SlideShare a Scribd company logo
1 of 27
Dr.Manjaiah.D.H. Chairman  and Professor, Dept of CS, Mangalagangotri, Mangalore University, Mangalore-31739   Hanumanthappa.J.,  Aravinda.C.V. B.E., Match.,(Ph.D) ,  M.Sc.,M.Phil.,M.Tech.,(Ph.D).,  Asst.Professor,DOS in CS,UOM,   Research Scholar, Manasagangotri,   Mangalagangotri, Mysore.   Mangalore University, Mangalore.
ABSTRACT
Contents
[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPv6 Header Format Traffic Class Flow Label Vers Payload Length Next Header Hop Limit Source Address Destination Address 0 4 12 16 24 31
 
[object Object]
Fig.2.Translation of IPv6 to IPv4 Header .
[object Object],[object Object],[object Object],[object Object]
ICIIC2010,Aug-5,6,7. BD-SIIT Data Packet Transmission Process Fig.3.BD-SIIT Data packet Transmission Process .
IPv4-mapped  -IPv6 Address . 0  79  80  95  ,[object Object],80- bits of zero FFFF(16 bits ) 32 bits (IPv4 address
[object Object],[object Object],IPv4  Address IPv6 Address Address mapping 195.18.23.17 ABC2::4321 1 210.154.76.91 ABC2:4321 2 IPv6 Address IPv4 Mapping Mapping_value ABC2::4321 195.18.231.17 1 CDEF::5672 223.18.231.17 2
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ICIIC2010,Aug-5,6,7. Comparison and Contrast between BD-SIIT and DSTM Transition Mechanism. BD-SIIT DSTM 1.It does not for tunneling technique . 1. A tunneling technique needs to be configured.   2. Two IPv4 and IPv6 addresses are assumed to be globally unique. 2.Only IPv4 addresses are assumed to be globally unique . 3.It Uses two types of global IP addresses that are assigned by DNS46 server for each communication system. 3. Uses only a pool of IPv4 addresses in order to assign Global IPv4 address for each communication system. 4.Applicable for Bi-Directional commn between IPv6 only nodes and IPv4 nodes. 4.Not applicable to IPv6 only nodes that want to communicate with IPv4 only node. 5.Less cost 5.High Cost 6.Does not require upgrading or extra software to be used at end user nodes. 6.Requires modifications  or extra software to support the dual stack on the end user nodes.  7.Transition from IPv4 to IPv6 and Vice versa is needed. 7.Encapsulation and Decapsulation methods are needed.
In this Paper we have calculated three performance evaluation metrics . 1.End to End delay 2. Throughput 3.Round trip time(RTT)  N rec 1.Mean End to End delay= ∑EEDi/Nrec i=1 EEDi =Tdi-Tsi where EEDi is the end to end delay of ith packet. Tsi is the  Source packet i created and Tdi is the Destination packet which is created at Destination . Nrec is the total number of packets received at Dest host and Mean EED is the mean value of each communication session .
The mean throughput for a sequence of packets of specific size is calculated by using equations 1 and 2. MeanThr = ∑ N   Thrj   /N  -------------(1) j=1  where  Thr=Packets received(Pr)/Packets generated(Pg)*100%.--------------(2) Thrj is the value of the throughput when the packet j is received at intermediate device like DSTM gateway,BD-SIIT Gateway,v4/v6 Router and N is the number of received packets at intermediate device,Pr is the no of packets received at intermediate device and Pg is the number of packets created by  source host .
ICIIC2010,Aug-5,6,7. Simulation Parameters Value 1.Buffer Size 500 Packets 2. Propogation Delay 10ms 3.Payload size 200 Bytes 4.Very traffic Load 6~240 Nodes. 5.Queue  Management  Scheme Drop tail.
References   [1].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” A Study on IPv6 in IPv4 Static Tunneling threat issues in 4G Networks using OOAD Class and Instance Diagrams“, Proceedings  of the International  Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA, January 09-11,2010,[Paper code CSCIT-152][CSCITOP113].   [2].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” An IPv4-to-IPv6 threat reviews with dual stack transition mechanism considerations a transitional threat model in 4G Wireless networks ”Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA,January 09-11,2010,[Paper code CSCIT-157] [CSCITOP115].   [3].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” Implementation,Comparative and Performance Analysis of IPv6 over IPv4 QoS metrics in 4G Networks: Single-source-destination paths Delay, Packet Loss Performance and Tunnel Discovery Mechanisms“,Proceedings  of the International  Conference on Information Science and Applications(ICISA-2010)organized by Dept. of Master of Computer Applications,Panimalar Engineering College,Chennai-600 123,Tamilnadu,India.,February-06-2010,[Paper code ICISA-293(with serial no-101)].   [4].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi ,”High Performance evaluation of Multimedia Video Streaming over IP networks” ,Proceedings of the National conference on Computing communications and Information systems(NCCCIS-2010)organized by Department of Information Technology Sri Krishna College of Engineering and Technology,Kuniamuthur,Coimbatore-641008,INDIA,February-12-13,2010,[Paper id NCCCIS-MM-03],pp-88-92 .  
ICIIC2010,Aug-5,6,7. [5].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” IPv6 Tunneling Algorithms in 4G Networks ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th  and  9 th   2010.    [6].Sridevi.,Hanumanthappa.J.,Manjaiah.D.H,” A Novel IPv4/IPv6 Transition scenarios in 4G Networks ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th  and  9 th  2010.   [7].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” A  Comparison of Performance evaluation metrics and Simulation parameters ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th  and  9 th  2010. [8].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K .,“Comparison and Contrast between Bellman ford and Dijkstra’s algorithms” ,Proc.of. the National Conference on Wireless Networks-09(NCOWN-2010),organized by RLJIT,Kodigehalli,Doddaballapur,Kerala,INDIA,February   ,2010,[Paper code  05].    [9].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi,” Emerging technologies for the 4G Wireless communications ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th  and  9 th  2010.   [10].Hanumanthappa.J.,Manjaiah.D.H .,”IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model: A Case Study for University of Mysore Network”, International Journal of Computer Science and Information(IJCSIS)Vol.3.,No.1,July-2009,ISSN 1947-5500,Paper ID: 12060915]
[11].Hanumanthappa.J.,Manjaiah.D.H .,”Transition of IPv4 Network Applications to IPv6 Applications”[TIPv4 to TIPv6], Proceedings of IEEE International Conference on emerging trends in computing(ICETiC-2009),Virudhunagar,Tamilnadu 8-10,January 2009,INDIA.[Paper ID 234].    [12].Hanumanthappa.J.,Manjaiah.D.H.,Thippeswamy.K .“IPv6 over Bluetooth: Security Aspects, Issues and its Challenges”, Proceedings of National  Conference on,Wireless Communications and Technologies(NCWCT-09)-Theme :Mobile and Pervasive Computing , Nitte,Karnataka,Udupi Dist, Karnataka ,INDIA,February-5-6  , 2009,[ Paper id -104]    [13].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D .“Economical and Technical costs for the Transition of IPv4–to-IPv6 Mechanisms[ETCTIPv4 to ETCTIPv6]” ,Proceedings of National  Conference on Wireless Communications and Technologies(NCWCT-09)-Theme:Mobile and Pervasive Computing , Nitte   ,Karnataka,Udupi Dist,Karnataka,INDIA,February-5-6  , 2009,[ Paper id -103]    [14].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D .”Implementation of Codec Driver for network embedded  devices ”, Proceedings of the ” IEEE International Advance Computing Conference IACC-2009 on March 6- 8[Paper ID IEEE-ALGO-0205]at patiala. [15].Hanumanthappa.J.,Tippeswamy.K.,Manjaiah.D.H ., “ SOA Approach for information retrieval using web Services” [SOAAFIRUWS ],Proceedings of  IEEE International Conference on   the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-DATA-2065].   [16].Hanumanthappa.J.,Manjaiah.D.H ., Tippeswamy.K.“ An Overview of Study on Smooth Porting Process  Scenario during IPv6 Transition”[TIPv6] ,Proceedings of  IEEE International Conference on   the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-APPL-1278].  [17].Hanumanthappa.J.,Manjaiah.D.H ., Tippeswamy.K .“Generic Query information retrieval System for web 2.0” ,Proceedings of the Seventh International Convention on Automation of libraries in education and Research(CALIBER-2009) organized by Inflibnet centre on February 25-27,2009 at Pondicherry university(A central University),R.Venkat Raman Nagar,Kalapet,Pondicherry-605014,India.[Paper ID C-13].   [18].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K.“ IPv6 over IPv4 QoS metrics in 4G Networks:Delay, Jitter,Packet Loss Performance,Throughput and Tunnel Discovery Mechanisms”, Proceedings of the National Conference on Wireless Networks-09(NCOWN-2009) organized by RLJIT,Kodigehalli,Doddaballapur,Karnataka, INDIA,November 21-22 nd  ,2009,[Paper code NCOWN-19 .
[19].Hanumanthappa.J.,Manjaiah.D.H.,“ A Study on Comparison and Contrast  between IPv6  and  IPv4 Feature Sets”  Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28 th ,2008,[Paper code  CP 15].  [20].Hanumanthappa.J.,Balachandra.C ,“Soft one to One Gateway Protocol”, Proceedings  of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28 th ,2008,[Paper code CP 27]. [21].Hanumanthappa.J.,Thippeswamy.K .“Generic Query Retrieval System”[GQRS]”, Proceedings of National  Conference on,Recent Trends in Engineering and Technology(RTIET-2008),Doddaballapur,Karnataka,INDIA,November   21-22 nd  ,2008,[ Paper code  05]  [22].S.Deering and R.Hinden “Internet Protocol Version 6(IPv6) Specification”, RFC 2460,December 1998 . [23].Ra’ed Al Ja’afreh,John Mellor, and Irfan Awan,“Evaluating BDMS and DSTM Transition mechanisms”. [24].S.Tanenbaum,“Computer Networks”,Third Edition,Prentice Hall Inc.,1996,pp.686,413-436,437-449.  [25].Behrouz A.Forouzan,Third Edition,“TCP/IP Protocol Suite” .  [26].Atul Kahate,“Cryptography and Network Security“,Tata McGraw-Hill,2003,pp-8-10.  [26].Kurose.J.& Ross.K.(2005)Computer Networking:A top-down approach featuring the Internet.3 rd  ed,(Addison Wesley).5960-0125-8.  [27].Moby dick project:“Mobility and Differentiated services in a future IP network:”,Final project report,4.4.2004.  [28].J.Wiljakka(ed.,)“Analysis on IPv6 transition in 3GPP networks”,draft-ietf-v6ops-3gpp-analysis-04.txt,Internet  draft, work in progress .
[35].E.Nordmark,Stateless IP/ICMP translation algorithm(SIIT),RFC 2765,February 2000. [36].Ra’ed AlJa’afreh,John mellor,Mumtaz  Kamala,” A Novel IPv4/IPv6 transition mechanism which support transparent connections”. [37].Ra’ed AlJa’afreh,John mellor,Mumtaz  Kamala and R.Kassabeh ,Bi-Directional mapping system as a new IPv4/IPv6 transition mechanism. [38].TimRooney,IPv4/IPv6Transition strategies,Director,Product management,BT Diamond IP. [39].John.J.Amos and Daniel Minoli,Handbook of IPv4 to IPv6 Transition Methodologies for Institutional and Corporate Networks. [40].Jivika Govil   ,Jivesh Govil,Navkeerat Kaur,Harkeerat Kaur,An examination of IPv4 and IPv6 Networks: constraints,and various transition mechanisms. [41].Jivika Govil,Jivesh Govil,”On the Investigation of Transactional and Interoperability Issues between IPv4 and IPv6,2007,IEEE electro/Information technology conference,(EIT 2007),17-20,May 2007,chicago,USA
ICIIC2010,Aug-5,6,7. ICEMC2-2010,Kuppam,AP,INDIA. Any Questions ?
ICIIC2010,Aug-5,6,7. .

More Related Content

What's hot

AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...Editor IJCATR
 
Icemc22010 ppt 29
Icemc22010 ppt 29Icemc22010 ppt 29
Icemc22010 ppt 29hanums1
 
Icemc2 kuppam
Icemc2 kuppamIcemc2 kuppam
Icemc2 kuppamhanums1
 
Major Report on ADIAN
Major Report on ADIANMajor Report on ADIAN
Major Report on ADIANsmittal121
 
Routing in delay tolerant network using
Routing in delay tolerant network usingRouting in delay tolerant network using
Routing in delay tolerant network usingIAEME Publication
 
Shortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksShortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksIJERA Editor
 
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...IOSR Journals
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesiaemedu
 
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...Thesis Scientist Private Limited
 
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...paperpublications3
 
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterArtificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterIOSR Journals
 
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...IDES Editor
 
140320702029 maurya ppt
140320702029 maurya ppt140320702029 maurya ppt
140320702029 maurya pptMaurya Shah
 
Neural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionNeural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionIJERA Editor
 
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...IJNSA Journal
 

What's hot (19)

AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
 
Icemc22010 ppt 29
Icemc22010 ppt 29Icemc22010 ppt 29
Icemc22010 ppt 29
 
Icemc2 kuppam
Icemc2 kuppamIcemc2 kuppam
Icemc2 kuppam
 
Major Report on ADIAN
Major Report on ADIANMajor Report on ADIAN
Major Report on ADIAN
 
Steganography
Steganography Steganography
Steganography
 
Ijetcas14 330
Ijetcas14 330Ijetcas14 330
Ijetcas14 330
 
Routing in delay tolerant network using
Routing in delay tolerant network usingRouting in delay tolerant network using
Routing in delay tolerant network using
 
Shortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksShortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor Networks
 
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniques
 
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
 
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
 
40120140505005 2
40120140505005 240120140505005 2
40120140505005 2
 
40120140505005
4012014050500540120140505005
40120140505005
 
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterArtificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
 
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
 
140320702029 maurya ppt
140320702029 maurya ppt140320702029 maurya ppt
140320702029 maurya ppt
 
Neural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionNeural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal Recognition
 
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
 

Viewers also liked

Iccsit 2010 rljit
Iccsit 2010 rljitIccsit 2010 rljit
Iccsit 2010 rljithanums1
 
Iccana 2011 jan8th
Iccana 2011 jan8thIccana 2011 jan8th
Iccana 2011 jan8thhanums1
 
Kkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithmsKkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithmshanums1
 
Iccsit2010 p 1
Iccsit2010 p 1Iccsit2010 p 1
Iccsit2010 p 1hanums1
 
Iccci2010
Iccci2010Iccci2010
Iccci2010hanums1
 
Kkbnet 2010-a compa
Kkbnet 2010-a  compaKkbnet 2010-a  compa
Kkbnet 2010-a compahanums1
 
Iccsit2010 p 1-dummy
Iccsit2010 p 1-dummyIccsit2010 p 1-dummy
Iccsit2010 p 1-dummyhanums1
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2hanums1
 

Viewers also liked (8)

Iccsit 2010 rljit
Iccsit 2010 rljitIccsit 2010 rljit
Iccsit 2010 rljit
 
Iccana 2011 jan8th
Iccana 2011 jan8thIccana 2011 jan8th
Iccana 2011 jan8th
 
Kkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithmsKkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithms
 
Iccsit2010 p 1
Iccsit2010 p 1Iccsit2010 p 1
Iccsit2010 p 1
 
Iccci2010
Iccci2010Iccci2010
Iccci2010
 
Kkbnet 2010-a compa
Kkbnet 2010-a  compaKkbnet 2010-a  compa
Kkbnet 2010-a compa
 
Iccsit2010 p 1-dummy
Iccsit2010 p 1-dummyIccsit2010 p 1-dummy
Iccsit2010 p 1-dummy
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
 

Similar to Iciic2010 114

Iccci10 bd siit
Iccci10 bd siitIccci10 bd siit
Iccci10 bd siithanums1
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...IOSR Journals
 
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
Procedia Computer Science   46  ( 2015 )  1072 – 1078 187.docxProcedia Computer Science   46  ( 2015 )  1072 – 1078 187.docx
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docxAASTHA76
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE IJERA Editor
 
Protocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationProtocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationAlexander Decker
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues andijfcstjournal
 
Da3210751081
Da3210751081Da3210751081
Da3210751081IJMER
 
Icemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmIcemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmhanums1
 
Design of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial ModulationDesign of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial ModulationSachin Talakeri
 
Respond 3 of your colleagues postings in one or more of the fol.docx
 Respond  3 of your colleagues postings in one or more of the fol.docx Respond  3 of your colleagues postings in one or more of the fol.docx
Respond 3 of your colleagues postings in one or more of the fol.docxaryan532920
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsIJECEIAES
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
 
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...IOSR Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...IJCNCJournal
 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...IJCNCJournal
 
Evaluation of Table Driven Protocols-DSDV & OLSR in MANET
Evaluation of Table Driven Protocols-DSDV & OLSR in MANETEvaluation of Table Driven Protocols-DSDV & OLSR in MANET
Evaluation of Table Driven Protocols-DSDV & OLSR in MANETijsrd.com
 

Similar to Iciic2010 114 (20)

Iccci10 bd siit
Iccci10 bd siitIccci10 bd siit
Iccci10 bd siit
 
M017147275
M017147275M017147275
M017147275
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
 
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
Procedia Computer Science   46  ( 2015 )  1072 – 1078 187.docxProcedia Computer Science   46  ( 2015 )  1072 – 1078 187.docx
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
 
Protocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationProtocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulation
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
 
Da3210751081
Da3210751081Da3210751081
Da3210751081
 
Icemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmIcemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstm
 
Design of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial ModulationDesign of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial Modulation
 
Respond 3 of your colleagues postings in one or more of the fol.docx
 Respond  3 of your colleagues postings in one or more of the fol.docx Respond  3 of your colleagues postings in one or more of the fol.docx
Respond 3 of your colleagues postings in one or more of the fol.docx
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!
 
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
 
Evaluation of Table Driven Protocols-DSDV & OLSR in MANET
Evaluation of Table Driven Protocols-DSDV & OLSR in MANETEvaluation of Table Driven Protocols-DSDV & OLSR in MANET
Evaluation of Table Driven Protocols-DSDV & OLSR in MANET
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
main_phase1 _3.pptx
main_phase1 _3.pptxmain_phase1 _3.pptx
main_phase1 _3.pptx
 

Recently uploaded

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 

Recently uploaded (20)

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 

Iciic2010 114

  • 1. Dr.Manjaiah.D.H. Chairman and Professor, Dept of CS, Mangalagangotri, Mangalore University, Mangalore-31739 Hanumanthappa.J., Aravinda.C.V. B.E., Match.,(Ph.D) , M.Sc.,M.Phil.,M.Tech.,(Ph.D)., Asst.Professor,DOS in CS,UOM, Research Scholar, Manasagangotri, Mangalagangotri, Mysore. Mangalore University, Mangalore.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. IPv6 Header Format Traffic Class Flow Label Vers Payload Length Next Header Hop Limit Source Address Destination Address 0 4 12 16 24 31
  • 9.  
  • 10.
  • 11. Fig.2.Translation of IPv6 to IPv4 Header .
  • 12.
  • 13. ICIIC2010,Aug-5,6,7. BD-SIIT Data Packet Transmission Process Fig.3.BD-SIIT Data packet Transmission Process .
  • 14.
  • 15.
  • 16.
  • 17. ICIIC2010,Aug-5,6,7. Comparison and Contrast between BD-SIIT and DSTM Transition Mechanism. BD-SIIT DSTM 1.It does not for tunneling technique . 1. A tunneling technique needs to be configured. 2. Two IPv4 and IPv6 addresses are assumed to be globally unique. 2.Only IPv4 addresses are assumed to be globally unique . 3.It Uses two types of global IP addresses that are assigned by DNS46 server for each communication system. 3. Uses only a pool of IPv4 addresses in order to assign Global IPv4 address for each communication system. 4.Applicable for Bi-Directional commn between IPv6 only nodes and IPv4 nodes. 4.Not applicable to IPv6 only nodes that want to communicate with IPv4 only node. 5.Less cost 5.High Cost 6.Does not require upgrading or extra software to be used at end user nodes. 6.Requires modifications or extra software to support the dual stack on the end user nodes. 7.Transition from IPv4 to IPv6 and Vice versa is needed. 7.Encapsulation and Decapsulation methods are needed.
  • 18. In this Paper we have calculated three performance evaluation metrics . 1.End to End delay 2. Throughput 3.Round trip time(RTT) N rec 1.Mean End to End delay= ∑EEDi/Nrec i=1 EEDi =Tdi-Tsi where EEDi is the end to end delay of ith packet. Tsi is the Source packet i created and Tdi is the Destination packet which is created at Destination . Nrec is the total number of packets received at Dest host and Mean EED is the mean value of each communication session .
  • 19. The mean throughput for a sequence of packets of specific size is calculated by using equations 1 and 2. MeanThr = ∑ N Thrj /N -------------(1) j=1 where Thr=Packets received(Pr)/Packets generated(Pg)*100%.--------------(2) Thrj is the value of the throughput when the packet j is received at intermediate device like DSTM gateway,BD-SIIT Gateway,v4/v6 Router and N is the number of received packets at intermediate device,Pr is the no of packets received at intermediate device and Pg is the number of packets created by source host .
  • 20. ICIIC2010,Aug-5,6,7. Simulation Parameters Value 1.Buffer Size 500 Packets 2. Propogation Delay 10ms 3.Payload size 200 Bytes 4.Very traffic Load 6~240 Nodes. 5.Queue Management Scheme Drop tail.
  • 21. References [1].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” A Study on IPv6 in IPv4 Static Tunneling threat issues in 4G Networks using OOAD Class and Instance Diagrams“, Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA, January 09-11,2010,[Paper code CSCIT-152][CSCITOP113].   [2].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” An IPv4-to-IPv6 threat reviews with dual stack transition mechanism considerations a transitional threat model in 4G Wireless networks ”Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA,January 09-11,2010,[Paper code CSCIT-157] [CSCITOP115].   [3].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” Implementation,Comparative and Performance Analysis of IPv6 over IPv4 QoS metrics in 4G Networks: Single-source-destination paths Delay, Packet Loss Performance and Tunnel Discovery Mechanisms“,Proceedings of the International Conference on Information Science and Applications(ICISA-2010)organized by Dept. of Master of Computer Applications,Panimalar Engineering College,Chennai-600 123,Tamilnadu,India.,February-06-2010,[Paper code ICISA-293(with serial no-101)].   [4].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi ,”High Performance evaluation of Multimedia Video Streaming over IP networks” ,Proceedings of the National conference on Computing communications and Information systems(NCCCIS-2010)organized by Department of Information Technology Sri Krishna College of Engineering and Technology,Kuniamuthur,Coimbatore-641008,INDIA,February-12-13,2010,[Paper id NCCCIS-MM-03],pp-88-92 .  
  • 22. ICIIC2010,Aug-5,6,7. [5].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” IPv6 Tunneling Algorithms in 4G Networks ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010.   [6].Sridevi.,Hanumanthappa.J.,Manjaiah.D.H,” A Novel IPv4/IPv6 Transition scenarios in 4G Networks ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010.   [7].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” A Comparison of Performance evaluation metrics and Simulation parameters ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010. [8].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K .,“Comparison and Contrast between Bellman ford and Dijkstra’s algorithms” ,Proc.of. the National Conference on Wireless Networks-09(NCOWN-2010),organized by RLJIT,Kodigehalli,Doddaballapur,Kerala,INDIA,February ,2010,[Paper code 05].   [9].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi,” Emerging technologies for the 4G Wireless communications ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010.   [10].Hanumanthappa.J.,Manjaiah.D.H .,”IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model: A Case Study for University of Mysore Network”, International Journal of Computer Science and Information(IJCSIS)Vol.3.,No.1,July-2009,ISSN 1947-5500,Paper ID: 12060915]
  • 23. [11].Hanumanthappa.J.,Manjaiah.D.H .,”Transition of IPv4 Network Applications to IPv6 Applications”[TIPv4 to TIPv6], Proceedings of IEEE International Conference on emerging trends in computing(ICETiC-2009),Virudhunagar,Tamilnadu 8-10,January 2009,INDIA.[Paper ID 234].   [12].Hanumanthappa.J.,Manjaiah.D.H.,Thippeswamy.K .“IPv6 over Bluetooth: Security Aspects, Issues and its Challenges”, Proceedings of National Conference on,Wireless Communications and Technologies(NCWCT-09)-Theme :Mobile and Pervasive Computing , Nitte,Karnataka,Udupi Dist, Karnataka ,INDIA,February-5-6 , 2009,[ Paper id -104]   [13].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D .“Economical and Technical costs for the Transition of IPv4–to-IPv6 Mechanisms[ETCTIPv4 to ETCTIPv6]” ,Proceedings of National Conference on Wireless Communications and Technologies(NCWCT-09)-Theme:Mobile and Pervasive Computing , Nitte ,Karnataka,Udupi Dist,Karnataka,INDIA,February-5-6 , 2009,[ Paper id -103]   [14].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D .”Implementation of Codec Driver for network embedded devices ”, Proceedings of the ” IEEE International Advance Computing Conference IACC-2009 on March 6- 8[Paper ID IEEE-ALGO-0205]at patiala. [15].Hanumanthappa.J.,Tippeswamy.K.,Manjaiah.D.H ., “ SOA Approach for information retrieval using web Services” [SOAAFIRUWS ],Proceedings of IEEE International Conference on the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-DATA-2065].   [16].Hanumanthappa.J.,Manjaiah.D.H ., Tippeswamy.K.“ An Overview of Study on Smooth Porting Process Scenario during IPv6 Transition”[TIPv6] ,Proceedings of IEEE International Conference on the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-APPL-1278]. [17].Hanumanthappa.J.,Manjaiah.D.H ., Tippeswamy.K .“Generic Query information retrieval System for web 2.0” ,Proceedings of the Seventh International Convention on Automation of libraries in education and Research(CALIBER-2009) organized by Inflibnet centre on February 25-27,2009 at Pondicherry university(A central University),R.Venkat Raman Nagar,Kalapet,Pondicherry-605014,India.[Paper ID C-13].   [18].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K.“ IPv6 over IPv4 QoS metrics in 4G Networks:Delay, Jitter,Packet Loss Performance,Throughput and Tunnel Discovery Mechanisms”, Proceedings of the National Conference on Wireless Networks-09(NCOWN-2009) organized by RLJIT,Kodigehalli,Doddaballapur,Karnataka, INDIA,November 21-22 nd ,2009,[Paper code NCOWN-19 .
  • 24. [19].Hanumanthappa.J.,Manjaiah.D.H.,“ A Study on Comparison and Contrast between IPv6 and IPv4 Feature Sets” Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28 th ,2008,[Paper code CP 15]. [20].Hanumanthappa.J.,Balachandra.C ,“Soft one to One Gateway Protocol”, Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28 th ,2008,[Paper code CP 27]. [21].Hanumanthappa.J.,Thippeswamy.K .“Generic Query Retrieval System”[GQRS]”, Proceedings of National Conference on,Recent Trends in Engineering and Technology(RTIET-2008),Doddaballapur,Karnataka,INDIA,November 21-22 nd ,2008,[ Paper code 05] [22].S.Deering and R.Hinden “Internet Protocol Version 6(IPv6) Specification”, RFC 2460,December 1998 . [23].Ra’ed Al Ja’afreh,John Mellor, and Irfan Awan,“Evaluating BDMS and DSTM Transition mechanisms”. [24].S.Tanenbaum,“Computer Networks”,Third Edition,Prentice Hall Inc.,1996,pp.686,413-436,437-449. [25].Behrouz A.Forouzan,Third Edition,“TCP/IP Protocol Suite” . [26].Atul Kahate,“Cryptography and Network Security“,Tata McGraw-Hill,2003,pp-8-10. [26].Kurose.J.& Ross.K.(2005)Computer Networking:A top-down approach featuring the Internet.3 rd ed,(Addison Wesley).5960-0125-8. [27].Moby dick project:“Mobility and Differentiated services in a future IP network:”,Final project report,4.4.2004. [28].J.Wiljakka(ed.,)“Analysis on IPv6 transition in 3GPP networks”,draft-ietf-v6ops-3gpp-analysis-04.txt,Internet draft, work in progress .
  • 25. [35].E.Nordmark,Stateless IP/ICMP translation algorithm(SIIT),RFC 2765,February 2000. [36].Ra’ed AlJa’afreh,John mellor,Mumtaz Kamala,” A Novel IPv4/IPv6 transition mechanism which support transparent connections”. [37].Ra’ed AlJa’afreh,John mellor,Mumtaz Kamala and R.Kassabeh ,Bi-Directional mapping system as a new IPv4/IPv6 transition mechanism. [38].TimRooney,IPv4/IPv6Transition strategies,Director,Product management,BT Diamond IP. [39].John.J.Amos and Daniel Minoli,Handbook of IPv4 to IPv6 Transition Methodologies for Institutional and Corporate Networks. [40].Jivika Govil ,Jivesh Govil,Navkeerat Kaur,Harkeerat Kaur,An examination of IPv4 and IPv6 Networks: constraints,and various transition mechanisms. [41].Jivika Govil,Jivesh Govil,”On the Investigation of Transactional and Interoperability Issues between IPv4 and IPv6,2007,IEEE electro/Information technology conference,(EIT 2007),17-20,May 2007,chicago,USA