IPv6 Tunnelling Algorithms in 4G Networks
Mr. Hanumanthappa.J 1 ,Dr.Manjaiah.D.H 2  &Aravinda.C.V 3 .  1 DoS in CS,Manasagangothri,University of Mysore, Mysore -06 ...
Theme of the Paper <ul><li>Tunneling Algorithms are playing a vital role in IPv6 . </li></ul><ul><li>Tunneling Algorithms ...
Contents <ul><li>Limitations of IPv4. </li></ul><ul><li>Introduction . </li></ul><ul><li>-Overview of  IPv6 </li></ul><ul>...
Problems with IPv4 : Limited Address Space <ul><li>IPv4 has 32 bit addresses. </li></ul><ul><li>Flat addressing (only neti...
8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
Problems with IPv4 : Routing Table Explosion <ul><li>IP does not permit route aggregation </li></ul><ul><li>(limited super...
Problems with IPv4 : Header Limitations <ul><li>Maximum header length is 60 octets. </li></ul><ul><li>(Restricts options) ...
Problems with IPv4 : Other Limitations <ul><li>Lack of quality-of-service support. </li></ul><ul><ul><li>Only an 8-bit ToS...
Introduction to IPv6 <ul><li>IPv6 addressing :   An IPv6 address consists  of 16 bytes (octets).It is 128 bits long.128  b...
IPv6  Address Fig-1 . 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
IPv6: Distinctive Features <ul><li>Larger address space. </li></ul><ul><li>Header format simplification </li></ul><ul><li>...
IPv6 Header Format Traffic Class Flow Label Vers Payload Length Next Header Hop Limit Source Address Destination Address 0...
Perspective of IPv6 Services in INDIA . 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal. Mobile Network Home Broadcast Center Sch...
<ul><li>4G is one which is used to resolve all the problems of 3G Technology . </li></ul><ul><li>4G advanced wireless comm...
<ul><li>4G must be more powerful than 3G in terms  </li></ul><ul><ul><li>Services. </li></ul></ul><ul><ul><li>Applications...
<ul><li>High User-level Customization. </li></ul><ul><li>-QoS,radio environment. </li></ul><ul><li>Carrier Frequency-5Ghz....
Transition to IPv6 : Design Goal <ul><li>No “flag”day. </li></ul><ul><li>Incremental upgrade and deployment. </li></ul><ul...
Transition from IPv4 to IPv6 . Figure-1. IPv6 Transition Mechanisms . 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
Transition Mechanisms: Dual Stack <ul><li>New nodes support both IPv4 and IPv6. </li></ul><ul><li>Upgrading from IPv4 to v...
Fig.2.Dual Stack . 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
Introduction to IPv6 Tunneling .  <ul><li>Tunnel is a bidirectional point–to-point link between two network endpoints. </l...
<ul><li>The term “tunneling” refers to a means to encapsulate one version of IP  in another so the packets can be sent ove...
Types of IPv6 Tunnels . .  Fig.2.Instance diagram of  IPv6 Tunneling . 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
IPv6 Automatic Tunneling . Fig.3.Automatic Tunneling . 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
Receiving Host ->{Rh} IPv6 compatible address->{IPv6ca} Sender->S,Receiver->R.,Da->Destination address,Sa->Source Addres s...
Fig.4.Configured Tunnelling . 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
IPv6 in IPv4 Static Tunneling .  <ul><li>Static tunneling is also called as Configured tunneling. Static tunneling can be ...
8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
Static Tunneling Algorithm Nomenclature : Tunnel Source->{Ts},Tunnel destination->{Td}. Static tunneling->{St},Routing Tab...
Future Research Areas of 4G <ul><li>New Decoding Algorithms for turbo codes for Wireless Channels. </li></ul><ul><li>New C...
Conclusions <ul><li>In this paper we proposed the IPv6 tunneling algorithms for 4G networks. </li></ul><ul><li>Static  tun...
References [1].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” A Study on IPv6 in IPv4 Static Tunneling threat issues in...
[5].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” IPv6 Tunneling Algorithms in 4G Networks ”,Proceedings of the National c...
[12].Hanumanthappa.J.,Manjaiah.D.H.,Thippeswamy.K .“IPv6 over Bluetooth: Security Aspects, Issues and its Challenges”, Pro...
[19].Hanumanthappa.J.,Manjaiah.D.H.,“ A Study on Comparison and Contrast  between IPv6  and  IPv4 Feature Sets”  Proceedin...
Queries and Suggestions.
Thank You 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
Upcoming SlideShare
Loading in …5
×

Kkbnet2010 i pv6 tunneling algorithms

432 views

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
432
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Kkbnet2010 i pv6 tunneling algorithms

  1. 1. IPv6 Tunnelling Algorithms in 4G Networks
  2. 2. Mr. Hanumanthappa.J 1 ,Dr.Manjaiah.D.H 2 &Aravinda.C.V 3 . 1 DoS in CS,Manasagangothri,University of Mysore, Mysore -06 [email_address] . 2 Dept.of.Computer Science, Mangalagangothri, Mangalore University Mangalore,INDIA [email_address] . 3 M.Tech.,K.S.O.U.,Manasagangotri,Mysore,INDIA [email_address]
  3. 3. Theme of the Paper <ul><li>Tunneling Algorithms are playing a vital role in IPv6 . </li></ul><ul><li>Tunneling Algorithms are playing a vital role in IPv6.Tunneling is the process of embedding IPv6 packet in IPv4 protocol or IPv4 packet in IPv6 protocol. </li></ul><ul><li>Tunnels playing important role for the quick access to the IPv6 network which relies on IPv6–in –IPv4 tunnels where native connectivity is not available. </li></ul><ul><li>The term Tunneling is widely used both to enhance networks without having to deploy native infrastructure and to improve security . </li></ul>8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  4. 4. Contents <ul><li>Limitations of IPv4. </li></ul><ul><li>Introduction . </li></ul><ul><li>-Overview of IPv6 </li></ul><ul><li>-IPv6 : Distinctive Features. </li></ul><ul><li>-IPv6 Header Format. </li></ul><ul><li>Literature review. </li></ul><ul><li>Types of IPv6 Tunnels. </li></ul><ul><li>Related work(IPv6 Tunneling Algorithms) </li></ul><ul><li>Simulation and Results. </li></ul><ul><li>Conclusion. </li></ul><ul><li>Bibliography. </li></ul>
  5. 5. Problems with IPv4 : Limited Address Space <ul><li>IPv4 has 32 bit addresses. </li></ul><ul><li>Flat addressing (only netid + hostid with “fixed” boundaries) </li></ul><ul><li>Results in inefficient use of address space. </li></ul><ul><li>Class B addresses are almost over. </li></ul><ul><li>Addresses will exhaust in the next 5 years. </li></ul><ul><li>IPv4 is victim of its own success. </li></ul>8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  6. 6. 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  7. 7. 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  8. 8. Problems with IPv4 : Routing Table Explosion <ul><li>IP does not permit route aggregation </li></ul><ul><li>(limited super netting possible with new routers) </li></ul><ul><li>Mostly only class C addresses remain </li></ul><ul><li>Number of networks is increasing very fast </li></ul><ul><li>(number of routes to be advertised goes up) </li></ul><ul><li>Very high routing overhead </li></ul><ul><ul><li>lot more memory needed for routing table </li></ul></ul><ul><ul><li>lot more bandwidth to pass routing information </li></ul></ul><ul><ul><li>lot more processing needed to compute routes </li></ul></ul>8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  9. 9. Problems with IPv4 : Header Limitations <ul><li>Maximum header length is 60 octets. </li></ul><ul><li>(Restricts options) </li></ul><ul><li>Maximum packet length is 64K octets. </li></ul><ul><li>(Do we need more than that ?) </li></ul><ul><li>ID for fragments is 16 bits. Repeats every 65537th packet. </li></ul><ul><li> (Will two packets in the network have same ID?) </li></ul><ul><li>Variable size header. </li></ul><ul><li>(Slower processing at routers.) </li></ul><ul><li>No ordering of options. </li></ul><ul><li>(All routers need to look at all options.) </li></ul>8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  10. 10. Problems with IPv4 : Other Limitations <ul><li>Lack of quality-of-service support. </li></ul><ul><ul><li>Only an 8-bit ToS field, which is hardly used. </li></ul></ul><ul><ul><li>Problem for multimedia services. </li></ul></ul><ul><li>No support for security at IP layer. </li></ul><ul><li>Mobility support is limited. </li></ul>8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  11. 11. Introduction to IPv6 <ul><li>IPv6 addressing : An IPv6 address consists of 16 bytes (octets).It is 128 bits long.128 bits are divided into 8(eight) sections, size of each section is 2 bytes. Each section of IPv6 is represented by 4 Hexadecimal digits. Therefore it is totally represented by 32 Hexadecimal digits with every four digits separated by a colon . </li></ul><ul><li>IPv6 quadruples the size of an IPv4 address from 32 bits to 128 bits. The IPv6 address is so large that it cannot be exhausted in the foreseeable future . </li></ul>8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  12. 12. IPv6 Address Fig-1 . 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  13. 13. IPv6: Distinctive Features <ul><li>Larger address space. </li></ul><ul><li>Header format simplification </li></ul><ul><li>Expanded routing and addressing capabilities </li></ul><ul><li>Improved support for extensions and options </li></ul><ul><li>Flow labeling (for QoS) capability </li></ul><ul><li>Auto-configuration and Neighbour discovery </li></ul><ul><li>Authentication and privacy capabilities </li></ul><ul><li>Simple transition from IPv4. </li></ul><ul><li>Encryption and Decryption. </li></ul><ul><li>Real time applications like Video & Audio. </li></ul>8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  14. 14. IPv6 Header Format Traffic Class Flow Label Vers Payload Length Next Header Hop Limit Source Address Destination Address 0 4 12 16 24 31 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  15. 15. Perspective of IPv6 Services in INDIA . 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal. Mobile Network Home Broadcast Center School Hospital Government Broadband Access (ADSL, CATV, FWA, FTTH) VoIP Intelligent Transport System Bank Business Store PSTN <ul><li>Broadband </li></ul><ul><li>Always-On </li></ul><ul><li>Seamless Connection to PSTN/Mobile Network </li></ul><ul><li>Application of Contents(Stream) Delivery and Electronic Commerce </li></ul>IPv6 Telephony Electronic Commerce Internet Broadcasting Electronic Government Mobile IP Music/Video Download
  16. 16. <ul><li>4G is one which is used to resolve all the problems of 3G Technology . </li></ul><ul><li>4G advanced wireless communication system is designed to allow seamless integration and Communication between wireless devices across diverse wireless standards as well as broadband networks wirelessly. </li></ul><ul><li>4G expands the terms like MAGIC </li></ul><ul><ul><li>Mobile Multimedia(M),Anytime Anywhere(A),Global mobility support(G),Integrated wireless solutions(I),and Customized Personnel service(C). </li></ul></ul><ul><li>4G not only supports Mobile service and also it supports Fixed wireless networks . </li></ul>Overview of 4G Networks 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  17. 17. <ul><li>4G must be more powerful than 3G in terms </li></ul><ul><ul><li>Services. </li></ul></ul><ul><ul><li>Applications. </li></ul></ul><ul><ul><li>Technology. </li></ul></ul><ul><li>4G is not a High speed uplink or a downlink packet access(HSUPA/HSDPA) or WLAN . </li></ul><ul><ul><li>3G+WLAN<4G. </li></ul></ul><ul><ul><li>3G+HSDPA+WLAN<4G. </li></ul></ul><ul><ul><li>3G+HSDPA+HSUPA+WLAN<4G. </li></ul></ul><ul><ul><li>4G is to replace entire core of cellular networks Single worldwide cellular nets using IPv6 for video,voice, Multimedia applications . </li></ul></ul>4G Primary Goals 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  18. 18. <ul><li>High User-level Customization. </li></ul><ul><li>-QoS,radio environment. </li></ul><ul><li>Carrier Frequency-5Ghz. </li></ul><ul><li>Channel Bandwidth/Operator-50MHz. </li></ul><ul><li>Data rate-100 to 1000 Mbits/Sec. </li></ul><ul><li>Bandwidth efficiency- 2 to 20 bits/hertz. </li></ul><ul><ul><ul><li>Ubiquity- </li></ul></ul></ul><ul><ul><ul><li>IPv6,MIPv6,Single carrier(SC),Multi carrier(MC),OFDM,TDMA,CDMA. </li></ul></ul></ul>Salient features of 4G advanced Wireless Networks 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  19. 19. Transition to IPv6 : Design Goal <ul><li>No “flag”day. </li></ul><ul><li>Incremental upgrade and deployment. </li></ul><ul><li>Minimum upgrade dependencies. </li></ul><ul><li>Interoperability of IPv4 and IPv6 nodes. </li></ul><ul><li>Let sites transition at their own pace. </li></ul><ul><li>Basic migration tools </li></ul><ul><ul><li>Dual stack and tunneling </li></ul></ul><ul><ul><li>Translation </li></ul></ul>8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  20. 20. Transition from IPv4 to IPv6 . Figure-1. IPv6 Transition Mechanisms . 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  21. 21. Transition Mechanisms: Dual Stack <ul><li>New nodes support both IPv4 and IPv6. </li></ul><ul><li>Upgrading from IPv4 to v4/v6 does not break anything. </li></ul><ul><li>Same transport layer and application above both. </li></ul><ul><li>Provides complete interoperability with IPv4 nodes. </li></ul>8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  22. 22. Fig.2.Dual Stack . 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  23. 23. Introduction to IPv6 Tunneling . <ul><li>Tunnel is a bidirectional point–to-point link between two network endpoints. </li></ul>8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal. A B C D Tunneling Original Packet Source Node Tunnel Entry Point Node Tunnel End Point Node Original Packet Destination Node
  24. 24. <ul><li>The term “tunneling” refers to a means to encapsulate one version of IP in another so the packets can be sent over a backbone that does not support the encapsulated IP version . </li></ul><ul><li>Tunneling strategies are mainly categorized into four types for deploying IPv6,Deploying IPv6 over IPv4 tunnels , Deploying IPv6 over dedicated data links, Deploying IPv6 over MPLS backbones. </li></ul><ul><li>Topology and the evolution of the IPv6 network and is useful for troubleshooting and performance optimization. </li></ul>8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  25. 25. Types of IPv6 Tunnels . . Fig.2.Instance diagram of IPv6 Tunneling . 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  26. 26. IPv6 Automatic Tunneling . Fig.3.Automatic Tunneling . 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  27. 27. Receiving Host ->{Rh} IPv6 compatible address->{IPv6ca} Sender->S,Receiver->R.,Da->Destination address,Sa->Source Addres s . 1.Suppose If Rh uses IPv6c then 2.Print “Tunneling occurs automatically with reconfiguration” 3.If sender sends the receiver an IPv6 packet with IPv6c as a Da then 4.Suppose If the packet reaches boundary of IPv4 net then 5.Print “Router encapsulated IPv6 packet it in an IPv4 packet format” then 6.When to send an IPv6 packet in the form of IPv4 packet then 7.We need IPv4 address. 8.If Router extracts IPv4 address embedded in the IPv6 then 9.When a packet starts its rest of journey as in the form of IPv4 packet then 10.Dh using dual stack receives IPv4 packet then 11.If it recognizes its IPv4 address then 12.It reads the header and then packet is forwarded(carrying) in the form of IPv4 packet then 13.Finally packet is sent it to IPv6 Software for processing[10]. 14.[End]. 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  28. 28. Fig.4.Configured Tunnelling . 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  29. 29. IPv6 in IPv4 Static Tunneling . <ul><li>Static tunneling is also called as Configured tunneling. Static tunneling can be used to link isolated islands of IPv6, in which the network domains are well known and unlikely to change without notice . </li></ul><ul><li>A static configured tunneling is equal to a permanent link of two IPv6 domains with the permanent connectivity provided over an IPv4 backbone . </li></ul><ul><li>Static tunneling assigned IPv4 addresses are manually configured to the tunnel source and the tunnel destination. </li></ul><ul><li>In a static tunneling the host or router at each end of a static configured tunnel must support both IPv4 and IPv6 protocol stacks . </li></ul><ul><li>The static tunneling in 4G networks was most preferred when the necessary of a few tunnels to forward a packets from source host to the destination host via tunnel end points . </li></ul>8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  30. 30. 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  31. 31. Static Tunneling Algorithm Nomenclature : Tunnel Source->{Ts},Tunnel destination->{Td}. Static tunneling->{St},Routing Table{Rt}.   1.If St assigned IPv4 addresses are manually configured to the Ts and Td then 2.To identify the packets which has to forward through tunnel via Rt in the tunnel end points then 3.The Rt forwards packets based on their destination using prefix mask and match technique 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  32. 32. Future Research Areas of 4G <ul><li>New Decoding Algorithms for turbo codes for Wireless Channels. </li></ul><ul><li>New Coding/modulation techniques for reducing the peak-to-mean envelope ratio-maximizing the data rate, and providing large coding gain. </li></ul><ul><li>Transition from 3G Cellular networks to Wireless Networks. </li></ul><ul><li>QoS application oriented services like Integrated services and Differentiated Services. </li></ul><ul><li>New approaches to jointly designing modulation techniques and power amplifiers to simultaneously obtain high power added efficiency along with bandwidth efficiency. </li></ul><ul><li>Research in methodologies for an integrated approach to wireless communications,( </li></ul><ul><li>Device layer ex:-Power and low noise amplifiers, mixers,filters,physical layer : Coding,modulation,Medium access layer:CDMA/FDMA/TDMA data link,Hybrid ARQ, network layer,routing etc[38]. </li></ul><ul><li>Communication problems unique to high frequency systems (ex:-Channel estimation). </li></ul><ul><li>Multi-access technologies for multi-rate systems with variable quality of requirements. </li></ul><ul><li>Ultra–wide band systems and hardware design. </li></ul><ul><li>Analog ,decoding techniques for high speed,low power systems etc. </li></ul>8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  33. 33. Conclusions <ul><li>In this paper we proposed the IPv6 tunneling algorithms for 4G networks. </li></ul><ul><li>Static tunnels are always better than Automatic and Configured tunneling Algorithms. </li></ul>8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.
  34. 34. References [1].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” A Study on IPv6 in IPv4 Static Tunneling threat issues in 4G Networks using OOAD Class and Instance Diagrams” ,Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA, January 09-11,2010,[Paper code CSCIT-152][CSCITOP113].   [2].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” An IPv4-to-IPv6 threat reviews with dual stack transition mechanism considerations a transitional threat model in 4G Wireless networks ”Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA,January 09-11,2010,[Paper code CSCIT-157] [CSCITOP115].   [3].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” Implementation,Comparative and Performance Analysis of IPv6 over IPv4 QoS metrics in 4G Networks:Single-source-destination paths Delay,Packet Loss Performance and Tunnel Discovery Mechanisms” ,Proceedings of the International Conference on Information Science and Applications(ICISA-2010)organized by Dept. of Master of Computer Applications,Panimalar Engineering College,Chennai-600 123,Tamilnadu,India.,February-06-2010,[Paper code ICISA-293(with serial no-101)].   [4].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi ,”High Performance evaluation of Multimedia Video Streaming over IP networks” ,Proceedings of the National conference on Computing communications and Information systems(NCCCIS-2010)organized by Department of Information Technology Sri Krishna College of Engineering and Technology,Kuniamuthur,Coimbatore-641008,INDIA,February-12-13,2010,[Paper id NCCCIS-MM-03],pp-88-92 .
  35. 35. [5].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” IPv6 Tunneling Algorithms in 4G Networks ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010.   [6].Sridevi.,Hanumanthappa.J.,Manjaiah.D.H,” A Novel IPv4/IPv6 Transition scenarios in 4G Networks ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010.   [7].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” A Comparison of Performance evaluation metrics and Simulation parameters ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010.   [8].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K .,“Comparison and Contrast between Bellman ford and Dijkstra’s algorithms” ,Proc.of. the National Conference on Wireless Networks-09(NCOWN-2010),organized by RLJIT,Kodigehalli,Doddaballapur,Kerala,INDIA,February ,2010,[Paper code 05].   [9].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi,” Emerging technologies for the 4G Wireless communications ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010.   [10].Hanumanthappa.J.,Manjaiah.D.H .,”IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model: A Case Study for University of Mysore Network”, International Journal of Computer Science and Information(IJCSIS)Vol.3.,No.1,July-2009,ISSN 1947-5500,Paper ID: 12060915]   [11].Hanumanthappa.J.,Manjaiah.D.H .,”Transition of IPv4 Network Applications to IPv6 Applications”[TIPv4 to TIPv6], Proceedings of IEEE International Conference on emerging trends in computing(ICETiC-2009),Virudhunagar,Tamilnadu 8-10,January 2009,INDIA.[Paper ID 234].
  36. 36. [12].Hanumanthappa.J.,Manjaiah.D.H.,Thippeswamy.K .“IPv6 over Bluetooth: Security Aspects, Issues and its Challenges”, Proceedings of National Conference on,Wireless Communications and Technologies(NCWCT-09)-Theme :Mobile and Pervasive Computing , Nitte,Karnataka,Udupi Dist, Karnataka ,INDIA,February-5-6 , 2009,[ Paper id -104] [13].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D .“Economical and Technical costs for the Transition of IPv4–to-IPv6 Mechanisms[ETCTIPv4 to ETCTIPv6]” ,Proceedings of National Conference on Wireless Communications and Technologies(NCWCT-09)-Theme:Mobile and Pervasive Computing , Nitte ,Karnataka,Udupi Dist,Karnataka,INDIA,February-5-6 , 2009,[ Paper id -103]   [14].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D .”Implementation of Codec Driver for network embedded devices ”, Proceedings of the ” IEEE International Advance Computing Conference IACC-2009 on March 6- 8[Paper ID IEEE-ALGO-0205]at patiala . [15].Hanumanthappa.J.,Tippeswamy.K.,Manjaiah.D.H ., “ SOA Approach for information retrieval using web Services” [SOAAFIRUWS ],Proceedings of IEEE International Conference on the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-DATA-2065].   6].Hanumanthappa.J.,Manjaiah.D.H ., Tippeswamy.K.“ An Overview of Study on Smooth Porting Process Scenario during IPv6 Transition”[TIPv6] ,Proceedings of IEEE International Conference on the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-APPL-1278].   [17].Hanumanthappa.J.,Manjaiah.D.H ., Tippeswamy.K .“Generic Query information retrieval System for web 2.0” ,Proceedings of the Seventh International Convention on Automation of libraries in education and Research(CALIBER-2009) organized by Inflibnet centre on February 25-27,2009 at Pondicherry university(A central University),R.Venkat Raman Nagar,Kalapet,Pondicherry-605014,India.[Paper ID C-13].   [18].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K.“ IPv6 over IPv4 QoS metrics in 4G Networks:Delay, Jitter,Packet Loss Performance,Throughput and Tunnel Discovery Mechanisms”, Proceedings of the National Conference on Wireless Networks-09(NCOWN-2009) organized by RLJIT,Kodigehalli,Doddaballapur,Karnataka, INDIA,November 21-22 nd ,2009,[Paper code NCOWN-19].  
  37. 37. [19].Hanumanthappa.J.,Manjaiah.D.H.,“ A Study on Comparison and Contrast between IPv6 and IPv4 Feature Sets” Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28 th ,2008,[Paper code CP 15].   [20].Hanumanthappa.J.,Balachandra.C ,“Soft one to One Gateway Protocol”, Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28 th ,2008,[Paper code CP 27]. [21].Hanumanthappa.J.,Thippeswamy.K .“Generic Query Retrieval System”[GQRS]”, Proceedings of National Conference on,Recent Trends in Engineering and Technology(RTIET-2008),Doddaballapur,Karnataka,INDIA,November 21-22 nd ,2008,[ Paper code 05]   [22].S.Deering and R.Hinden “Internet Protocol Version 6(IPv6) Specification”, RFC 2460,December 1998 . [23].Behrouz A.Forouzan,Third Edition,“TCP/IP Protocol Suite”. [24].Atul Kahate,“Cryptography and Network Security“,Tata McGraw-Hill,2003,pp-8-10. [25].Kurose.J.& Ross.K.(2005)Computer Networking:A top-down approach featuring the Internet.3 rd ed,(Addison Wesley). [26].R.Callon and D.Haskin,“RFC2185:Routing aspects of IPv6 transition”,September 1997. [27].D.Provan,”RFC1234:Tunneling IPX traffic through IP networks”,June 1991. [28].R.Gilligan and E.Nordmark,”Transition mechanisms for IPv6 Hosts and Routers”,RFC 2893,Aug 200014. [29].R.Woodburn and D.Miills,”RFC1241:Scheme for an Internet encapsulation protocol :Version 1”,July 1991. [30].R.Atkinson and S.Kent,”Security architecture for the internet protocol”,RFC 2401,Nov.1998. [31].B.Gleeson,A.Lin,J.Heinanen,G.Armitage,and A.Malis,:”A Framework for IP based Virtual Private networks”,RFC 2764,February 2000. [32].B.Carpenter and K.Moore,“Connection of IPv6 Domains via IPv4 Clouds,”RFC 3056,Feb.2001. [33].F.Templin,T.Gleeson,M.Talwar,and D.Thaler,Intra-Site Automatic Tunnel Addressing Protocol(ISATAP),draft-ietf-ngtrans-isatap-22,May,2004. [34].C.Huitema,Tunneling IPv6 over UDP through NATs(Teredo),draft-huitema-v6ops-teredo -05,April 5,2005. [35].S.Hanks,T.Li,D.Farinacci and P.Traina,”RFC1701:Generic Routing encapsulation(GRE)”,October 1994
  38. 38. Queries and Suggestions.
  39. 39. Thank You 8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.

×