SlideShare a Scribd company logo
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645
www.ijmer.com 1075 | Page
Bikki Lakshmi Manasa, 1
Guttikonda Chaitra Bharti, 2
Mikkili Ramya Teja, 3
Akkela Rama Krishna4
1234
Dept. of Electronics and Communication Engineering, K L University, India
Abstract: On February 3, 2011 the current version of the Internet IPv4 was depleted of addresses. Since the Internet today
uses IPv4 for 99% of the traffic, it will be a slow migration to IPv6.1.The shortage of addresses has led to the introduction of
IPv6 which has 128-bit (16-byte) source and destination IP addresses. Many organizations do not see a reason to convert to
IPv6, and believe they are not running IPv6.2 whether an organization knows it or not, any laptop/PC running Vista or
Windows 7 is a vulnerability from which attacks can come that will be invisible to IPv4 networks. Three transition strategies
are being employed: header translation, dual stack and tunneling of IPv6 inside IPv4.4 Tunneling is the most precarious
method for today’s IPv4 networks. The IPv6 packet is included inside the message field of an IPv4 packet. The contents of
the IPv6 packet will not be noticed by an IPv4 firewall or intrusion detection system. Hidden IPv6 traffic running across an
organization’s network can wreak havoc, allow malware to enter the network, and be the basis for a denial of service attack.
The only defense against such attacks is deep packet inspection (DPI). The widespread use of DPI is inevitable. The first
serious security breach caused by tunneled IPv6 inside an IPv4 packet is certain to come in the near future. This event will
be a motivation to organizations to defend against such attacks.
Keywords: IPv4, IPv6, deep packet inspection, cyber terrorism, security
I. Introduction
Under the Action Plan Europe 2005, it was recognized by the Commission that “IPv6 is essential on the road
leading to network-based technologies, products and services that will contribute to an "everywhere", user-centric
Information Society”.
This gave rise to the European Commission's Communication to the Council and the European Parliament
(COM/2002/96) – “Next Generation Internet – priorities for action in migrating to the new Internet protocol IPv6”, which
creates a context for the EU Members to take action in focusing on broadband availability and the development of IPv6.
These developments require a concerted action aiming at the structuring, consolidation and integration of European
efforts on IPv6, notably through:
1. Increased support towards IPv6 in public networks and services;
2. The establishment and launch of educational programmers on IPv6;
3. The adoption of IPv6 through awareness raising campaigns;
4. The continued stimulation of the Internet take-up across the European Union;
5. Increased support to IPv6 activities in the Framework’s Programme;
6. The strengthening of the support towards the IPv6 enabling of national and European Research Networks;
7. An active contribution towards the promotion of IPv6 standards work;
8. The integration of IPv6 in all strategic plans concerning the use of new Internet services.
In order to take some of the proposed actions, various European Countries have created an IPv6 Task Force group
open to the different market players, including manufactures, operators, providers, applications developers, academic
institutions, etc.
Following the European Commission's Communication, the present document explains the different aspects
involved in IPv6 implementation that could lead to guidelines on the priorities for implementing and adopting IPv6 in public
networks and services. The consequences for the market parties, including the users are also discussed.
II. Ipv6 – The Next Generation of Ip
“In the general sense, an internet is a computer network that connects several networks. The Internet is a publicly
available internationally interconnected system of computers plus the information and services provided to their users using
a TCP/IP suite of packet switching communications protocols1
”.
To interconnect two or more computer networks it is necessary to have a routing device to exchange traffic, and
steer traffic via several different nodes on the path across a network to its destination. The devices used to interconnect
different networks are routers. Others devices with specific functions like gateways or bridge are also used. All network
elements such as routers, switches, gateways, bridges, LAN cards, need to have at least one IP address.
IPv6, an Internet Protocol for efficient expansion capacity
in addressing and routing
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645
www.ijmer.com 1076 | Page
Figure 1: Use of routers
Different IP packet networks are normally interconnected by Routers that have added functionality to permit
accounting between the interconnected networks. In other configurations they act also as interworking devices between
different protocols.
2.1 Major benefits of the IPv6 – Why change?
The new version of IPv6 was conceived to replace the previous IPv4 standard that was adopted two decades ago as
a robust, easily implemented standard.
However IPv4 is being used successfully to support the communications systems in the emerging information
society and has been updated to extend its useful life (e.g. NAT mechanism, IPsec protocol), MPLS, Tunneling). However
its capabilities are somewhat limited in the following areas:
 Exhaustion of the IPv4 address space;
 Growth of the Internet and the maintenance of routing tables
 Auto-configuration
 Mobility
 Security
 Quality of service
And the purpose of developing IPv6 is to overcome these limitations.
The areas where IPv6 offers improvement are:
 Expansion capacity for addressing and routing – the IP address space is expanded from 32 bits to 128 bits, enabling a
greatly increased number of address combinations, levels of hierarchical address organization and auto-configuration of
addresses;
 Simplified header format – the IPv6 basic header is only 40 bytes long in spite of the greatly increased address
allocation;
 Enhanced options support – several different, separate “extension headers” are defined, which enable flexible support
for options without all of the header structure having to be interpreted and manipulated at every router point along the
way;
 Quality of service – the Flow Label and the Priority fields in the IPv6 header are used by a host to identify packets that
need special handling by IPv6 routers, such as non-default quality of service or "real-time" service. This capability is
important in that it needs to support applications that require some degree of consistent throughput, delay, and jitter;
 Auto-configuration – adds the concept of dynamic assignment of part of the address space, based on geographic and
topographic features of a given physical connection
 Elimination of the need for NATs (network address translators) – since the IP address space supports
approximately 3.4 x 1038
possible combinations, the need for private addressing schemes behind NATs is unnecessary
on grounds of address conservation;
 Improved security with mandatory IPsec implementation – IPv6 provides for integral support for authentication,
privacy and data integrity measures, by requiring all implementations to support these features;
 Mobility - mobile computers are assigned with at least two IPv6 addresses whenever they are roaming away from their
home network. One (the home address) is permanent; the other (the IPv6 link-local address) is used temporarily. In
addition, the mobile node will typically auto-configure a globally-routable address at each new point of attachment.
Every IPv6 router supports encapsulation, so every router is capable of serving as a home agent on the network(s) to
which it is attached.
2.2IP addressing architecture
An IP address is a binary number, which identifies any user’s computer directly connected to the Internet. An IPv4 address
consists of 32 bits, but it is usually represented by a group of four numbers (8 bits hexadecimal), from 0 to 255 ranges and
separated by full stops. An example of this representation is showed below
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645
www.ijmer.com 1077 | Page
124.32.43.4
Several domain names can also be linked to the same IP address, in effect similar to having more than one name for
the same person.
The most recognized change from IPv4 to IPv6 is the length of network addresses. The IPv6 addresses have 128
bits length. The 128 bits provide approximately 3.4x1038
separate values. An IPv6 address consists of eight numbers in the
hexadecimal format, from 0 to 65535 (decimal) ranges and separated by a colon “:”. An example of this new representation
is showed following:
FECA: 0000:234A:0043:AB45: FFFF: 9A3E:000B
In order to compare with the IPv4 header next figure 3 shows the IPv6 header format:
Figure 3: IPv6 Structure
III. Services and Equipments
The "converging" new generation communication networks are using and planning to use an IP based network
infrastructure with multi-functional end-devices, always on, always reachable peer-to-peer, with mobility, quality of service
and end-to-end security. Even non telecom industries such as music, radio and television will be supported in the IP
environment. There are applications that need or will benefit from IPv6 such as:
 Mobile broadband IP;
 Mobile IP broadcast;
 Peer to peer VoIP;
 Digital radio;
 iTV and IPTV;
 Grids;
 P2P multiplayer games;
 RFID;
 Control networks;
 Remote manufacturing systems;
 Sensor networks;
 Microsoft (native support of IPv6 in the next version of Windows – Longhorn).
There are also a few technologies that will support the migration to IPv6 like:
 Power line Communication;
 Wi-Fi;
 Wi-Max;
 ZigBee;
 Unlicensed Mobile Access (UMA).

IV. Migration
The current IP-based network will gradually migrate from IPv4 to IPv6. Signaling interworking will need to be
supported between the IPv6 network and the existing IPv4 network. Mapping of signaling between IPv6 and IPv4 is
required. From the deployment point of view, there are three stages of evolution scenarios:
 First stage (stage 1): IPv4 ocean and IPv6 island;
 Second stage (stage 2): IPv6 ocean and IPv4 island;
 Third stage (stage 3): IPv6 Ocean and IPv6 Island.
00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Version Flow Label
Destination Address
(128 bits)
Source Address
(128 bits)
Payload Length Next Header Hop Limit
Traffic Class1
2
3
4
5
6
7
8
9
10
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645
www.ijmer.com 1078 | Page
There are several migration mechanisms from the IPv4 protocol to IPv6 protocol. The most discussed techniques are:
 Dual stack – to allow IPv4 and IPv6 to coexist in the same devices and networks;
 Tunneling – to avoid order dependencies when upgrading hosts, routers or regions;
 Translation – to allow IPv6 only devices to communicate with IPv4 only devices.
Most of these techniques can be combined in a migration scenario to permit a smooth transition from IPv4 to IPv6.
In the following sub-sections, these three techniques are described briefly.
4.1 Dual Stack Technique
In this method it is proposed to implement two protocols stacks in the same device. The protocol stack used for each
link depends on the device used at the other end of the link. Figure 4 shows this arrangement.
Figure 4: Dual stack operation
4.2 Tunnelling Techniques
Tunneling techniques are used in two phases in the migration to a fully IPv6 network. In the first phase the core of
the network uses the IPv4 protocol and there are only small islands IPv6. Figure 5 shows this phase. The IPv6 protocol is
encapsulated in IPv4 tunnels.
Figure 5: IPv4 Tunneling with islands of IPv6 in and IPv4 core network (phase 1)
In a second phase, when many nodes in the core of the network have already changed to IPv6, the situation is
reversed and IPv4 is encapsulated in IPv6 tunnels. The following figure shows this second phase.
Figure 6: IPv6 Tunneling with islands of IPv4 in and IPv6 core network (phase 2)
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645
www.ijmer.com 1079 | Page
4.3 Translation Techniques
This technique uses a device, the NATPT (Network Address Translation – Protocol Translation) that translates in
both directions between IPv4 and IPv6 at the boundary between an IPv4 network and an IPv6 network. Figure 7 shows this
arrangement.
Figure 7: the arrangement with Network Address Translation – Protocol Translation
4.4 Some Proposals
As it was stated before that the solution for the migration from IPv4 to IPv6 will be a combination of the techniques
described above.
The most preferable solution on the backbone of the IP Network is the use of the dual stack technique by ISPs and
Network operators. This solution is already possible, because almost all hardware providers have already updated the
software to support this technique.
In the access network, considering that there are many routers at the user’s premises and these routers do not
support IPv6 at present, the best solution is the use of the translation technique by access devices. In a further phase is
possible to switch to the dual stack technique.
V. Security
“Security is the most common concern with regard to the Internet and to financial transactions via the Internet in
particular. Security issues such as authenticating users, controlling access to resources, encrypting communications, and
generally ensuring the privacy of transactions all need to be addressed” (European Commission).
The IPv6 is considered to have “Native Security” included by adding different extensions headers in the protocol.
This security has the following characteristics:
 It works end-to-end – it is possible to have IPsec services between a pair of hosts; the authentication is separate from the
encryption;
 It has an Authentication Header (AH) – this header refers to the entire packet; providing data integrity and
authentication and mitigating the replay;
 It has an Encapsulating Security Payload (ESP) Header - encapsulated payload packet (tunnel); providing data integrity
and authentication and/or confidentiality; mitigating the replay and limits sniffing when confidentiality is enabled.
Network Address Translation (NAT) appears to add little value in the IPv6 environment. With the increased
capacity of addressing, there is no need to continue to use NATs to conserve addresses.
The Firewalls have following functions:
 They enforce uniform policy at perimeter;
 They stop outsiders from performing dangerous operations;
 They provide a check point and scalable, centralized control.
In an IPv6 network end-to-end connectivity, tunneling and encryptions can conflict with this policy. To avoid these
limitations, in an IPv6 network it is necessary to combine the firewall functions and the router functions in the same
equipment and to locate it in the edge of the private network. See figure 8 below:
Figure 8: Combined firewall and router
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645
www.ijmer.com 1080 | Page
VI. Ipv6 and the Ngn
The current IP network is in a process of transition from IPv4 to IPv6. Mobile access networks are one of the major
potential application areas for IPv6. This is mainly due to the large address space of IPv6. Besides, a large percentile of
packets in such networks will carry real time traffic such as voice or video. These applications are expected to be important
for IPv6, as they may depend heavily on the QoS mechanism in IPv6 networks. Nevertheless 3GPP is considering using
IPv4 addresses initially instead of IPv6 addresses.
From the signaling point of view, the IPv6 protocol has many features related to QoS and other capabilities. By
utilizing IPv6 features, such as ease of defining explicit route, flow labeling capability and improved support for extensions
and options like hop-by-hop option header or destination option header, it is possible to improve the efficiency of IPv6
networks without modifying the existing signaling protocols.
VII. Standards and Tests
The IETF (Internet Engineering Task Force) created a working group to develop the IPv6 protocol. The "IPv6
Working Group" is responsible for the specification and standardization of the Internet Protocol version 6 (IPv6). IETF
produced several specifications and protocols; these can be found at the following URL:
http://playground.sun.com/pub/ipng/html/specs/specifications.htm
The core IPv6 standards are widely implemented and are starting to see global deployment.
A European IPv6 Task Force has also been created. Delegates of the different national Task Forces take part. The
link for the documents prepared for this TF is showed:
http://www.ec.ipv6tf.org/in/i-documentos.php
Another organization founded to promote de IPv6 protocol and implementation was the IPv6 Forum. IPv6 Forum is
a world-wide consortium of leading Internet vendors, Research & Education Networks, with a clear mission to promote IPv6
by dramatically improving the market and user awareness of IPv6, creating a quality and secure Next Generation Internet
and allowing world-wide equitable access to knowledge and technology.
To achieve these proposals the IPv6 FORUM will:
 Establish an open, international FORUM of IPv6 expertise;
 Share IPv6 knowledge and experience among members;
 Promote new IPv6-based applications and global solutions;
 Promote interoperable implementations of IPv6 standards;
 Co-operate to achieve end-to-end quality of service;
 Resolve issues that create barriers to IPv6 deployment.
The web site from this forum can be found in:
http://www.ipv6forum.com
The European Commission has been instrumental in providing necessary funding for the research and development
of IPv6 related issues. In particular, and in response to the conclusions of the Stockholm Summit, the Commission stepped
up its R&D efforts. A large number of IPv6 projects are currently operational, including two large-scale IPv6 trials, namely
6NET and Euro6IX.
These trials are fully complementary to the efforts deployed at national level and at European level in the context of
initiatives such as GEANT.
VIII. Possible Actions
In order to complete some of the actions proposed by the Commission and the European Task Force, guidelines
should be developed to help the operators and the users gradually take the necessary steps to start the migration to IPv6 and
in a near future to adopt the new version of IP protocol (IPv6).
Technical guidance is a valuable way to promote the adoption of IPv6 in public networks and services.
IX. Conclusion
The deployment of IPv6 is important to the future health of the Internet. An average of 4Tbps of traffic per day is
seen for a one-year measurement period. This provides a best available estimate of overall IPv6 traffic on the Internet. The
dwindling supply of available IPv4 addresses has been broadly documented, as have the challenges faced by those wishing to
migrate to IPv6.
In terms of hard data, however, industry and academia have had little visibility into the rate of IPv6 deployment in
the Internet.
Providing support for IPv6 in the world is still predominantly IPv4 based. Also, it seems interesting that there is no
significant migration of users from IPv4 to IPv6 as per the data. However, the significant growth of IPv4 traffic implies that
the usage of IPv6 is also increasing, but at a comparatively slower pace.
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645
www.ijmer.com 1081 | Page
References
[1] C. Caicedo, J. Joshi, and S. Tuladhar, “IPv6 Security Challenges”, Computer, IEEE Computer Society, February 2009
[2] Bihrouzan A. Forouzan, “TCP/IP Protocol Suite”, 4th Edition, McGraw Hill, ISBN: 978- 0-07-337604-2, 2010
[3] C. Balanis, Antenna Theory, Analysis and Design, 3rd edition, New York: Wiley, 2005.
[4] S. Bradner and A. Mankin, “The Recommendation for the Next Generation IP Protocol”, RFC 1752, Jan. 1995
[5] Christian Huitema, “IPv6: The New Internet Protocol (2nd Edition)”, Jan. 1998.
[6] Andrew S. Tanenbaum,David J. Wetherall,“Computer Networks (5th
edition)”,Oct. 2010.
Bikki Lakshmi Manasa was born in Guntur District ,Andhra Pradesh, India on 1st
August 1992, is currently pursuing
B.TECH (4th year) in Electronics and Communication Engineering(ECE) in K.L.University. Areas of interest are Digital
Communications, Computer Networks, Antennas and Wave Propagation, VLSI and Digital Signal Processing.
Guttikonda Chaitra Bharti was born in Warangal District ,Andhra Pradesh, India on 23rd February 1992, is currently
pursuing B.TECH (4th year) in Electronics and Communication Engineering(ECE) in K L University. Areas of interest are
Digital Communications, Computer Networks, Antennas and Wave Propagation, VLSI and Digital Signal Processing.
Mikkili Ramya Teja was born in Guntur District, Andhra Pradesh, India, on 30th
may 1992, and is currently pursuing
B.TECH (4th year) in Electronics and Communication Engineering (ECE) in K L University. Areas of interest are Digital
Communications, Computer networks, Antennas and Wave Propagation and Digital Signal Processing.
Akkela Rama Krishna is working as an Asst. Professor in the department of Electronics and Computers Engineering at K
L University. Areas of interest are Artificial Intelligence, Digital Communications and Computer Networks.

More Related Content

What's hot

Performance Evaluation of Soft RoCE over 1 Gigabit Ethernet
Performance Evaluation of Soft RoCE over 1 Gigabit EthernetPerformance Evaluation of Soft RoCE over 1 Gigabit Ethernet
Performance Evaluation of Soft RoCE over 1 Gigabit Ethernet
IOSR Journals
 
ccna presentation
ccna presentationccna presentation
ccna presentation
Yasser Mahfouz
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
ateeq85905
 
Ex 1 chapter05-network-layer-tony_chen
Ex 1 chapter05-network-layer-tony_chenEx 1 chapter05-network-layer-tony_chen
Ex 1 chapter05-network-layer-tony_chenĐô GiẢn
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]Avijit Nath
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...
IJECEIAES
 
Vo ip
Vo ipVo ip
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
RMK ENGINEERING COLLEGE, CHENNAI
 
Ppt on i pv6
Ppt on i pv6Ppt on i pv6
Ppt on i pv6
vikash saini
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
Sagar Shashank
 
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
CSCJournals
 
Ipv6
Ipv6Ipv6
Ccna report
Ccna reportCcna report
Ccna report
Surender Singh
 
10.18100 ijamec.270089-236597
10.18100 ijamec.270089-23659710.18100 ijamec.270089-236597
10.18100 ijamec.270089-236597
luis miguel
 
Networking
NetworkingNetworking
NetworkingRashmi
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
Peter R. Egli
 
Unit 2
Unit 2Unit 2
Unit 2
vijisvs2012
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
Nil Menon
 

What's hot (20)

Performance Evaluation of Soft RoCE over 1 Gigabit Ethernet
Performance Evaluation of Soft RoCE over 1 Gigabit EthernetPerformance Evaluation of Soft RoCE over 1 Gigabit Ethernet
Performance Evaluation of Soft RoCE over 1 Gigabit Ethernet
 
ccna presentation
ccna presentationccna presentation
ccna presentation
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
 
Ex 1 chapter05-network-layer-tony_chen
Ex 1 chapter05-network-layer-tony_chenEx 1 chapter05-network-layer-tony_chen
Ex 1 chapter05-network-layer-tony_chen
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...
 
Vo ip
Vo ipVo ip
Vo ip
 
It2402 mobile communication unit 4
It2402 mobile communication unit 4It2402 mobile communication unit 4
It2402 mobile communication unit 4
 
Ppt on i pv6
Ppt on i pv6Ppt on i pv6
Ppt on i pv6
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
 
27 122-1-pb
27 122-1-pb27 122-1-pb
27 122-1-pb
 
Ipv6
Ipv6Ipv6
Ipv6
 
Ccna report
Ccna reportCcna report
Ccna report
 
10.18100 ijamec.270089-236597
10.18100 ijamec.270089-23659710.18100 ijamec.270089-236597
10.18100 ijamec.270089-236597
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
Networking
NetworkingNetworking
Networking
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Unit 2
Unit 2Unit 2
Unit 2
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 

Viewers also liked

Writing for pr #2
Writing for pr #2Writing for pr #2
Writing for pr #2
Dicky Ahmad
 
Skyline Query Processing using Filtering in Distributed Environment
Skyline Query Processing using Filtering in Distributed EnvironmentSkyline Query Processing using Filtering in Distributed Environment
Skyline Query Processing using Filtering in Distributed Environment
IJMER
 
How to quickly put money in your bank
How to quickly put money in your bankHow to quickly put money in your bank
How to quickly put money in your bankdenise2228
 
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...
IJMER
 
An32678684
An32678684An32678684
An32678684IJMER
 
Aj32652658
Aj32652658Aj32652658
Aj32652658IJMER
 
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
IJMER
 
Bt2423072310
Bt2423072310Bt2423072310
Bt2423072310IJMER
 
Ijmer 46065964
Ijmer 46065964Ijmer 46065964
Ijmer 46065964IJMER
 
Dr2425912593
Dr2425912593Dr2425912593
Dr2425912593IJMER
 
CCL
CCLCCL
CCL
EWIL_EU
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
IJMER
 
Some New Families on H-Cordial Graphs
Some New Families on H-Cordial GraphsSome New Families on H-Cordial Graphs
Some New Families on H-Cordial Graphs
IJMER
 
On Normal and Unitary Polynomial Matrices
On Normal and Unitary Polynomial MatricesOn Normal and Unitary Polynomial Matrices
On Normal and Unitary Polynomial Matrices
IJMER
 
GPS cycle slips detection and repair through various signal combinations
GPS cycle slips detection and repair through various signal combinationsGPS cycle slips detection and repair through various signal combinations
GPS cycle slips detection and repair through various signal combinations
IJMER
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
IJMER
 
Enhancement in viscosity of diesel by adding vegetable oil
Enhancement in viscosity of diesel by adding vegetable oilEnhancement in viscosity of diesel by adding vegetable oil
Enhancement in viscosity of diesel by adding vegetable oil
IJMER
 
Structural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor NetworksStructural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor Networks
IJMER
 

Viewers also liked (19)

Writing for pr #2
Writing for pr #2Writing for pr #2
Writing for pr #2
 
Skyline Query Processing using Filtering in Distributed Environment
Skyline Query Processing using Filtering in Distributed EnvironmentSkyline Query Processing using Filtering in Distributed Environment
Skyline Query Processing using Filtering in Distributed Environment
 
How to quickly put money in your bank
How to quickly put money in your bankHow to quickly put money in your bank
How to quickly put money in your bank
 
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...
 
Report Card Night
Report Card NightReport Card Night
Report Card Night
 
An32678684
An32678684An32678684
An32678684
 
Aj32652658
Aj32652658Aj32652658
Aj32652658
 
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
 
Bt2423072310
Bt2423072310Bt2423072310
Bt2423072310
 
Ijmer 46065964
Ijmer 46065964Ijmer 46065964
Ijmer 46065964
 
Dr2425912593
Dr2425912593Dr2425912593
Dr2425912593
 
CCL
CCLCCL
CCL
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
 
Some New Families on H-Cordial Graphs
Some New Families on H-Cordial GraphsSome New Families on H-Cordial Graphs
Some New Families on H-Cordial Graphs
 
On Normal and Unitary Polynomial Matrices
On Normal and Unitary Polynomial MatricesOn Normal and Unitary Polynomial Matrices
On Normal and Unitary Polynomial Matrices
 
GPS cycle slips detection and repair through various signal combinations
GPS cycle slips detection and repair through various signal combinationsGPS cycle slips detection and repair through various signal combinations
GPS cycle slips detection and repair through various signal combinations
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
 
Enhancement in viscosity of diesel by adding vegetable oil
Enhancement in viscosity of diesel by adding vegetable oilEnhancement in viscosity of diesel by adding vegetable oil
Enhancement in viscosity of diesel by adding vegetable oil
 
Structural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor NetworksStructural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor Networks
 

Similar to Da3210751081

Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
IJERA Editor
 
On the migration of a large scale network from i pv4 to ipv6 environment
On the migration of a large scale network from i pv4 to ipv6 environmentOn the migration of a large scale network from i pv4 to ipv6 environment
On the migration of a large scale network from i pv4 to ipv6 environment
IJCNCJournal
 
Ipv6 Advantages And Disadvantages
Ipv6 Advantages And DisadvantagesIpv6 Advantages And Disadvantages
Ipv6 Advantages And Disadvantages
Jacqueline Thomas
 
A Scenario-Based Review Of IPv6 Transition Tools
A Scenario-Based Review Of IPv6 Transition ToolsA Scenario-Based Review Of IPv6 Transition Tools
A Scenario-Based Review Of IPv6 Transition Tools
Tye Rausch
 
M017147275
M017147275M017147275
M017147275
IOSR Journals
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
IOSR Journals
 
Non symbolic base64 an effective representation of ipv6 address
Non symbolic base64 an effective representation of ipv6 addressNon symbolic base64 an effective representation of ipv6 address
Non symbolic base64 an effective representation of ipv6 addressIAEME Publication
 
Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4Alexander Decker
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
IJCNCJournal
 
A Survey On Next Generation Internet Protocol IPv6
A Survey On Next Generation Internet Protocol  IPv6A Survey On Next Generation Internet Protocol  IPv6
A Survey On Next Generation Internet Protocol IPv6
Carrie Romero
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
Kollins Lolong
 
A secure tunnel technique using i pv6 transition over ipv4 channel
A secure tunnel technique using i pv6 transition over ipv4 channelA secure tunnel technique using i pv6 transition over ipv4 channel
A secure tunnel technique using i pv6 transition over ipv4 channel
Made Artha
 
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
ijceronline
 
Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6
Zalak Patel
 
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSREVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
IJNSA Journal
 
A Review Paper On IPv4 And IPv6 A Comprehensive Survey
A Review Paper On IPv4 And IPv6  A Comprehensive SurveyA Review Paper On IPv4 And IPv6  A Comprehensive Survey
A Review Paper On IPv4 And IPv6 A Comprehensive Survey
Hannah Baker
 
14 564
14 56414 564
Ipv4 To Ipv6 Transition
Ipv4 To Ipv6 TransitionIpv4 To Ipv6 Transition
Ipv4 To Ipv6 Transition
Heidi Owens
 

Similar to Da3210751081 (20)

Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
 
On the migration of a large scale network from i pv4 to ipv6 environment
On the migration of a large scale network from i pv4 to ipv6 environmentOn the migration of a large scale network from i pv4 to ipv6 environment
On the migration of a large scale network from i pv4 to ipv6 environment
 
40120130405018 2
40120130405018 240120130405018 2
40120130405018 2
 
Ipv6 Advantages And Disadvantages
Ipv6 Advantages And DisadvantagesIpv6 Advantages And Disadvantages
Ipv6 Advantages And Disadvantages
 
A Scenario-Based Review Of IPv6 Transition Tools
A Scenario-Based Review Of IPv6 Transition ToolsA Scenario-Based Review Of IPv6 Transition Tools
A Scenario-Based Review Of IPv6 Transition Tools
 
M017147275
M017147275M017147275
M017147275
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
 
Non symbolic base64 an effective representation of ipv6 address
Non symbolic base64 an effective representation of ipv6 addressNon symbolic base64 an effective representation of ipv6 address
Non symbolic base64 an effective representation of ipv6 address
 
Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
 
A Survey On Next Generation Internet Protocol IPv6
A Survey On Next Generation Internet Protocol  IPv6A Survey On Next Generation Internet Protocol  IPv6
A Survey On Next Generation Internet Protocol IPv6
 
RASHMI VT REPORT
RASHMI VT REPORTRASHMI VT REPORT
RASHMI VT REPORT
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
A secure tunnel technique using i pv6 transition over ipv4 channel
A secure tunnel technique using i pv6 transition over ipv4 channelA secure tunnel technique using i pv6 transition over ipv4 channel
A secure tunnel technique using i pv6 transition over ipv4 channel
 
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
 
Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6Compatibility between IPv4 and IPv6
Compatibility between IPv4 and IPv6
 
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSREVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
 
A Review Paper On IPv4 And IPv6 A Comprehensive Survey
A Review Paper On IPv4 And IPv6  A Comprehensive SurveyA Review Paper On IPv4 And IPv6  A Comprehensive Survey
A Review Paper On IPv4 And IPv6 A Comprehensive Survey
 
14 564
14 56414 564
14 564
 
Ipv4 To Ipv6 Transition
Ipv4 To Ipv6 TransitionIpv4 To Ipv6 Transition
Ipv4 To Ipv6 Transition
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
IJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
IJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
IJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
IJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
IJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
IJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
IJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
IJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
IJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
IJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
IJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
IJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Da3210751081

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645 www.ijmer.com 1075 | Page Bikki Lakshmi Manasa, 1 Guttikonda Chaitra Bharti, 2 Mikkili Ramya Teja, 3 Akkela Rama Krishna4 1234 Dept. of Electronics and Communication Engineering, K L University, India Abstract: On February 3, 2011 the current version of the Internet IPv4 was depleted of addresses. Since the Internet today uses IPv4 for 99% of the traffic, it will be a slow migration to IPv6.1.The shortage of addresses has led to the introduction of IPv6 which has 128-bit (16-byte) source and destination IP addresses. Many organizations do not see a reason to convert to IPv6, and believe they are not running IPv6.2 whether an organization knows it or not, any laptop/PC running Vista or Windows 7 is a vulnerability from which attacks can come that will be invisible to IPv4 networks. Three transition strategies are being employed: header translation, dual stack and tunneling of IPv6 inside IPv4.4 Tunneling is the most precarious method for today’s IPv4 networks. The IPv6 packet is included inside the message field of an IPv4 packet. The contents of the IPv6 packet will not be noticed by an IPv4 firewall or intrusion detection system. Hidden IPv6 traffic running across an organization’s network can wreak havoc, allow malware to enter the network, and be the basis for a denial of service attack. The only defense against such attacks is deep packet inspection (DPI). The widespread use of DPI is inevitable. The first serious security breach caused by tunneled IPv6 inside an IPv4 packet is certain to come in the near future. This event will be a motivation to organizations to defend against such attacks. Keywords: IPv4, IPv6, deep packet inspection, cyber terrorism, security I. Introduction Under the Action Plan Europe 2005, it was recognized by the Commission that “IPv6 is essential on the road leading to network-based technologies, products and services that will contribute to an "everywhere", user-centric Information Society”. This gave rise to the European Commission's Communication to the Council and the European Parliament (COM/2002/96) – “Next Generation Internet – priorities for action in migrating to the new Internet protocol IPv6”, which creates a context for the EU Members to take action in focusing on broadband availability and the development of IPv6. These developments require a concerted action aiming at the structuring, consolidation and integration of European efforts on IPv6, notably through: 1. Increased support towards IPv6 in public networks and services; 2. The establishment and launch of educational programmers on IPv6; 3. The adoption of IPv6 through awareness raising campaigns; 4. The continued stimulation of the Internet take-up across the European Union; 5. Increased support to IPv6 activities in the Framework’s Programme; 6. The strengthening of the support towards the IPv6 enabling of national and European Research Networks; 7. An active contribution towards the promotion of IPv6 standards work; 8. The integration of IPv6 in all strategic plans concerning the use of new Internet services. In order to take some of the proposed actions, various European Countries have created an IPv6 Task Force group open to the different market players, including manufactures, operators, providers, applications developers, academic institutions, etc. Following the European Commission's Communication, the present document explains the different aspects involved in IPv6 implementation that could lead to guidelines on the priorities for implementing and adopting IPv6 in public networks and services. The consequences for the market parties, including the users are also discussed. II. Ipv6 – The Next Generation of Ip “In the general sense, an internet is a computer network that connects several networks. The Internet is a publicly available internationally interconnected system of computers plus the information and services provided to their users using a TCP/IP suite of packet switching communications protocols1 ”. To interconnect two or more computer networks it is necessary to have a routing device to exchange traffic, and steer traffic via several different nodes on the path across a network to its destination. The devices used to interconnect different networks are routers. Others devices with specific functions like gateways or bridge are also used. All network elements such as routers, switches, gateways, bridges, LAN cards, need to have at least one IP address. IPv6, an Internet Protocol for efficient expansion capacity in addressing and routing
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645 www.ijmer.com 1076 | Page Figure 1: Use of routers Different IP packet networks are normally interconnected by Routers that have added functionality to permit accounting between the interconnected networks. In other configurations they act also as interworking devices between different protocols. 2.1 Major benefits of the IPv6 – Why change? The new version of IPv6 was conceived to replace the previous IPv4 standard that was adopted two decades ago as a robust, easily implemented standard. However IPv4 is being used successfully to support the communications systems in the emerging information society and has been updated to extend its useful life (e.g. NAT mechanism, IPsec protocol), MPLS, Tunneling). However its capabilities are somewhat limited in the following areas:  Exhaustion of the IPv4 address space;  Growth of the Internet and the maintenance of routing tables  Auto-configuration  Mobility  Security  Quality of service And the purpose of developing IPv6 is to overcome these limitations. The areas where IPv6 offers improvement are:  Expansion capacity for addressing and routing – the IP address space is expanded from 32 bits to 128 bits, enabling a greatly increased number of address combinations, levels of hierarchical address organization and auto-configuration of addresses;  Simplified header format – the IPv6 basic header is only 40 bytes long in spite of the greatly increased address allocation;  Enhanced options support – several different, separate “extension headers” are defined, which enable flexible support for options without all of the header structure having to be interpreted and manipulated at every router point along the way;  Quality of service – the Flow Label and the Priority fields in the IPv6 header are used by a host to identify packets that need special handling by IPv6 routers, such as non-default quality of service or "real-time" service. This capability is important in that it needs to support applications that require some degree of consistent throughput, delay, and jitter;  Auto-configuration – adds the concept of dynamic assignment of part of the address space, based on geographic and topographic features of a given physical connection  Elimination of the need for NATs (network address translators) – since the IP address space supports approximately 3.4 x 1038 possible combinations, the need for private addressing schemes behind NATs is unnecessary on grounds of address conservation;  Improved security with mandatory IPsec implementation – IPv6 provides for integral support for authentication, privacy and data integrity measures, by requiring all implementations to support these features;  Mobility - mobile computers are assigned with at least two IPv6 addresses whenever they are roaming away from their home network. One (the home address) is permanent; the other (the IPv6 link-local address) is used temporarily. In addition, the mobile node will typically auto-configure a globally-routable address at each new point of attachment. Every IPv6 router supports encapsulation, so every router is capable of serving as a home agent on the network(s) to which it is attached. 2.2IP addressing architecture An IP address is a binary number, which identifies any user’s computer directly connected to the Internet. An IPv4 address consists of 32 bits, but it is usually represented by a group of four numbers (8 bits hexadecimal), from 0 to 255 ranges and separated by full stops. An example of this representation is showed below
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645 www.ijmer.com 1077 | Page 124.32.43.4 Several domain names can also be linked to the same IP address, in effect similar to having more than one name for the same person. The most recognized change from IPv4 to IPv6 is the length of network addresses. The IPv6 addresses have 128 bits length. The 128 bits provide approximately 3.4x1038 separate values. An IPv6 address consists of eight numbers in the hexadecimal format, from 0 to 65535 (decimal) ranges and separated by a colon “:”. An example of this new representation is showed following: FECA: 0000:234A:0043:AB45: FFFF: 9A3E:000B In order to compare with the IPv4 header next figure 3 shows the IPv6 header format: Figure 3: IPv6 Structure III. Services and Equipments The "converging" new generation communication networks are using and planning to use an IP based network infrastructure with multi-functional end-devices, always on, always reachable peer-to-peer, with mobility, quality of service and end-to-end security. Even non telecom industries such as music, radio and television will be supported in the IP environment. There are applications that need or will benefit from IPv6 such as:  Mobile broadband IP;  Mobile IP broadcast;  Peer to peer VoIP;  Digital radio;  iTV and IPTV;  Grids;  P2P multiplayer games;  RFID;  Control networks;  Remote manufacturing systems;  Sensor networks;  Microsoft (native support of IPv6 in the next version of Windows – Longhorn). There are also a few technologies that will support the migration to IPv6 like:  Power line Communication;  Wi-Fi;  Wi-Max;  ZigBee;  Unlicensed Mobile Access (UMA).  IV. Migration The current IP-based network will gradually migrate from IPv4 to IPv6. Signaling interworking will need to be supported between the IPv6 network and the existing IPv4 network. Mapping of signaling between IPv6 and IPv4 is required. From the deployment point of view, there are three stages of evolution scenarios:  First stage (stage 1): IPv4 ocean and IPv6 island;  Second stage (stage 2): IPv6 ocean and IPv4 island;  Third stage (stage 3): IPv6 Ocean and IPv6 Island. 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Version Flow Label Destination Address (128 bits) Source Address (128 bits) Payload Length Next Header Hop Limit Traffic Class1 2 3 4 5 6 7 8 9 10
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645 www.ijmer.com 1078 | Page There are several migration mechanisms from the IPv4 protocol to IPv6 protocol. The most discussed techniques are:  Dual stack – to allow IPv4 and IPv6 to coexist in the same devices and networks;  Tunneling – to avoid order dependencies when upgrading hosts, routers or regions;  Translation – to allow IPv6 only devices to communicate with IPv4 only devices. Most of these techniques can be combined in a migration scenario to permit a smooth transition from IPv4 to IPv6. In the following sub-sections, these three techniques are described briefly. 4.1 Dual Stack Technique In this method it is proposed to implement two protocols stacks in the same device. The protocol stack used for each link depends on the device used at the other end of the link. Figure 4 shows this arrangement. Figure 4: Dual stack operation 4.2 Tunnelling Techniques Tunneling techniques are used in two phases in the migration to a fully IPv6 network. In the first phase the core of the network uses the IPv4 protocol and there are only small islands IPv6. Figure 5 shows this phase. The IPv6 protocol is encapsulated in IPv4 tunnels. Figure 5: IPv4 Tunneling with islands of IPv6 in and IPv4 core network (phase 1) In a second phase, when many nodes in the core of the network have already changed to IPv6, the situation is reversed and IPv4 is encapsulated in IPv6 tunnels. The following figure shows this second phase. Figure 6: IPv6 Tunneling with islands of IPv4 in and IPv6 core network (phase 2)
  • 5. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645 www.ijmer.com 1079 | Page 4.3 Translation Techniques This technique uses a device, the NATPT (Network Address Translation – Protocol Translation) that translates in both directions between IPv4 and IPv6 at the boundary between an IPv4 network and an IPv6 network. Figure 7 shows this arrangement. Figure 7: the arrangement with Network Address Translation – Protocol Translation 4.4 Some Proposals As it was stated before that the solution for the migration from IPv4 to IPv6 will be a combination of the techniques described above. The most preferable solution on the backbone of the IP Network is the use of the dual stack technique by ISPs and Network operators. This solution is already possible, because almost all hardware providers have already updated the software to support this technique. In the access network, considering that there are many routers at the user’s premises and these routers do not support IPv6 at present, the best solution is the use of the translation technique by access devices. In a further phase is possible to switch to the dual stack technique. V. Security “Security is the most common concern with regard to the Internet and to financial transactions via the Internet in particular. Security issues such as authenticating users, controlling access to resources, encrypting communications, and generally ensuring the privacy of transactions all need to be addressed” (European Commission). The IPv6 is considered to have “Native Security” included by adding different extensions headers in the protocol. This security has the following characteristics:  It works end-to-end – it is possible to have IPsec services between a pair of hosts; the authentication is separate from the encryption;  It has an Authentication Header (AH) – this header refers to the entire packet; providing data integrity and authentication and mitigating the replay;  It has an Encapsulating Security Payload (ESP) Header - encapsulated payload packet (tunnel); providing data integrity and authentication and/or confidentiality; mitigating the replay and limits sniffing when confidentiality is enabled. Network Address Translation (NAT) appears to add little value in the IPv6 environment. With the increased capacity of addressing, there is no need to continue to use NATs to conserve addresses. The Firewalls have following functions:  They enforce uniform policy at perimeter;  They stop outsiders from performing dangerous operations;  They provide a check point and scalable, centralized control. In an IPv6 network end-to-end connectivity, tunneling and encryptions can conflict with this policy. To avoid these limitations, in an IPv6 network it is necessary to combine the firewall functions and the router functions in the same equipment and to locate it in the edge of the private network. See figure 8 below: Figure 8: Combined firewall and router
  • 6. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645 www.ijmer.com 1080 | Page VI. Ipv6 and the Ngn The current IP network is in a process of transition from IPv4 to IPv6. Mobile access networks are one of the major potential application areas for IPv6. This is mainly due to the large address space of IPv6. Besides, a large percentile of packets in such networks will carry real time traffic such as voice or video. These applications are expected to be important for IPv6, as they may depend heavily on the QoS mechanism in IPv6 networks. Nevertheless 3GPP is considering using IPv4 addresses initially instead of IPv6 addresses. From the signaling point of view, the IPv6 protocol has many features related to QoS and other capabilities. By utilizing IPv6 features, such as ease of defining explicit route, flow labeling capability and improved support for extensions and options like hop-by-hop option header or destination option header, it is possible to improve the efficiency of IPv6 networks without modifying the existing signaling protocols. VII. Standards and Tests The IETF (Internet Engineering Task Force) created a working group to develop the IPv6 protocol. The "IPv6 Working Group" is responsible for the specification and standardization of the Internet Protocol version 6 (IPv6). IETF produced several specifications and protocols; these can be found at the following URL: http://playground.sun.com/pub/ipng/html/specs/specifications.htm The core IPv6 standards are widely implemented and are starting to see global deployment. A European IPv6 Task Force has also been created. Delegates of the different national Task Forces take part. The link for the documents prepared for this TF is showed: http://www.ec.ipv6tf.org/in/i-documentos.php Another organization founded to promote de IPv6 protocol and implementation was the IPv6 Forum. IPv6 Forum is a world-wide consortium of leading Internet vendors, Research & Education Networks, with a clear mission to promote IPv6 by dramatically improving the market and user awareness of IPv6, creating a quality and secure Next Generation Internet and allowing world-wide equitable access to knowledge and technology. To achieve these proposals the IPv6 FORUM will:  Establish an open, international FORUM of IPv6 expertise;  Share IPv6 knowledge and experience among members;  Promote new IPv6-based applications and global solutions;  Promote interoperable implementations of IPv6 standards;  Co-operate to achieve end-to-end quality of service;  Resolve issues that create barriers to IPv6 deployment. The web site from this forum can be found in: http://www.ipv6forum.com The European Commission has been instrumental in providing necessary funding for the research and development of IPv6 related issues. In particular, and in response to the conclusions of the Stockholm Summit, the Commission stepped up its R&D efforts. A large number of IPv6 projects are currently operational, including two large-scale IPv6 trials, namely 6NET and Euro6IX. These trials are fully complementary to the efforts deployed at national level and at European level in the context of initiatives such as GEANT. VIII. Possible Actions In order to complete some of the actions proposed by the Commission and the European Task Force, guidelines should be developed to help the operators and the users gradually take the necessary steps to start the migration to IPv6 and in a near future to adopt the new version of IP protocol (IPv6). Technical guidance is a valuable way to promote the adoption of IPv6 in public networks and services. IX. Conclusion The deployment of IPv6 is important to the future health of the Internet. An average of 4Tbps of traffic per day is seen for a one-year measurement period. This provides a best available estimate of overall IPv6 traffic on the Internet. The dwindling supply of available IPv4 addresses has been broadly documented, as have the challenges faced by those wishing to migrate to IPv6. In terms of hard data, however, industry and academia have had little visibility into the rate of IPv6 deployment in the Internet. Providing support for IPv6 in the world is still predominantly IPv4 based. Also, it seems interesting that there is no significant migration of users from IPv4 to IPv6 as per the data. However, the significant growth of IPv4 traffic implies that the usage of IPv6 is also increasing, but at a comparatively slower pace.
  • 7. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645 www.ijmer.com 1081 | Page References [1] C. Caicedo, J. Joshi, and S. Tuladhar, “IPv6 Security Challenges”, Computer, IEEE Computer Society, February 2009 [2] Bihrouzan A. Forouzan, “TCP/IP Protocol Suite”, 4th Edition, McGraw Hill, ISBN: 978- 0-07-337604-2, 2010 [3] C. Balanis, Antenna Theory, Analysis and Design, 3rd edition, New York: Wiley, 2005. [4] S. Bradner and A. Mankin, “The Recommendation for the Next Generation IP Protocol”, RFC 1752, Jan. 1995 [5] Christian Huitema, “IPv6: The New Internet Protocol (2nd Edition)”, Jan. 1998. [6] Andrew S. Tanenbaum,David J. Wetherall,“Computer Networks (5th edition)”,Oct. 2010. Bikki Lakshmi Manasa was born in Guntur District ,Andhra Pradesh, India on 1st August 1992, is currently pursuing B.TECH (4th year) in Electronics and Communication Engineering(ECE) in K.L.University. Areas of interest are Digital Communications, Computer Networks, Antennas and Wave Propagation, VLSI and Digital Signal Processing. Guttikonda Chaitra Bharti was born in Warangal District ,Andhra Pradesh, India on 23rd February 1992, is currently pursuing B.TECH (4th year) in Electronics and Communication Engineering(ECE) in K L University. Areas of interest are Digital Communications, Computer Networks, Antennas and Wave Propagation, VLSI and Digital Signal Processing. Mikkili Ramya Teja was born in Guntur District, Andhra Pradesh, India, on 30th may 1992, and is currently pursuing B.TECH (4th year) in Electronics and Communication Engineering (ECE) in K L University. Areas of interest are Digital Communications, Computer networks, Antennas and Wave Propagation and Digital Signal Processing. Akkela Rama Krishna is working as an Asst. Professor in the department of Electronics and Computers Engineering at K L University. Areas of interest are Artificial Intelligence, Digital Communications and Computer Networks.