Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
The document describes the headers for IPv4 and IPv6 packets. IPv6 packet headers are simpler than IPv4 headers, with fewer fields but larger source and destination addresses. IPv6 also introduces extension headers to replace IPv4 options and allow additional optional information to be included. The transition from IPv4 to IPv6 will involve dual-stack implementations and tunneling IPv6 packets in IPv4 networks using special address types.
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...IOSR Journals
This document compares the performance of IPv4, IPv6, and tunneling (6to4) networks using computer simulations in OPNET 17.5. The simulation analyzed delay, throughput, and packet loss over 1 hour. The results showed that IPv6 had higher delay than IPv4 due to its larger header, while tunneling had the highest delay. Throughput was highest for IPv6 and lowest for IPv4. Packet loss was lowest for IPv4 and highest for IPv6. In conclusion, the network performance varied between the different addressing schemes and tunneling in terms of delay, throughput, and packet loss.
IPv4 uses datagram switching at the network layer and is connectionless. It includes fields for identification, flags, fragmentation offset, and time to live. IPv6 was developed to address IPv4's inefficient address space, lack of security, and inability to support real-time audio/video. IPv6 features a larger 128-bit address space, better header format, extensions, flow labeling, and more security. A smooth transition involves dual stack, tunneling, or header translation methods.
Comparative study of IPv4 and IPv6 on Windows and Linux. Shourya Puri
This document provides a comparative study of IPv4 and IPv6 performance on Windows and Linux operating systems. It introduces IPv4 and IPv6, compares their key differences, and experimentally measures performance metrics like throughput, delay, jitter and CPU usage for IPv4 and IPv6 on Windows and Linux. The results show that for Windows and Linux, IPv4 generally has higher throughput and lower CPU usage than IPv6. However, IPv6 has advantages like a larger address space and increased security. Linux typically shows the highest CPU usage and TCP throughput for IPv6. The document also reviews several related works comparing IPv4 and IPv6 performance on different operating systems.
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...IOSR Journals
This document provides a summary of a comparative study on the performance of IPv4 and IPv6 protocols under different operating systems. The study analyzed bandwidth utilization, round trip time, and overhead for IPv4 and IPv6 in point-to-point configurations under Windows 2007, Mac OS, and Red Hat Linux. Experiments were conducted between 3 PCs configured for IPv4 and IPv6 communications over an unloaded network with 3 routers and 3 workstations. Key differences between IPv4 and IPv6 such as address length, header fields, and transition mechanisms are also outlined.
1. The Internet Protocol (IP) is responsible for addressing hosts and routing packets across networks to allow communication between devices.
2. There are two main versions of IP - IPv4 uses 32-bit addresses and IPv6 uses 128-bit addresses to allow for more devices as the number connected to the internet grows exponentially.
3. TCP and UDP are protocols that operate at a higher layer than IP and provide different functions - TCP enables reliable transmission of data through sequencing and acknowledgment while UDP provides a basic transmission model without these features.
Network optimization of ipv6 networks using tunnel header compressioneSAT Journals
Abstract
IPv6 is the successor internet protocol which will eventually replace IPv4. These two protocols are not compatible with each other and it will take time to migrate towards IPv6, until then both the protocols need to coexist for a long time. The main overhead involved with both the protocols is header length of 20 bytes in case of IPv4 and of 40 bytes in case of IPv6. This overhead will affect the network performance specially over tunneling mechanism where one header is encapsulated inside another. Tunneling is widely deployed over the network for various purposes like network security, mobility and transition mechanism. Header compression can be applied to compress the excess protocol headers to improve the performance of network. In this paper we want to use header compression in context of 6 to 4 tunneling transition. Using header compression over 6 to 4 tunnels would result in better response times reduced packet size and reduced packet losses. We want to simulate this algorithm using EXata Cyber 1.1 simulator.
Keywords: Header Compression, IPv4, IPv6, ROHC, 6 to 4 tunneling.
The document describes the headers for IPv4 and IPv6 packets. IPv6 packet headers are simpler than IPv4 headers, with fewer fields but larger source and destination addresses. IPv6 also introduces extension headers to replace IPv4 options and allow additional optional information to be included. The transition from IPv4 to IPv6 will involve dual-stack implementations and tunneling IPv6 packets in IPv4 networks using special address types.
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...IOSR Journals
This document compares the performance of IPv4, IPv6, and tunneling (6to4) networks using computer simulations in OPNET 17.5. The simulation analyzed delay, throughput, and packet loss over 1 hour. The results showed that IPv6 had higher delay than IPv4 due to its larger header, while tunneling had the highest delay. Throughput was highest for IPv6 and lowest for IPv4. Packet loss was lowest for IPv4 and highest for IPv6. In conclusion, the network performance varied between the different addressing schemes and tunneling in terms of delay, throughput, and packet loss.
IPv4 uses datagram switching at the network layer and is connectionless. It includes fields for identification, flags, fragmentation offset, and time to live. IPv6 was developed to address IPv4's inefficient address space, lack of security, and inability to support real-time audio/video. IPv6 features a larger 128-bit address space, better header format, extensions, flow labeling, and more security. A smooth transition involves dual stack, tunneling, or header translation methods.
Comparative study of IPv4 and IPv6 on Windows and Linux. Shourya Puri
This document provides a comparative study of IPv4 and IPv6 performance on Windows and Linux operating systems. It introduces IPv4 and IPv6, compares their key differences, and experimentally measures performance metrics like throughput, delay, jitter and CPU usage for IPv4 and IPv6 on Windows and Linux. The results show that for Windows and Linux, IPv4 generally has higher throughput and lower CPU usage than IPv6. However, IPv6 has advantages like a larger address space and increased security. Linux typically shows the highest CPU usage and TCP throughput for IPv6. The document also reviews several related works comparing IPv4 and IPv6 performance on different operating systems.
Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS pl...IOSR Journals
This document provides a summary of a comparative study on the performance of IPv4 and IPv6 protocols under different operating systems. The study analyzed bandwidth utilization, round trip time, and overhead for IPv4 and IPv6 in point-to-point configurations under Windows 2007, Mac OS, and Red Hat Linux. Experiments were conducted between 3 PCs configured for IPv4 and IPv6 communications over an unloaded network with 3 routers and 3 workstations. Key differences between IPv4 and IPv6 such as address length, header fields, and transition mechanisms are also outlined.
1. The Internet Protocol (IP) is responsible for addressing hosts and routing packets across networks to allow communication between devices.
2. There are two main versions of IP - IPv4 uses 32-bit addresses and IPv6 uses 128-bit addresses to allow for more devices as the number connected to the internet grows exponentially.
3. TCP and UDP are protocols that operate at a higher layer than IP and provide different functions - TCP enables reliable transmission of data through sequencing and acknowledgment while UDP provides a basic transmission model without these features.
Network optimization of ipv6 networks using tunnel header compressioneSAT Journals
Abstract
IPv6 is the successor internet protocol which will eventually replace IPv4. These two protocols are not compatible with each other and it will take time to migrate towards IPv6, until then both the protocols need to coexist for a long time. The main overhead involved with both the protocols is header length of 20 bytes in case of IPv4 and of 40 bytes in case of IPv6. This overhead will affect the network performance specially over tunneling mechanism where one header is encapsulated inside another. Tunneling is widely deployed over the network for various purposes like network security, mobility and transition mechanism. Header compression can be applied to compress the excess protocol headers to improve the performance of network. In this paper we want to use header compression in context of 6 to 4 tunneling transition. Using header compression over 6 to 4 tunnels would result in better response times reduced packet size and reduced packet losses. We want to simulate this algorithm using EXata Cyber 1.1 simulator.
Keywords: Header Compression, IPv4, IPv6, ROHC, 6 to 4 tunneling.
IPv4 addresses are running out, so IPv6 was created with a vastly larger 128-bit address space. During the transition, IPv4 and IPv6 will coexist via three main methods: dual-stack, tunneling, and translation. For internet service providers, dual-stack is the best approach as it allows gradual migration while both protocols are supported. The presentation provides details on IPv4 and IPv6 addressing schemes, transition mechanisms, and configuration examples for tunneling dual-stack implementations at an ISP.
IPv4 packets contain an IP header and payload. The IP header includes fields that identify the packet like the version and protocol, provide routing information like the source and destination addresses, and ensure reliability like the checksum. It also contains fields for fragmentation, packet lifetime (TTL), and optional features. The payload is the actual data being delivered from the upper layer to the destination.
The document outlines key concepts related to IPv4 and IPv6 including:
- IPv4 uses 32-bit addresses and IPv6 uses 128-bit addresses. IPv6 simplifies the header format and introduces extension headers.
- It describes IP address classes in IPv4 and differences between IPv4 and IPv6 addressing schemes, header formats, and features like built-in security.
- Transitioning from IPv4 to IPv6 poses challenges around increased management complexity, interoperability problems, and security concerns due to shared communication resources between the protocols.
The document discusses IPv6, the next generation Internet Protocol. It introduces IPv6 and describes some key differences from IPv4, including a much larger 128-bit address space compared to 32-bits in IPv4. It also describes some advantages IPv6 has over IPv4 such as built-in support for multicasting and stateless address autoconfiguration. The document outlines various mechanisms for transitioning from IPv4 to IPv6, including dual stack implementations, tunneling protocols, and translation technologies.
Abstract— Internet of things (IoT) is a new networks paradigm,
that billions of internet things can be connected at anytime and
anyplace, and it’s expected to include billions of smart devices,
these devices characterized by small memory, low transfer rate
and low energy, internet protocol version 6 (IPv6) it was
introduced to offer huge address space, however it doesn’t
compatible with capabilities of the constrained device, therefore
IPv6 over low power Wireless Personal Area network
(6LoWPAN) adaptation layer was introduced to carry IPv6
datagram over constrained links, in this paper, we first provide
intensive analysis of 6LoWPAN specifications that includes IPv6
encapsulation, frame format, 6LoWPAN header compression,
fragmentation of the payload datagram and encoding of user
datagram protocol UDP, in addition to the implementation of the
6LoWPAN in the NS-3 using different payload size, then we
evaluate the following metrics throughput, packets loss, delay
and jitter, the results showed that the fragmentation effects the
network throughput and increase the delay and the number of
lost packets, moreover, when payload fit within a single frame the
network show better performance , there are no packets lost as
well as minimum values of the delay and the jitter, and in the
two cases 6LoWPAN shows reasonable packets delivery ratio.
Abstract
The rapid growth in the Internet of Things (IoTs)
has change our life to be more intelligent and smart,
the development in the Wireless Sensors Networks
(WSNs), besides the wide use of the embedded devices
in different area like industry, home automation,
transport, agriculture and health care, which was led
the Routing Over Low-power and Lossy-network
(ROLL) working group to introduce the IPv6 Routing
Protocol for Low-Power and Lossy Networks (RPL),
therein the RPL nodes have organized topology as a
Directed Acyclic Graph (DAG) and terminated at one
root to form the Destination Oriented DAGs
(DODAGs). In this paper by using InstantContiki3.0
and CoojaGUI we analyze the DODAG formations,
the RPL control messages that are send downward
and upward routes to construct and maintain
DODAG and the Rank computation by Objective
Function (OF) for inconsistency and loop detection,
also we evaluate the performance of the RPL based
on the Expected Transmission Count (ETX) OF that
enable RPL to select and optimize routes within RPL
instance, as well as we evaluate the following metrics:
The ETX Reliability Object (ETX), Radio Duty Cycle
(RDC), energy consumption, the received packets by
the motes and neighbor count. The simulation results
show that the RPL control messages flow in consistent
manner, the DODAG root able to connect to all of the
neighbor motes, also Rank illustration shows no loops
and DODAG topology consistent, as well as the ETX
can essentially take control over DODAG formations
and it has an effects in the RDC ratio, furthermore
most of the motes show reasonable low power
consumption, also the motes show acceptable number
of the received packets.
Abstract - The Transmission Control Protocol (TCP) is
connection oriented, reliable and end-to-end protocol that support
flow and congestion control, with the evolution and rapid growth
of the internet and emergence of internet of things IoT, flow and
congestion have clear impact in the network performance. In this
paper we study congestion control mechanisms Tahoe, Reno,
Newreno, SACK and Vegas, which are introduced to control
network utilization and increase throughput, in the performance
evaluation we evaluate the performance metrics such as
throughput, packets loss, delivery and reveals impact of the cwnd.
Showing that SACK had done better performance in terms of
numbers of packets sent, throughput and delivery ratio than
Newreno, Vegas shows the best performance of all of them.
The Internet Protocol version 4 (IPv4) is the delivery mechanism used by the TCP/IP protocols. IPv4 is an unreliable and connectionless datagram protocol & a best-effort delivery service means that IPv4 provides no error control or flow control (except for error detection on the header). IPv4 assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees.ThesisScientist.com
IPv4 uses a datagram format with a header and data. The header contains information for routing and delivery and is 20-60 bytes. It includes fields for the version, length, identification, fragmentation, protocol, and source/destination addresses. Datagrams can be fragmented into smaller pieces if their size exceeds the MTU of a network. Fragments are reassembled at the destination using the identification field. The time to live field limits the number of hops a packet can make to prevent endless routing.
IPv6 addresses are 128-bit identifiers for interfaces compared to 32-bit in IPv4. The presentation discusses the various address formats and types in IPv6 including unicast, anycast, and multicast. It also covers the changes in IPv6 packet header format versus IPv4 as well as new features like flow labeling and extension headers. Key advantages of IPv6 are larger address space, simplified header format, improved support for extensions, and better mobility and security features.
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...IJERA Editor
In this paper, we have analyzed the performance characteristics of OFDM data transmission with regard to a new high speed RS decoding algorithm. The various characteristics identified are mainly speed and accuracy of the transmission irrespective of channel behaviour. We consider two cases viz. data transmission without error control and data transmission with error control. Each of these cases are duly analyzed and it is proven that high speed RS decoding algorithms can actually benefit OFDM data transmission for advanced communication systems only if implemented at the hardware (VLSI) level because of significant processing overhead involved in software based implementation even though the algorithm may have lower computational complexity.
This paper targets at a comparative study on the through-puts in bits/ seconds, packet through-puts, delay in networks, response time in seconds of both IPv4 and IPv6. Hence, since the system proposes for co-existence of both IPv4 and IPv6, the solution projected in this paper is “DUAL STACK where you can and TUNNEL where you have to”.
IPv6 is the next-generation Internet protocol that replaces IPv4. It features a 128-bit address size allowing for many more IP addresses compared to IPv4's 32-bit addresses. IPv6 also includes improvements in routing, network autoconfiguration, security, quality of service, and extensibility. A transition from IPv4 to IPv6 is underway using mechanisms like dual stacking that allow both protocols to coexist on networks. While not yet widely deployed, IPv6 is expected to fully replace IPv4 in the coming years.
IPv4 uses 32-bit addresses and has a limited address space, while IPv6 uses 128-bit addresses and has a much larger address space to support more devices. IPv6 integrates network security directly into its design using IPSec and uses extension headers to encode optional information. It also features stateless address autoconfiguration to simplify configuration, and allows communication with IPv4 nodes through mapping and tunneling.
The document discusses IPv4 and IPv6 addressing and protocols. It provides:
1) IPv4 uses 32-bit addresses represented in dotted decimal notation, consisting of a network and node identifier. IPv6 uses 128-bit addresses to allow for more networks and devices.
2) IPv4 is a connectionless protocol that does not guarantee delivery, while IPv6 includes improvements like larger addresses, better header format, new options, and more security.
3) Transition technologies like dual stack, NAT-PT, 6to4, and 4to6 allow migration from IPv4 to IPv6 networks.
IPv4 was first developed in 1978 and has been deployed globally but will soon run out of addresses as it only provides 4 billion addresses. IPv6 was developed in 1993 to replace IPv4 and provides an immense 340 undecillion addresses to accommodate continued growth of the internet. IPv6 improves on IPv4 with a larger 128-bit address size, built-in security features, and auto-configuration to simplify network management. While IPv6 has been available since 1999, many networks and devices still rely on IPv4, but further IPv6 adoption will be necessary to sustain long term growth of internet connectivity.
This document discusses the network layer in the internet. It covers the internet protocol (IP) which provides connectionless best-effort delivery of packets called internet datagrams. The transmission control protocol (TCP) provides reliable stream service using acknowledgments, while the user datagram protocol (UDP) provides connectionless datagram service. The document then describes the IP version 4 protocol, including the header fields, fragmentation, addressing, and subnetting techniques.
Internet Protocol (IP) is used to carry data from source to destination hosts across the Internet by providing addressing, fragmentation and reassembly, packet timeouts, and prioritization of traffic. IP uses 32-bit addresses to identify sending and receiving hosts and allows packets to be split into smaller fragments if needed to travel across networks. Routers use the IP Time to Live field to discard packets that have been traveling too long to prevent flooding of networks.
The document describes a new transition methodology called BD-SIIT for translating between IPv4 and IPv6. BD-SIIT uses a bidirectional mapping algorithm between IPv4 and IPv6 headers and addresses. It avoids embedding the IPv4 address directly into the IPv6 address. Instead, it uses a new address mapping approach based on identifying corresponding public IPv4 and IPv6 addresses.
In recent years, cooperative communication is a hot topic of research and it is a powerful physical layer
technique to combat fading in wireless relaying scenario. Concerning with the physical layer issues, in this
paper it is focussed on with providing a better space time block coding (STBC) scheme and incorporating it
in the cooperative relaying nodes to upgrade the system performance. Recently, the golden codes have
proven to exhibit a superior performance in a wireless MIMO (Multiple Input Multiple Output) scenario
than any other code. However, a serious limitation associated with it is its increased decoding complexity.
This paper attempts to resolve this challenge through suitable modification of golden code such that a less
complex sphere decoder could be used without much compromising the error rates. The decoder complexity
is analyzed through simulation and it proves to exhibit less complexity compared to the conventional
(Maximum likelihood) ML decoder. The single relay cooperative STBC consisting of source, relay and
destination are considered. The cooperative protocol strategy considered in the relay node is Decode and
forward (DF) protocol. The proposed modified golden code with less complex sphere decoder is
implemented in the nodes of the cooperative relaying system to achieve better performance in the system.
The simulation results have validated the effectiveness of the proposed scheme by offering better BER
performance, minimum outage probability and increased spectral efficiency compared to the non
cooperative transmission method.
Security analysis of generalized confidentialmodulation for quantum communica...IJCNCJournal
We propose a new evaluation method for‘generalized confidential modulation(GCM)’ for quantum
communication. Confidential modulationrealizes a secret communication by using secret information for
modulationand noise in a channel. Y-00 is one of the famous methods of GCM forquantum communication.
The existing evaluation methods for GCM arebased on stream ciphers. They can estimate its analytical
security andthe evaluation depends on the security status of pseudo random numbergenerator (PRNG)
which controls the modulation. On the other hand,our method is based on mode of operation for block
ciphers and clears theweaknesses from structural viewpoint. Using our method, we can comparethe
security of different GCM structures. Our method of security evaluationand comparison does not depend on
the security status of PRNG.From the results of our evaluation, we conclude that the security of GCMis
limited to computational security.
IPv4 addresses are running out, so IPv6 was created with a vastly larger 128-bit address space. During the transition, IPv4 and IPv6 will coexist via three main methods: dual-stack, tunneling, and translation. For internet service providers, dual-stack is the best approach as it allows gradual migration while both protocols are supported. The presentation provides details on IPv4 and IPv6 addressing schemes, transition mechanisms, and configuration examples for tunneling dual-stack implementations at an ISP.
IPv4 packets contain an IP header and payload. The IP header includes fields that identify the packet like the version and protocol, provide routing information like the source and destination addresses, and ensure reliability like the checksum. It also contains fields for fragmentation, packet lifetime (TTL), and optional features. The payload is the actual data being delivered from the upper layer to the destination.
The document outlines key concepts related to IPv4 and IPv6 including:
- IPv4 uses 32-bit addresses and IPv6 uses 128-bit addresses. IPv6 simplifies the header format and introduces extension headers.
- It describes IP address classes in IPv4 and differences between IPv4 and IPv6 addressing schemes, header formats, and features like built-in security.
- Transitioning from IPv4 to IPv6 poses challenges around increased management complexity, interoperability problems, and security concerns due to shared communication resources between the protocols.
The document discusses IPv6, the next generation Internet Protocol. It introduces IPv6 and describes some key differences from IPv4, including a much larger 128-bit address space compared to 32-bits in IPv4. It also describes some advantages IPv6 has over IPv4 such as built-in support for multicasting and stateless address autoconfiguration. The document outlines various mechanisms for transitioning from IPv4 to IPv6, including dual stack implementations, tunneling protocols, and translation technologies.
Abstract— Internet of things (IoT) is a new networks paradigm,
that billions of internet things can be connected at anytime and
anyplace, and it’s expected to include billions of smart devices,
these devices characterized by small memory, low transfer rate
and low energy, internet protocol version 6 (IPv6) it was
introduced to offer huge address space, however it doesn’t
compatible with capabilities of the constrained device, therefore
IPv6 over low power Wireless Personal Area network
(6LoWPAN) adaptation layer was introduced to carry IPv6
datagram over constrained links, in this paper, we first provide
intensive analysis of 6LoWPAN specifications that includes IPv6
encapsulation, frame format, 6LoWPAN header compression,
fragmentation of the payload datagram and encoding of user
datagram protocol UDP, in addition to the implementation of the
6LoWPAN in the NS-3 using different payload size, then we
evaluate the following metrics throughput, packets loss, delay
and jitter, the results showed that the fragmentation effects the
network throughput and increase the delay and the number of
lost packets, moreover, when payload fit within a single frame the
network show better performance , there are no packets lost as
well as minimum values of the delay and the jitter, and in the
two cases 6LoWPAN shows reasonable packets delivery ratio.
Abstract
The rapid growth in the Internet of Things (IoTs)
has change our life to be more intelligent and smart,
the development in the Wireless Sensors Networks
(WSNs), besides the wide use of the embedded devices
in different area like industry, home automation,
transport, agriculture and health care, which was led
the Routing Over Low-power and Lossy-network
(ROLL) working group to introduce the IPv6 Routing
Protocol for Low-Power and Lossy Networks (RPL),
therein the RPL nodes have organized topology as a
Directed Acyclic Graph (DAG) and terminated at one
root to form the Destination Oriented DAGs
(DODAGs). In this paper by using InstantContiki3.0
and CoojaGUI we analyze the DODAG formations,
the RPL control messages that are send downward
and upward routes to construct and maintain
DODAG and the Rank computation by Objective
Function (OF) for inconsistency and loop detection,
also we evaluate the performance of the RPL based
on the Expected Transmission Count (ETX) OF that
enable RPL to select and optimize routes within RPL
instance, as well as we evaluate the following metrics:
The ETX Reliability Object (ETX), Radio Duty Cycle
(RDC), energy consumption, the received packets by
the motes and neighbor count. The simulation results
show that the RPL control messages flow in consistent
manner, the DODAG root able to connect to all of the
neighbor motes, also Rank illustration shows no loops
and DODAG topology consistent, as well as the ETX
can essentially take control over DODAG formations
and it has an effects in the RDC ratio, furthermore
most of the motes show reasonable low power
consumption, also the motes show acceptable number
of the received packets.
Abstract - The Transmission Control Protocol (TCP) is
connection oriented, reliable and end-to-end protocol that support
flow and congestion control, with the evolution and rapid growth
of the internet and emergence of internet of things IoT, flow and
congestion have clear impact in the network performance. In this
paper we study congestion control mechanisms Tahoe, Reno,
Newreno, SACK and Vegas, which are introduced to control
network utilization and increase throughput, in the performance
evaluation we evaluate the performance metrics such as
throughput, packets loss, delivery and reveals impact of the cwnd.
Showing that SACK had done better performance in terms of
numbers of packets sent, throughput and delivery ratio than
Newreno, Vegas shows the best performance of all of them.
The Internet Protocol version 4 (IPv4) is the delivery mechanism used by the TCP/IP protocols. IPv4 is an unreliable and connectionless datagram protocol & a best-effort delivery service means that IPv4 provides no error control or flow control (except for error detection on the header). IPv4 assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees.ThesisScientist.com
IPv4 uses a datagram format with a header and data. The header contains information for routing and delivery and is 20-60 bytes. It includes fields for the version, length, identification, fragmentation, protocol, and source/destination addresses. Datagrams can be fragmented into smaller pieces if their size exceeds the MTU of a network. Fragments are reassembled at the destination using the identification field. The time to live field limits the number of hops a packet can make to prevent endless routing.
IPv6 addresses are 128-bit identifiers for interfaces compared to 32-bit in IPv4. The presentation discusses the various address formats and types in IPv6 including unicast, anycast, and multicast. It also covers the changes in IPv6 packet header format versus IPv4 as well as new features like flow labeling and extension headers. Key advantages of IPv6 are larger address space, simplified header format, improved support for extensions, and better mobility and security features.
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...IJERA Editor
In this paper, we have analyzed the performance characteristics of OFDM data transmission with regard to a new high speed RS decoding algorithm. The various characteristics identified are mainly speed and accuracy of the transmission irrespective of channel behaviour. We consider two cases viz. data transmission without error control and data transmission with error control. Each of these cases are duly analyzed and it is proven that high speed RS decoding algorithms can actually benefit OFDM data transmission for advanced communication systems only if implemented at the hardware (VLSI) level because of significant processing overhead involved in software based implementation even though the algorithm may have lower computational complexity.
This paper targets at a comparative study on the through-puts in bits/ seconds, packet through-puts, delay in networks, response time in seconds of both IPv4 and IPv6. Hence, since the system proposes for co-existence of both IPv4 and IPv6, the solution projected in this paper is “DUAL STACK where you can and TUNNEL where you have to”.
IPv6 is the next-generation Internet protocol that replaces IPv4. It features a 128-bit address size allowing for many more IP addresses compared to IPv4's 32-bit addresses. IPv6 also includes improvements in routing, network autoconfiguration, security, quality of service, and extensibility. A transition from IPv4 to IPv6 is underway using mechanisms like dual stacking that allow both protocols to coexist on networks. While not yet widely deployed, IPv6 is expected to fully replace IPv4 in the coming years.
IPv4 uses 32-bit addresses and has a limited address space, while IPv6 uses 128-bit addresses and has a much larger address space to support more devices. IPv6 integrates network security directly into its design using IPSec and uses extension headers to encode optional information. It also features stateless address autoconfiguration to simplify configuration, and allows communication with IPv4 nodes through mapping and tunneling.
The document discusses IPv4 and IPv6 addressing and protocols. It provides:
1) IPv4 uses 32-bit addresses represented in dotted decimal notation, consisting of a network and node identifier. IPv6 uses 128-bit addresses to allow for more networks and devices.
2) IPv4 is a connectionless protocol that does not guarantee delivery, while IPv6 includes improvements like larger addresses, better header format, new options, and more security.
3) Transition technologies like dual stack, NAT-PT, 6to4, and 4to6 allow migration from IPv4 to IPv6 networks.
IPv4 was first developed in 1978 and has been deployed globally but will soon run out of addresses as it only provides 4 billion addresses. IPv6 was developed in 1993 to replace IPv4 and provides an immense 340 undecillion addresses to accommodate continued growth of the internet. IPv6 improves on IPv4 with a larger 128-bit address size, built-in security features, and auto-configuration to simplify network management. While IPv6 has been available since 1999, many networks and devices still rely on IPv4, but further IPv6 adoption will be necessary to sustain long term growth of internet connectivity.
This document discusses the network layer in the internet. It covers the internet protocol (IP) which provides connectionless best-effort delivery of packets called internet datagrams. The transmission control protocol (TCP) provides reliable stream service using acknowledgments, while the user datagram protocol (UDP) provides connectionless datagram service. The document then describes the IP version 4 protocol, including the header fields, fragmentation, addressing, and subnetting techniques.
Internet Protocol (IP) is used to carry data from source to destination hosts across the Internet by providing addressing, fragmentation and reassembly, packet timeouts, and prioritization of traffic. IP uses 32-bit addresses to identify sending and receiving hosts and allows packets to be split into smaller fragments if needed to travel across networks. Routers use the IP Time to Live field to discard packets that have been traveling too long to prevent flooding of networks.
The document describes a new transition methodology called BD-SIIT for translating between IPv4 and IPv6. BD-SIIT uses a bidirectional mapping algorithm between IPv4 and IPv6 headers and addresses. It avoids embedding the IPv4 address directly into the IPv6 address. Instead, it uses a new address mapping approach based on identifying corresponding public IPv4 and IPv6 addresses.
In recent years, cooperative communication is a hot topic of research and it is a powerful physical layer
technique to combat fading in wireless relaying scenario. Concerning with the physical layer issues, in this
paper it is focussed on with providing a better space time block coding (STBC) scheme and incorporating it
in the cooperative relaying nodes to upgrade the system performance. Recently, the golden codes have
proven to exhibit a superior performance in a wireless MIMO (Multiple Input Multiple Output) scenario
than any other code. However, a serious limitation associated with it is its increased decoding complexity.
This paper attempts to resolve this challenge through suitable modification of golden code such that a less
complex sphere decoder could be used without much compromising the error rates. The decoder complexity
is analyzed through simulation and it proves to exhibit less complexity compared to the conventional
(Maximum likelihood) ML decoder. The single relay cooperative STBC consisting of source, relay and
destination are considered. The cooperative protocol strategy considered in the relay node is Decode and
forward (DF) protocol. The proposed modified golden code with less complex sphere decoder is
implemented in the nodes of the cooperative relaying system to achieve better performance in the system.
The simulation results have validated the effectiveness of the proposed scheme by offering better BER
performance, minimum outage probability and increased spectral efficiency compared to the non
cooperative transmission method.
Security analysis of generalized confidentialmodulation for quantum communica...IJCNCJournal
We propose a new evaluation method for‘generalized confidential modulation(GCM)’ for quantum
communication. Confidential modulationrealizes a secret communication by using secret information for
modulationand noise in a channel. Y-00 is one of the famous methods of GCM forquantum communication.
The existing evaluation methods for GCM arebased on stream ciphers. They can estimate its analytical
security andthe evaluation depends on the security status of pseudo random numbergenerator (PRNG)
which controls the modulation. On the other hand,our method is based on mode of operation for block
ciphers and clears theweaknesses from structural viewpoint. Using our method, we can comparethe
security of different GCM structures. Our method of security evaluationand comparison does not depend on
the security status of PRNG.From the results of our evaluation, we conclude that the security of GCMis
limited to computational security.
On modeling controller switch interaction in openflow based sdnsIJCNCJournal
With an increase in number of software defined network (SDN) deployments,and OpenFlow consolidating as the protocol of choice for controller-switch interactions, a need to analytically model the system for performance analysis is increasing. An attempt has previously been made in [1] to model the syste considering both a controller and a switch as an M/M/1 queue. The method, although useful, lacks accuracy for higher probabilities of new flows entering the network. The approach is also deficient of
details on how it can be extended to more than one node in the data plane.These two short-comings are addressed in this paper where thecontroller and switch are modeled
collectively as Jackson’s network, with essential tuning to suit OpenFlow-based SDN. The consequent analysis shows the resilience of the model even for higher number of new flow entries. An example is also used
to illustrate the case of multiple nodes in the data plane.
A new method for controlling and maintainingIJCNCJournal
Topology Control is an essential technique in a wireless sensor network to extend the operational time of
the sensor nodes. The goal of this technique is to maintain network connectivity and optimize performance
metrics such as network lifetime and throughput. In this paper we presented a new method for controlling
and maintaining topology in wireless sensor networks that show some improvement over the state of art
methods. The results are analyzed based on objective criteria.
Energy aware clustering protocol (eacp)IJCNCJournal
The document summarizes an Energy Aware Clustering Protocol (EACP) proposed for heterogeneous wireless sensor networks. EACP introduces heterogeneity by using two types of nodes: normal and advanced. Normal nodes elect cluster heads using a probability scheme based on residual and average energy. Advanced nodes use a separate probability scheme and act as gateways for normal cluster heads, transmitting their data to the base station. The performance of EACP is compared to SEP through simulations, showing better results for stability period, network life and energy savings.
Pwm technique to overcome the effect ofIJCNCJournal
Many current communication systems suffer from performance degradation due to the high sensitivity to
high power peaks especially in the nonlinear devices. The author introduces a new concept based on the
Pulse Width Modulation (PWM), namely MIMO-OFDM system based PWM (MO-PWM) to overcome this
deficiency. Here, the peak-to-average power ratio (PAPR) problem in Orthogonal Frequency Division
Multiplexing (OFDM) technique is used as a criterion to check the validity of the proposed work.
Moreover, the proposed system work has been implemented over Field Programmable Gate Array (FPGA),
which is designed to characterize both of the complexity and the speed issues.
The systems performance based MO-PWM and validity have been checked based on a numerical analysis
and a conducted simulation. The simulation results show that the MO-PWM can clearly reduce the PAPR
values nevertheless the used OFDM systems’ specifications, and gives a promising results over some
techniques found in the literature, such as clipping, SLM and PTS under same bandwidth occupancy and
system’s specifications.
On client’s interactive behaviour to design peer selection policies for bitto...IJCNCJournal
Peer-to-peer swarming protocols have been proven to be very efficient for content replication over Internet.
This fact has certainly motivated proposals to adapt these protocols to meet the requirements of on-demand
streaming system. The vast majority of these proposals focus on modifying the piece and peer selection
policies, respectively, of the original protocols. Nonetheless, it is true that more attention has often been
given to the piece selection policy rather than to the peer selection policy. Within this context, this article
proposes a simple algorithm to be used as basis for peer selection policies of BitTorrent-like protocols,
considering interactive scenarios. To this end, we analyze the client’s interactive behaviour when accessing
real multimedia systems. This analysis consists of looking into workloads of real content providers and
assessing three important metrics, namely temporal dispersion, spatial dispersion and object position
popularity. These metrics are then used as the main guidelines for writing the algorithm. To the best of our
knowledge, this is the first time that the client’s interactive behaviour is specially considered to derive an
algorithm for peer selection policies. Finally, the conclusion of this article is drawn with key challenges
and possible future work in this research field.
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIJCNCJournal
In the performance evaluation of a protocol for a vehicular ad hoc network, the protocol should be tested under a realistic conditions including, representative data traffic models, and realistic movements of the mobile nodes which are the vehicles (i.e., a mobility model). This work is a comparative study between two mobility models that are used in the simulations of vehicular networks, i.e., MOVE (MObility model generator for VEhicular networks) and CityMob, a mobility pattern generator for VANET. We describe several mobility models for VANET simulations.
In this paper we aim to show that the mobility models can significantly affect the simulation results in VANET networks. The results presented in this article prove the importance of choosing a suitable real world scenario for performances studies of routing protocols in this kind of network.
A comparative analysis of number portability routing schemesIJCNCJournal
To reap the benefits of liberalized telecom market, the implementation of number portability (NP) is utmost
important. NP allows end user to retain their telephone number in case of change of geographical location
or service type or service provider. This paper describes the various number portability routing schemes
namely, All Call Query, Query on Release, Call Dropback and Onward routing. The comparative analysis
between these routing schemes on various parameters is presented here. The issues pertaining to NP have
also been described.
Due to the proliferation in the number of users that are accessing the internet and due to the increase in
the number of the electronic devices that support mobility like mobiles, laptops and many others that
definitely lead to the need of a protocol that supports a mobility. Mobile Internet Protocol is a
recommended Internet protocol designed to support the mobility of a user (host). This protocol provides a
continuous connectivity for any mobile host . In the traditional Mobile IP all packets forwarded to the
Mobile host from the correspondent node will be forwarded via the Home Agent (HA) and that leads to
the triangle routing problem .
(ISP MBG) technique is used as a route optimization technique for solving the triangle routing problem
in conventional Mobile IPv4. This technique has been implemented on .net platform .The study of this
technique was discussed before using 2 similar Internet Service Providers and the simulation results
provided a better performance compared with the Conventional Mobile IP Technique. In this paper the
simulator will be used to study the performance of the (ISP MBG) technique using two different Internet
Service Providers ( ISPs) structures separated by a single Mobile Border Gateway ( MBG).Simulation
results shows also a better performance compared with the conventional Mobile IP technique .
Real time audio translation module between iax and rswIJCNCJournal
At the last few years, multimedia communication has
been developed and improved rapidly in order to
enable users to communicate between each other over
the internet. Generally, multimedia communication
consists of audio and video communication. However,
this research concentrates on audio conferencing
only. The audio translation between protocols is a
very critical issue, because it solves the communic
ation
problems between any two protocols. So, it enables
people around the world to talk with each other eve
n
they use different protocols. In this research, a r
eal time audio translation module between two proto
cols
has been done. These two protocols are: InterAsteri
sk eXchange Protocol (IAX) and Real-Time Switching
Control Protocol (RSW), which they are widely used
to provide two ways audio transfer feature. The
solution here is to provide interworking between th
e two protocols which they have different media
transports, audio codec’s, header formats and diffe
rent transport protocols for the audio transmission
. This
translation will help bridging the gap between the
two protocols by providing interworking capability
between the two audio streams of IAX and RSW. Some
related works have been done to provide translation
between IAX and RSW control signalling messages. Bu
t, this research paper concentrates on the
translation that depends on the media transfer. The
proposed translation module was tested and evaluat
ed
in different scenarios in order to examine its perf
ormance. The obtained results showed that the Real-
Time
Audio Translation Module produces lower rates of pa
cket delay and jitter than the acceptance values fo
r
each of the mentioned performance metrics.
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...IJCNCJournal
This document evaluates the effect of noise power jamming on Bluetooth personal area networks (PANs). It finds that barrage noise jamming across the full 79MHz Bluetooth band is ineffective from 10 meters away. Narrower 20MHz and 5MHz sweep jamming can reduce the processing gain over time by causing channels to be blocked by the adaptive frequency hopping (AFH) mechanism. Jamming power levels of 2-5 watts were still insufficient to overcome path loss and processing gain at distances over 1 meter. Future work could evaluate follower jamming techniques targeting the frequency hopping scheme.
Design, implementation and evaluation of icmp based available network bandwid...IJCNCJournal
We propose a method to measure available network ba
ndwidth using the Internet Control Message
Protocol (ICMP). The recently proposed ImTCP techni
que uses Transmission Control Protocol (TCP) data
packets and the corresponding acknowledgement respo
nses to measure the available bandwidth between
sender and receiver. Since ImTCP needs to change th
e sender’s TCP implementation, it needs
modifications to sender’s operating system kernel.
Moreover, ImTCP cannot measure available bandwidth
accurately if the receiver sends delayed acknowledg
ments. These problems stem from the use of TCP. In
this paper, we discuss an ICMP-based method that ov
ercomes these limitations. We evaluate the
performance of the proposed method in an experiment
al network and show that it generates less
measurement traffic and requires less time for band
width measurement than PathLoad. We also show that
proposed method can measure the available bandwidth
even if the bandwidth changes during
measurement
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by
the click of a mouse. The impact of identity theft severely limits victims’ ability to participate in commerce,
education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks,
which includes but not limited to identity theft, corporate espionage and cyber warfare taking advantage of
the Internet as a medium of operations. The paper highlights the increase of cyber related attacks in the
past ten years due to lack of transatlantic international corporation between participating countries,
coherent information security policies, data aggregation and sound international laws to facilitate
prosecution of perpetrators. The cyber space coupled with availability of free hacking tools has contributed
to resurgence in syndicated identity theft, corporate espionage and identity theft by organized crime
elements taking advantage of the Internet as a medium of operations. This paper presents conclusive
solution that users, organizations and consumers can enact to protect themselves from the threat of cyber
attacks culminating into identity theft, financial loss or both.
A bandwidth allocation model provisioning framework with autonomic characteri...IJCNCJournal
The Bandwidth Allocation Models (MAM, RDM, G-RDM and AllocTC-Sharing) are management
alternatives currently available which propose different resource (bandwidth) allocation strategies in
multiservice networks. The BAM adoption by a network is typically a management choice and
configuration task executed by the network operations and management system setup in a static or nearly
static way. This paper proposes and explores the alternative of allowing BAM definition and configuration
on a more dynamic way. In effect, one of the basic motivations towards BAM dynamic allocation is the fact
that multiservice networks characteristics (traffic load) may change considerably in daily network
operation and, as such, some dynamics in BAM allocation should be introduced in order to improve
performance. A framework is presented supporting BAM dynamic allocation. The framework adopts an
OpenFlow-based software-defined networking (SDN) implementation approach in order to support
scalability issues with a centralized controller and management network view. The framework architecture
also supports the implementation of some autonomic characteristics which, in brief, look for improving and
facilitating the decision-making process involved with BAM provisioning in a multiservice network. A
proof of concept is presented evaluating different BAM performance under different traffic loads in order to
demonstrate the framework strategy adopted.
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
Link aware nice application level multicast protocolIJCNCJournal
Multicast is one of the most efficient ways to dist
ribute data to multiple users. There are different
types of
Multicast such as IP Multicast, Overlay Multicast,
and Application Layer Multicast (ALM). In this pape
r,
we present a link-aware Application Layer (ALM) Mul
ticast algorithm. Our proposed algorithm, Link
Aware-NICE (LA-NICE) [1], is an enhanced version of
the NICE protocol [2]. LA-NICE protocol uses the
variations of bandwidth or capacity in communicatio
n links to improve multicast message delivery and
minimize end-to-end delay. OMNeT++ simulation frame
work [3] was used to evaluate LA-NICE. The
evaluation is done through a comparison between LA-
NICE and NICE. The simulation results showed that
LA-NICE produces an increased percentage of success
ful message delivery ranging from 2% to 10%
compared to NICE. Also, LA-NICE has less average de
lay and less average message hop count than NICE
which reduces the overall latency of message delive
ry
Cloud computing challenges and solutionsIJCNCJournal
Cloud computing is an emerging area of computer technology that benefits form the processing power and
the computing resources of many connected, geographically distanced computers connected via Internet.
Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet
users requirements and applications. It can be thought of or considered as a complete or a partial
outsourcing of hardware and software resources. To access cloud applications, a good Internet connection
and a standard Internet browser are required. Cloud computing has its own drawback from the security
point of view; this paper aims to address most of these threats and their possible solutions.
Correlation based feature selection (cfs) technique to predict student perfro...IJCNCJournal
Education data mining is an emerging stream which h
elps in mining academic data for solving various
types of problems. One of the problems is the selec
tion of a proper academic track. The admission of a
student in engineering college depends on many fact
ors. In this paper we have tried to implement a
classification technique to assist students in pred
icting their success in admission in an engineering
stream.We have analyzed the data set containing inf
ormation about student’s academic as well as socio-
demographic variables, with attributes such as fami
ly pressure, interest, gender, XII marks and CET ra
nk
in entrance examinations and historical data of pre
vious batch of students. Feature selection is a pro
cess
for removing irrelevant and redundant features whic
h will help improve the predictive accuracy of
classifiers. In this paper first we have used featu
re selection attribute algorithms Chi-square.InfoGa
in, and
GainRatio to predict the relevant features. Then we
have applied fast correlation base filter on given
features. Later classification is done using NBTree
, MultilayerPerceptron, NaiveBayes and Instance bas
ed
–K- nearest neighbor. Results showed reduction in c
omputational cost and time and increase in predicti
ve
accuracy for the student model
This document compares the performance of IPv4, IPv6, and tunneling (6to4) networks using computer simulations in OPNET 17.5. The simulation analyzed delay, throughput, and packet loss over 1 hour. The results showed that IPv6 had higher delay than IPv4 due to its larger header, while tunneling had the highest delay. Throughput was highest for IPv6 and lowest for IPv4. Packet loss was lowest for IPv4 and highest for IPv6. In conclusion, the network performance varied between the different addressing schemes and tunneling technique.
A Survey On Next Generation Internet Protocol IPv6Carrie Romero
This document discusses IPv6 and the need to transition from IPv4 to IPv6. It provides an overview of IPv6, including that IPv6 was developed to address the limited address space of IPv4 and improve security. It also discusses some of the key challenges in transitioning to IPv6, such as the need for IPv6 and IPv4 to coexist during transition. The document summarizes various transition techniques between IPv6 and IPv4, including dual stack, tunneling, and translation methods.
This document provides an overview of Internet Protocol version 6 (IPv6). It discusses some of the key features and advantages of IPv6, including its larger 128-bit address space that supports up to 3.4×1038 addresses compared to the 4.3 billion addresses supported by IPv4. The document also compares IPv6 to IPv4, noting they are not interoperable but that most transport and application protocols can operate over both with little change. Transition mechanisms have been developed to allow communication between IPv4 and IPv6 networks.
The document discusses the network layer of the OSI model and the Internet Protocol (IP). It focuses on IP version 4 (IPv4), including the IPv4 packet structure, addressing modes of IPv4, and address resolution protocols. The network layer is responsible for identification of hosts based on logical addresses and routing data between hosts over underlying networks. IPv4 currently dominates but is being replaced by IPv6 due to address exhaustion issues in IPv4.
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
This paper is focused on the Translator strategy for migration of IPv4 to Ipv6 implemented in Cisco packet
tracer. It describes the design and configuration of network devices and packet transfer between devices of IPv4
and IPv6 networks using NAT-PT as transition mechanism. First major version of IP, IPv4 is the dominant
protocol of internet.IPv6 is developed to deal with long anticipated problem of IPv4 running out of addresses.
The migration from IPv4 to IPv6 must be implemented node by node by using auto-configuration procedures to
eliminate the need to configure IPv6 hosts manually.
Review of IPv4 and IPv6 and various implementation methods of IPv6IRJET Journal
This document compares IPv4 and IPv6 and reviews various implementation methods of IPv6. It finds that while IPv6 provides many advantages over IPv4 like a vastly larger address space and improved security features, full deployment of IPv6 requires complete network participation which has hindered adoption. Various transition techniques allow IPv6 networks to communicate over existing IPv4 infrastructure to facilitate gradual deployment, including tunneling which encapsulates IPv6 packets in IPv4 packets to traverse IPv4 networks. Dual stack backbones that support both protocols and protocol translation mechanisms also help transition. Global IPv6 deployment continues to progress with over 30% user support currently.
This document provides a report on a vocational training in IPV6 that was completed by Rashmi Kumari. It includes an introduction to IPV6 that compares it to IPV4 and highlights its larger address space, built-in multicasting, and network layer security. It also details IPV6's simplified packet format and routing. The report then discusses addressing, OSPF, implementing OSPF for IPV6, and building a simulated network with dual stack transition in GNS3 to test IPV6 functionality.
This document discusses the transition from IPv4 to IPv6. It begins by providing an overview of IPv4 and its limitations, such as address exhaustion from limited 32-bit addressing. It then describes IPv6, which uses a 128-bit address scheme to provide vastly more addresses and enhancements over IPv4. The document focuses on explaining the need to transition to IPv6 due to IPv4's shortcomings. It notes several mechanisms for the transition, including dual stack, tunneling, and translation approaches. The goal is to present information on facilitating the change from IPv4 to the improved IPv6 protocol.
IPv6 is the latest version of the Internet Protocol that provides identification and location for computers on networks. It was developed to address the problem of IPv4 address exhaustion, as IPv4 addresses were running out. IPv6 is intended to eventually replace IPv4 and provides a vastly larger 128-bit address space compared to IPv4's 32-bit addresses. Key features of IPv6 include new header format, large address space, built-in security, prioritized traffic delivery, autoconfiguration, and mobility support.
Performance Evaluation and Comparisons for IPv4&IPv6 using mpls Technologiesiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document compares the performance of IPv4 and IPv6 over MPLS networks. It summarizes the results of simulations run using OPNET 14.5 that evaluated packet delay, packet loss, and throughput for IPv4 and IPv6 over MPLS. The simulations found that IPv6 over MPLS exhibited higher packet loss, higher throughput, and higher delay compared to IPv4 over MPLS which had lower throughput and delay with less dropped packets. Therefore, IPv6 may be suitable for applications requiring high bandwidth but not for real-time applications due to its higher delays and packet loss.
Migration of corperate networks from ipv4 to ipv6 using dual stackpraveenReddy268
Migration of corperate networks from ipv4 to ipv6 using dual stack
in this you will be learning about internet protocols of version4 & 6.And also about OSI layers and their architecture and coding to the routers
This document discusses the transition from IPv4 to IPv6. It provides background on why IPv6 was developed, noting that IPv4 addresses were being depleted and IPv6 expands the address space from 32 to 128 bits. It summarizes three main transition strategies: dual stack, tunneling, and translation. The document warns that tunneling IPv6 packets inside IPv4 packets could allow hidden IPv6 traffic and security issues if deep packet inspection is not used. Overall it emphasizes that a gradual transition combining techniques will be needed to migrate from the current IPv4 internet to an IPv6 internet.
New Network ProtocolRunning Head New Network Protocol Pap.docxcurwenmichaela
New Network Protocol
Running Head: New Network Protocol Paper
Data Communication and Networking
New Network Protocol Paper
Table Of Contents
Abstract ............................................................................................................................. 3
Introduction ......................................................................................................................... 3
History ................................................................................................................................. 4
Need for IPV6 and Disadvantages of IPv4 .......................................................................... 4
Advantages of IPV6 ............................................................................................................. 5
Statistics ................................................................................................................................ 6
Conclusion ............................................................................................................................ 6
References ............................................................................................................................. 8
Abstract
In today's world as technology is growing people are looking to adopt new technologies which offer them a feasible and easy access to the resources with a security that makes them away from common threats. This paper introduces the introduction to the internet protocols and concept of the IPV4 and IPV6, as well what are the disadvantages in the IPV4 and the advantages in IPV6. This paper describes the future concepts of the IPV6 and the future impact of the IPV6 on the network field by describing a brief history of the internet protocols and the statistical representation of the IPV6 users.
Introduction
Transport layer is the basic layer in the OSI and the TCP/IP model. The basic task of this layer is to send or receive the data or voice and video data grams or packets over the internet. IPV 4 is meant for Internet Protocol version 4. The network protocol that has been used in the Internet since its inception is IPv4 , which provides 2^32 distinct addresses. Its successor IPv6(Internet Protocol Version 6) provides 2^128 addresses, but IPv6 adoption has not proceeded as quickly as its designers expected (Erik Kline,2011). The main need for the migration to IPV6 from IPV4 is mainly for the ip addresses . IPv4 provides approximately 4.3 billion of ip addresses but there is a need for more ip addresses. For that reason they introduced IPV6.
History
The current trend of the Internet Protocol IPv4 was initially grown in the 1970s, and the primary convention standard RFC 791 that administers IPv4 usefulness was distributed in 1981. With the remarkable extension of Internet use - particularly by highly populated nations like India and China. The approaching deficiency of loca ...
Internet Protocol version 6 (IPv6) is the latest version of the
Internet Protocol (IP), the communications protocol that
provides an identification and location system for computers
on networks and routes traffic across the Internet.
IPv4 & IPv6 are not designed to be interoperable, complicating
the transition to IPv6. However, several IPv6 transition
mechanisms have been devised to permit communication
between IPv4 and IPv6 hosts.
This document discusses some of the security advantages of IPv6 over IPv4. It begins with an introduction to IPv6 and outlines some of the improvements in the IPv6 header compared to IPv4. It then discusses types of attacks that existed in IPv4, such as reconnaissance, header manipulation, spoofing, and DHCP attacks. It analyzes security issues that exist in IPv6, such as the large address space and how threats can be dealt with. Finally, it discusses IPsec as the mandatory security mechanism in IPv6 and how it provides confidentiality, integrity, and authentication through the use of authentication headers and encrypted security payloads.
A Review Paper On IPv4 And IPv6 A Comprehensive SurveyHannah Baker
This document summarizes a review paper on IPv4 and IPv6. It discusses that IPv4 addresses are running out due to increased internet usage. IPv6 was created as a successor to IPv4 to address this issue by using a 128-bit address space providing vastly more addresses. However, transitioning the entire internet from IPv4 to IPv6 is challenging due to incompatibility between the protocols. The paper reviews literature on IPv4 and IPv6 addressing issues and proposed transition solutions.
IPv6 The Big Move Transition And Coexistentfrenildand
The document discusses the transition from IPv4 to IPv6. It notes that IPv4 addresses are running out due to the rapid growth of the internet. IPv6 was developed as a replacement, using a 128-bit address space to provide vastly more addresses. The document outlines some key advantages of IPv6, such as larger addresses, simpler headers, better security and quality of service support. It also examines how IPv6 and IPv4 will coexist during a long transition period, using various transition technologies.
As robust as the IP protocol is, it does not perform the actual .docxcargillfilberto
As robust as the IP protocol is, it does not perform the actual transmission of the data. In this step, you will investigate the network protocol called
Transmission Control Protocol (TCP)
, responsible for creation, reliability of delivery, and proper assembling of data packets.
In addition to IP, TCP is also widely used on the internet, especially for any network communication where it is essential to confirm receipt of the transmission. Many of the network protocols used to implement cloud computing use both TCP and IP. You will review TCP’s workings and discuss them in your final technical report.
In general, there is no guarantee that a data packet will reach its destination. Packets can get lost or corrupted during transmission, and there are network applications where you need assurance that the packets have reached their destination. To achieve reliability, TCP establishes connections between communicating hosts, using port numbers to refer to applications on these hosts. Then, packets are created, sequenced, transmitted, acknowledged, and retransmitted if missing or containing errors. Finally, at the destination, they are reassembled into the original messages.
To synchronize the flow of packets between sender and receiver, and avoid packet congestion in case of varying speeds, TCP uses
sliding windows
for packets remaining in processing at a given time, at both the sender and receiver ends.
In the next step, you will look into subnetting BallotOnline’s IP addresses.
One of the drawbacks of IPv4 is the maximum number of network devices it can support. IPv4 addressing uses a 32-bit network address. This allows for 232,, or a little over 4 billion devices. However, today there are significantly more devices on the internet. Even though the more robust IPv6 version has been introduced and efforts are under way to assure wide adoption, IPv4 is still widely used.
One method used to more efficiently use the IPv4 network addresses is a technique to optimize the addresses by splitting them into network addresses and host addresses within designated networks. You will need to take advantage of IP address splitting so that you can efficiently use and allocate the IPv4 network addresses that have been assigned to BallotOnline.
For a given large network, rather than addressing all the hosts using the host part of the address,
subnetting
allows for splitting the network into several smaller ones by borrowing the host part bits and adding them to the network bits. It supports efficient management of local networks composed of multiple LANs. In this step, you will investigate subnetting conventions and discuss them in your final report in order to lay ground for the use of subnets by BallotOnline.
As the network engineer for BallotOnline, you know that subnetting a network into several smaller and variable-sized networks will be best for the organization's needs. BallotOnline has been assigned a network address block by the
In.
Similar to ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES (20)
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...IJCNCJournal
Paper Title
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation with Hybrid Beam Forming Power Transfer in WSN-IoT Applications
Authors
Reginald Jude Sixtus J and Tamilarasi Muthu, Puducherry Technological University, India
Abstract
Non-Orthogonal Multiple Access (NOMA) helps to overcome various difficulties in future technology wireless communications. NOMA, when utilized with millimeter wave multiple-input multiple-output (MIMO) systems, channel estimation becomes extremely difficult. For reaping the benefits of the NOMA and mm-Wave combination, effective channel estimation is required. In this paper, we propose an enhanced particle swarm optimization based long short-term memory estimator network (PSOLSTMEstNet), which is a neural network model that can be employed to forecast the bandwidth required in the mm-Wave MIMO network. The prime advantage of the LSTM is that it has the capability of dynamically adapting to the functioning pattern of fluctuating channel state. The LSTM stage with adaptive coding and modulation enhances the BER.PSO algorithm is employed to optimize input weights of LSTM network. The modified algorithm splits the power by channel condition of every single user. Participants will be first sorted into distinct groups depending upon respective channel conditions, using a hybrid beamforming approach. The network characteristics are fine-estimated using PSO-LSTMEstNet after a rough approximation of channels parameters derived from the received data.
Keywords
Signal to Noise Ratio (SNR), Bit Error Rate (BER), mm-Wave, MIMO, NOMA, deep learning, optimization.
Volume URL: https://airccse.org/journal/ijc2022.html
Abstract URL:https://aircconline.com/abstract/ijcnc/v14n5/14522cnc05.html
Pdf URL: https://aircconline.com/ijcnc/V14N5/14522cnc05.pdf
#scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #journalpaper #submission #journalsubmission #WBAN #requirements #tailoredtreatment #MACstrategy #enhancedefficiency #protrcal #computing #analysis #wirelessbodyareanetworks #wirelessnetworks
#adhocnetwork #VANETs #OLSRrouting #routing #MPR #nderesidualenergy #korea #cognitiveradionetworks #radionetworks #rendezvoussequence
Here's where you can reach us : ijcnc@airccse.org or ijcnc@aircconline.com
June 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Abstract: Accurate latency computation is essential for the Internet of Things (IoT) since the connected
devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not
an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while
still allowing communication with the cloud. Many applications rely on fog computing, including traffic
management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to
address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog
computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the
simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses
various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which
are essential for evaluating the performance of the ITCMS. Our system model is also compared with other
models to assess its performance. A comparison is made using two parameters, namely throughput and the
total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend
Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system
outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Call for Papers -International Journal of Computer Networks & Communications ...IJCNCJournal
International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
---- Scopus, ERA Listed, WJCI Indexed ----
Scopus Cite Score 2022--1.8
https://airccse.org/journal/ijcnc.html
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Scope & Topics
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
· Network Protocols & Wireless Networks
· Network Architectures
· High speed networks
· Routing, switching and addressing techniques
· Next Generation Internet
· Next Generation Web Architectures
· Network Operations & management
· Adhoc and sensor networks
· Internet and Web applications
· Ubiquitous networks
· Mobile networks & Wireless LAN
· Wireless Multimedia systems
· Wireless communications
· Heterogeneous wireless networks
· Measurement & Performance Analysis
· Peer to peer and overlay networks
· QoS and Resource Management
· Network Based applications
· Network Security
· Self-Organizing Networks and Networked Systems
· Optical Networking
· Mobile & Broadband Wireless Internet
· Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
· Submission Deadline : June 22, 2024
· Notification : July 22, 2024
· Final Manuscript Due : July 29, 2024
· Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijcnc@airccse.org or ijcnc@aircconline.com
For other details please visit - http://airccse.org/journal/ijcnc.html
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
ANALYSIS OF IPV6 TRANSITION
TECHNOLOGIES
Ali Albkerat and Biju Issac
School of Computing, Teesside University, Middlesbrough, UK
ABSTRACT
Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
KEYWORDS
IPv6, IPv4, 6to4 Tunnel, Manual Tunnel, Dual-Stack, Opnet Modeler, Delay and Throughput
1. INTRODUCTION
The connection between computing nodes requires a protocol, number or a name, in order for
each node to be recognized, and for the source and destination of each packet to be known. The
Internet depends on protocol that is known as Internet Protocol version 4 (IPv4), which uses
Classless Interdomain Routing (CIDR) and 32 bit: this protocol can cover 4.3 billion nodes
around the world. Because the technology is developing, and many different services and devices
use 3G and 4G, IPv4 is approaching its limit: there is not enough IPs available from internet
service providers (ISP) to meet customer demand. Therefore, the new version of IP is critical in
maintaining the pace of the Internet’s development as shown in the picture below. IPv6,
developed by IETF, is considered more efficient than IPv4 in relation to scalability, reliability,
speed and security. Moreover, the size is larger than IPv4, as it uses 128 bit that will be able to
encompass all of the nodes and any services that might require the IP, both now and in the future.
Countries such as China, India and Japan have begun to use the next generation IP
[1].
IPv6 can cover 340 trillion, trillion, trillion nodes whereas IPv4 is only capable of 4.3 billion
nodes. This will contribute to building the necessary infrastructure for future development. IPv6
will not require NAT as IPv4 does, as security will be built in. IPv4 used NAT as security, but its
function is not primarily for security. The flow control provides high priority for specific traffic to
avoid congestion, and the connection with IPv6 will be as end to end. In addition, the IPv6 header
is simpler than IPv4. It contains fewer fields which helps data to be processed faster, which will
in turn be reflected in a higher performance. One of the fields which will not be included with
DOI : 10.5121/ijcnc.2014.6502 19
2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
IPv6 is the CRC, because the packet is already checked at a lower layer, and therefore is not
required to be checked for errors in an upper layer. Consequently the process time will be
decreased. The transition from IPv4 to IPv6 requires a smooth method without any disconnection
or fault within the network. This requires an efficient management and upgrading of the nodes,
devices and operation systems in order to be able to understand the new IP generation.
20
2. UNDERSTANDING IPV4 AND IPV6
The communication evaluation identifies IPv4 as being limited in not only the addresses available
for customers but also in the services that consumers need to access the applications. The new
version (IPv6) is found to have solved these issues of IPv4 by extending the size of the network in
order to accommodate more customers; it is also easier to reconfigure addresses. IPv6 also
provides a higher performance, particularly during real time traffic, which requires quality of
service (QoS), and the overall processing time is reduced. Moreover, the new version is able to
provide what is required for future development of an infrastructure. Security is also an important
consideration, as the internet is used by many different applications to transfer data; security is
implemented with the IPv6. In addition, mobility is supported.
2.1. IPv4
IPv4 is considered the core of internet addressing, as it allows transmission of data using TCP/IP.
In previous years, this protocol proved its stability and reliability in working in the internet
environment in order to provide a connection for millions of nodes. Figure 1 shows the five
classes of IPv4 address.
Figure 1. IPv4 addressing
IPv4 was launched in the 1980s. After a small period of time, this protocol started to be
exhausted; this led to the use of class inter domain routing (CIDR); however, this did not provide
a long-term solution due to the rapidly increased use of the Internet. Some sources expected it to
be exhausted in 2010 or 2012, which was a primary reason to develop a new version that was able
to accommodate more consumers.
IPv4 contains 32 bits. It can cover 4.3 billion addresses. The address is represented as
192.168.2.1. Each colon can be from 0 to 255. In general, IPv4 contains five classes. Each class
provides different limits to the address numbers for networks and hosts; the figure 2 shows the
types of addresses and their range.
3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
21
2.2. IPv6
IPv6 is also known as IP next generation: it is considered evolutionary from IPv4, as it does not
make a radical change to IPv4 and the basic concept remains the same, but some features have
been added, which help to improve performance and provide a good service for customers. In
IPv6, the NAT was eliminated, which is considered an advantage. Moreover, the configuration is
easier with IPv6 as it can be done stateless (auto configuration). The IP address is a combination
of the MAC address for the interface and the prefix from the router; in general the DHCP is not
used, but it can be used with DNS. The IPv6 size is 128 bits, comprised of Hexadecimal digits
which are able to provide 3.8X1038 addresses, which are enough to give a unique address to each
device for today and the future. Each four digits are separated by a colon which provides eight
parts; the zeroes can be omitted to make the address smaller as shown in figure 2 [2].
Figure 2. IPv6 addressing
IPv6 makes the global routing simpler than IPv4. There is less effect on resources and memory,
which helps to improve performance and be more efficient. The security is provided end to end
by encryption, which is integrated within IPV6.
The traffic in IPv4 can be unicast, multicast or broadcast. With IPV6 the broadcast is no longer
available because of its high consumption of resources. However, a broadcast can be sent from
within a multicast.
1. Unicast Addressing: the unicast is to send the packet for a unique address (for one
destination).
2. Multicast Addressing: the multicast addressing is to send the packet for a group of
addresses. The IPv6 use the ff00::/8 as a prefix for multicast. The type of addressing use
two protocols to know which IPs in the same group for multicast there are Multicast
Listening Discovery protocol (MLD) and MLDv2.
3. Anycast Addressing: when there are many similar destinations in different areas the
unicast use to send the packets to the closet destination from the sender [3].
2.3. Header
The IPV6 header is quite different from IPv4. Although IPv6 has abolished some fields it is still
bigger than IPv4; however, it is more efficient than IPv4. The picture below shows the two
headers and the differences between them. For example, the CRC is no longer necessary as the
packet is already checked from a lower layer so there is no reason to check it again, which makes
overheads on processing and loses time. Figures 3 and 4 show the differences header for IPv4 and
IPv6.
4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
22
Figure 3. IPv6 header
Figure 4. IPv4 header
The IPv6 header is bigger than IPv4: IPv6 is 40 bytes while IPv4 is 20 bytes; this is how the IPv6
address is bigger than in IPv4. The version field detects which type of header it is: if it is 6 then
the IP is IPv6, and if it is 4 that mean that it is IPv4. Traffic class determines the priority for
traffic, which varies from 0 to 7: traffic class length is 8 bits and it is used to reduce traffic
congestion as much as possible. The quality of service is provided by the flow label, which is 20
bits; when the traffic reaches the router this field provide a mechanism to process the traffic.
Payload length, which is 16 bits, is used to detect the length of data and is able to transfer up to 64
Kbytes. The extension header will be used when the data exceeds 64 Kbytes, as it is 32 bits: the
extension header therefore is capable of providing 4.3 million bytes. The type of extension header
used is detected by the Next Header field. Hop limit is similar to TTL in IPv4: it is decreased after
each hop until it reaches zero, and then it is discarded. The source and destination are each 16
bytes, which enables them to provide a long address [4].
Overall the IPv6 provides solutions for weakness in IPv4, such as address exhaustion: IPv6
provides addresses with 128 bit, there are no private addresses, and the transmission of data is end
to end. IPv4 depends on manual or dynamic host configuration for addressing, whereas IPv6 uses
auto configuration: the configuration is done automatically without the need to send a query and
wait for a response from the DHCP server. The security with IPv4 is optional, so data transferred
over the Internet could be hacked; IPv6, however, has IPsec in-built so that data is encrypted.
IPv4 is limited in real time traffic despite using type of service (TOS) whereas IPv6 supports real
time traffic by using Traffic Class and Flow Label. The routing table in IPv4 is large in
comparison to IPv6. IPv6 uses the same home IP for excellent mobility, even when outside the
home and it can use neighbour discovery and auto configuration when moving from one link to
another [5].
5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
23
3. TRANSITION STRATEGIES
Transition strategies are methods that provide a means of connection between IPv4 and IPv6, as
these two protocols cannot understand each other. Therefore, in order to transfer data, a special
method is needed. The three strategies are:
• Dual-Stack: This method is used to understand simultaneously IPv4 and IPv6: regardless
of which protocol is used, when the traffic is received the node is able to respond.
• Tunnel: This strategy is employed when there are two networks that are using the same IP
version but are separated by another network that has a different IP. The tunnel method
establishes a virtual link through the networks by providing a connection in the middle of
them.
• Translation: This method is similar to NAT, as it changes the IP packet from IPv4 to IPv6
and vice versa, depending on the source and the destination [6].
3.1. Dual-Stack
The Dual Stack technique uses IPv4 and IPv6 within the same stack in parallel. The choice of
protocol is decided by the administrator policies, along with what kind of service is required and
which type of network is used. This technology does not make any change to the packet header
and at the same time does not make encapsulation between IPv4 and IPv6. This technology is
known as native dual stack or Dual IP layer [7].
Figure 5 Dual-Stack
According to [8], the Internet contains nodes and these nodes are able to support both protocols in
parallel within the same infrastructure. Therefore, the node can provide the transmission of data
for IPv4 and IPv6. This technique is not suitable for large networks like the Internet because it is
difficult and expensive to cover all the nodes in such huge networks. On the other hand, it is
suitable for small networks, which need less management and are easy to control. The dual stack
is considered to be the basis for inventing the two other techniques for transition between IPv4
and IPv6
6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
24
3.2. Tunneling
Tunneling could be either manual or automatic. The connection for the manual is a point to point
mode which is assigned the source and the destination address of the tunnel by the operator while
the automatic connection is a point to multipoint where the source address is assigned by the
operator and the destination address is found automatically. The tunnel idea works as a bridge to
transfer packets between two similar networks over incompatible network [7]. In other words, the
IPv6 will be as a part of IPv4, and the IPv6 data will flow by using IPv4 infrastructure, which will
send it to the destination (IPv6) for processing; the tunnel is a virtual link between the two points
to transfer data [9].
3.2.1. Manual Tunnel
The manual tunnel provides a connection between the IPv6 networks over the IPv4 network as a
static point-to-point tunnel. The IPv4 and IPv6 are manually assigned as the source and
destination. This strategy provides a secure connection between two ends [10].
3.2.2. Automatic Tunnel
There are different types of automatic tunnels as follows.
3.2.2.1. Tunnel Broker
The dual stack is important for a tunnel broker, so that a tunnel for the hosts in the IPv4 network
only can be built. The web server is required to build the tunnel because the user should be
connected to a web server and apply certain authentication details (such as the IP address,
operating system and IPv6 support software) and the replay will be a short script; now the IPv4 to
IPv6 tunnel is ready to use. The tunnel broker is considered to be an automatic configuration
service and it will configure the end point for the network side, the DNS server and the end user
[11]. The tunnel broker contains different parts: the first is the tunnel broker (TB), which sends
instructions between the server and DNS. Additionally, the TB works as a tunnel monitor, and if
the tunnel is down it can use other tunnels which are already in existence in the tunnel group. The
second is the tunnel server (TS), which should have at least three IPv6, an IPv4 unicast, and an
anycast: these are used for routing, accessibility, and endpoint for the user respectively. Third is
the tunnel server group (TSG), which uses the IPv4 anycast to divide the tunnel servers into
tunnel server groups, all of which have the same IPv4 anycast address. This makes tunnel work
more efficient as the user’s request will be sent to the nearest tunnel, and if there is any issue with
the connection another tunnel will take over and generate the connection. The fourth part is the
DNS system (DNS), where each user has a domain name and the mappings are done by the DNS
system. This requires the user to register to access the tunnel, and then the user will obtain an
IPv6 address; at the end, the communication is carried out by a website such as http://gogo6.com/
by using HTTP protocol [12], figure 6 shows the tunnel broker mechanism.
7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
25
Figure 6. Tunnel Broker mechanism [11]
3.2.2.2. 6to4
6to4 is a technique that is able to connect IPv6 domains that are separated by an IPv4 network.
The IPv4 network acts as a link between the IPv6 networks. 6to4 is an automatic tunnel. It uses
the IPv4 infrastructure to transfer the IPv6 packet. Therefore, the IPv4 address is part of the IPv6
address during the transferring of the packets until they reach the other side of the tunnel [11].
The IPv6 networks are connected together using the 6to4 router with the prefix 2002: IPv4
address::/48. The IPv4 address (32 bit) is the 6to4 router address. The IPv6 destination will
extract the encapsulation address. In addition to connecting the IPv6 network with the IPv6
Internet through the IPv4 network, the prefix is the same and the 6to4 router will encapsulate the
IPv4 destination for the 6to4 relay router, as shown in figure 7, there are two IPv6 hosts isolated
by the IPv4 network; the tunneling used by IPv6 to deliver data through IPv4 [9].
Figure 7. 6to4 mechanism [8].
3.2.2.3. 6over4
The 6over4 is an automatic technique for providing an approach to IPv6 nodes that exist within a
pool of IPv4 networks. These IPv6 nodes are not directly connected to each other; so this
technique will create a virtual link to provide a way for the IPv6 nodes to communicate [11]. The
virtual link was created by IPv4 Multicast; it is represented by Ethernet with IPv6 and Multicast
with IPv4. Therefore, the IPv4 infrastructure should be fully supported by IPv4 to provide the
virtual link to all the IPv6 nodes. There are two important protocols to use with this technique,
SLAAC and ND, the latter of which causes a security issue because the ND message might be
attacked [8].
3.2.2.4. ISATAP (Intra-Site Automatic Tunnel Addressing Protocol)
ISATAP is another mechanism for enabling communication between IPv6 and IPv4 using the
tunneling technique. It is used to link the local IPv6 address with the prefix fe80::5efe/96, which
8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
is followed by the IPv4 32 bit. ISATAP can build more than one gateway, which is used as a
tunnel for IPv6 to access ISATAP hosts [8].
ISTAP is an automatic tunnel and it is point to point connection. The addressing is dependent on
embedding strategy; the IPv6 address will be within an IPv4 address. The ISATAP tunnel is able
to provide a connection between IPv6 and IPv4 routers: at the beginning of the connection the
host within ISTAP will get an address called a local ISATAP address and will detect the next hop
of the ISATAP router. The packets will then be sent by the tunnel after embedding the IPv6
address into an IPv4 address. At the destination the IPv4 header will be removed and the packet is
sent to the IPv6 server; there the server sends the packets to the ISATAP network and finally the
ISATAP router prepares the IPv6 packets into IPv4 and sends them to the ISATAP host, which
will then remove the IPv4 header and extract the IPv6 packets [13]. Figure 8 shows the ISATAP
mechanism.
26
Figure 8. ISATAP mechanism (Xiaodong,2009)
3.3 Translation
The translation technology changes the header and the payload of the IP from version 4 to version
6 and vice versa. There are two ways for translation: stateless and stateful. The stateless
translation, there is no reference for the pervious packet during the conversion while the stateful
translation is related with the previous packets [7].
3.3.1 SIIT (Stateless IP/ICMP Translation)
The translation is executed with the header between IPv4 and IPv6. During the translation the
information might be lost and NAT (network address translation) is required; therefore this
technique is not recommended [14].The SIIT technique requires each IPv6 host to have an
assigned IPv4 address. There are two types of addressing: one is known as IPv4-translated
address for the IPv6 host, where the IPv6 address is generated by adding the prefix 0:ffff:0:0:0/96
before the IPv4 address; the second type is known as IPv4-mapped address for the IPv4 host, and
the IPv6 is generated by adding ::ffff:0:0/96 before the IPv4 address. The translation operation is
as follows: the IPv4 packet is translated to IPv6, the source will take the prefix ::ffff:0:0/96 and
the destination will take the prefix 0:ffff:0:0:0/96 and remove it from the original. The DNS is
vital in knowing the addresses; the local DNS server helps the IPv6 host to learn the IPv4 mapped
address in order to get ‘AAAA’ record from ‘A’ record by using DNS64.
Moreover, the IPv4 record is registered within IPv6 hosts to answer the heterogeneous query and
there is no security issue added for the network by the SIIT technique; also the DHCPv6 and the
SLAA can be used to assign the IPv6 addresses for the host. This type is a stateless translation
[8].
3.3.2 NAT-PT (Network Address Translation--Protocol Translation)
The communication between native IPv6 and native IPv4 could be obtained by using NAT-PT.
This mechanism has a pool of global IPv4 and IPv6 prefix with length of 96 bits. The translation
will be created by assigning the IPv6 with the IPv4 address pool through NAT-PT gateway [6].
9. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
27
Figure 9. NAT PT [15].
This mechanism does not require extra Applications or depend on another mechanism, such as
dual stack, but it requires interoperability with the core network for easy and fast management
[11].
The prefix ::/96 will be used to generate a new address. To translate from IPv6 to IPv4, the IPv4
source will be created from the source of IPv6 and the port is found by looking it up in the NAT
binding table; the destination IPv4 is created by removing the prefix. To translate from IPv4 to
IPv6 the prefix will be added to the IPv4 source address to create an IPv6 source, and the
destination address is generated by using the destination IPv4 address and the port looked up in
the NAT binding table. To avoid the problems that are generated by building the binding map, the
heterogeneous addressing will use the DNS ALG on the translator. This will assist in converting
the A to AAAA query in two-way to generate a stateful binding between IPv6 and IPv4
addressing IPv4 by using the pool of addressing [8].
3.3.3 BIS (Bump in the stack) and BIA (Bump in the API)
Both BIA and BIS are stateful translations. These two mechanisms are used to solve a problem
when an application in IPv4 wants to communicate with a remote IPv6 host through an IPv6
network; this strategy depends on tricking the application using IPv4 to assume that the remote
host is IPv4 as well. This technique is built by software and inserted inside the host. The security
is lax enough for a DOS attack on the DNS query: by exhausting the pool of IPv4 addresses, the
binding table will be full [8]
3.3.3.1 Bump in the stack (BIS)
BIS uses the translation as per packet: the translation executes the operation by generating the
source address from the host and the destination from the binding table with an IPv4 destination
address. When the packet reaches the host, the translator translates the packet to IPv4 and the
source address is taken from the binding table with the IPv6 source address and the destination
from the host IPv4 address, as shown in figure 10 [8].
10. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
28
.
Figure 10. BIS [8]
The translation between IPv4 and IPv6 is done by injection BIS in the dual stack for the host and
the IPv4 is detected to the IPv6 [15].
3.3.3.2 Bump in the API (BIA)
BIA is similar to BIS; with BIA the translator translates between IPv4 APIs and IPv6 APIs. The
name resolver and address mapper are the same as in BIS, and the function mapper is responsible
for the translation. The translation will be done without the IP header so that the security will not
break down between end and end.
4. IPV6 DEPLOYMENT
To start using IPv6 over a network the equipment such as router, switches firewalls and servers
should be supported by IPv6, and then the transition may begin. Generally, the migration will take
time; however many countries today began to use IPv6 side by side with IPv4.
In Asia companies have begun to use IPv6 as IPv4 is no longer available. Governments in Japan,
Korea and China prompt their countries to move to IPv6. The migration in Asia is faster than in
Europe; however Europe began extensive research on the benefits of migrating to IPv6 in January
2014. The USA use the new version with the Internet mobility, and the US Department of
Defense (DoD) led other companies that that have a contract with them (such as IMB and Apple)
to also switch to IPv6 [16]. On the other hand, there are over 200 million users in China that
should be supported by IPv6; in 2008 the Olympic event began and this was the catalyst to push
towards a move to IPv6, in order to provide modern networks which are able to cover everything
from CCTV to taxis. Hong Kong Shanghai Banking Corporation’s (HSBC) migrated to IPv6 to
keep pace with development. The Australian government built a migration strategy in 2007 to
move to IPv6 in 2012: it required an upgrade to all software and hardware to IPv6. Europe will
provide the new version to all customers at the end of 2015: many of its economic organizations
and enterprises prepared a report to demonstrate the importance of migration. In North America,
the Obama administration on September 30, 2012 said that all web services, domain name
systems (DNS), email, and other applications should move to IPv6 before the end of September
30, 2014. According to New Zealand’s Chief Information Officer (CIO survey, the cost is still the
primary factor for many organization in avoiding the migration; however, the same survey shows
the IPv6 use is growing from 54% in 2009 to 74% in 2010. Microsoft has begun to provide
applications that depend on IPv6, such as Remote Assistance in Windows 7 and Direct Access in
both Windows 7 and Windows Server 2008 [17].
11. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
29
5. OPNET MODELER
The Optimized Network Engineering Tools (OPNET) Modeler is an efficient way to provide a
complete study for the network analysis. The graphical user interface (GUI) is simple to use and
the result is shown as graphical and static. Furthermore, it does not require a programing
knowledge, and this can be easily used. The Opnet analyses the network as a real life network
which gives a complete view before building the network in a real life and also contains a library
of protocols and models which can be used as examples [18].
There are four simulation technologies supported by Opnet:
Discrete-event Simulation (DES): The DES provides a simulation in the same way as a real
network; it will assist the study by analyzing the performance and behavior of the protocols and
packets.
Hybrid Simulation: Hybrid simulations supported by DES, the results depend on analysis and
the DES to be accurate; by using the two, accurate results can be generated with reasonable
runtimes.
Flow Analysis: Analytical techniques and algorithm are used with flow analysis. It uses detailed
configuration information to recreate the routing table for the device to ensure high efficiency.
Flow analysis is used to study and understand the routing and reachability throughout the
network.
ACE Quickpredict: The bandwidths, packet loss and latency impact time will be studied by
ACE quick predict, which is supported within the OPNET Application Characterization
Environment (ACE) [19]. Figure 11 shows the options for the Opnet simulation
Figure 11. Opnet Simulation technology options
6. SIMULATION EXPERIMENT
This experiment will be conducted using the Opnet Modeler 17.5 for simulation. Opnet was
chosen as it is considered as highly efficient simulation software and will be appropriate in
reaching the goal of the experiment. It also includes most of the network technology such as
routers and switches, as well as other equipment such as the filters, which help to analyses the
traffic. The experiment consists of different stages: firstly, the network model is created;
secondly, the most suitable statistical analysis is detected; thirdly, the simulation is run in order to
obtain results; fourthly, the results are analyzed and compared to each other, and finally a report is
written to discuss the results. .
12. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
The experiment will show the performance of two types of IPv6 transitions (6to4 and manual)
and both of them will be compared with IPv4 and IPv6 traffic. The two transition technologies
will provide the connection for two IPv6 sites that are isolated by an IPv4 network. The design
includes a LAN, which contains 100 users that are connected by four switching devices using 100
base T cable. The Dual-Stack router (the router in the middle of the two networks) has two
interfaces, one connected to the LAN by 100 Base T cable and the other to an IPv4 network by a
PPPDS3 cable. The IPv4 network contains five routers connected with each other by 100 Base T
links. The other side consists of the IPv6 network including a web server; the web server
connection can be used for heavy browsing. This experiment will show how 6to4 and manual
tunnel can be used to provide a connection for an IPv6 isolated by an IPv4. The routing protocol
is RIP for IPv4 and RIPng for IPv6. The OSPFv3 is not compatible with the 6to4 tunnel. In
addition, the experiment network topology is designed to be easy to understand and explains how
the transition works. Moreover, the results will show the network behavior, which can be
analyzed and compared with IPv4 and IPv6.
30
7. METHODS USED
The network is implemented by using different network materials such as switches, routers, LAN
and servers as shown in figure 12. From the object palette one can choose the equipment and
connect them together.
After the network implementation, start to configure the attributes for IPv6, IPv4, Dual-Stack,
Manual and 6to4. The IPv4 and IPv6 they do not require any special configuration; just a normal
configuration by assigning all interfaces IPv4 address for IPv4 network and IPv6 addresses for
IPv6 network. The Dual-Stack as well is just required for each interface to add both IPs version 4
and version 6 together that is for servers and routers. The LAN setting can be configured by right
clicking on the LAN icon and choosing “edit attributes.” Extend “IP” and then “IP Host
Parameters.” IPv4 is assigned by putting its IP address in “Address” and then putting the mask in
“subnet” mask. These steps should be followed again for each LAN.
Figure 12. The network topology in OPNET
IPv6
Network
IPv6
Network
IPv4 Network
13. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
The router setting is edited by clicking on “IP Routing Parameter” and from there “Interface
Information.” There, IP addresses for 12 ports for IPv4 can be assigned, and IPv6 addresses may
also be added by clicking on “IPv6 Parameter”. The numbers of ports depend on the number of
addresses. Change the “not active” to “Default EUI-64” and assign the IPv6 to the network. The
switch does not require any configuration, and it is important to choose the right cable with the
right equipment. All nodes are connected together by 100 base T cables and the edge routers
connect to the IPv4 backbone by PPP_DS3 cable.
There are two important factors that should be configured to establish the traffic when designing
the network. First “Application” is used to decide which application is required for the network,
by choosing it from the “Object Palette” and right clicking to extend the “Application
Definitions.” From the “Number of Rows” choose the number of applications that will apply for
the network; in this experiment it is one (web server). The service types are assigned in
“Application Definitions,” and this information is relayed back to the server. The server can then
decide which services will be applied to the network. The “Description” field gives the choice as
to what type of service and the value; for this experiment the choice is HTTP and the value is
heavy browsing, which includes videos and images. “Profile” is used to detect the properties for
each application: “Application” is binding with the server and “Profile” is binding with the host.
The Opnet Modeler provides many statistics which can be used to measure the network, which
assists in understanding network behavior. The table 1 give examples of these measurements
include:
31
Table 1. Opnet Modeler Parameters
Download Response Time The time required to send and receive a request from the
client to the server.
Upload Response Time: The required time to get an acknowledgement from the
application.
Throughput Represents the successful transmission of packets
between two nodes.
Traffic Receiver (byte/sec): Calculates the average bytes per second sent from client
to server
Traffic received (packet/sec): Calculates the number of packets by getting the average
throughput of the packets sent from the client to the
server.
Traffic Sent (byte/sec): Is the average number of bytes assigned to the client by
the server.
Traffic Sent (packet/sec): Is the average number of packets assigned by the server
to the client per second.
Ethernet Delay Calculates the end-to-end delay between devices.
Utilization Shows the percentage of consumption delay for packet
forwarding and processing.
7.1 6to4 Tunneling
To create a 6to4 tunnel, the IPv4 address is embedded between the middle router and the IPv4
with the IPv6 6to4 prefix address (2002:ipv4 address- with the edge router::/48). The middle
router should be a dual stack router to support both versions of IPs and is considered the transport
gate to the other site.
14. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
32
Table 2. 6to4 configurations
LAN 6to4 IP Address: 2002:192.168.1.1:1::2
Dual-Stack
Router- A
Tunnel
configuration
IPv4 192.168.1.1
IPv6 2002:192.168.1.1:1::1
Tunnel type: 6to4
Tunnel Source: IF10
Address 2002:192.168.1.1:d::1
Prefix: 128
Dual-Stack
Router- B
Tunnel
configuration
IPv4 10.1.1.1
IPv6 2002:10.1.1.1:a::1
Tunnel type: 6to4
Tunnel Source: IF10
Address 2002:10.1.1.1:b::1
Prefix: 128
The tunnel configuration is done from the “IP Routing Parameters.” Choose the “Tunnel
Interface,” and from “Tunnel Information” detect the source, which is the interface that connects
to the IPv4 network (Tunnel Source). From “Tunnel Mode” detect the tunnel type: for this
experiment the tunnel type is 6to4. To assign the tunnel address choose “Tunnel Interface” from
“IPv6 Parameters”, extend the row for however many tunnels there are, and then assign the IP
address that is the IP address for the tunnel. For the other site it is the same configuration but with
different IPs. Table 2 shows the configurations for 6to4 tunnel; The tunnel is now ready to
transfer packets through the IPv4 network.
7.2 IPv6 Manual Tunnel
The manual tunnel is not too different from the 6to4; the idea is similar, but for the tunnel mode
choose IPv6 (Manual). The source is the interface with central edge router that connects to the
IPv4 network, and the destination is the interface for the IPv6 on the other side (across the IPv4
network). The configuration is similar on the other side but notice the difference for IPs: manual
strategy uses 2001 instead of 2002 for 6to4. Also, manual requires the source and destination for
the tunnel as it works point-to-point, unlike 6to4 which works as point-to-multipoint. Table 3
shows the configurations for the manual tunnel.
Table 3. Manual configurations
LAN manual Address 2001:192.168.1.1:1::2
Dual-Stack Router- A
Tunnel configuration
IPv4 192.168.1.1
IPv6 2001:192.168.1.1:1::1
Tunnel Type: manual
Tunnel Source: IF10
Tunnel Destination: 10.1.1.1
Address 2002:192.168.1.1:d::1
Prefix: 128
15. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
33
Dual-Stack Router- B
Tunnel configuration
IPv4 10.1.1.1
IPv6 2001:10.1.1.1:a::1
Tunnel Type: manual
Tunnel Source: IF10
Tunnel Destination: 192.168.1.1
Address 2002:10.1.1.1:b::1
Prefix: 128
8. RESULTS AND DISCUSSION
The simulation ran for 5min (300 sec): this time is enough to gain an overview of the behavior of
the network.
8.1 Delay
Figure 13 shows the LAN TCP delay within the web server: 6to4 is represented by green, manual
transition by red, blue for the IPv4, and purple for IPv6.
Figure 13. TCP network delay
The TCP delay occurred in the transport layer; the transport layer could use UDP or TCP
protocol, as the connection with the web server requires a TCP connection. The transport layer is
responsible for the connection between end to end and for the flow packets, so when delay occurs
it is found in this layer. As seen from the graph, IPv6 and IPv4 have shorter delays than the
transition strategies. Moreover, the delay occurs because of the congestion in the network. This
network includes a LAN of 100 hosts; at the same time as the transmission was underway, each
host was browsing, including accessing large images and long videos, which generated a high
numbers of packets travelling inside the network and it is this which caused the congestion to
occur. As previously discussed, the simulation programmer creates traffic by sending the same
request from the server to the 100 hosts at the same time. This traffic causes congestion and
therefore the delay is appears; after the requests are sent, the windowing is decreased, which
therefore decreases the traffic flow and therefore minimizes delay.
In addition, the transition technologies caused further delay, because when the packets reached
the middle router (between the IPv4 network and the IPv6 network), the packets transferred
16. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
through the tunnel. This required the IPv6 packet to be encapsulated into Ipv4 in order for them to
transfer through the IPv4 infrastructure. When they reached the other side these packets were de-capsulated
and transferred to the destination server; the time between capsulation and de-capsulation
generated additional delays. Moreover, the transition technologies generated
additional size to their packets (20 byte adds more than the original size). In addition, when the
queue was full there was not enough space for the new packets; this generated drop packets and,
as TCP is a reliable connection, when packets are dropped, TCP will retransmit the dropped
packets. There are many factors that generate congestion, such as:
• Queuing delay: The packets arriving at the switch or the router will wait in the queue for
processing and the waiting time will create a delay. Figure 14 shows the point to point
delay between the dual stack router (middle router between two networks) and the IPv6
switch site. The queue delay increases with time because as the packets begin to reach the
queue router and await their turn for processing, more packets are arriving: when the
queue is full this will affect the network’s throughput as the number of packets that are
successfully arriving at their destination is decreasing. The figure shows IPv4 has less
queue delay because the packet size is smaller than other types.
34
Figure 14. Queuing delay between point to point
As seen in the figure, the IPv4 and IPv6 have the lowest delay, because the processing time for
the router is faster than for manual and 6to4 strategies. In addition, IPv4 has lees queue than IPv6
because the packet size for IPv4 less than IPv6.
• CPU Utilizations: The router contains a CPU, and the usage becomes extremely high
when there is a high level of traffic that needs to be processed quickly. The manual and
6to4 transitions generate more pressure on the CPU than IPv4, IPv6 and Dual-Stack
because the 6to4 and manual required the encapsulation and De capsulation operations on
each packet cross from IPv6 to Ipv4 and vice versa; figure 15 shows the effect of the five
phases on the router. In general, the CPU utilization represents the percent of CPU time
spent in processing traffic (Chen, Chang, Lin, 2004).
17. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
35
Figure 15. CPU utilization on the middle router
• Page response time: The response time for the page is related to the delay, as delay can
influence the time it takes for the server to respond the host request. Figure 16 shows the
responses times for each phase. The response times for IPv4, IPv6 and Dual-Stack are
less than those of 6to4 and manual as they generated less overhead on the router and
therefore the processing time is faster. The manual transition had a slower response time
than 6to4, which is why the TCP delay is higher.
Figure 16. Server response time
Towards the end, congestion was generating the delay. For example, if there are 1000 packets that
require 1 second to transmit in a normal situation with congestion the time needed can at least
double, due to each packet needing to wait for a longer period of time, especially with TCP
because of its reliability. The table 4 shows the difference in delays between IPv4, IPv6, manual
and 6to4 tunneling. Table 4 shows the average network performances
18. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
36
Table 4. Average Network Performances
Statistic
Phase
Page response
time
TCP delay
Queue Delay
CPU
Utilization
Dual-Stack 0.3379 0.0375 7.7897 0.5453
IPv4 0.3852 0.0392 6.8323 0.5706
Manual Tunnel 0.5186 0.0677 7.6016 1.1845
IPv6 0.4165 0.0461 7.5914 0.5348
6to4 Tunnel 0.4381 0.0485 7.595 1.0651
8.2 Throughput
Throughput is the rate of transferring data through a network and is calculated using bits per
second. The table shows the throughput between the LAN, which contains 100 users, and a FTP
server. There are three data rates for this test: 1Mbps, 2 Mbps and 5 Mbps. The IPv6 had a higher
throughput due to its larger packet size in comparison to the others; this enabled it to transfer
more data. The second better throughput is for manual tunnel for 1 and 2 Mbps. With 5 Mbps the
6to4 got higher throughput than the others, except IPv6. Manual tunnel is point to point
connection, which meant that the data travelled immediately from source to destination (which is
also considered preferable for security reasons). In general, the throughput is increasing when the
data rate is increased. Table 5 measure the throughput by using 1, 2 and 5 Mbps.
Table 5. Average Networks Throughput
Phase Date rate Throughput
(byte/sec)
Date rate Throughput
(byte/sec)
Date rate Throughput
(byte/sec)
IPv6 1 Mbps 19522.5 2 Mbps 36707.5 5 Mbps 83013
IPv4 1 Mbps 13698.5 2 Mbps 28553.5 5 Mbps 74279.5
Dual-Stack 1 Mbps 17775 2 Mbps 32631.5 5 Mbps 74275
Manual
Tunnel
1 Mbps
18356 2 Mbps
33796 5 Mbps 61167.5
6to4 Tunnel 1 Mbps 15737.5 2 Mbps 33213.5 5 Mbps 75731
9. CONCLUSION
In the previous years IPv4 has proven its worth in providing sufficient addresses for the Internet.
When the Internet continued to expand, it began to approach IPv4’s limit in providing different
services and applications. Therefore, a new version of IP (namely IPv6) was developed in order to
cater to all users’ requirements. In this paper, some networks were designed and simulated by
using Opnet Modeler to study different translation schemes. The design contained different
network devices in order to capture a real network environment. The network topology was
configured in five phases as - IPv4, IPv6, Dual-Stack, 6to4, and manual tunnel. The statistical
analysis was done to provide suitable results and to show that the network’s performance varied
19. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
across different mechanisms. For example, the CPU utilization for manual and 6to4 is higher than
IPv6, IPv4 and Dual-Stack because the transition technology generates more effort to encapsulate
and encapsulate. The Dual-Stack found less delay with TCP, but with 6to4 and manual the delay
is higher because the packets are not transferred directly, as usual. The throughputs of the four
network simulations were analyzed by using three different data rates: 1, 2 and 5 Mbps. The
results show that IPv6 has higher throughput than the other four, and for manual it is higher than
6to4 till 5 Mbps. The 6to4 and manual strategies required manual configurations to detect the
source, and the manual tunnel is required to have the destination detected in order to build the
point to point mechanism.
37
REFERENCES
[1] Grosse, E. and Lakshman, Y. (2003). Network processors applied to IPv4/IPv6 transition, IEEE
Network, 17(4), pp.35-39.
[2] Ali, A. (2012). Comparison study between IPv4 & IPv6, International Journal of Computer Science
Issues (IJCSI), 9(3), pp.314-317.
[3] Batiha, K. (2013). Improving IPv6 Addressing Type and Size, International Journal of Computer
Networks & Communications (IJCNC), 5(4), pp.41-51.
[4] Ibáñez Parra, J. (2014). Comparison of IPv4 and IPv6 Networks Including Concepts for Deployment
and Interworking, INFOTECH Seminar Advanced Communication Services (ACS), pp.1-13.
[5] Sailan, M., Hassan, R. and Patel, A. (2009). A comparative review of IPv4 and IPv6 for research test
bed, Proceedings of International Conference on Electrical Engineering and Informatics (ICEEI '09),
Malaysia, pp.427-433.
[6] Ahmad, N. and Yaacob, A. (2012). IPSec over Heterogeneous IPv4 and IPv6Networks: Issues and
Implementation, International Journal of Computer Networks & Communications (IJCNC), 4(5),
pp. 57-72
[7] Arafat, M., Ahmed, F. and Sobhan, M. (2014). On the Migration of a Large Scale Network from
IPv4 to IPv6 Environment, International Journal of Computer Networks & Communications
(IJCNC), 6(2), pp.111-126.
[8] Wu, P., Cui, Y., Wu, J., Liu, J. and Metz, C. (2013). Transition from IPv4 to IPv6: A state-of-the-art
survey, IEEE Communications Surveys & Tutorials, 15(3), pp.1407--1424.
[9] Wu, Y. and Zhou, X. (2011). Research on the IPv6 performance analysis based on dual-protocol
stack and Tunnel transition, Proceedings of the 6th International Conference on Computer Science
& Education (ICCSE), pp.1091--1093.
[10] Interface and Hardware Component Configuration Guide, Cisco IOS XE Release 3S. (2014). 1st ed.
[ebook] San Jose: Cisco Systems, Inc., pp.18-26. Available at:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/interface/configuration/xe-3s/ir-xe-3s-book.pdf
[Accessed 10 May 2014].
[11] Chen, J., Chang, Y. and Lin, C. (2004). Performance investigation of IPv4/IPv6 transition
Mechanisms, Proceedings of the 6th International Conference on Advanced Communication
Technology, pp.545--550.
[12] Narayanan, A., Mohideen, M. and Raja, M. (2012). IPv6 Tunnelling Over IPV4, International
Journal of Computer Science Issues (IJCSI), 9(2), pp.599-604.
[13] Xiaodong, Z. and others, (2009). Research on the Next-generation Internet transition technology,
Proceedings of Second International Symposium on Computational Intelligence and Design (SCID
'09), pp.380-382.
[14] Monte, C., Robles, M., Mercado, G., Taffernaberry, C., Orbiscay, M., Tobar, S. and others, (2012).
Implementation and Evaluation of Protocols Translating Methods for IPv4 to IPv6 Transition,
Journal of Computer Science & Technology (JCS&T), 12(2), pp.64-70
[15] Bi, J., Wu, J. and Leng, X. (2007). IPv4/IPv6 transition technologies and univer6 architecture,
International Journal of Computer Science and Network Security, 7(1), pp.232--242.
[16] Eslambolchi, H. (2013). IPV6 Migration & Its Contingencies, Complexities & Implications: Final
Chapter. [Online] Linkedin.com. Available at:
http://www.linkedin.com/today/post/article/20130806013233-5213223-ipv6-migration-its-contingencies-
complexities-implications-final-chapter [Accessed 3 Apr. 2014].
20. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.5, September 2014
[17] The Role of Government in IPv6 Adoption. (2010). 1st ed. [ebook] USA: Cisco. Available at:
38
http://www.cisco.com/en/US/services/ps6887/ps10716/docs/ipv6_govt_services_whitepaper.pdf
[Accessed 11 Apr. 2014].
[18] Mohammed, H., Ali, A. and Mohammed, H. (2013). The Effects of Different Queuing Algorithms
within the Router on QoS VoIP application Using OPNET, International Journal of Computer
Networks & Communications (IJCNC), 5(1), p.117-124.
[19] Etidweb.tamu, (2004). Simulation Technology Options. [Online] Available at:
http://etidweb.tamu.edu/ftp/entc489rf/Opnet/sim_options.pdf [Accessed 4 May 2014].
Authors
Ali Albkerat received the B.E degree in Computer engineering from the 7th of April
University, Libya in 2008 and has graduated MSc degree in Network Systems from the
School of Computing, Teesside University, UK in 2014.
Dr Biju Issac is a senior lecturer in the School of Computing, Teesside University, UK. He
has Bachelor of Engineering in Electronics and Communication Engineering (ECE), after
which he completed a Master of Computer Applications (MCA) with honours. Later he
finished his PhD in Networking and Mobile Communications, by research. He is a Charted
Engineer (CEng), and Senior Member of IEEE.