IPSec, an Internet layer three (3)-security protocol suite is often characterising with introducing an additional space and processing overhead when implemented on a network for secured communication using either internet protocol version 4 or 6; IPv4 or IPv6. The use of Internet protocol security (IPSec) on IPv4 is an alternative that offers solutions and addresses the security vulnerabilities in network layer of the open system interconnect (OSI) and transmission control protocol/internet protocol (TCP/IP) protocol stack. In IPv6, IPSec is one among many other features added to the earlier Internet protocol to enhance efficiency and security. This paper, set as its objective to reports on the impact of processing and space overhead introduced by IPSec on both IPv4 and IPv6 in relation to packet end-to-end delay based on different IPSec transformations with different authentication and encryption algorithms deployed in different scenarios simulated using NS2. The experiment result reveals that the cost of IPSec added overhead is relatively small when smaller packet sizes are involved for both protocols in comparison with large packet sizes that were IPSec protected with the same configuration as the smaller packet, unless in the cases whereby the packet was very large which has to be fragmented. This paper can therefore, serve as a guide for network administrators to trade up between processing cost and larger address space specifically for transmission involving larger IP packets
In today’s network-based cloud computing era, software applications are playing big role. The security of these software applications is paramount to the successful use of these applications. These applications utilize cryptographic algorithms to secure the data over the network through encryption and decryption
processes. The use of parallel processors is now common in both mobile and cloud computing scenarios.
Cryptographic algorithms are compute intensive and can significantly benefit from parallelism. This paper
introduces a parallel approach to symmetric stream cipher security algorithm known as RC4A, which is
one of the strong variants of RC4. We present an efficient parallel implementation to the compute intensive
PRGA that is pseudo-random generation algorithm portion of the RC4A algorithm and the resulted
algorithm will be named as PARC4-I. We have added some functionality in terms of lookup tables.
Modified algorithm is having four lookup tables instead of two and is capable of returning four distinct
output bytes at each iteration. Further, with the help of Parallel Additive Stream Cipher Structure and loop
unrolling method, encryption/decryption is being done on multi core machine. Finally, the results shows
that PARC4-I is a time efficient algorithm.
On the migration of a large scale network from i pv4 to ipv6 environmentIJCNCJournal
This work mainly addresses the design a large scale network using dual stack mechanisms. We focused on
the most important theoretical concepts of the IPv6 protocol, such as addressing, address allocation,
routing with the OSPF and BGP protocols and routing protocols performance in dual stack network using
GNS3 and Wireshark simulators. we have a tendency to measure a perfect model and a true large-scale
network atmosphere victimization out there end-to-end activity techniques that focuses on a large-scale
IPv4 and IPv6 backbone and created performance the IPv4 and IPv6 network. In this paper, we compiled
IPv6 address planning in large scale network, performance statistics of each network in terms of TCP
throughput, delay jitters, packet loss rate, and round trip time. It is found that, a minor degradation within
the throughput of the TCP, delay jitter, a lower packet loss rate, and a rather longer round trip time are
occurred in a real large scale dual stack network
The Impact of Software-based Virtual Network in the Public CloudChunghan Lee
Today’s cloud network consists of sophisticated virtual
networks, and a virtual switch is a key element of these
networks. Although there is tremendous interest in measuring
cloud network performance, little is known about the impact
of software-based virtual network on latency. In this paper, we
conduct the impact of virtual network on latency in the public
cloud based on OpenStack. We measured the throughput of VMs
and simultaneously captured their packets on hosts. We analyzed
the traces by using well-known metrics, such as throughput and
RTT, and investigated the abrupt fluctuation of latency called as
‘the burstiness of latency’. We quantitatively clarify the impact of
software-based virtual network on latency. In our public cloud,
the latency is approximately 35.2% of RTT and 10% of burstiness
mainly contributes to the increased RTT. The total latency was
increased by the receiving side regardless of data and ACK
paths. Our analysis results, discussions, and implications can
not only help cloud researchers and developers design the next
generation of software-based virtual network but can also help
cloud operators improve the performance of virtual network.
In today’s network-based cloud computing era, software applications are playing big role. The security of these software applications is paramount to the successful use of these applications. These applications utilize cryptographic algorithms to secure the data over the network through encryption and decryption
processes. The use of parallel processors is now common in both mobile and cloud computing scenarios.
Cryptographic algorithms are compute intensive and can significantly benefit from parallelism. This paper
introduces a parallel approach to symmetric stream cipher security algorithm known as RC4A, which is
one of the strong variants of RC4. We present an efficient parallel implementation to the compute intensive
PRGA that is pseudo-random generation algorithm portion of the RC4A algorithm and the resulted
algorithm will be named as PARC4-I. We have added some functionality in terms of lookup tables.
Modified algorithm is having four lookup tables instead of two and is capable of returning four distinct
output bytes at each iteration. Further, with the help of Parallel Additive Stream Cipher Structure and loop
unrolling method, encryption/decryption is being done on multi core machine. Finally, the results shows
that PARC4-I is a time efficient algorithm.
On the migration of a large scale network from i pv4 to ipv6 environmentIJCNCJournal
This work mainly addresses the design a large scale network using dual stack mechanisms. We focused on
the most important theoretical concepts of the IPv6 protocol, such as addressing, address allocation,
routing with the OSPF and BGP protocols and routing protocols performance in dual stack network using
GNS3 and Wireshark simulators. we have a tendency to measure a perfect model and a true large-scale
network atmosphere victimization out there end-to-end activity techniques that focuses on a large-scale
IPv4 and IPv6 backbone and created performance the IPv4 and IPv6 network. In this paper, we compiled
IPv6 address planning in large scale network, performance statistics of each network in terms of TCP
throughput, delay jitters, packet loss rate, and round trip time. It is found that, a minor degradation within
the throughput of the TCP, delay jitter, a lower packet loss rate, and a rather longer round trip time are
occurred in a real large scale dual stack network
The Impact of Software-based Virtual Network in the Public CloudChunghan Lee
Today’s cloud network consists of sophisticated virtual
networks, and a virtual switch is a key element of these
networks. Although there is tremendous interest in measuring
cloud network performance, little is known about the impact
of software-based virtual network on latency. In this paper, we
conduct the impact of virtual network on latency in the public
cloud based on OpenStack. We measured the throughput of VMs
and simultaneously captured their packets on hosts. We analyzed
the traces by using well-known metrics, such as throughput and
RTT, and investigated the abrupt fluctuation of latency called as
‘the burstiness of latency’. We quantitatively clarify the impact of
software-based virtual network on latency. In our public cloud,
the latency is approximately 35.2% of RTT and 10% of burstiness
mainly contributes to the increased RTT. The total latency was
increased by the receiving side regardless of data and ACK
paths. Our analysis results, discussions, and implications can
not only help cloud researchers and developers design the next
generation of software-based virtual network but can also help
cloud operators improve the performance of virtual network.
Performance Evaluation of Routing Protocols RIPng, OSPFv3, and EIGRP in an
IPv6 Network
Siti Ummi Masruroh
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
ummi.masruroh@uinjkt.ac.id
Fadly Robby
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
fadly.robby11@mhs.uinjkt.ac.id
Nashrul Hakiem
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
hakiem@uinjkt.ac.id
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTSatish Kumar
MINI PPT
IPv6 (Internet Protocol version 6) is a revision of the Internet Protocol (IP) developed by the Internet Engineering Task Force (IETF). IPv6 is intended to succeed IPv4.
IPv6 implements a new addressing system that allows for far more addresses to be assigned than with Ipv4.
Multiprotocol Label Switching (MPLS) is deployed by many service providers for establishing their backbone networks.
The Cisco implementation of IPv6 provider edge router over MPLS is called 6PE,and it enables IPv6 sites to communicate with each other over an MPLS IPv4 core network using MPLS label switched paths.
Implementation of Steganographic Method Based on IPv4 Identification Field ov...IJERA Editor
In this paper we present first a study of covert channels (steganography) that may be applied for each TCP/IP layer in VoIP application. Then, we present a steganographic method which hide secret data in IP protocol header fields, particularly the identification field. The IP protocol covert channel implementation was carried out in NS-3 (Network Simulator 3).
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKIJCNCJournal
Internet of Things (IoT) deployments mostly relies on the establishment of Low-Power and Lossy Networks (LLNs) among a large number of constraint devices. The Internet Engineering Task Force (IETF) provides an effective IPv6-based LLN routing protocol, namely the IPv6 Routing Protocol for Low Power and Lossy Network (RPL). RPL provides adequate protection against external security attacks but stays vulnerable to internal routing attacks such as a rank attack. Malicious RPL nodes can carry out a rank attack in different forms and cause serious network performance degradation. An experimental study of the impact of the decreased rank attack on the overall network performance is presented in this paper. In also besides, it is
important to understand the main influencing factors in this context. In this study, several some many network scenarios were considered with varying network sizes, attacker properties, and topological setups. The experimental results indicate a noticeable adverse effect of the rank attack on the average PDR, delay, ETX, and beacon interval. However, such impact was varied according to network size, attacker position,
attacker neighbor count, number of attack-affected nodes, and overall hops increase. The results give a practical reference to the overall performance of RPL networks under rank attacks.
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSIJNSA Journal
One of the main purposes of Internet Protocol version 6 (IPv6) developments was to solve the IP address depletion concern due to the burgeoning growth of the Internet users. The new Internet protocol provides end-to-end communication, enhanced security and extensibility apart from the other features such as address auto-configuration or plug-and-play and faster packet processing in the routers. However, as a new technology, it is also reported that the protocol introduces some security vulnerabilities both in the header format and in the other protocols associated to it. This paper reviews IPv6 security vulnerabilities that have large potential exploitation in terms of denial of service attacks. The IPv6 security vulnerabilities are classified under three categories that include the IPv6 main header field, IPv6 extension header and Neighbour Discovery Protocol (NDP). This paper also summarizes the current mitigation methods proposed by researchers and practitioners to secure from these IPv6 security vulnerabilities.
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...CSCJournals
WLAN (Wireless Local Area Networks) are gaining their grounds, and widely deployed in organizations, college campuses, public places, and residential areas. This growing popularity of WLAN makes these networks more vulnerable towards attacks and data thefts. Attacker attempts unauthorized access to the network for accessing the sensitive data of the users. Thus, it's necessary to address all the security challenges and its countermeasures using various encryption algorithms to prevent the attacks. However, with the use of security protocols the performance of the WLAN network can be varied. Thus this paper addresses the impact of various security protocols on the WLAN network, keeping throughput as the benchmark for network performance.
IEEE 802.11 ac is the latest wireless standard that operates in 5 Ghz frequency band with higher data rate, compare to its previous standards. This research has also chosen IEEE 802.11 ac standard for investigating the impact of security protocols including WEP (Wired Equivalent Privacy), WPA (WiFi Protected Access), and WPA2 (WiFi Protected Access 2) on throughput of WLAN IEEE 802.11 ac in Windows environment using TCP and UDP traffic for both IP versions (IPv4 & IPv6). The research was launched in a real test-bed setup, with a Client/Server network structure. The results from the experiment showed that the performance of data throughput in the open system were higher comparable to secured systems. However, the results demonstrated that the performance of throughput have different behavior to different security protocols under TCP/UDP traffic with IPV4 & IPV6. A detailed comparison of results in all scenarios is explained in the paper.
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...IJECEIAES
This paper attempts to build up a simple, strong and secure cryptographic algorithm. The result of such an attempt is “RC6-Cascade” which is 320-bits RC6 like block cipher. The key can be any length up to 256 bytes. It is a secret-key block cipher with precise characteristics of RC6 algorithm using another overall structure design. In RC6-Cascade, cascading of F-functions will be used instead of rounds. Moreover, the paper investigates a hardware design to efficiently implement the proposed RC6-Cascade block cipher core on field programmable gate array (FPGA). An efficient compact iterative architecture will be designed for the F-function of the above algorithm. The goal is to design a more secure algorithm and present a very fast encryption core for low cost and small size applications.
Mining Environment Harmful Gas Detection And Alarm System Using Kiel And Prot...ijceronline
The main idea behind this paper is to propose a system which can provide a safe environment for miners using wireless communication, alarming system . Sensors are employed within the helmets of the miners to detect the temperature and intensity of the harmful gas levels. If the temperature breaches the 40 degree Celsius mark or if the CO intensity level exceeds 120 ppm ,here both the values of temperature and CO concentration value is calibrated to the potentiometer used (200). If these values exceed 200 mark an alarming signal is set on ,which alerts the miners and also gives information about these values to the base station via RF transmitter . In this paper we are introducing the RF transmitter and receiver technology instead of using other means of communication
Comparison ofTraditional-Trainingon theOpen E-TrainingPlatform s and Traditio...ijceronline
Open e-training Platform s play an important role as one of the tools that help people develop their skills and acquire new knowledge and expertise in various fields, recently the trend has increased towards the virtual training and it became a way to reach more of the trainees who aspire to get better educational quality of the training programs which are held on the Internet without the temporal and spatial limitations and away from the traditional training, as the time and cost stand as a significant obstacle before the ambitions of individuals. The paper discussed the problems that hinder the trainees of full understanding of the training courses on the open e-training Platform s compared to traditional training, and see how they benefit and their orientation towards it, this study followed the analytical descriptive method through the distribution of a questionnaire to a random sample of the technical community members. The questionnaire results indicated a preference to use online training instead of traditional training, were the main reasons is the lack of temporal and spatial constraints.
Fault Vertical Segmentation Growth and Determination of Oil Source Fault in F...ijceronline
It is proved that fault possesses a typical characterisc of vertical segmentation growth if there is competent difference according to field observation, typical seismic analysis and physical modeling. Fault evolution can be divided into three stages by competent difference: formation of lower fault,segmentation of upper and lower fault and formation of thoroughgoing fault. Taking Sanzhao depression as an example, rock mechanical properties and fault−related fold theories prove that there widely exists faults in sandstone layer of Fuyang oil layer, whose propagation is stopped by mudstone in Qingshankou formation member, leading to the formation of fault vertical segmentation growth. Combining reservoir careful anatomy, it can be indicated that the main oil source faults of the “reversed” migration in Fuyang oil layer must keep active in hydrocarbon migration and accumulation period connect oil source and reservoirs, and segment vertically growth in Sanzhao depression.
Dimension of Land Use Conversion in Ado-Ekiti Metropolisijceronline
Over the years land use has ever been dynamics due to many factors such as economics, environmental, socio- political, legal among others. In Ado-Ekiti metropolis, due to urbanization the quantum of developable land available continue to decrease daily, hence the high rate of land use conversion. This paper examined land use pattern in Ado- Ekiti and then identified the direction of land use conversion in the study area. Primary data were collected with questionnaire administered on 76 individual property owners who have their properties converted. It was discovered that all the identified properties were originally meant for residential use. The results showed that land use conversion from residential-commercial (68%) was identified followed by residential-institutional (16%), residential-recreational (12%), while residential-others (4%). This study concluded that going by the rate at which residential properties are been converted to other uses in Ado-Ekiti metropolis in the recent time, may lead to serious housing shortage. The implication of this is that house rents will continue to rise to the extent that, low and even medium income earners may not be able to afford accommodation within the study area, unless urgent government intervention.
Performance Evaluation of Routing Protocols RIPng, OSPFv3, and EIGRP in an
IPv6 Network
Siti Ummi Masruroh
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
ummi.masruroh@uinjkt.ac.id
Fadly Robby
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
fadly.robby11@mhs.uinjkt.ac.id
Nashrul Hakiem
Department of Informatics, FST
UIN Syarif Hidayatullah
Jakarta, Indonesia
hakiem@uinjkt.ac.id
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTSatish Kumar
MINI PPT
IPv6 (Internet Protocol version 6) is a revision of the Internet Protocol (IP) developed by the Internet Engineering Task Force (IETF). IPv6 is intended to succeed IPv4.
IPv6 implements a new addressing system that allows for far more addresses to be assigned than with Ipv4.
Multiprotocol Label Switching (MPLS) is deployed by many service providers for establishing their backbone networks.
The Cisco implementation of IPv6 provider edge router over MPLS is called 6PE,and it enables IPv6 sites to communicate with each other over an MPLS IPv4 core network using MPLS label switched paths.
Implementation of Steganographic Method Based on IPv4 Identification Field ov...IJERA Editor
In this paper we present first a study of covert channels (steganography) that may be applied for each TCP/IP layer in VoIP application. Then, we present a steganographic method which hide secret data in IP protocol header fields, particularly the identification field. The IP protocol covert channel implementation was carried out in NS-3 (Network Simulator 3).
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKIJCNCJournal
Internet of Things (IoT) deployments mostly relies on the establishment of Low-Power and Lossy Networks (LLNs) among a large number of constraint devices. The Internet Engineering Task Force (IETF) provides an effective IPv6-based LLN routing protocol, namely the IPv6 Routing Protocol for Low Power and Lossy Network (RPL). RPL provides adequate protection against external security attacks but stays vulnerable to internal routing attacks such as a rank attack. Malicious RPL nodes can carry out a rank attack in different forms and cause serious network performance degradation. An experimental study of the impact of the decreased rank attack on the overall network performance is presented in this paper. In also besides, it is
important to understand the main influencing factors in this context. In this study, several some many network scenarios were considered with varying network sizes, attacker properties, and topological setups. The experimental results indicate a noticeable adverse effect of the rank attack on the average PDR, delay, ETX, and beacon interval. However, such impact was varied according to network size, attacker position,
attacker neighbor count, number of attack-affected nodes, and overall hops increase. The results give a practical reference to the overall performance of RPL networks under rank attacks.
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSIJNSA Journal
One of the main purposes of Internet Protocol version 6 (IPv6) developments was to solve the IP address depletion concern due to the burgeoning growth of the Internet users. The new Internet protocol provides end-to-end communication, enhanced security and extensibility apart from the other features such as address auto-configuration or plug-and-play and faster packet processing in the routers. However, as a new technology, it is also reported that the protocol introduces some security vulnerabilities both in the header format and in the other protocols associated to it. This paper reviews IPv6 security vulnerabilities that have large potential exploitation in terms of denial of service attacks. The IPv6 security vulnerabilities are classified under three categories that include the IPv6 main header field, IPv6 extension header and Neighbour Discovery Protocol (NDP). This paper also summarizes the current mitigation methods proposed by researchers and practitioners to secure from these IPv6 security vulnerabilities.
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...CSCJournals
WLAN (Wireless Local Area Networks) are gaining their grounds, and widely deployed in organizations, college campuses, public places, and residential areas. This growing popularity of WLAN makes these networks more vulnerable towards attacks and data thefts. Attacker attempts unauthorized access to the network for accessing the sensitive data of the users. Thus, it's necessary to address all the security challenges and its countermeasures using various encryption algorithms to prevent the attacks. However, with the use of security protocols the performance of the WLAN network can be varied. Thus this paper addresses the impact of various security protocols on the WLAN network, keeping throughput as the benchmark for network performance.
IEEE 802.11 ac is the latest wireless standard that operates in 5 Ghz frequency band with higher data rate, compare to its previous standards. This research has also chosen IEEE 802.11 ac standard for investigating the impact of security protocols including WEP (Wired Equivalent Privacy), WPA (WiFi Protected Access), and WPA2 (WiFi Protected Access 2) on throughput of WLAN IEEE 802.11 ac in Windows environment using TCP and UDP traffic for both IP versions (IPv4 & IPv6). The research was launched in a real test-bed setup, with a Client/Server network structure. The results from the experiment showed that the performance of data throughput in the open system were higher comparable to secured systems. However, the results demonstrated that the performance of throughput have different behavior to different security protocols under TCP/UDP traffic with IPV4 & IPV6. A detailed comparison of results in all scenarios is explained in the paper.
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...IJECEIAES
This paper attempts to build up a simple, strong and secure cryptographic algorithm. The result of such an attempt is “RC6-Cascade” which is 320-bits RC6 like block cipher. The key can be any length up to 256 bytes. It is a secret-key block cipher with precise characteristics of RC6 algorithm using another overall structure design. In RC6-Cascade, cascading of F-functions will be used instead of rounds. Moreover, the paper investigates a hardware design to efficiently implement the proposed RC6-Cascade block cipher core on field programmable gate array (FPGA). An efficient compact iterative architecture will be designed for the F-function of the above algorithm. The goal is to design a more secure algorithm and present a very fast encryption core for low cost and small size applications.
Mining Environment Harmful Gas Detection And Alarm System Using Kiel And Prot...ijceronline
The main idea behind this paper is to propose a system which can provide a safe environment for miners using wireless communication, alarming system . Sensors are employed within the helmets of the miners to detect the temperature and intensity of the harmful gas levels. If the temperature breaches the 40 degree Celsius mark or if the CO intensity level exceeds 120 ppm ,here both the values of temperature and CO concentration value is calibrated to the potentiometer used (200). If these values exceed 200 mark an alarming signal is set on ,which alerts the miners and also gives information about these values to the base station via RF transmitter . In this paper we are introducing the RF transmitter and receiver technology instead of using other means of communication
Comparison ofTraditional-Trainingon theOpen E-TrainingPlatform s and Traditio...ijceronline
Open e-training Platform s play an important role as one of the tools that help people develop their skills and acquire new knowledge and expertise in various fields, recently the trend has increased towards the virtual training and it became a way to reach more of the trainees who aspire to get better educational quality of the training programs which are held on the Internet without the temporal and spatial limitations and away from the traditional training, as the time and cost stand as a significant obstacle before the ambitions of individuals. The paper discussed the problems that hinder the trainees of full understanding of the training courses on the open e-training Platform s compared to traditional training, and see how they benefit and their orientation towards it, this study followed the analytical descriptive method through the distribution of a questionnaire to a random sample of the technical community members. The questionnaire results indicated a preference to use online training instead of traditional training, were the main reasons is the lack of temporal and spatial constraints.
Fault Vertical Segmentation Growth and Determination of Oil Source Fault in F...ijceronline
It is proved that fault possesses a typical characterisc of vertical segmentation growth if there is competent difference according to field observation, typical seismic analysis and physical modeling. Fault evolution can be divided into three stages by competent difference: formation of lower fault,segmentation of upper and lower fault and formation of thoroughgoing fault. Taking Sanzhao depression as an example, rock mechanical properties and fault−related fold theories prove that there widely exists faults in sandstone layer of Fuyang oil layer, whose propagation is stopped by mudstone in Qingshankou formation member, leading to the formation of fault vertical segmentation growth. Combining reservoir careful anatomy, it can be indicated that the main oil source faults of the “reversed” migration in Fuyang oil layer must keep active in hydrocarbon migration and accumulation period connect oil source and reservoirs, and segment vertically growth in Sanzhao depression.
Dimension of Land Use Conversion in Ado-Ekiti Metropolisijceronline
Over the years land use has ever been dynamics due to many factors such as economics, environmental, socio- political, legal among others. In Ado-Ekiti metropolis, due to urbanization the quantum of developable land available continue to decrease daily, hence the high rate of land use conversion. This paper examined land use pattern in Ado- Ekiti and then identified the direction of land use conversion in the study area. Primary data were collected with questionnaire administered on 76 individual property owners who have their properties converted. It was discovered that all the identified properties were originally meant for residential use. The results showed that land use conversion from residential-commercial (68%) was identified followed by residential-institutional (16%), residential-recreational (12%), while residential-others (4%). This study concluded that going by the rate at which residential properties are been converted to other uses in Ado-Ekiti metropolis in the recent time, may lead to serious housing shortage. The implication of this is that house rents will continue to rise to the extent that, low and even medium income earners may not be able to afford accommodation within the study area, unless urgent government intervention.
Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...ijceronline
An enacting approach to intelligent virtual collaborative learning model is explored through the lens of critical ontology. This ontological model enables to reuse of the domain knowledge and to make the knowledge explicitly available to the agent working as an Expert System, which uses the operational knowledge in collaborative learning environment. This ontological model used by the agent to identify the preliminary competency level of the user. This environment offers personalized education to each learner in accordance with his/her learning preferences, and learning capabilities. Here the factors considered to identify the learning capability taken are demographic profile, age, family profile, basic educational qualification and basic competency scale. The conception of heuristics is then used by the agent to determine the effectiveness of the learner by referring the different parameters of the learner available in the ontological model.To help getting over this, the paper describes the experience on using an ontological model for collaborative learning to relate and integrate the history of the learner by maintaining the history of learner in collaborative learning environment that will be used by the Multi-Objective Grey Situation Decision Making Theory to infer the understanding level of user and produces the conditional content to the user
Based On Oil Analysis Applicable To Transportation Fleets Using A Viscosimeterijceronline
At the present paper we try to explain the analysis techniques use in engine oil for the lubricating in a maintenance period of a city bus (Mercedes Benz Boxer 40), in a transportation company. This experiment is done to estimate the optimal time for the oil change. using devices such as the rotational viscometer and the atomic absorption spectrometer as they can detect the incipient form when the oil loses its lubricating properties, and therefore cannot protect the mechanical components of diesel engines such these trucks. Timely detection of lost property in the oil, allows us taking preventive plan maintenance for the truck and subsequently these methodologies could be use in a fleet.
Stabilization of soil using Rice Husk Ashijceronline
In today scenario, lack of stable ground for development of infrastructures is very common. In view of this, construction of buildings on unsuitable ground is unavoidable and making a suitable ground before constructions is real challenging issue for Geotechnical Engineers. To overcome the difficulties experienced with problematic soil in geotechnical applications on one side and safe disposal of solid wastes on the other side, an attempt is made in this investigation to explore the possibilities of utilizing solid wastes to improve the engineering behavior of problematic soil. In this, in this present investigation the type of solid waste namely Rice Husk Ash for stabilization is selected to study the effects of same on the index and engineering characteristics of problematic soil. The rice husk ash is mixed with soil in various proportions like 5%, 10%, 20%, 30%, 40%, 50% and 80%. The various tests were conducted on these proportions and optimized proportion is arrived
Simulation of the Hydrodynamic Conditions of a Rotating Cage for Evaluating C...ijceronline
The Rotating cage technique is used to evaluate corrosion inhibitors. The rotating cage holds 8 coupons containing corrosive liquid, which rotate within it. These coupons have a dynamic that simulates the conditions in a pipe through a corrosive fluid, in this case the material used in pipelines are analyzed oil. A study of the fluid dynamics through the ANSYS software shows that the velocity fields, contours, vectors and speed profiles for symmetric geometries arrangements 2, 4 and 8 embedded specimens with a corrosion inhibitor. The conditions are calculated velocity profiles are standard temperature and solution viscosity of 1.0 cp and 1.5 cp. The density is considered constant of 998 kg / m3 and three angular velocities (920, 460 and 230 rpm) were analyzed. Finally the results of these conditions have been analyzed, yielding values close to zero in the outside walls of the cylinder. The cylinder contain the coupons rotating speeds to ensure turbulence (1) and to analyze the rate of corrosion inhibitor.
Energy-Mass-Size balance model for dynamic control of a wet open circuit grin...ijceronline
A simple dynamic model combining energy balance and population balance has been utilized to assess the dynamic response of the mill to changes in mill operational parameters for purpose of establishing a predictive control tool. The manipulated parameters are feed rate, feed % solids and ore hardness index while the response variables are mill power draw, mill temperature and mill product size distribution (d80). The results demonstrate a good dynamic response of the model to variations in mill operational parameters. Thus, the model could be integrated in the overall mill control scheme to assist mill operators and process engineers in timely decisions with regard to mill control.
Firefly Algorithm based Optimal Reactive Power Flowijceronline
The optimal reactive power flow (ORPF) helps to effectively utilize the existing reactive power sources for minimizing the network loss. Firefly Algorithm (FA), inspired by social flashing behavior of fireflies, is one of the evolutionary computing models for solving multimodal optimization problems. This paper attempts to obtain global best solution of ORPF using FA. The results of IEEE 57 bus system are presented to demonstrate its performance.
Chronic diseases based on cloud computing platform (hypertension) intelligent...ijceronline
Chronic diseases seriously affecting people's lives and health in China, as one of the major chronic diseases of hypertension, incidence is increasing constantly endangering people's health and life. Treatment of high blood pressure, prevent complications and complications to be an important task of the medical profession. With the development of information technology and medicine, change the passive role in diagnosis and treatment of patients in the traditional mode, making full use of advanced information technology to achieve real-time monitoring of the disease is possible. Cloud computing platforms of chronic diseases is discussed in this paper (high blood pressure) meaning of intelligent control system, analysis of chronic diseases (hypertension) construction of an intelligent control system demonstrates the feasibility of the system, chronic diseases (hypertension) new model of prevention and control information, realize full use of limited medical resources and maximizing the social benefit.
Sidelobe reduction in Synthetic Aperture Radar (SAR) using Multi Stages of Li...ijceronline
A commonly used Synthetic Aperture Radar (SAR) pulse is the Linear Frequency Modulated (LFM) pulse. It has the advantage of greater bandwidth while keeping the pulse duration short and the envelope constant. However, the matched filter output of this signal contains range sidelobes with the first sidelobe at a level of -13.2 dB to the peak of the main lobe. In this paper, the linear frequency modulation (LFM) waveform and matched filter response are introduced. The principle of Multi Stages of Linear Frequency Modulation (MS-LFM) is also discussed. Simulation results of the proposed MS-LFM signal are presented, where sidelobe level reduction of more than -20 dB can be achieved
Energy-Mass-Size balance model for dynamic control of a wet open circuit grin...ijceronline
Majority of traditional mill simulation models have been successfully applied in mill circuit design and optimization. However, only limited success has been reported with respect to dynamic mill control. This is partly attributable to the fact that these models are based on steady state analysis and fail to account for energy balance inside the mill. In this paper, an integrated model has been developed based on energy-mass-size balance for dynamic simulation of open circuit wet grinding mills under MATLAB environment. The model combines information from energy-mass balance, material breakage mechanisms, fundamental material properties and the milling conditions in a simple and clear representation of the physics and thermodynamics of the wet milling process, thereby addressing the limitations of traditional model formulations. Simulation test results depicting the dynamic response of the model are presented in Part II. Successful validation of this modelling approach would go alongside improving the current methods of continuous control of grinding mills.
Existence and Stability of the Equilibrium Points in the Photogravitational M...ijceronline
In this article we have discussed the equilibrium points in the photogravitational magnetic binaries problem when the bigger primary is a oblate spheroid and source of radiation and the small primary is a oblate body and have investigated the stability of motion around these points.
Significance and Need of Computational Analysis and Finite Element Modelling ...ijceronline
Composite materials are the cutting edge materials that possess unrestrained opportunities for advanced material science and development. Thermal studies of composite materials are gaining greater impetus in the present scenario. This will help to comprehend the properties of materials as they change with temperature. The thermal characterization of hybrid composites has been progressively more important in a wide range of applications. The coefficient of thermal expansion, thermal conductivity, specific heat capacity, latent heat and thermal diffusivity are the most important properties of composite materials. Since nearly all composites are used in various temperature ranges, measurement of coefficient of thermal expansion (CTE) and thermal conductivity as a function of temperature is necessary in order to know the behaviour of the material. Thermal characterization and analysis of hybrid composites will depend on the factors that influence on the prominent thermo-physical properties presents a major challenge since they are sensitive to the type of reinforcement and method of manufacture. This research paper emphasizes the significance, need, applications and scope of computational investigation and finite element analysis of composite materials
Information Model and Its Element for Displaying Information on Technical Con...ijceronline
The suggested information elements for the system of information display of the technical condition of the integrated information system meet the essential requirements of the information presentation. They correlate with the real object simply and very accurately. The suggested model of information display of the technical condition of the objects of integrated information system improves the efficiency of the operator of technical diagnostics in evaluating the information about the technical condition of the integrated information system .
EOQ Inventory Models for Deteriorating Item with Weibull Deterioration and Ti...ijceronline
This paper develops an EOQ inventory model for deterioratingitemswith two parameters Weibull deterioration. Shortages are permissible andpartially backlogged. In this model we consider time varying quadratic holding cost and ramp-type demand. The model is developed under two different replenishment policies: (i) Starting with no shortages (ii) Starting with shortages.The aim of this study is to find the optimal solutiontominimizing the total inventory costs for both the above mentioned strategies. To elevate the model a numerical example has been carried out and a sensitivity analysis occurred to study the result of parameters on essential variables and the entire cost of this model.
A Paper on Problems Generated By Junk Food in Indiaijceronline
India “The Land of Rich Heritage and Culture” with its vast food variety is now at the verge of declining its food habits. Moreover, the food which is common among youth is “JUNK FOOD”. Junk food is a pejorative term for food containing high levels of calories, salts and fats with little protein, vitamins or minerals. They have a significant impact on student’s diet and weight as many students consume more than half of their daily calories as junk food in canteens of schools and colleges. According to WHO (World Health Organization) reports, in India, more than 3% of the population is in the obese category. Obesity is an emerging major public health problem throughout the world among adolescents. Excess consumption of junk food leads to the wide variety of health disorders like obesity, food poisoning, dental diseases and many more included angina pectoris, stroke, depression, diabetes, asthma etc. all of which sometimes contribute to premature death of an individual. This paper is concern about the obesity crisis in India which can be reduced by developing more and more educated society, implementing strong nutritional standards in schools and colleges, decreasing the advertising rates of junk food and some changes in the government tax policy. All these points are used as an instrument to discourage consumption of unhealthy foods such as sodas and junk food. This paper uses a basic method of optimization techniques i.e. simplex method to optimize or minimize the consumption of junk food in schools and colleges
Description of condensation and evaporation processes in cylindrical-type por...ijceronline
Cylindrical-type porous materials such as MCM-41 and SBA-15 substrata have been the subject of intensive research. Nevertheless, a profound and unifying study concerning the effects of surface heterogeneity and networking effects are still lacking. This research aims to connect experimental results from adsorption data, specifically Pore-Size Distributions, with a theory describing porous space organization in terms of Pore-size heterogeneity and networking effects.
Effect on heat transfer for laminar flow over Backward Facing Step with squar...ijceronline
The purpose of this paper is to study the influence of an adiabatic square cylinder on the heat transfer enhancement in the 2D laminar flow over the Backward Facing Step (BFS). This work also studies the effect of streamwise position of the square cylinder on heat transfer enhancement. The governing equations, for the 2D laminar flow over BFS with a square cylinder placed inside, are solved on nonuniform Cartesian grid using projection method. The individual differential terms of the N-S equations are discretized using a Higher Order Compact Scheme (HOCS). The numerical code is first validated with the results available in the literature. The main advantage of HOCS is to obtain higher order approximations to the derivatives accurately without the necessity of higher number of nodes. Thus reducing the computational cost. It is observed from the numerical experiment that placing the cylinder affects the fluid flow and heat transfer and for XC=1.4, YC = 1.0 and Re= 200, there is a maximum heat transfer enhancement of 193.93%.The results of these numerical experiments are useful in studying the heat transfer enhancement and its dependence on the bluff body and flow characteristics. This work has its applications in engineering problems where the heat transfer in a laminar flow regime can be enhanced using a bluff body. The current work also demonstrates the dependence of horizontal position of cylinder on heat transfer augmentation.
Performance Evaluation and Comparisons for IPv4&IPv6 using mpls Technologiesiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...IJCNCJournal
Migration from IPv4 to IPv6 is still visibly slow, mainly because of the inherent cost involved in the implementation, hardware and software acquisition. However, there are many values IPv6 can bring to the
IP enabled environment as compared to IPv4, particularly for Voice Over Internet Protocol (VoIP) solutions. Many companies are drifting away from circuit based switching such as PSTN to packet based switching (VoIP) for collaboration. There are several factors determining the effective utilization and
quality of VoIP solutions. These include the choice of codec, echo control, packet loss, delay, delay variation (jitter), and the network topology. The network is basically the environment in which VoIP is deployed. State of art network design for VoIP technologies requires impeccable Interior Gateway routing
protocols that will reduce the convergence time of the network, in the event of a link failure. Choice of CODEC is also a main factor. Since most research work in this area did not consider a particular CODEC as a factor in determining performance, this paper will compare the behaviour of RIP and OSPF in IPv4
and IPv6 using G.711 CODEC with riverbed modeller17.5.
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...IJCNCJournal
Migration from IPv4 to IPv6 is still visibly slow, mainly because of the inherent cost involved in the implementation, hardware and software acquisition. However, there are many values IPv6 can bring to the
IP enabled environment as compared to IPv4, particularly for Voice Over Internet Protocol (VoIP) solutions. Many companies are drifting away from circuit based switching such as PSTN to packet based switching (VoIP) for collaboration. There are several factors determining the effective utilization and
quality of VoIP solutions. These include the choice of codec, echo control, packet loss, delay, delay variation (jitter), and the network topology. The network is basically the environment in which VoIP is deployed. State of art network design for VoIP technologies requires impeccable Interior Gateway routing
protocols that will reduce the convergence time of the network, in the event of a link failure. Choice of CODEC is also a main factor. Since most research work in this area did not consider a particular CODEC as a factor in determining performance, this paper will compare the behaviour of RIP and OSPF in IPv4
and IPv6 using G.711 CODEC with riverbed modeller17.5.
Efficient End-to-End Secure Key Management Protocol for Internet of Things IJECEIAES
Internet of things (IoT) has described a futurevision of internetwhere users, computing system, and everyday objects possessing sensing and actuating capabilities are part of distributed applications and required to support standard internet communication with more powerful device or internet hosts. This vision necessitates the security mechanisms for end-to-end communication. A key management protocol is critical to ensuring the secure exchange of data between interconnecting entities, but due to the nature of this communication system where a high resource constrained node may be communicating with node with high energy makes the application of existing key management protocols impossible. In this paper, we propose a new lightweight key management protocol that allows the constrained node in 6loWPAN network to transmit captured data to internet host in secure channel. This protocol is based on cooperation of selected 6loWPAN routers to participate in computation of highly consuming cryptographic primitives. Our protocol is assessed with AVISPA tool, the results show that our scheme ensured security properties.
The aim of this dissertation project was to investigate and improve the performance of the two most popular link-state routing protocols when configured in IPv4/IPv6 dual-stack enterprise networks. The thesis intended to make the first step of scientific research in performance comparison of different routing protocols in IPv4-IPv6 coexistence dual stack ipv4 and ipv6 coexistence
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Security (IPsec) on IPv4 and IPv6 Enabled Communication
1. ISSN (e): 2250 – 3005 || Volume, 06 || Issue, 02 ||February – 2016 ||
International Journal of Computational Engineering Research (IJCER)
www.ijceronline.com Open Access Journal Page 13
A Comparative Analysis of Additional Overhead Imposed by
Internet Protocol Security (IPsec) on IPv4 and IPv6 Enabled
Communication
1
Muhammed NuraYusuf, 2
Badamasi Imam Ya’u
1,2
Faculty of Science AbubakarTafawa Balewa University, P.M.B 0248 TafawaBalewa Way, Bauchi State,
Nigeria.
I. Introduction
It is a well-known fact that internet protocol version 4 (IPv4) the most widely adopted internet protocol as of
today for packet transmission is vulnerable to a number of attacks at the network layer of the open system
interconnect (OSI) and transmission control protocol/internet protocol (TCP/IP) protocol stack[1]. The optional
provision of Internet Protocol Security (IPSec)protocol on IPv4 deployment in technologies such as virtual
private network (VPN) has been in the rescue for the vulnerable operation of plain IPv4, the technology
provides immunity and protection against network layer attacks by ensuring secured end-to-end transmission
channel. In the other hand, IPv6 is yet another Internet protocol that is set to replace the use of IPv4completely
in the near future in the computer networking industry [2]. It has been around the corner for many years now, in
fact it services is already being exploited in some parts of the world. IPv6 can simply be seen as an upgrade
version of IPv4 [2]; it introduces so many features to address the defect of the existing IPv4. Among the new
features introduced is the compulsory implementation of IPSec protocol. This implies that by default IPv6 is
protected against any possible network layer attack.
Both Internet protocol version (IPv4) with Internet protocol security (IPSec) enabled and (IPv6) introduced
additional overheads to the actual IP datagram, which may be significant to performance parameters such as
end-2-end delay, throughput, round trip time etc. Hence, the need for a study/analysis to investigate the
overheads introduced by the protocols for their proper deployment and suitable selection of configuration
options among them, considering scarce resources such as bandwidth and processing speed etc.
The general objectives of the study was to provide a practical working, network administration guidance for
making a right selection of configurations under a pre-defined and strict networking condition, IPSec protocols
suite had to offer to suit a particular network environment while bearing in mind the cost/penalty of overheads
involvement on performance. While the basic objectives of this study include were to investigate the impact of
IPSec overheads on Ipv6 network compared to Ipv4 network, to evaluate the processing and space overheads
Abstract
IPSec, an Internet layer three (3)-security protocol suite is often characterising with introducing
an additional space and processing overhead when implemented on a network for secured
communication using either internet protocol version 4 or 6; IPv4 or IPv6. The use of Internet
protocol security (IPSec) on IPv4 is an alternative that offers solutions and addresses the
security vulnerabilities in network layer of the open system interconnect (OSI) and
transmission control protocol/internet protocol (TCP/IP) protocol stack. In IPv6, IPSec is one
among many other features added to the earlier Internet protocol to enhance efficiency and
security. This paper, set as its objective to reports on the impact of processing and space
overhead introduced by IPSec on both IPv4 and IPv6 in relation to packet end-to-end delay
based on different IPSec transformations with different authentication and encryption algorithms
deployed in different scenarios simulated using NS2. The experiment result reveals that the cost
of IPSec added overhead is relatively small when smaller packet sizes are involved for both
protocols in comparison with large packet sizes that were IPSec protected with the same
configuration as the smaller packet, unless in the cases whereby the packet was very large which
has to be fragmented. This paper can therefore, serve as a guide for network administrators to
trade up between processing cost and larger address space specifically for transmission
involving larger IP packets.
Keywords: end-to-end delay, Internet Protocols,IP Security, Overhead, Packets, Processing,
Space,
2. A Comparative Analysis of Additional Overhead Imposed…
www.ijceronline.com Open Access Journal Page 14
imposed by different cryptographic algorithms on IPv4 and IPv6 networks currently supported by IPSec. This is
because, [4] put forward that over time, the future of Internet communication is certain to be occupied by IPv6.
This is in spite of the fact that IPv4 is still in use for Internet communication, a scenario that could probably be
so for many more years ahead, the reasons for that is obtained from the post made by Nicolas Boillot 1st
Jun
2006 on IEEE Spectrum website ―But migration to the Internet IPv6 is proving to be painfully slow. Originally,
that was because it took a long time for computer scientists and engineers to hammer out the details. During that
initial delay, a stopgap, called Network Address Translation (NAT), did such a good job of relieving the need
for more IP addresses that it has become a permanent part of the IPv4 landscape. And it lets the administrators
of the world’s biggest networks continue to put off the dreary task of changing over to IPv6.‖ So will the
Internet and your home or work computer ever move to IPv6? Certainly that’s the future. Most of the Internet
routers that your data travels through can now accommodate IPv6. For some years, leading manufacturers such
as Alcatel, Avici, Cisco, Juniper, Lucent, and Nortel have been adding the necessary software to their wares. All
the leading operating systems—such as Windows, Mac OS X, and Linux—support IPv6, and the U.S.
Department of Defence has mandated IPv6 for its own networks by 2008.Yet a June 2005 survey by Juniper
Networks, Sunnyvale, Calif., found that ‖few organizations are in the process of migrating from the current
standard of IPv4 to the improved IPv6.‖ For one thing, IPv6 is not backward compatible with IPv4. This means
companies will have to support two protocols simultaneously.
IPv4 and IPv6 may have to coexist for some time. IPv4 can finally be jettisoned only when all carriers, ISPs,
routers, switches, firewalls, and servers accommodate packets that use IPv6. Asia will probably lead the way.
Demand for IPv6 is highest there, says Tony Downes, principal technologist at Data Connection Ltd., a London-
based maker of networking and communications products. Another option is running the both protocols as dual
stack, but running that depends on your network. But in most cases for an infrastructure network providing IP
transit, it's fairly easy. For a lot of content providers it won't be too complicated, but there are some things that
they're going to need to keep in mind, depending on the way their particular site is implemented. Where it's
going to be hardest is going to be the enterprise networks, because they've become so ingrained with the
technology known as network address translation and, you know, certain ways of doing things that just don't
scale to an IPv6 world[5]. An ISP ―Hurricane Electric is fully deployed in dual stack and completely ready to
serve everybody's‖
II. Materials and Method (The Experiment Design Approach).
Network Simulator 2 (NS2) a discrete event computer network simulator was used to design and simulate
the experiment. The experiment was performed on a network consisting of clients, a gateway and a server as
illustrated on the physical topology in figure 1. Clients’ access severs through a gateway via a duplex link
channel set up at 2mbs and 10ms. The queue limit size is setup at 10;transmission control protocol (TCP)
agents are attached to the clients’ nodes with the following parameters:
fid_ 1, window size-_ 50, maxburst _ 50,maxcwnd_ 50, while tcpbase_hdr_size was set at 64, and
aggressive maxburst was kept at 50. For the tcp packet size, it was set according to the IPSec configuration
setting being used.
Different sizes of the protected packet were calculated. File transfer protocol (FTP) traffic was attached to
the transmission control protocol (TCP)agent while a TCP sink is attached to receivers and connects to the
traffic agents as shown in figure 1.
Figure (1)The Experiment Network Design Diagram
3. A Comparative Analysis of Additional Overhead Imposed…
www.ijceronline.com Open Access Journal Page 15
III. The Simulation Experiments Scenarios.
The simulation experiments were conducted using NS2 by employing different scenarios. The scenarios
involved the two different IPSec modes (tunnel mode and transport mode of operations). Authentication and
encryption algorithm are deployed in a different scenario as outline below. The investigation is carried out on
end-to-end delay performance parameter; by examining FTP traffic in different IPSecenabled network scenarios
of IPv4 and IPv6. The scenarios include:
Test Case 1: IPv4 only, under the following scenarios.
a. Plain IPv4 Packet with no IPSec: in this scenario the packet is encapsulated plainly and transmitted
with out any IP security with IPv4 protocol
b. IPv4 with Authentication Header (AH): Here the send packet is transmitted using IPv4 transmission
protocol and encapsulated in IPSec header enforcing and ensuring authentication only.
c. IPv4 with Encapsulation Security Payload (ESP): while in this scenario the send packet is transmitted
using IPv4 transmission protocol and encapsulated in IPSec header enforcing and ensuring confidentiality of the
datagram only.
d. IPv4 with both AH & ESP: while in this scenario the send packet is transmitted using IPv4
transmission protocol and encapsulated in IPSec header enforcing and ensuring both authentication and
confidentiality of the datagram.
Test case 2: IPv6 only, under the following scenarios.
a. Plain Unmodified IPv6: Plain IPv6, in this scenario the packet is encapsulated plainly and transmitted
with out any modified IP security with IPv6 protocol
b. IPv6 with AH (e.g.MD5, SHA-1): Here the send packet is transmitted using IPv6 transmission protocol
and encapsulated in IPSec header enforcing and ensuring authentication only.
c. IPv6 with ESP: while in this scenario the send packet is transmitted using IPv6 transmission protocol
and encapsulated in IPSec header enforcing and ensuring confidentiality of the datagram only.
d. IPv6 with Both AH and ESP: while in this scenario the send packet is transmitted using IPv6
transmission protocol and encapsulated in IPSec header enforcing and ensuring both authentication and
confidentiality of the datagram.
Test case 3: IPv4 vs. IPv6 under the following scenarios (For Authentication Check).
a. Plain IPv4 with no IPSec: in this scenario the packet is encapsulated plainly and transmitted with out
any IP security with IPv4 protocol
b. Unmodified IPv6: Plain IPv6, in this scenario the packet is encapsulated plainly and transmitted with
out any modified IP security with IPv6 protocol
c. IPv4 with AH: Here the send packet is transmitted using IPv4 transmission protocol and encapsulated
in IPSec header enforcing and ensuring authentication only.
d. IPv6 with AH: Here the send packet is transmitted using IPv6 transmission protocol and encapsulated
in IPSec header enforcing and ensuring authentication only.
Test case 4: IPv4 vs. IPv6 under the following scenarios (for confidentiality Check).
a. Plain IPv4: in this scenario the packet is encapsulated plainly and transmitted with out any IP security
with IPv4 protocol
b. Unmodified IPv6: Plain IPv6, in this scenario the packet is encapsulated plainly and transmitted with
out any modified IP security with IPv6 protocol
c. IPv4 with ESP: while in this scenario the send packet is transmitted using IPv4 transmission protocol
and encapsulated in IPSec header enforcing and ensuring confidentiality of the datagram only.
d. IPv6 with ESP: while in this scenario the send packet is transmitted using IPv6 transmission protocol
and encapsulated in IPSec header enforcing and ensuring confidentiality of the datagram only.
Test case 5: IPv4 vs. IPv6 under the following scenarios (For Combine Authentication And
Confidentiality Check)
a. Plain IPv4 Packet with no IPSec:in this scenario the packet is encapsulated plainly and transmitted with
out any IP security with IPv4 protocol
4. A Comparative Analysis of Additional Overhead Imposed…
www.ijceronline.com Open Access Journal Page 16
b. Unmodified IPv6: Plain IPv6, in this scenario the packet is encapsulated plainly and transmitted with
out any modified IP security with IPv6 protocol
c. IPv4 with AH plus ESP (3DES + MD5, AES + MD5): in this scenario the send packet is transmitted
using IPv4 transmission protocol and encapsulated in IPSec header enforcing both authentication and ensuring
confidentiality of the datagram.
d. IPv6 with AH plus ESP (3DES + MD5, AES + MD5) while in this scenario the send packet is
transmitted using IPv6 transmission protocol and encapsulated in IPSec header enforcing both authentication
and ensuring confidentiality of the datagram.
IV. Results and Discussion.
To accomplish the objectives setup by the paper as outlined. Different experiment scenarios involving
distinct combination of IPSec mode of operation, authentication and encryption algorithms as shown were
configured, Regardless of the fact that IPSec ensures effective and efficient information protection of network
connectivity between two endpoints, yet there exists is a worrisome cost of overheads associated with it in terms
of latency, router processing and memory, in addition to processing support for other networking functions [6].
However, the scenarios were deployed to investigate their discrepancies and similarities with respect to Internet
protocol versions 4 and 6. Similarly, the performance metric investigated is: end-to-end delay.
AWK scripting language, an interpreted programming language was used to extract, process and manipulate
the NS2 trace file output, it was used to measure and calculates the end-to-end delay experienced during the
transmission of the FTP traffic of different file sizes under the different IPSecconfiguration deployed. The file
sizes used are 1byte, 10bytes 100bytes, 1024bytes 10240bytes, 102400bytes, 1048576bytes, 1024460bytes, and
104857600bytes plus the IPSec header of the IPSec transform employed. The data is then exported, and
analysedto illustrate the behaviour of the IP protocols with respect to different IPSec transform.
Earlier studies have shown that the overheads introduced by IPSec on networks vary with respect to the
adopted IPSec security scenario; the algorithms used for its deployments, the transmitting medium and the file
size. For instance, algorithms like HMAC-SHA1 introduced an additional 9% increase in packet transfer time
than HMAC-MD5. Hence network load involved due to AH authentication and ESP encryption on small files
had a greater ratio of increase when relate to authentication and encryption by ESP alone. This indicates that the
choice of ESP for authentication purpose ahead of traditional AH when both encryption and authentication are
needed for small files is better; especially when the number of encryption and authentication occurrences is
significant and the bandwidth is limited. Moreover, wireless transmission medium significantly suffer more
from IPSec overheads with respect to transfer time. This is because more time is needed to affect the transfer
compared to the wired medium [7]
[1]in similar study indicated that IPSec overheads affects overall performance with respect to packet transfer
time and increase in the network load, they also stated that these overheads are relative to different protocol, file
size, algorithm, network traffic and services employed on the network. The research gap here is that the study
has not go further to carry out specific investigation on how different file sizes/user datagram secured using
different authentication (AH) and encapsulation Security pay load (ESP) algorithm transmitted using different
either of the following protocols; (IPv4 or IPv6) can affect end to end delay; although [8] investigated the
effects of some these parameters but with respect to bandwidth and processing time, ignoring the end-to-end
delay which our study considered. Other performance matrix such as throughput were earlier confirmed to
suffer depreciation due encryption and decryption process of datagram for authentication and confidentiality
check of packets, because both the ciphering and IPSec encapsulation enlarges the eventual packet that will be
transmitted thus building up space overheads. [9]
The result presented in Figure (2) shows the end-to-end delay experience while using IPv6, it could be
noticed that based on the result displayed on the graph there was insignificant/small difference in the average
end-to-end delay between, when AH only is used or when ESP only is used or when both AH plus ESP put
together or when no IPSec was used at all. This happened when the packet size was between 1byte to
102400byte. Noticeable/significant difference in the end-to-end delay among the different IPSec configuration
employed with respect to the Internet protocol in play began to emerge and show clearly when the file size was
large. The packet transmission experience higher delay, when AH & ESP put together; followed by a situation
when ESP header was used.
5. A Comparative Analysis of Additional Overhead Imposed…
www.ijceronline.com Open Access Journal Page 17
The same trend in the average delay is noticed when IPv4 was used as Figure (3) indicated. The results from
figure (3) and figure (2) suggested that both IPv4 and IPv6 behave alike with regard to addition of IPSec header
on the packet. They both experience low end–to-end delay when the file size was small, small between 1byte
and 102400byte and the delay was significant/small when the packet size increased to 102400byte upward. In
both cases the end-to-end delay was higher when AH plus ESP was used to provide the IP security. Similarly,
AH when used alone bring on lower delay compared to when ESP is used alone.
However, the result displayed in Figure (4) compares the difference in the average end-to-end delay between
IPv4 and IPv6 when AH header was added to the packet. The result indicated that IPv6 with AH caused higher
end-to-end delay than IPv4. Figure (5) and Figure (6) show the difference in the situation when ESP and when
AH plus ESP were used respectively. In both cases IPv6 end-to-end delay was higher than the end-to-end delay
incurred with IPv4. This of course, could be attributed to the space and processing overhead cost as a result of
authentication and encryption of packet during transmission was higher in IPv6 than in IPv4 in all cases, even
though, IPSec header added the same number of bytes on both IPv4 and IPv6. The reason in this case was that
the packet is very large that it has to be fragmented, as such IPv6 experienced higher overhead than IPv4. This
happened due to the fact that the manner at which IPv6 handles fragmented packet when IPSec is involved was
completely different with the way IPv4 tackles it. IPv6 applied IPSec header to all fragmented portion of the
packet while IPv4 applied it to the very initial fragment only.
6. A Comparative Analysis of Additional Overhead Imposed…
www.ijceronline.com Open Access Journal Page 18
Figure (4) Test Case 3 Result (IPv4 vs. IPv6 with AH only)
0.0
100.0
200.0
300.0
400.0
1byte
10byte
100byte
1024byte
10240byte
102400byte
1048576
byte
10485760
byte
104857600
byte
Averageend-to-enddelay
inseconds Internet Protocol version 4 vs 6 with IPSect AH
IPv4 Plain Packet with no IPSec IPv4 With AH
IPv6 Plain Packet with no IPSec IPv6 With AH
7. A Comparative Analysis of Additional Overhead Imposed…
www.ijceronline.com Open Access Journal Page 19
V. Conclusion
This paper as initially stated and set as its objective to reports on the impact of processing and space
overhead introduced by internet protocol security (IPSec) on both internet protocol version 4 and 6, (IPv4 and
IPv6) in relation to packet end-to-end delay based on different IPSec transformations under different
authentication and encryption algorithms deployed in different scenarios simulated using NS2, had
demonstrated how the said IPSec headers under different protocol configurations setup introduced the additional
processing and space overhead with respect to different file size on the two different Internet protocols I.e.
version 4 and 6; (IPv4 and IPv6). The idea is to investigate the impact of IPSec overheads on Ipv6 network
compared to Ipv4 network, to evaluate the processing and space overheads imposed by different cryptographic
algorithms on IPv4 and IPv6 networks currently supported by IPSec.
The study indicated that the cost of IPSec added overhead was smaller when smaller packet sizes were
involved for both protocols compare to larger packet sizes that are IPSec protected with the same configuration
as the smaller packet. The only exception wasin the cases whereby the packet is very large that it has to be
fragmented. In such case IPv6 experienced higher overhead than IPv4. This happened due to the fact that the
manner at which IPv6 handles fragmented packet when IPSec is involved was completely different with the way
IPv4 tackles it. IPv6 applied IPSec header to all fragmented portion of the packet while IPv4 applied it to the
very initial fragment only.Therefore,the general objectives of the study was to provide a practical working,
network administration guidance for making a right selection of configurations under a pre-defined and strict
networking condition, IPSec protocols suite had to offer to suit a particular network environment while bearing
in mind the cost/penalty of overheads involvement on performance.
References
[1] A.A. Muhammad, M. Zaka-Ul, T. Usman, S.M. Ahsan, A.N. Muhammad, R. Imran, and A. Muhammad. Overhead Analysis of
Security Implementation Using IPSec. (PP 1-7)(2009)
[2] K.S.Mohd, H. Rosilah, and P. Ahmed P. A Comparative Review of IPv4 and IPv6 for Research Test Bed. 2009 International
Conference on Electrical Engineering and Informatics 5-7 Selangor, Malaysia, Institute of Electrical Electronics Engineers (IEEE
Xplore Digital Library), pp. 1-7, August 2009.
[3] L. Lambros.andK. Peter. Integrating Voice over IP services in IPv4 and IPv6 networks. Proceedings of the International Multi-
Conference on Computing in the Global Information Technology (ICCGI'07) Institute of Electrical Electronics Engineers (IEEE
Xplore Digital Library), pp.1-6, 2007
[4] R. Radhakrishnan.,M. Jamil., S. Mehfuz., and Moinuddin; Security issues in IPv6, Third International Conference on Networking
and Services (ICNS), 2007, pp.110, 19-25, 2007,
[5] E. Gregory. Iterative Block Ciphers’ Effects on Quality of Experience for VoIPUnicast Transmissions under Different Coding
Schemes. A thesis submitted to the University of Bedfordshire in partial fulfillment of the requirements for the degree of Doctor
of Philosophy November 2010.
[6] S. Iftikhar.andP. Atul. Cost Overhead Analysis Associated with IPSec in the Next Generation Satellite Network.IEEEAC paper
#1647, Version 2, Updated December 16, 2007 Institute of Electrical Electronics Engineers (IEEE Xplore Digital Library), pp. 1-
6, 2007.
[7] C.H. George.,J. Nathaniel., I.V. Davis, F. Scott. andF. Midkif. IPSec Overhead in Wireline and Wireless Networks for Web and
Email Applications, IEEE Institute of Electrical Electronics Engineers (IEEE Xplore Digital Library), pp. 1-5, 2003.
[8] S.P.Meenakshi and S.V. Raghavan. Impact of IPSec Overhead on Web Application Servers, Institute of Electrical Electronics
Engineers (IEEE Xplore Digital Library), pp 1-6, 2006.
[9] X. Christos.,L. Nikolaos., M. Lazaros, and S. Ioannis. A generic characteristic of the overheads imposed by IPSec and associated
cryptographic algorithms, ScienceDirect computer networks 50(2006):3225-3241, 2006.