This document analyzes the readiness of Higher Education Institutions (HEIs) in Oman to adopt IPv6. It finds that while the Telecommunications Regulatory Authority established an IPv6 project 10 years ago and issued guidelines for migrating to IPv6 by 2020, data on HEIs' responses is limited. The next stage of research will investigate stakeholders' perceptions of HEIs' actual readiness to implement IPv6 through surveys of ICT personnel, administrators, and senior staff. Globally, many countries and institutions have adopted IPv6 transition plans and policies, but implementation varies and often lacks services, funding, coordination or technical knowledge.
The issue of deploying IPv6 Technology has been a topic of debate for more than a decade now.
Professionals have been discussing on the transition from Internet Protocol version 4 (IPVv4) to Internet
Protocol version 6 (IPv6) due to the fact that the IPv4 address space would soon be exhausted.
In this paper, we analyse the IPv4 and IPv6 technologies and look at the benefits of migrating to IPv6,
its social implications, risks & challenges and the opportunities the IPv6 migration offers
In this day and age where internet connectivity is becoming more and more ubiquitous, IPv4 addresses are forseen to be exhausted by 2011.
in this webcast, we will cover
why entreprises should migrate to IPv6
what the underlying challenges for such a migration are
how Orange Business Service can support you to successfully migrate from IPv4 to IPv6
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
Ensuring the best quality of smart multimedia services becomes an essential goal for modern enterprises so there is always a need for effective IP mobility smart management schemes in order to fulfill the following two main functions: (I) interconnecting the moving terminals around the extended indoor smart services. In addition, (II) providing session continuity for instant data transfer in real-time and multimedia applications with negligible latency, efficient bandwidth utilization, and improved reliability. In this context, it found out that the Generalized Multi-Protocol Label Switching (GMPLS) over LTE-A network that offers many advanced services for large numbers of users with higher bandwidths, better spectrum efficiency, and lower latency. In GMPLS, there is an elimination of the routing searches and choice of routing protocols on every core LTE-A router also it provides the architecture simplicity and increases the scalability. A comparative assessment of three types of IPv6 mobility management schemes over the LTE-A provided by using various types of multimedia. By using OPNET Simulator 17.5, In accordance with these schemes, it was proven that the IPv6-GMPLS scheme is the best choice for the system's operation, in comparison to the IPv6-MPLS and Mobile IPv6 for all multimedia offerings and on the overall network performance.
IPv6 campus transition: A Central Luzon State University case studyjournalBEEI
Internet connections still use IPv4 as the primary address protocol and it is now facing exhaustion. However, academic institutions specifically in the Philippines should devise steps to address the exhaustion of IPv4. In this paper, this is brought to light as we present the IPv4 to IPv6 campus transition techniques to address the issue. The experiment is carried out in Central Luzon State University and is assessed if the university is able to adopt the IPv6 transition in their campus network. Two IPv6 transition mechanisms were implemented and tested. As a general result, it has been found out, through testbeds, that the dual-stack transition mechanism is more suitable than 6 to 4 tunnel broker. The results have also shown that 6 to 4 tunnel broker was outperformed by dual-stack transition mechanism in all areas and presents better performance. Additionally, results also showed that IPv4 presents slight advantages in terms of network performance than IPv6 with a very small percentage in difference, and this does mean that migration to IPv6 is possible without performance detriments. Furthermore, the results also provide a proof of concept for the university especially in the Philippines to consider IPv6 for future migration within their campus network.
The issue of deploying IPv6 Technology has been a topic of debate for more than a decade now.
Professionals have been discussing on the transition from Internet Protocol version 4 (IPVv4) to Internet
Protocol version 6 (IPv6) due to the fact that the IPv4 address space would soon be exhausted.
In this paper, we analyse the IPv4 and IPv6 technologies and look at the benefits of migrating to IPv6,
its social implications, risks & challenges and the opportunities the IPv6 migration offers
In this day and age where internet connectivity is becoming more and more ubiquitous, IPv4 addresses are forseen to be exhausted by 2011.
in this webcast, we will cover
why entreprises should migrate to IPv6
what the underlying challenges for such a migration are
how Orange Business Service can support you to successfully migrate from IPv4 to IPv6
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
Ensuring the best quality of smart multimedia services becomes an essential goal for modern enterprises so there is always a need for effective IP mobility smart management schemes in order to fulfill the following two main functions: (I) interconnecting the moving terminals around the extended indoor smart services. In addition, (II) providing session continuity for instant data transfer in real-time and multimedia applications with negligible latency, efficient bandwidth utilization, and improved reliability. In this context, it found out that the Generalized Multi-Protocol Label Switching (GMPLS) over LTE-A network that offers many advanced services for large numbers of users with higher bandwidths, better spectrum efficiency, and lower latency. In GMPLS, there is an elimination of the routing searches and choice of routing protocols on every core LTE-A router also it provides the architecture simplicity and increases the scalability. A comparative assessment of three types of IPv6 mobility management schemes over the LTE-A provided by using various types of multimedia. By using OPNET Simulator 17.5, In accordance with these schemes, it was proven that the IPv6-GMPLS scheme is the best choice for the system's operation, in comparison to the IPv6-MPLS and Mobile IPv6 for all multimedia offerings and on the overall network performance.
IPv6 campus transition: A Central Luzon State University case studyjournalBEEI
Internet connections still use IPv4 as the primary address protocol and it is now facing exhaustion. However, academic institutions specifically in the Philippines should devise steps to address the exhaustion of IPv4. In this paper, this is brought to light as we present the IPv4 to IPv6 campus transition techniques to address the issue. The experiment is carried out in Central Luzon State University and is assessed if the university is able to adopt the IPv6 transition in their campus network. Two IPv6 transition mechanisms were implemented and tested. As a general result, it has been found out, through testbeds, that the dual-stack transition mechanism is more suitable than 6 to 4 tunnel broker. The results have also shown that 6 to 4 tunnel broker was outperformed by dual-stack transition mechanism in all areas and presents better performance. Additionally, results also showed that IPv4 presents slight advantages in terms of network performance than IPv6 with a very small percentage in difference, and this does mean that migration to IPv6 is possible without performance detriments. Furthermore, the results also provide a proof of concept for the university especially in the Philippines to consider IPv6 for future migration within their campus network.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Future Internet: Challenge And Research TrendIJERA Editor
This article first presents the Challenges of the current Internet and concept of Future Internet Research, motivation for future Internet. Challenges and limitations of Current Internet are reason of Future Internet Researches. In order to provide Future Internet’s service, the Future Internet testbed must be deployed as foundation, and many countries such as USA, Europe and Asia are striving research of Future Internet and deployment of the Future Internet. This paper describe countries which are active on Future Internet research and summarizes the Trends of the Future Internet.
Denial of service attack: an analysis to IPv6 extension headers security nig...IJECEIAES
Dealing with scarcity issues of internet protocol version 4 (IPv4), internet engineering task force (IETF) developed internet protocol version 6 (IPv6) to support the needs of IP addresses for future use of the internet, however, one challenge that must be faced while transitioning to IPv6 is in the area of security. IPv6 is a new protocol that has many new probabilities for attackers to exploit the protocol stack and one of them is through IPv6 extension headers. Mishandling of extension headers are the security nightmares for network administrators, allowing for new security threats that will cause denial of service (DoS). As a result, the mishandling of IPv6 extension Headers creates new attack vectors that could lead to DoS–which can be exploited for different purposes, such as creating covert channels, fragmentation attacks, and routing header 0 attacks. Furthermore, this paper becomes proof of concepts that even to this day our well-known network devices are still exploitable by these attack vectors.
ID IGF 2016 - Infrastruktur 2 - IPv4 between internet growth and low adopti...IGF Indonesia
Presented by Cristian Guna G (TELKOMSEL)
ID IGF 2016
Sesi Infrastruktur 2 - IPv4 Tidak Dapat Lagi Mendukung Pertumbuhan Internet dan Rendahnya Tingkat Partisipasi IPv6
Jakarta, 15 November 2016
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
The Impact on Security due to the Vulnerabilities Existing in the network a S...IJAEMSJORNAL
Software Defined Networking, the emerging technology is taking the network sector to a new variant. Networking sector completely focused on hardware infrastructure is now moving towards software programming. Due to an exponential growth in the number of user and the amount of information over wires, there arises a great risk with the existing IP Network architecture. Software Defined Networking paves a platform identifying a feasible solution to the problem by virtualization. Software Defined Networking provides a viable path in virtualization and managing the network resources in an “On Demand Manner”. This study is focused on the drawbacks of the existing technology and a fine grained introduction to Software Defined Networking. Further adding to the above topic, this study also passes over the current steps taken in the industrial sector in implementing Software Defined Networking. This study makes a walkthrough about the security features of Software Defined Networking, its advantages, limitations and further scope in identifying the loopholes in the security.
IETF Tutorial. IETF-LAC (IETF in Latin America and the Caribbean). Bogota, 28 Sep 2015.
This presentation summarizes the objectives of GAIA IRTF Research Group, and talks about some examples of the things being discussed: community networks, alternative networks, new protocol proposals as Simplemux, etc.
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSIJNSA Journal
One of the main purposes of Internet Protocol version 6 (IPv6) developments was to solve the IP address depletion concern due to the burgeoning growth of the Internet users. The new Internet protocol provides end-to-end communication, enhanced security and extensibility apart from the other features such as address auto-configuration or plug-and-play and faster packet processing in the routers. However, as a new technology, it is also reported that the protocol introduces some security vulnerabilities both in the header format and in the other protocols associated to it. This paper reviews IPv6 security vulnerabilities that have large potential exploitation in terms of denial of service attacks. The IPv6 security vulnerabilities are classified under three categories that include the IPv6 main header field, IPv6 extension header and Neighbour Discovery Protocol (NDP). This paper also summarizes the current mitigation methods proposed by researchers and practitioners to secure from these IPv6 security vulnerabilities.
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsINFOGAIN PUBLICATION
Internet of Things (IoT) is a novel communication standard and it is researcher’s preferred topic, which integrates heterogeneous systems seamlessly. Designing a universal architecture for IoT is a challenging task due to the integration of wide variety of the devices. The main objective of this paper is to provide comprehensive knowledge on challenges, applications, Security issues, and different communication models of IoT. This paper also focuses on the marketing trends of IoT with respect to variety of application with the end users. This motivates the researchers to contribute more productive work in this field by analyzing various parameters.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Future Internet: Challenge And Research TrendIJERA Editor
This article first presents the Challenges of the current Internet and concept of Future Internet Research, motivation for future Internet. Challenges and limitations of Current Internet are reason of Future Internet Researches. In order to provide Future Internet’s service, the Future Internet testbed must be deployed as foundation, and many countries such as USA, Europe and Asia are striving research of Future Internet and deployment of the Future Internet. This paper describe countries which are active on Future Internet research and summarizes the Trends of the Future Internet.
Denial of service attack: an analysis to IPv6 extension headers security nig...IJECEIAES
Dealing with scarcity issues of internet protocol version 4 (IPv4), internet engineering task force (IETF) developed internet protocol version 6 (IPv6) to support the needs of IP addresses for future use of the internet, however, one challenge that must be faced while transitioning to IPv6 is in the area of security. IPv6 is a new protocol that has many new probabilities for attackers to exploit the protocol stack and one of them is through IPv6 extension headers. Mishandling of extension headers are the security nightmares for network administrators, allowing for new security threats that will cause denial of service (DoS). As a result, the mishandling of IPv6 extension Headers creates new attack vectors that could lead to DoS–which can be exploited for different purposes, such as creating covert channels, fragmentation attacks, and routing header 0 attacks. Furthermore, this paper becomes proof of concepts that even to this day our well-known network devices are still exploitable by these attack vectors.
ID IGF 2016 - Infrastruktur 2 - IPv4 between internet growth and low adopti...IGF Indonesia
Presented by Cristian Guna G (TELKOMSEL)
ID IGF 2016
Sesi Infrastruktur 2 - IPv4 Tidak Dapat Lagi Mendukung Pertumbuhan Internet dan Rendahnya Tingkat Partisipasi IPv6
Jakarta, 15 November 2016
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
The Impact on Security due to the Vulnerabilities Existing in the network a S...IJAEMSJORNAL
Software Defined Networking, the emerging technology is taking the network sector to a new variant. Networking sector completely focused on hardware infrastructure is now moving towards software programming. Due to an exponential growth in the number of user and the amount of information over wires, there arises a great risk with the existing IP Network architecture. Software Defined Networking paves a platform identifying a feasible solution to the problem by virtualization. Software Defined Networking provides a viable path in virtualization and managing the network resources in an “On Demand Manner”. This study is focused on the drawbacks of the existing technology and a fine grained introduction to Software Defined Networking. Further adding to the above topic, this study also passes over the current steps taken in the industrial sector in implementing Software Defined Networking. This study makes a walkthrough about the security features of Software Defined Networking, its advantages, limitations and further scope in identifying the loopholes in the security.
IETF Tutorial. IETF-LAC (IETF in Latin America and the Caribbean). Bogota, 28 Sep 2015.
This presentation summarizes the objectives of GAIA IRTF Research Group, and talks about some examples of the things being discussed: community networks, alternative networks, new protocol proposals as Simplemux, etc.
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSIJNSA Journal
One of the main purposes of Internet Protocol version 6 (IPv6) developments was to solve the IP address depletion concern due to the burgeoning growth of the Internet users. The new Internet protocol provides end-to-end communication, enhanced security and extensibility apart from the other features such as address auto-configuration or plug-and-play and faster packet processing in the routers. However, as a new technology, it is also reported that the protocol introduces some security vulnerabilities both in the header format and in the other protocols associated to it. This paper reviews IPv6 security vulnerabilities that have large potential exploitation in terms of denial of service attacks. The IPv6 security vulnerabilities are classified under three categories that include the IPv6 main header field, IPv6 extension header and Neighbour Discovery Protocol (NDP). This paper also summarizes the current mitigation methods proposed by researchers and practitioners to secure from these IPv6 security vulnerabilities.
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsINFOGAIN PUBLICATION
Internet of Things (IoT) is a novel communication standard and it is researcher’s preferred topic, which integrates heterogeneous systems seamlessly. Designing a universal architecture for IoT is a challenging task due to the integration of wide variety of the devices. The main objective of this paper is to provide comprehensive knowledge on challenges, applications, Security issues, and different communication models of IoT. This paper also focuses on the marketing trends of IoT with respect to variety of application with the end users. This motivates the researchers to contribute more productive work in this field by analyzing various parameters.
Similar to Analytical Review On The Stakeholders Perceptions About IPv6 Readiness And Their Implications To The Omani Higher Education Institutions (20)
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
2. Al Musawi et al Analytical Review on the Stakeholders Perceptions about IPv6 Readiness
1042| International Journal of Current Engineering and Technology, Vol.8, No.4 (July/Aug 2018)
Table 1 IPv4/IPv6 comparison
IPv4 IPv6
Invention 1981 1999
Address length 4 bytes
32 bits
16 bytes
128 bits
No. of addresses 232 ≈ 4.2 billion
(Less than a single IP address per person on the
planet)
2128 ≈ 340 trillion trillion trillion
Address format Dotted decimal notation:
192.168.10.1
Hexadecimal notation:
2001:0db8:85a3:0000:0000:8a2e:0370:7334
Packet size 576 bytes required
fragmentation optional
1280 bytes required
no fragmentation
Packet header includes options up to 40 byte extension headers used for optional data
include checksum does not include checksum
Address
configuration
Manual or via Dynamic Host Configuration
Protocol (DHCP)
Manual, via Stateless address
autoconfiguration (SLAAC), or via DHCPv6
Security features Security is dependent on applications, and the
Internet Protocol Security (IPSec) is optional
IPSec is built into the IPv6 protocol
Interoperability &
mobility
Very constrained interoperability and mobility Designed to provide interoperability and
mobility capabilities
Table 2: Governments IPv6 Deployment Roadmaps*
Governments
IT Policy -- IPv6 Roadmap --
Adoption Year
Milestones 1 Milestones 2
United States
IPv6 Strategy -- Year 2009
Refreshed -- Year 2012
Public web sites – 9.2012
Result: 35% - May 2013
Complete transition to
IPv6 (dual stack) by
December 2017
Australia
AGIMO IPv6 Strategy – Year 2008
Stage 1: Preparation (2008-2009)
Stage 2: Transition (2010 - 2011)
Stage 3: Implementation (2012-
2012)
Tasks:
Review Procurement
Policy.
Stocktake of Equipment.
Stocktake of Applications.
Government Transition to
IPv6: Stage 2: Transition:
Jan 2010 – Dec 2011
Implementation: Jan 2012
– Dec 2012
Canada
IPv6 adoption strategy – Year
2012
Enabling Phase – Sep
2013
Deployment Phase - 2015
Completion Phase –
201X?
India
IPv6 Policy -- Year 2010
Updated -- Year 2013
Public web sites –
1.1.2015
Complete transition to
IPv6 (dual stack) by
December 2017
China
CNGI -- Year 2006
NDRC -- Year 2012
8M IPv6 users by 2013
25M IPv6 users by 2014-
5
European Commission
i2010
EU IPv6 Task Force Year 2001
IPv6 Communication 2004
IPv6 Communication 2008
25% IPv6 users by 2010
Result: 1%
Indonesia
IPv6 Task Force -- Year 2005
Phase 1: 2006 Dissemination,
Research
Phase 2: 2007
Development
of infrastructure and
Content
Phase 3: 2008 -
Development of
Applications and Transition
Process
Taiwan, R. of China
E-Taiwan Strategy--Year 2002
Phase 1: 03-05
Promotional
strategy
Phase 2 05-07
Implementation strategy
South Korea IT839 Strategy -- Year 2004 ISP Readiness IPv6 service
Japan U-Japan -- Year 2001 ISP readiness IPv6 service
* Source: Ladid (2016)
Due to the vastness of the Internet and the complexity
of transitioning the entire Internet to IPv6, it has been
realized from the beginning that the transition would
be a long-term process and it involves significant effort
and investments in terms of national human resources
and national communication infrastructure. Several
network operators and service providers have
migrated their networks to IPv6 networks. Similarly,
several countries throughout the world (see Table 2
below) have already planned for a time-frame
migration to their national communication
infrastructure into IPv6 operable communication
infrastructure with the formation of roadmaps and
policies (Dawadi, Shakya, & Khanal, 2016; Dell, 2012;
Main, Zakaria, & Yusof, 2015).
There were four basic issues faced in the
technology implementation; namely, security issues,
addressing issues, error detection issues and Wireless
Sensor Network issues (Meena & Bundele, 2015).
Threats resulting from these implementation issues
require updated training/education and enhanced
countermeasures. In addition, traditional monitoring
approaches are usually not appropriate for IPv6 traffic
and therefore, new techniques, effective algorithms
3. Al Musawi et al Analytical Review on the Stakeholders Perceptions about IPv6 Readiness
1043| International Journal of Current Engineering and Technology, Vol.8, No.4 (July/Aug 2018)
and data structures need to be deployed (Grégr, Petr
Matoušek, Podermański, & Švéda, 2011). In addition to
traditional network services, educational
infrastructures must enable specialized resources such
as registration, billing, and online systems on devices
that will increasingly run IPv6; applications must be
available, fast and secure and video surveillance are
vital too. Further, literature argues that universities
and research institutions should adopt an IPv6
strategy with at least three facets: acquisition policies
that promote increasing readiness; develop knowledge
and experience through experimentation and pilot
projects; and seek opportunities to work with
organizations to facilitate the general adoption of IPv6
(Martin & Heyer, 2004). HEIs have to lead the way with
new technologies, as this is one of their social
responsibilities.
Efforts in the Middle East are being made to
strategize for IPv6 migration. These efforts are
summarized in Table 3 below. Sultanate of Oman has
gained significant momentum in ICT development;
however, proper policy and regulatory framework is
needed to cope with IPv6 technology migration to
make the HEIs synchronize with the world’s
technologies and to fulfill the current market’s
demands. However, efforts are scarce in IPv6
implementation. For example, the Telecommunication
Regulatory Authority (TRA) provides a website and
one-time training. The national organizations including
TRA, ISPs, ITA, universities, government organizations,
non-governmental organizations, etc. that are not well
prepared for IPv6 may find themselves at low levels of
IPv6 readiness and could constitute a significant
problem for the higher education and ICT industry.
Table 3: National Regulators IPv6 Deployment Roadmaps*
National Regulators IPv6
Deployment Roadmaps
Regulator
IT Policy -- IPv6 Roadmap --
Adoption Year
Milestones Results
Saudi CITC
IPv6 Strategy -- Year 2008
3 Studies:
IPv6 Readiness Assessment
IPv6 Countries Benchmark
IPv6 International bodies &
Organizations
Infrastructure Track
Awareness Track
14 ASNs support IPv6
3 ASNs have IPv6 traffic
Transition Process
Oman TRA Oman IPv6 Strategy--Year 2010 IPv6.om Web Site OmanTel Testing IPv6
Morocco ANRT
IPv6 Study -- Year 2012 ISP Readiness work
Strategy published in 2013
* Source: Ladid (2016)
This paper describes the first stage of an internal grant
provided by the Sultan Qaboos University (SQU) to
conduct a research project exploring the actual
readiness of HEIs to adopt the above national plan to
migrate to IPv6.
Research Significance
Practically, there is no research dedicated for the
Sultanate of Oman HEIs IPv6 readiness. It is difficult for
universities and ISPs to achieve a well-managed IPv6
transition without concrete understanding of the IPv6
readiness. On the other hand, there has been no
empirical research with focus on actual knowledge and
readiness of network engineers, network
administrators, security personnel, and IT supporters
who will be directly or indirectly involved in IPv6
implementation.
The researchers proposed a research project in an
attempt to fill this research gap by investigating the
actual readiness of HEIs as perceived by their
stakeholders including ICT personnel, technical
administrators, and senior administrators to
implement the next generation of Internet protocol in
these institutions.
Research Objectives
The main aim of this research is to provide a better
understanding about the readiness of HEIs and ICT
personnel for IPv6 migration to assist the process of
preparation towards IPv6 adoption in these
institutions.
Research Questions
1) What are the factors isolated from the literature to
improve the readiness of the Omani HEIs for IPv6
migration?
2) What effect do the governmental IPv6 migration
plan has on the Omani HEIs?
3) What implications do the findings so far suggest to
inform the research process?
Method
Analytical and document review was conducted as
follows:
1) IPv6 in the global HEIs context was studied.
2) Documents concerning the Omani context both on
the national and HEIs levels were analyzed.
However, qualitative research method will be
subsequently employed in order to triangulate the
findings. Those are explained below in the ‘Conclusions
and Next Steps’ section.
For the purpose of this stage of research project, the
TRA and other institutional documents were consulted,
field visit to TRA took place and a meeting was
4. Al Musawi et al Analytical Review on the Stakeholders Perceptions about IPv6 Readiness
1044| International Journal of Current Engineering and Technology, Vol.8, No.4 (July/Aug 2018)
conducted with the stakeholders to collect the required
documents.
Analytical Review Findings
Global HEIs Status
IPv6 is developed to meet the increasing needs of
internet and, in the case of higher education
institutions (HEIs); these institutions are the main
focus to conduct IPv6 readiness research (Southworth,
2016). Southworth (2016) has surveyed 1,000
American colleges and universities to determine the
rate of IPv6 readiness. Institutional factors (e.g.
implementation, infrastructure, policy and training)
were analyzed and found to be related to IPv6
readiness and effectiveness. In Texas, LEARN, is a
consortium of 38 public and private institutions of
higher education, community colleges, K-12 public
schools, and the National Weather Service provides
high speed optical network services to support
research, education, healthcare, and public service
missions. It uses dual stack IPv4 and IPv6 on all
production backbone networks. The consortium
educates its members through working groups and
workshops and relies on continuous education and
awareness campaigns to promote the migration
process (Hicks, 2012).
In Europe, “governments from various countries
are responding differently to the imminent exhaustion
of the IPv4 address space. The more economically
advanced and export oriented countries have set clear
objectives with predetermined and measurable
deadlines for implementing IPv6 into public, state and
private communication networks. Despite the decline
in economic growth, governments in some countries
did not lower but actually increased the budget for
investments into the ICT infrastructure that will be
IPv6 based.” (Kunk, et al. 2012).
In Malaysia, Abulkasim and Ahmad (2015) found
that IPv6 network has not been widely used among the
institutions of higher learning in Malaysia. The study
provides systematic performance testing of IPv6
guidelines in the aspect of network connections. It
seems that HEIs will need sufficient time for planning
the IPv6 transition, enough fund to replace old
technologies along with cross-institutional
collaborative research and shared access to data
repositories (Almes, Anderson, Mundrane, & Polichar,
2013). In Norway, only 30% of HEIs has deployed IPv6
with only 20% of their clients on IPv6. This is because
they suffer from lack of services and miss IPv6 support
in wireless controllers. The national strategy calls to
make IPv6 available as well as the information about
its purpose, increase the knowledge, remove any
obstacle and provide institutional workshops and
practical implementation consultancy (Boe, 2012). In
Africa, many initiatives, many reasons account for lack
of IPv6 adoption in higher education. These are related
to lack of native IPv6 Internet access, services
available, and networking hardware components and
infrastructures. Dandjinou (2014) proposed a policy to
adopt IPv6 by African higher Education institutions
and ways to follow for efficient migration in the Africa
region.
IPv6 in the Omani context
A Circular (No. 1/2018) was issued by the TRA on ‘The
National Migration Plan for Government Sector’
informing all administrative units of the Sultanate
about the preparation of the national plan. It also
request these agencies to comply and abide by what
came in this plan according to the above-mentioned
time stages, in order to facilitate the transition to the
Sixth version of the Internet Protocol addresses
efficiently. The plan lists the obligations actions to be
enforced by the government authorities as follows
(TRA, 2018a):
1) The preparation of detailed transition plan to fully
move to the Internet Protocol Version 6 addresses
(IPv6) (dual stack) by December 2020, depending
on the complexity of the network and life
expectancy of equipment and techniques.
2) The transition plan would be ready by December
2018.
3) That all new services based on the Internet
Protocol (such as cloud computing and data
centers, etc.) which are provided to/from
governmental bodies supporting the 6th version of
the internet protocol addresses (IPv6), with
immediate effect from the date of issuance of this
circular
4) That all new services/applications/systems/email
which provide services to the public, support the
sixth version of the internet protocol addresses
(IPv6), with immediate effect from the date of
issuance of this circular.
5) That all current services/application/system/
email messages that provide services to the public,
support the sixth version of the internet protocol
addresses (IPv6) before the fourth quarter of the
year 2019.
6) All governmental authorities to stop the purchase
of equipment and systems incompatible with
Version 6 of IPv6 addresses, with immediate effect
from the date of issuance of this circular.
The Omani National Migration Plan for Government
Sector
It seems that TRA was working on the IPv6 long before
2018. In fact, Table 4 below shows that the National
Plan preparation went back 10 years ago since TRA
established IPv6 project. In addition, TRA plans to
conduct an ‘IPv6 National Migration Initiative Survey’.
The instrument was constructed and to be
implemented soon (see Appendix 1).
5. Al Musawi et al Analytical Review on the Stakeholders Perceptions about IPv6 Readiness
1045| International Journal of Current Engineering and Technology, Vol.8, No.4 (July/Aug 2018)
Table 4: Main stages and sequence of the National Plan*
The main components of the Plan Timeline
Stage 1: Context Analysis and Building Awareness
Started communications with operators regarding IPv6 (TRA always communicate with operators
on this regard and follow-up with them).
10/06/2008
Lunching of ipv6 website 18/8/2010
IPv6 leaflet 27/9/2010
Stage 2: Design and Development of Procedures
TRA testing the implementation of IPv6 with Omantel 24/12/2012
The Type approval department has to play an essential role in promoting the use of devises that is
IPv6 enabled during COMEX or other exhibitions.
In COMEX 2013
TRA become the one of the LIR and have received the first IPV6 Allocation for network assignment 28/5/2013
TRA has become a member of RIPE NCC 29/7/2013
Stage 3: Adoption and Implementation
IPv6 adoption in Oman (Task force) 26/1/2017
The Domain Names Registry system became IPv6 November 2017
IPv6 workshop in TRA presents by RIPE 16- 20 /4/2017
The registry website www.registry.om became IPv6 8/2/2018
Stage 4: Nation-wide dissemination
IPv6 schema training March 2018
Directives to the Licensees 8/4/2018
circular to many government entities and some companies regarding the migration to IPv6 9/4/2018
directives to the Equipment’s Dealers/importers 25/4/2018
From 31 June 2018, all devices must support IPv6 and the devices that support only IPv4 will not
accepted.
May 2018
Announcement regarding ipv6 through newspaper, twitter, TRA website 16/5/2018
Stage 5: Evaluation and Feedback
Conduct IPv6 National Migration Initiative Survey’ 2018-2020
* Source: TRA (2018b)
Conclusions
It seems that the factors isolated from the literature to
improve the readiness of the Omani HEIs for IPv6
migration can be summarized in providing the
stakeholders with sufficient time for planning, financial
resources, assuring the applications compatibility and
security. Planning the transition also requires
structural preparedness, developing a technical plan,
developing a security Plan, and developing a rollout
plan (Almes, et al. 2013).
Although the Sultanate gives due importance to the
transition process, data on the governmental agencies
response is scarce and unclear. More importantly,
HEIs’ (specifically those in the private sector) response
seems to be even vaguer as they were not mainly
targeted at the initial stages of the project. It can be
therefore concluded the governmental IPv6 migration
plan has minimal effect on the Omani HEIs. This result
gives importance to continue the research project with
Future Implications to Research Project
From what has been found above, the research team
needs to refocus the objectives of the project.
Specifically the research should try to assess the IPv6
readiness in terms of infrastructure, the ICT personnel
perceptions about the deployment of IPv6 in terms of
IPv6 knowledge and the IPv6 readiness in HEIs in
terms of research and teaching the IPv6 technology.
Further, the research questions will be accordingly
refined (see Southworth, 2016 and Almes, et al. 2013, )
to investigate the extent to which the status provides
for IPv6 readiness in terms of: awareness, current
environment, planning, deployment and infrastructure,
policy frameworks, training, research, human
resources, and courses provision as perceived by
Omani HEIs faculty, administrators and ICT personnel.
The concerns/problems of IPv6 as perceived by the
stakeholders. Ultimately, the research project outcome
will be the best policy model to provide for IPv6 in the
Omani HEIs. The research participants should include
all Omani HEIs stakeholders in ICT fields. Random
sampling will be applied with a ratio of 15% of the
faculty, administrators and ICT personnel.
Methodologically, a questionnaire will be designed,
reviewed, and distributed to survey the stakeholders’
perceptions followed by focus group interviews to
investigate issues isolated from the questionnaire
analysis in more details. The questionnaire will benefit
from ‘IPv6 National Migration Initiative Survey’ (see
Appendix 1). Table 5 below shows the tasks and
timeline of the research project. The work team will
conduct training courses and issue practical guide of
the HEIs migration policy to IPv6.
6. Al Musawi et al Analytical Review on the Stakeholders Perceptions about IPv6 Readiness
1046| International Journal of Current Engineering and Technology, Vol.8, No.4 (July/Aug 2018)
Table 5: Research project’s Timeline
Task/
Time
2018 2019
Design/
Review
Development Implantation
Analysis/
Writing
Design
Develop
ment
Implantation
Analysis/
Writing
Literature Review
Questionnaire
Interviews
Reports
Training courses
Practical Guide
We express our gratitude to the SQU for the generous
grant awarded to us. Further, we appreciate the TRA
stakeholders’ cooperation in meeting the research
team and providing the required documents and
resources. Such institutional efforts make this research
project possible.
References
Abulkasim, A. F. S., & Ahmad, A. A. (2015). IPV6 Deployment
Status for Higher Education Institutions' Website of
Ministry of Education Malaysia. International Journal of
Current Engineering and Technology, 5(2), 1060-1067.
Ali, A. N. A. (2012). Comparison study between IPV4 & IPV6.
International Journal of Computer Science Issues, 9(3),
314-317.
Almes, G., Anderson, C., Mundrane, M., & Polichar, V. (2013).
Transitioning to IPv6. In ECAR (Ed.), ECAR reports:
EDUCAUSE.
Ansari, A. N., Sedky, M., Sharma, N., & Tyagi, A. (2015). An
Internet of things approach for motion detection using
Raspberry Pi. Paper presented at the Intelligent Computing
and Internet of Things (ICIT), 2014 International
Conference on.
Boe, G. (2012). IPv6 in higher education in Norway, The last
IPv6 workshop Helsinki 2012-10-04, UNINETT.
Coffeen, T. (2014). IPv6 Address Planning: Designing an
Address Plan for the Future: " O'Reilly Media, Inc.".
Dandjinou, P. (2014). Preparing African Higher Educations
Institutions for IPv6 Networking, Paper presented to the
Association of African Universities, Accra-North, GH,
Available: https:// idl-bnc-idrc.dspacedirect.org/handle/
10625/53453
Dawadi, B. R., Shakya, S., & Khanal, A. R. (2016). Government
Roadmap for IPv4 to IPv6 Network Migration: A Case of
Nepal. Journal of the Institute of Engineering, 11(1), 67-78.
Dell, P. (2012). Australian IPv6 readiness: Results of a
national survey. Journal of Research and Practice in
Information Technology, 44(1), 3.
Graziani, R. (2012). IPv6 fundamentals: a straightforward
approach to understanding IPv6: Pearson Education.
Grégr, M., Petr Matoušek, Podermański, T., & Švéda, M.
(2011). Practical IPv6 Monitoring on Campus: Best
Practice Document: TERENA.
Hicks, B. (2012). IPv6 within Texas Research and Education,
Paper presentation, Lonestar Education And Research
Network (LEARN), Available: http://www.tx-learn.net/
Kunc, U., Pepelnjak, I., Sterle, J., Istenič, M., Kobal, A., Lisec, S.,
Maennel, and O., Žorž, J. (2012). Transition to IPv6,
Ministry of Higher Education, Science and Technology,
Slovenia.
Ladid, L. (2000). IPv6—The new-generation Internet.
Ericsson Review(1), 6-13.
Ladid, L. (2016). IPv6 based Internet, Paper presented at the
3rd Middle East College International Conference, March
15-16 2016, Muscat, Oman.
Main, A., Zakaria, N. A., & Yusof, R. (2015). Organisation
Readiness Factors Towards IPv6 Migration: Expert Review.
Procedia-Social and Behavioral Sciences, 195, 1882-1889.
Martin, D. H., & Heyer, A. B. (2004). Anyone for IPv6? Paper
presented at the Conference of Information Technology in
Tertiary Education (CITTE 2004), University of Cape Town.
Meena, R. C., & Bundele, M. (2015). A Review on
Implementation Issues in IPv6 Network Technology.
International Journal of Engineering Research and General
Science, 3(6), 800-809.
Southworth, J. B. (2016). An empirical analysis of the
relationship between IPv6 readiness, IPv6 enablement,
and IPv6 effectiveness at colleges and universities in the
United States. (Ph.D.), Indiana State University.
(10106058)
TRA- Telecommunication Regularatory Authority (2018a).
The National Migration Plan for Government Sector, TRA
official Resolution (1/2018), Muscat, Oman.
TRA- Telecommunication Regularatory Authority (2018b).
Sequence of event since TRA established IPv6 project, TRA
electronic document, Muscat, Oman.