simulator for Resource Allocation Task in Cloud Co...
Scheduling Algorithm Based Simulator for Resource Allocation Task in Cloud Co...IRJET Journal
 
Iccci2010 fipv6
Iccci2010 fipv6Iccci2010 fipv6
Iccci2010 fipv6hanums1
 
Network Performance Enhancement for 1G-EPON by DBA Algorithms
Network Performance Enhancement for 1G-EPON by DBA AlgorithmsNetwork Performance Enhancement for 1G-EPON by DBA Algorithms
Network Performance Enhancement for 1G-EPON by DBA AlgorithmsIJERA Editor
 
Ieeepro techno solutions 2013 ieee java project -building confidential and ...
Ieeepro techno solutions   2013 ieee java project -building confidential and ...Ieeepro techno solutions   2013 ieee java project -building confidential and ...
Ieeepro techno solutions 2013 ieee java project -building confidential and ...hemanthbbc
 
Large Scale Kernel Learning using Block Coordinate Descent
Large Scale Kernel Learning using Block Coordinate DescentLarge Scale Kernel Learning using Block Coordinate Descent
Large Scale Kernel Learning using Block Coordinate DescentShaleen Kumar Gupta
 
Yue Tian's 2015 PIMRC powerpoint slides
Yue Tian's 2015 PIMRC powerpoint slidesYue Tian's 2015 PIMRC powerpoint slides
Yue Tian's 2015 PIMRC powerpoint slidesYue Tian
 
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...Danny Alex Lachos Perez
 
Architecture and Performance of Runtime Environments for Data Intensive Scala...
Architecture and Performance of Runtime Environments for Data Intensive Scala...Architecture and Performance of Runtime Environments for Data Intensive Scala...
Architecture and Performance of Runtime Environments for Data Intensive Scala...jaliyae
 

What's hot (18)

Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
 
A Novel Approach in Scheduling Of the Real- Time Tasks In Heterogeneous Multi...
A Novel Approach in Scheduling Of the Real- Time Tasks In Heterogeneous Multi...A Novel Approach in Scheduling Of the Real- Time Tasks In Heterogeneous Multi...
A Novel Approach in Scheduling Of the Real- Time Tasks In Heterogeneous Multi...
 
Transfer of ut information from fpga through ethernet interface
Transfer of ut information from fpga through ethernet interfaceTransfer of ut information from fpga through ethernet interface
Transfer of ut information from fpga through ethernet interface
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
 
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
 
Computer Network Performance Evaluation Based on Different Data Packet Size U...
Computer Network Performance Evaluation Based on Different Data Packet Size U...Computer Network Performance Evaluation Based on Different Data Packet Size U...
Computer Network Performance Evaluation Based on Different Data Packet Size U...
 
Dcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless networkDcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless network
 
F45013942
F45013942F45013942
F45013942
 
Scheduling Algorithm Based Simulator for Resource Allocation Task in Cloud Co...
Scheduling Algorithm Based Simulator for Resource Allocation Task in Cloud Co...Scheduling Algorithm Based Simulator for Resource Allocation Task in Cloud Co...
Scheduling Algorithm Based Simulator for Resource Allocation Task in Cloud Co...
 
Iccci2010 fipv6
Iccci2010 fipv6Iccci2010 fipv6
Iccci2010 fipv6
 
Network Performance Enhancement for 1G-EPON by DBA Algorithms
Network Performance Enhancement for 1G-EPON by DBA AlgorithmsNetwork Performance Enhancement for 1G-EPON by DBA Algorithms
Network Performance Enhancement for 1G-EPON by DBA Algorithms
 
Ieeepro techno solutions 2013 ieee java project -building confidential and ...
Ieeepro techno solutions   2013 ieee java project -building confidential and ...Ieeepro techno solutions   2013 ieee java project -building confidential and ...
Ieeepro techno solutions 2013 ieee java project -building confidential and ...
 
Large Scale Kernel Learning using Block Coordinate Descent
Large Scale Kernel Learning using Block Coordinate DescentLarge Scale Kernel Learning using Block Coordinate Descent
Large Scale Kernel Learning using Block Coordinate Descent
 
Yue Tian's 2015 PIMRC powerpoint slides
Yue Tian's 2015 PIMRC powerpoint slidesYue Tian's 2015 PIMRC powerpoint slides
Yue Tian's 2015 PIMRC powerpoint slides
 
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...
 
Architecture and Performance of Runtime Environments for Data Intensive Scala...
Architecture and Performance of Runtime Environments for Data Intensive Scala...Architecture and Performance of Runtime Environments for Data Intensive Scala...
Architecture and Performance of Runtime Environments for Data Intensive Scala...
 
Chapter4 l4
Chapter4 l4Chapter4 l4
Chapter4 l4
 

Viewers also liked

Non symbolic base64 an effective representation of ipv6 address
Non symbolic base64 an effective representation of ipv6 addressNon symbolic base64 an effective representation of ipv6 address
Non symbolic base64 an effective representation of ipv6 addressIAEME Publication
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
 
BasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet FiltersBasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet Filtersbhasker nalaveli
 
IPv6 Observatory study - Final report
IPv6 Observatory study - Final reportIPv6 Observatory study - Final report
IPv6 Observatory study - Final reportFabrice Clari
 

Viewers also liked (7)

Non symbolic base64 an effective representation of ipv6 address
Non symbolic base64 an effective representation of ipv6 addressNon symbolic base64 an effective representation of ipv6 address
Non symbolic base64 an effective representation of ipv6 address
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
 
Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention
 
BasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet FiltersBasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet Filters
 
My ppt..priya
My ppt..priyaMy ppt..priya
My ppt..priya
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
IPv6 Observatory study - Final report
IPv6 Observatory study - Final reportIPv6 Observatory study - Final report
IPv6 Observatory study - Final report
 

Similar to Comparing IPv4 to IPv6 Migration Techniques

Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...IOSR Journals
 
Review of IPv4 and IPv6 and various implementation methods of IPv6
Review of IPv4 and IPv6 and various implementation methods of IPv6Review of IPv4 and IPv6 and various implementation methods of IPv6
Review of IPv4 and IPv6 and various implementation methods of IPv6IRJET Journal
 
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
Procedia Computer Science   46  ( 2015 )  1072 – 1078 187.docxProcedia Computer Science   46  ( 2015 )  1072 – 1078 187.docx
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docxAASTHA76
 
IRJET- Evaluating the Impact of IPv4 to IPv6 Tunneling with MPLS on VOIP
IRJET-  	  Evaluating the Impact of IPv4 to IPv6 Tunneling with MPLS on VOIPIRJET-  	  Evaluating the Impact of IPv4 to IPv6 Tunneling with MPLS on VOIP
IRJET- Evaluating the Impact of IPv4 to IPv6 Tunneling with MPLS on VOIPIRJET Journal
 
draft-georgescu-bmwg-ipv6-tran-tech-benchmarking-00
draft-georgescu-bmwg-ipv6-tran-tech-benchmarking-00draft-georgescu-bmwg-ipv6-tran-tech-benchmarking-00
draft-georgescu-bmwg-ipv6-tran-tech-benchmarking-00Marius Georgescu
 
Performance analysis of tunnel broker through open virtual private network
Performance analysis of tunnel broker through open virtual private networkPerformance analysis of tunnel broker through open virtual private network
Performance analysis of tunnel broker through open virtual private networkTELKOMNIKA JOURNAL
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2hanums1
 
A Scenario-Based Review Of IPv6 Transition Tools
A Scenario-Based Review Of IPv6 Transition ToolsA Scenario-Based Review Of IPv6 Transition Tools
A Scenario-Based Review Of IPv6 Transition ToolsTye Rausch
 
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6journalBEEI
 
Da3210751081
Da3210751081Da3210751081
Da3210751081IJMER
 
A Survey On Next Generation Internet Protocol IPv6
A Survey On Next Generation Internet Protocol  IPv6A Survey On Next Generation Internet Protocol  IPv6
A Survey On Next Generation Internet Protocol IPv6Carrie Romero
 
A secure tunnel technique using i pv6 transition over ipv4 channel
A secure tunnel technique using i pv6 transition over ipv4 channelA secure tunnel technique using i pv6 transition over ipv4 channel
A secure tunnel technique using i pv6 transition over ipv4 channelMade Artha
 
Best lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packetBest lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packeteSAT Publishing House
 
Performance comparison of transmitting jumbo frame on Windows and Linux System
Performance comparison of transmitting jumbo frame on Windows and Linux SystemPerformance comparison of transmitting jumbo frame on Windows and Linux System
Performance comparison of transmitting jumbo frame on Windows and Linux SystemTELKOMNIKA JOURNAL
 
Icemc22010 ppt 29
Icemc22010 ppt 29Icemc22010 ppt 29
Icemc22010 ppt 29hanums1
 
Icemc2 kuppam
Icemc2 kuppamIcemc2 kuppam
Icemc2 kuppamhanums1
 

Similar to Comparing IPv4 to IPv6 Migration Techniques (20)

N017147679
N017147679N017147679
N017147679
 
M017147275
M017147275M017147275
M017147275
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
 
Review of IPv4 and IPv6 and various implementation methods of IPv6
Review of IPv4 and IPv6 and various implementation methods of IPv6Review of IPv4 and IPv6 and various implementation methods of IPv6
Review of IPv4 and IPv6 and various implementation methods of IPv6
 
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
Procedia Computer Science   46  ( 2015 )  1072 – 1078 187.docxProcedia Computer Science   46  ( 2015 )  1072 – 1078 187.docx
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
 
A010630103
A010630103A010630103
A010630103
 
IRJET- Evaluating the Impact of IPv4 to IPv6 Tunneling with MPLS on VOIP
IRJET-  	  Evaluating the Impact of IPv4 to IPv6 Tunneling with MPLS on VOIPIRJET-  	  Evaluating the Impact of IPv4 to IPv6 Tunneling with MPLS on VOIP
IRJET- Evaluating the Impact of IPv4 to IPv6 Tunneling with MPLS on VOIP
 
RASHMI VT REPORT
RASHMI VT REPORTRASHMI VT REPORT
RASHMI VT REPORT
 
draft-georgescu-bmwg-ipv6-tran-tech-benchmarking-00
draft-georgescu-bmwg-ipv6-tran-tech-benchmarking-00draft-georgescu-bmwg-ipv6-tran-tech-benchmarking-00
draft-georgescu-bmwg-ipv6-tran-tech-benchmarking-00
 
Performance analysis of tunnel broker through open virtual private network
Performance analysis of tunnel broker through open virtual private networkPerformance analysis of tunnel broker through open virtual private network
Performance analysis of tunnel broker through open virtual private network
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
 
A Scenario-Based Review Of IPv6 Transition Tools
A Scenario-Based Review Of IPv6 Transition ToolsA Scenario-Based Review Of IPv6 Transition Tools
A Scenario-Based Review Of IPv6 Transition Tools
 
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
 
Da3210751081
Da3210751081Da3210751081
Da3210751081
 
A Survey On Next Generation Internet Protocol IPv6
A Survey On Next Generation Internet Protocol  IPv6A Survey On Next Generation Internet Protocol  IPv6
A Survey On Next Generation Internet Protocol IPv6
 
A secure tunnel technique using i pv6 transition over ipv4 channel
A secure tunnel technique using i pv6 transition over ipv4 channelA secure tunnel technique using i pv6 transition over ipv4 channel
A secure tunnel technique using i pv6 transition over ipv4 channel
 
Best lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packetBest lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packet
 
Performance comparison of transmitting jumbo frame on Windows and Linux System
Performance comparison of transmitting jumbo frame on Windows and Linux SystemPerformance comparison of transmitting jumbo frame on Windows and Linux System
Performance comparison of transmitting jumbo frame on Windows and Linux System
 
Icemc22010 ppt 29
Icemc22010 ppt 29Icemc22010 ppt 29
Icemc22010 ppt 29
 
Icemc2 kuppam
Icemc2 kuppamIcemc2 kuppam
Icemc2 kuppam
 

More from IOSR-JEN

More from IOSR-JEN (20)

C05921721
C05921721C05921721
C05921721
 
B05921016
B05921016B05921016
B05921016
 
A05920109
A05920109A05920109
A05920109
 
J05915457
J05915457J05915457
J05915457
 
I05914153
I05914153I05914153
I05914153
 
H05913540
H05913540H05913540
H05913540
 
G05913234
G05913234G05913234
G05913234
 
F05912731
F05912731F05912731
F05912731
 
E05912226
E05912226E05912226
E05912226
 
D05911621
D05911621D05911621
D05911621
 
C05911315
C05911315C05911315
C05911315
 
B05910712
B05910712B05910712
B05910712
 
A05910106
A05910106A05910106
A05910106
 
B05840510
B05840510B05840510
B05840510
 
I05844759
I05844759I05844759
I05844759
 
H05844346
H05844346H05844346
H05844346
 
G05843942
G05843942G05843942
G05843942
 
F05843238
F05843238F05843238
F05843238
 
E05842831
E05842831E05842831
E05842831
 
D05842227
D05842227D05842227
D05842227
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Comparing IPv4 to IPv6 Migration Techniques

  • 1. IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 08 (August. 2014), ||V4|| PP 51-57 International organization of Scientific Research 51 | P a g e Evaluation and Comparisons of Migration Techniques From IPv4 To IPv6 Using GNS3 Simulator Ghaida Yagoub Ahmed Yosif Al-Gadi 1, Dr. Amin Babiker A/Nabi Mustafa 2, Mahmoud Ahmed Hamied3 1Faculty Of Engineering, Neelain University ,Khartoum -Sudan 2Faculty Of Engineering Neelain University ,Khartoum-Sudan 3 Mysore University (India) SUDACAD -Sudan Abstract: - The enormous boom of the internet services and with the increased number of the devices, and applications that use the Internet, major changes in the overall architecture has required the use of new technologies. In this day became necessary to find a version of IPv6 (Internet Protocol Version 6) in order to reach out to the product meets all of these requirements and enable a global environment where processing rules clasped all applications. This paper discusses ways to migrate from IPv4 to IPv6,It uses GNS3 to simulate three ways used in transition to IP6 and Svolarwinds to analysis three parameters of network performance Latency, Packet loss.We tried to present in this paper a groundwork examination of IPv6 in Network migration and performance analysis, in which determine that network migration process is a very essential footstep in shaping how the communication will occur and will support with or detract from the enforcement of IPv6 policies[1]. Keywords: - IPv4, IPv6, GNS3, Tunneling,Dual Stack, NAT-PT I. INTRODUCTION The great expansion of the internet, these days, creates more significant challenges. Not only the addressing of new hosts like computer, tablets, laptop, cell phone but also the technologies. This requires an improvement in the overall architecture of the Internet to support the increase number of users, application, and services that use the Internet. Internet Protocol version 6 (IPv6) came to meet the needs that enable us to get all the applications with high transparency and enable inside network environment rules. IPv6 makes important improvements to network topologies dynamically (exp. Peer to peer, client/server or mesh networks). Also, it improves most of networks functions like, notably in security, mobility, auto configuration, quality of service (QOS) and multicasting [2]. IPv6 is proposed to provide Internet with a larger address space and better performance [3]. In the past ten years, a lot of work has been done on the protocol design, connection and routing mechanism, and transition mechanism of IPv6. As the demand of IPv6-supported network equipment increases, some proposals are introduced to recommend methods for the evaluation of performance and platforms that focus on hardware and compatibility with IPv6 protocols [2]. After its first decade of protocol design and testing, the IPv6 Internet is now in a transition phase from experimental research networks of global operational networks. Once a network begins to provide public services, its performance is always a big issue. As forIPv6, it is even more complex question mark. II. TRANSITION Moving from IPv4 to IPv6 will not need to be over all areas at the same time because such approach is difficult and it will take time. In addition, public networks now days has no single point of control so it is not possible to enforce like this change. In addition, such change to most companies and organizations already connected to the internet is unwelcome and unprofitable. The best approach for this move is to implementIPv6 along with existing IPv4.To make this approach much easier and coexist with existing IPv4 many transition techniques have been implemented [4]. There are three types: Dual Stack, Tunneling and Translation (NAT- PT). A. Dual Stack Dual Stack in simple way mean two protocols stack work in the same time or in parallel, the device will have both IPv4 and IPv6 protocol stacks [4]. For example, IPv4 will be used to communicate with IPv4 destinations, and IPv6 will be used to communicate with IPv6 destinations.
  • 2. Evaluation and Comparisons Of Migration Techniques From IPv4 To IPv6 Using GNS3 Simulator International organization of Scientific Research 52 | P a g e B. Tunneling When packets move between different places it will be encapsulated that is mean IPv6 packet inside IPv4packet, orIPv4 packet inside IPv6 packet [6]. C. Translation Translation is a way to make a connection between networks that is used, differentprotocols;ittranslatesIPv6 traffic to IPv4 and IPv4 traffic to IPv6 when needed. One of translation methods is Network Address Translation—Protocol (NAT-PT) [5]. With this method of translation can be configured statically or dynamically to translate IPv6 address to IPv4 or IPv4 address to IPv6. III. METHOD We use GNS3 [7], software to simulate three different methods in the transition from IPv4 to IPv6 (Tunneling, Dual Stack, NAT-PT). In addition, using Solarwinds software for analysis the traffic between multiple destination, sand to measure the performance of the network at every one of the transition methods according to three parameters (Latency, Packet loss, response time). A. Simulation Environment Dual Stack The below Figure.1 illustrate the Dual Stack Connections. In this simulation the components are:  Two routers (using Cisco routers 3700). two switches-with Ethernet cabling (Fast Ethernet).  Host windows server 2008 (with Solarwinds installation for analysis requirements) host windows 7 clients. (Using virtual box installation in both hosts for client and server)  Addressing between router - PC addressing: IPv6  Addressing protocol between router 1 and Router 2: Dual Stackboth (IPv4, IPv6). Figure 1: Dual-stack
  • 3. Evaluation and Comparisons Of Migration Techniques From IPv4 To IPv6 Using GNS3 Simulator International organization of Scientific Research 53 | P a g e B. Simulation Environment Tunneling This Figure.2 show the Tunnel technique ofIPv6 to IPv6 network, while the transit network use IPV4. GNS3 topology implemented to test the tunneling can be seen in Figure (2) the test consists of six family Cisco routers (Cisco routers 3700) two computers. Two switches. Implemented through VirtualBox represented by the two computers. Devices used:  6 Routers R1, R2 IPv4 backbone 1) Addressing protocol between R1, R3: IPV4 only 2) Addressing protocol between R2, R4: IPV4 only 3) Addressing protocol between R3, R6: IPV6 only 4) Addressing protocol between R4, R5: IPV6 only Tunneling will take place from R3 to R4 (tunnel technique GRE). C. Simulation environment NAT-PT In this Figure.3 shows the NAT-PT, IPV4 to IPV6 dynamic NAT translation. Figure 3: NAT-PT Figure 2: Tunnel
  • 4. Evaluation and Comparisons Of Migration Techniques From IPv4 To IPv6 Using GNS3 Simulator International organization of Scientific Research 54 | P a g e Components in the NAT-PT network.  1 host, windows server 2008 (with solarwind installation for analysis requirements)  2 switches for connecting. 2 hosts win 7 operating system as a client. (Using virtual box installation in both hosts for client and server) Can be seen GNS3 topology NAT-PT translation configuration from IPv4 to IPv6 and from IPv6 to IPv4) implementation of the test in Figure 3, the test consists of a family:  Two Router (using Cisco routers 3700)  Two switches for connecting.  Server (NAT-PT server) installed with solar winds) and connected to the computer running windows server. The first portion of the topology is using IPv4 (host wins 7 + R3) the second part is using IPv6 (host c3 + R2). IV. RESULT A. Dual Stack network result The average response time of dual stack 238 ms was measured in the above Figure.4 and the results show as packet size increase the response time increases. The average response time of Dual Stack high and packet loss high, show Figure.5. Figure 4: average response time of dual stack Figure 5: Network latency& packet loss of Dual Stack
  • 5. Evaluation and Comparisons Of Migration Techniques From IPv4 To IPv6 Using GNS3 Simulator International organization of Scientific Research 55 | P a g e B. Tunnel network result The average response time of Tunnel = 36 ms in the Previous Figure.6. In Figure.7, there are fewlatency& packet losses of the tunnel. In the Figure. 6, 7 we find that the average response time is equal to 28.5 ms and the loss of packets is equal to zero. Figure 6: average response time of Tunnel Figure 7: Networklatency& packet loss of Tunnel
  • 6. Evaluation and Comparisons Of Migration Techniques From IPv4 To IPv6 Using GNS3 Simulator International organization of Scientific Research 56 | P a g e C. NAT-PT network result In the above Figure.8, we measured network latency in ms. The packet loss of NAT-PT was high; this is because of the above-mentioned facts The MTU and dual Translation. In Figure.9 the average response time in of NAT-PT=800 ms as measured in the above figure10. Moreover, the result shows as packet size increases the response time increases. We absorb high packet loss and latency of the three proposed migration techniques in NAT-PT, these due to that the fact dual (two-way) translation technique and tunneling. V. CONCLUSIONS Figure 8: Networklatency& packet loss of NAT-PT Figure 9: AVERAGE RESPONSE TIME NAT-PT
  • 7. Evaluation and Comparisons Of Migration Techniques From IPv4 To IPv6 Using GNS3 Simulator International organization of Scientific Research 57 | P a g e The migration from IPv4 to IPv6 is a something of an evident in the long term, however, IPv6 does not only provides IP address space - there are some other advantages including long-term cost savings and better performance. In addition to the realization of true interoperability and mobility of networks. In this paper, we conducted three scenarios, models of transition technique. Tunnel, NAT-PT and Dual Stack. We have implemented the experiment by using GNS 3 and analyze the work of the three networks through the Solarwinds program .And we measure packet loss and latency and Response Time. We have found that the average response time is different from one network to the other, and that the adoption of the topology used by each network and the number of machines in it. We find that the average response time in the tunnel is equal to 28.5 ms and in the Dual Stack is 283 ms As far as NAT-PT an average response time of 800 ms. The higher average response time resulted in higher latency. There is higher latency in NAT-PT fellows Dual Stack and last tunnel. We conclude that from the simulation of these three techniques, that the tunneling technique is the best in terms of latency, packet loss, and RRT. REFERENCE [1] MD. tarig Aziz, Mohamed Saiful Islam, MD. nazmul Islam khan. Throughput performance evolution of video /voice traffic in IPv4/IPv6 network. International journal of computer applications. December 2, 2011, p, 1. [2] A.Dutta, J.ALberi, A.Cheng, B.Horgan, T.McAuley, D.Chee, B.Lyles, "IPv6TRANSITIONTECHNIQUSFORLEGACY APPLICATION":582, MILCOM 2006. [3] Ali, Amer nizar abu. Comparison study between IPv4&IPv6. International journal of computer science issue. May 1, 2013. [4] Internet Engineering Task Force (IETF) RFC6052, 3513, 4291, 6104, HTTP://tools.ietf. Or/htm/ [5] P. Loshin, IPv6: Theory, Protocol and Practice, Second Edition, 500 Sansome Street, Suite 400, San Francisco, CA 94111: Morgan Kaufmann Publishers, 2004. [6] GNS3. “Hardware that GNS3 can emulate”, http://www.gns3.org/hardware/. [7] C. Bouras, P. Guanos, and A. Karaliotas, "The Deployment Of IPv6 in an IPv4 world and Transition strategies," Internet Research: Electronic Networking Applications and Policy, Vol. 13, no. 2, pp. 86-93, 2003.