Iciic2010 114

626 views

Published on

Published in: Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
626
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
3
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Iciic2010 114

  1. 1. Dr.Manjaiah.D.H. Chairman and Professor, Dept of CS, Mangalagangotri, Mangalore University, Mangalore-31739 Hanumanthappa.J., Aravinda.C.V. B.E., Match.,(Ph.D) , M.Sc.,M.Phil.,M.Tech.,(Ph.D)., Asst.Professor,DOS in CS,UOM, Research Scholar, Manasagangotri, Mangalagangotri, Mysore. Mangalore University, Mangalore.
  2. 2. ABSTRACT
  3. 3. Contents
  4. 4. <ul><li>An IP address is an Identifier that is applied to each device connected to an IP network. </li></ul>
  5. 5. <ul><li>IPv6 is the Internet’s next-generation Protocol. </li></ul><ul><li>The First name of IPv6 is Ipng . </li></ul><ul><li>The IETF developed the basic Specification’s during the 1990’s to support a migration to a new development . </li></ul><ul><li>IPv6 is defined in RFC 2460 Internet Protocol version 6 Specification by S. Deering and R.Hinden(December 1998). </li></ul>
  6. 6. <ul><ul><ul><li>Larger address space(Scalability). </li></ul></ul></ul><ul><li>- IPv6 has 128-bit address versus 32-bit IPv4 .With theoretical number of available IP addresses is 2 32 ~10 10 . </li></ul><ul><li>- Hence number of available unique node addresses is 2 128 ~ 10 39 . </li></ul><ul><li>Header format simplification. </li></ul><ul><li>Expanded routing and addressing capabilities . </li></ul><ul><li>- IPv6 improves the addressing and routing hierarchy . </li></ul><ul><li>Improved support for extensions and options . </li></ul><ul><li>- IPv6 has been designed to be extensible and offers support for new options and extensions . </li></ul><ul><li>Optimized Protocol . </li></ul><ul><li>- IPv6 embodies IPv4 best practices but removes unused or obsolete IPv4 characteristics. </li></ul>
  7. 7. <ul><li>Flow labeling (for QoS) capability </li></ul><ul><li>Auto-configuration and Neighbor discovery. </li></ul><ul><li>Authentication and privacy capabilities </li></ul><ul><li>Simple transition from IPv4. </li></ul><ul><li>Encryption and Decryption. </li></ul><ul><li>Real time applications like Video & Audio . </li></ul><ul><li>- To provide better support for real-time traffic ex:- VOIP,IPv6 includes “labeled flows” in its specifications . </li></ul><ul><li>Mobility . </li></ul><ul><li>- IPv6 offers more efficient and enhanced mobility mechanisms particularly important for mobile networks . </li></ul>
  8. 8. IPv6 Header Format Traffic Class Flow Label Vers Payload Length Next Header Hop Limit Source Address Destination Address 0 4 12 16 24 31
  9. 10. <ul><li>In this paper we propose a new BD-SIIT Transition Algorithm . </li></ul>
  10. 11. Fig.2.Translation of IPv6 to IPv4 Header .
  11. 12. <ul><li>IPv6 Packet Transmission. </li></ul><ul><li>IPv6-to-IPv4 mapping calculation and Address mapping. </li></ul><ul><li>IPv6-in-IPv4 Header Translation. </li></ul><ul><li>IPv4 Packet Transmission. </li></ul>
  12. 13. ICIIC2010,Aug-5,6,7. BD-SIIT Data Packet Transmission Process Fig.3.BD-SIIT Data packet Transmission Process .
  13. 14. IPv4-mapped -IPv6 Address . 0 79 80 95 <ul><li>127 </li></ul>80- bits of zero FFFF(16 bits ) 32 bits (IPv4 address
  14. 15. <ul><li>F orward Operation(IPv4->IPv6) . </li></ul><ul><li>Feedback Operation . </li></ul>IPv4 Address IPv6 Address Address mapping 195.18.23.17 ABC2::4321 1 210.154.76.91 ABC2:4321 2 IPv6 Address IPv4 Mapping Mapping_value ABC2::4321 195.18.231.17 1 CDEF::5672 223.18.231.17 2
  15. 16. <ul><li>DSTM Data packet Transmission Process . </li></ul><ul><li>IPv4–in IPv6 encapsulation. </li></ul><ul><li>Encapsulated IPv6 packet transmission . </li></ul><ul><li>IPv4-in-IPv6 Decapsulation . </li></ul><ul><li>IPv6 to IPv4 address mapping . </li></ul><ul><li>IPv4 packet transmission. </li></ul>
  16. 17. ICIIC2010,Aug-5,6,7. Comparison and Contrast between BD-SIIT and DSTM Transition Mechanism. BD-SIIT DSTM 1.It does not for tunneling technique . 1. A tunneling technique needs to be configured. 2. Two IPv4 and IPv6 addresses are assumed to be globally unique. 2.Only IPv4 addresses are assumed to be globally unique . 3.It Uses two types of global IP addresses that are assigned by DNS46 server for each communication system. 3. Uses only a pool of IPv4 addresses in order to assign Global IPv4 address for each communication system. 4.Applicable for Bi-Directional commn between IPv6 only nodes and IPv4 nodes. 4.Not applicable to IPv6 only nodes that want to communicate with IPv4 only node. 5.Less cost 5.High Cost 6.Does not require upgrading or extra software to be used at end user nodes. 6.Requires modifications or extra software to support the dual stack on the end user nodes. 7.Transition from IPv4 to IPv6 and Vice versa is needed. 7.Encapsulation and Decapsulation methods are needed.
  17. 18. In this Paper we have calculated three performance evaluation metrics . 1.End to End delay 2. Throughput 3.Round trip time(RTT) N rec 1.Mean End to End delay= ∑EEDi/Nrec i=1 EEDi =Tdi-Tsi where EEDi is the end to end delay of ith packet. Tsi is the Source packet i created and Tdi is the Destination packet which is created at Destination . Nrec is the total number of packets received at Dest host and Mean EED is the mean value of each communication session .
  18. 19. The mean throughput for a sequence of packets of specific size is calculated by using equations 1 and 2. MeanThr = ∑ N Thrj /N -------------(1) j=1 where Thr=Packets received(Pr)/Packets generated(Pg)*100%.--------------(2) Thrj is the value of the throughput when the packet j is received at intermediate device like DSTM gateway,BD-SIIT Gateway,v4/v6 Router and N is the number of received packets at intermediate device,Pr is the no of packets received at intermediate device and Pg is the number of packets created by source host .
  19. 20. ICIIC2010,Aug-5,6,7. Simulation Parameters Value 1.Buffer Size 500 Packets 2. Propogation Delay 10ms 3.Payload size 200 Bytes 4.Very traffic Load 6~240 Nodes. 5.Queue Management Scheme Drop tail.
  20. 21. References [1].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” A Study on IPv6 in IPv4 Static Tunneling threat issues in 4G Networks using OOAD Class and Instance Diagrams“, Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA, January 09-11,2010,[Paper code CSCIT-152][CSCITOP113].   [2].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” An IPv4-to-IPv6 threat reviews with dual stack transition mechanism considerations a transitional threat model in 4G Wireless networks ”Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA,January 09-11,2010,[Paper code CSCIT-157] [CSCITOP115].   [3].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” Implementation,Comparative and Performance Analysis of IPv6 over IPv4 QoS metrics in 4G Networks: Single-source-destination paths Delay, Packet Loss Performance and Tunnel Discovery Mechanisms“,Proceedings of the International Conference on Information Science and Applications(ICISA-2010)organized by Dept. of Master of Computer Applications,Panimalar Engineering College,Chennai-600 123,Tamilnadu,India.,February-06-2010,[Paper code ICISA-293(with serial no-101)].   [4].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi ,”High Performance evaluation of Multimedia Video Streaming over IP networks” ,Proceedings of the National conference on Computing communications and Information systems(NCCCIS-2010)organized by Department of Information Technology Sri Krishna College of Engineering and Technology,Kuniamuthur,Coimbatore-641008,INDIA,February-12-13,2010,[Paper id NCCCIS-MM-03],pp-88-92 .  
  21. 22. ICIIC2010,Aug-5,6,7. [5].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” IPv6 Tunneling Algorithms in 4G Networks ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010.   [6].Sridevi.,Hanumanthappa.J.,Manjaiah.D.H,” A Novel IPv4/IPv6 Transition scenarios in 4G Networks ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010.   [7].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” A Comparison of Performance evaluation metrics and Simulation parameters ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010. [8].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K .,“Comparison and Contrast between Bellman ford and Dijkstra’s algorithms” ,Proc.of. the National Conference on Wireless Networks-09(NCOWN-2010),organized by RLJIT,Kodigehalli,Doddaballapur,Kerala,INDIA,February ,2010,[Paper code 05].   [9].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi,” Emerging technologies for the 4G Wireless communications ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010.   [10].Hanumanthappa.J.,Manjaiah.D.H .,”IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model: A Case Study for University of Mysore Network”, International Journal of Computer Science and Information(IJCSIS)Vol.3.,No.1,July-2009,ISSN 1947-5500,Paper ID: 12060915]
  22. 23. [11].Hanumanthappa.J.,Manjaiah.D.H .,”Transition of IPv4 Network Applications to IPv6 Applications”[TIPv4 to TIPv6], Proceedings of IEEE International Conference on emerging trends in computing(ICETiC-2009),Virudhunagar,Tamilnadu 8-10,January 2009,INDIA.[Paper ID 234].   [12].Hanumanthappa.J.,Manjaiah.D.H.,Thippeswamy.K .“IPv6 over Bluetooth: Security Aspects, Issues and its Challenges”, Proceedings of National Conference on,Wireless Communications and Technologies(NCWCT-09)-Theme :Mobile and Pervasive Computing , Nitte,Karnataka,Udupi Dist, Karnataka ,INDIA,February-5-6 , 2009,[ Paper id -104]   [13].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D .“Economical and Technical costs for the Transition of IPv4–to-IPv6 Mechanisms[ETCTIPv4 to ETCTIPv6]” ,Proceedings of National Conference on Wireless Communications and Technologies(NCWCT-09)-Theme:Mobile and Pervasive Computing , Nitte ,Karnataka,Udupi Dist,Karnataka,INDIA,February-5-6 , 2009,[ Paper id -103]   [14].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D .”Implementation of Codec Driver for network embedded devices ”, Proceedings of the ” IEEE International Advance Computing Conference IACC-2009 on March 6- 8[Paper ID IEEE-ALGO-0205]at patiala. [15].Hanumanthappa.J.,Tippeswamy.K.,Manjaiah.D.H ., “ SOA Approach for information retrieval using web Services” [SOAAFIRUWS ],Proceedings of IEEE International Conference on the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-DATA-2065].   [16].Hanumanthappa.J.,Manjaiah.D.H ., Tippeswamy.K.“ An Overview of Study on Smooth Porting Process Scenario during IPv6 Transition”[TIPv6] ,Proceedings of IEEE International Conference on the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-APPL-1278]. [17].Hanumanthappa.J.,Manjaiah.D.H ., Tippeswamy.K .“Generic Query information retrieval System for web 2.0” ,Proceedings of the Seventh International Convention on Automation of libraries in education and Research(CALIBER-2009) organized by Inflibnet centre on February 25-27,2009 at Pondicherry university(A central University),R.Venkat Raman Nagar,Kalapet,Pondicherry-605014,India.[Paper ID C-13].   [18].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K.“ IPv6 over IPv4 QoS metrics in 4G Networks:Delay, Jitter,Packet Loss Performance,Throughput and Tunnel Discovery Mechanisms”, Proceedings of the National Conference on Wireless Networks-09(NCOWN-2009) organized by RLJIT,Kodigehalli,Doddaballapur,Karnataka, INDIA,November 21-22 nd ,2009,[Paper code NCOWN-19 .
  23. 24. [19].Hanumanthappa.J.,Manjaiah.D.H.,“ A Study on Comparison and Contrast between IPv6 and IPv4 Feature Sets” Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28 th ,2008,[Paper code CP 15]. [20].Hanumanthappa.J.,Balachandra.C ,“Soft one to One Gateway Protocol”, Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28 th ,2008,[Paper code CP 27]. [21].Hanumanthappa.J.,Thippeswamy.K .“Generic Query Retrieval System”[GQRS]”, Proceedings of National Conference on,Recent Trends in Engineering and Technology(RTIET-2008),Doddaballapur,Karnataka,INDIA,November 21-22 nd ,2008,[ Paper code 05] [22].S.Deering and R.Hinden “Internet Protocol Version 6(IPv6) Specification”, RFC 2460,December 1998 . [23].Ra’ed Al Ja’afreh,John Mellor, and Irfan Awan,“Evaluating BDMS and DSTM Transition mechanisms”. [24].S.Tanenbaum,“Computer Networks”,Third Edition,Prentice Hall Inc.,1996,pp.686,413-436,437-449. [25].Behrouz A.Forouzan,Third Edition,“TCP/IP Protocol Suite” . [26].Atul Kahate,“Cryptography and Network Security“,Tata McGraw-Hill,2003,pp-8-10. [26].Kurose.J.& Ross.K.(2005)Computer Networking:A top-down approach featuring the Internet.3 rd ed,(Addison Wesley).5960-0125-8. [27].Moby dick project:“Mobility and Differentiated services in a future IP network:”,Final project report,4.4.2004. [28].J.Wiljakka(ed.,)“Analysis on IPv6 transition in 3GPP networks”,draft-ietf-v6ops-3gpp-analysis-04.txt,Internet draft, work in progress .
  24. 25. [35].E.Nordmark,Stateless IP/ICMP translation algorithm(SIIT),RFC 2765,February 2000. [36].Ra’ed AlJa’afreh,John mellor,Mumtaz Kamala,” A Novel IPv4/IPv6 transition mechanism which support transparent connections”. [37].Ra’ed AlJa’afreh,John mellor,Mumtaz Kamala and R.Kassabeh ,Bi-Directional mapping system as a new IPv4/IPv6 transition mechanism. [38].TimRooney,IPv4/IPv6Transition strategies,Director,Product management,BT Diamond IP. [39].John.J.Amos and Daniel Minoli,Handbook of IPv4 to IPv6 Transition Methodologies for Institutional and Corporate Networks. [40].Jivika Govil ,Jivesh Govil,Navkeerat Kaur,Harkeerat Kaur,An examination of IPv4 and IPv6 Networks: constraints,and various transition mechanisms. [41].Jivika Govil,Jivesh Govil,”On the Investigation of Transactional and Interoperability Issues between IPv4 and IPv6,2007,IEEE electro/Information technology conference,(EIT 2007),17-20,May 2007,chicago,USA
  25. 26. ICIIC2010,Aug-5,6,7. ICEMC2-2010,Kuppam,AP,INDIA. Any Questions ?
  26. 27. ICIIC2010,Aug-5,6,7. .

×