This document discusses the transition from IPv4 to IPv6. It provides background on why IPv6 was developed, noting that IPv4 addresses were being depleted and IPv6 expands the address space from 32 to 128 bits. It summarizes three main transition strategies: dual stack, tunneling, and translation. The document warns that tunneling IPv6 packets inside IPv4 packets could allow hidden IPv6 traffic and security issues if deep packet inspection is not used. Overall it emphasizes that a gradual transition combining techniques will be needed to migrate from the current IPv4 internet to an IPv6 internet.
MANAGING ORGANISATION USING VPN's : A SURVEYEditor IJMTER
The basic concept of a VPN is to connect networks in separate offices in such a way that
makes them appear as a single network.The investigation of using peer-to-peer communication
began due to the low performance of traditional, client-server based model. The bandwidth and
latency of the communication between the connected clients , was improved by virtual private
networks (VPN's). Thus a new peer-to-peer connection based VPN protocol was developed. It uses
both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) communication to
transfer Ethernet frames between the connected clients across IPv4 and IPv6 networks, and it makes
direct communication for the clients possible.
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
The increasing use of wireless devices and in particular smart phones has resulted the need for greater capacity
and higher speed than the existing network technologies. Hence, LTE (Long Term Evolution) and WiMAX
(Worldwide Interoper- ability for Microwave Access) became the two leading technologies. Services are
increasingly shifting from voice to data and from circuit-switched to packet-switched ones. Battle between LTE
and WiMAX technologies is already heating up with WiMAX being ahead due to availability of standards
through IEEE 802.16 and is up and running but lacks in substantial roll out plans due to cost. The targets for
LTE indicate bandwidth increases as high as 100 Mbps on the downlink, and up to 50 Mbps on the uplink.
However, this potential increase in bandwidth is just a small part of the overall improvement LTE aims to
provide. This study illustrates the model and representation of LTE links and traffics using NS-2 network
simulator and observation of TCP performance investigated. The Evaluation of the network performance with
TCP is mainly based on congestion window behavior, throughput, average delay and lost packet.
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONcseij
This is era of information blast. A huge quantity of information is pouring in from various sources. The
revolutionary advancement of Information and Communication technologies bring the world close
together.A pile of information in different formats is just a click away. Which motivate the organizations to
get more internet bandwidth to consume and publish theinformationoverexploding cloudof Internet. The
standard router redundancyprotocolis used to handle backup link showever it cannot aggregate
them.Whereas thelink standard aggregation protocol can aggregate the link but it support only Ethernet
technology.In this researchpaper a concept of Redundant Link Aggregation (RLA)is proposed. RLA can
aggregate and handle backup links with main links regardless of carriertechnology. Furthermore a
dataforwardingmechanism Odd Load Balancing (OLB) is also proposed for RLA scheme. For the sake of
performance evaluation, Redundant Link Aggregation (RLA) is compared with Virtual Router Redundancy
Protocol (VRRP). The simulation result reveals that Redundant Link Aggregation (RLA) can cover the
bandwidth demand of the network in peak hours by consuming backup links as well which with Virtual
Router Redundancy Protocol (VRRP)cannot.It is further noted thatOdd Load Balancing (OLB) feature can
be used to save the cost in terms of money per annum.
Many people mistaken that Internet 2.0 is Web 2.0 which is a mis-concept. Internet means internetworking which works at the transmission media layer and current Internet is based on IP protocol therefore is subject to many security vulnerabilities. Internet 2.0 is based on new patented protocol which utilize native telephony network to establish secure point to point connection and able to prevents a lot of current Internet vulnerabilities.
Migration of corperate networks from ipv4 to ipv6 using dual stackpraveenReddy268
Migration of corperate networks from ipv4 to ipv6 using dual stack
in this you will be learning about internet protocols of version4 & 6.And also about OSI layers and their architecture and coding to the routers
MANAGING ORGANISATION USING VPN's : A SURVEYEditor IJMTER
The basic concept of a VPN is to connect networks in separate offices in such a way that
makes them appear as a single network.The investigation of using peer-to-peer communication
began due to the low performance of traditional, client-server based model. The bandwidth and
latency of the communication between the connected clients , was improved by virtual private
networks (VPN's). Thus a new peer-to-peer connection based VPN protocol was developed. It uses
both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) communication to
transfer Ethernet frames between the connected clients across IPv4 and IPv6 networks, and it makes
direct communication for the clients possible.
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
The increasing use of wireless devices and in particular smart phones has resulted the need for greater capacity
and higher speed than the existing network technologies. Hence, LTE (Long Term Evolution) and WiMAX
(Worldwide Interoper- ability for Microwave Access) became the two leading technologies. Services are
increasingly shifting from voice to data and from circuit-switched to packet-switched ones. Battle between LTE
and WiMAX technologies is already heating up with WiMAX being ahead due to availability of standards
through IEEE 802.16 and is up and running but lacks in substantial roll out plans due to cost. The targets for
LTE indicate bandwidth increases as high as 100 Mbps on the downlink, and up to 50 Mbps on the uplink.
However, this potential increase in bandwidth is just a small part of the overall improvement LTE aims to
provide. This study illustrates the model and representation of LTE links and traffics using NS-2 network
simulator and observation of TCP performance investigated. The Evaluation of the network performance with
TCP is mainly based on congestion window behavior, throughput, average delay and lost packet.
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONcseij
This is era of information blast. A huge quantity of information is pouring in from various sources. The
revolutionary advancement of Information and Communication technologies bring the world close
together.A pile of information in different formats is just a click away. Which motivate the organizations to
get more internet bandwidth to consume and publish theinformationoverexploding cloudof Internet. The
standard router redundancyprotocolis used to handle backup link showever it cannot aggregate
them.Whereas thelink standard aggregation protocol can aggregate the link but it support only Ethernet
technology.In this researchpaper a concept of Redundant Link Aggregation (RLA)is proposed. RLA can
aggregate and handle backup links with main links regardless of carriertechnology. Furthermore a
dataforwardingmechanism Odd Load Balancing (OLB) is also proposed for RLA scheme. For the sake of
performance evaluation, Redundant Link Aggregation (RLA) is compared with Virtual Router Redundancy
Protocol (VRRP). The simulation result reveals that Redundant Link Aggregation (RLA) can cover the
bandwidth demand of the network in peak hours by consuming backup links as well which with Virtual
Router Redundancy Protocol (VRRP)cannot.It is further noted thatOdd Load Balancing (OLB) feature can
be used to save the cost in terms of money per annum.
Many people mistaken that Internet 2.0 is Web 2.0 which is a mis-concept. Internet means internetworking which works at the transmission media layer and current Internet is based on IP protocol therefore is subject to many security vulnerabilities. Internet 2.0 is based on new patented protocol which utilize native telephony network to establish secure point to point connection and able to prevents a lot of current Internet vulnerabilities.
Migration of corperate networks from ipv4 to ipv6 using dual stackpraveenReddy268
Migration of corperate networks from ipv4 to ipv6 using dual stack
in this you will be learning about internet protocols of version4 & 6.And also about OSI layers and their architecture and coding to the routers
Performance Evaluation of Soft RoCE over 1 Gigabit EthernetIOSR Journals
Abstract: Ethernet is most influential & widely used technology in the world. With the growing demand of low
latency & high throughput technologies like InfiniBand and RoCE have evolved with unique features viz. RDMA
(Remote Direct Memory Access). RDMA is an effective technology, which is used for reducing system load &
improves the performance. InfiniBand is a well known technology, which provides high-bandwidth and lowlatency
and makes optimal use of in-built features like RDMA. With the rapid evolution of InfiniBand technology
and Ethernet lacking the RDMA and zero copy protocol, the Ethernet community has came out with a new
enhancements that bridges the gap between InfiniBand and Ethernet. By adding the RDMA and zero copy
protocol to the Ethernet a new networking technology is evolved called RDMA over Converged Ethernet
(RoCE). RoCE is a standard released by the IBTA standardization body to define RDMA protocol over
Ethernet. With the emergence of lossless Ethernet, RoCE uses InfiniBand efficient transport to provide the
platform for deploying RDMA technology in mainstream data centres over 10GigE, 40GigE and beyond. RoCE
provide all of the InfiniBand benefits transport benefits and well established RDMA ecosystem combined with
converged Ethernet. In this paper, we evaluate the heterogeneous Linux cluster, having multi nodes with fast
interconnects i.e. gigabit Ethernet & Soft RoCE. This paper presents the heterogeneous Linux cluster
configuration & evaluates its performance using Intel’s MPI Benchmarks. Our result shows that Soft RoCE is
performing better than Ethernet in various performance metrics like bandwidth, latency & throughput.
Keywords: Ethernet, InfiniBand, MPI, RoCE, RDMA, Soft RoCE
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
UNIT IV MOBILE NETWORK AND TRANSPORT LAYERS
Mobile IP – Dynamic Host Configuration Protocol-Mobile Ad Hoc Routing Protocols–Multicast routing-TCP over Wireless Networks – Indirect TCP – Snooping TCP – Mobile TCP – Fast Retransmit / Fast Recovery – Transmission/Timeout Freezing-Selective Retransmission – Transaction Oriented TCP- TCP over 2.5 / 3G wireless Networks
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...CSCJournals
End-System multicasting (ESM) is a promising application-layer scheme that has been recently proposed for implementing multicast routing in the application layer as a practical alternative to the IP multicasting. Moreover, ESM is an efficient application layer solution where all the multicast functionality is shifted to the end users. However, the limitation in bandwidth and the fact that the message needs to be forwarded from host-to-host using unicast connection, and consequently incrementing the end-to-end delay of the transmission process, contribute to the price to pay for this new approach. Therefore, supporting high-speed real-time applications such as live streaming multimedia, videoconferencing, distributed simulations, and multiparty games require a sound understanding of these multicasting schemes such as IP multicast and ESM and the factors that might affect the end-user requirements. In this paper, we present both the analytical and the mathematical models for formalizing the end-to-end delay and the bandwidth efficiency of both IP and ESM multicast system. For the sake of the experimental verifications of the proposed models, numerical and simulation results are presented in this paper. Finally, the proposed formulization can be used to design and implement a more robust and efficient multicast systems for the future networks
Overview of VPN protocols.
VPNs (Virtual Private Networks) are often viewed from the perspective of security with the goal of providing authentication and confidentiality.
However, the primary purpose of VPNs is to connect 2 topologically separated private networks over a public network (typically the Internet).
VPNs basically hook a network logically into another network so that both appear as one private local network.
Security is a possible add-on to VPNs. In many cases it makes perfectly sense to secure the VPNs communication over the unsecure public network.
VPN protocols typically employ a tunnel where data packets of the local network are encapsulated in an outer protocol for transmission over the public network.
The most important VPN protocols are IPSec, PPTP and L2TP. In recent years SSL/TLS based VPNs such as OpenVPN have gained widespread adoption.
Performance Evaluation of Soft RoCE over 1 Gigabit EthernetIOSR Journals
Abstract: Ethernet is most influential & widely used technology in the world. With the growing demand of low
latency & high throughput technologies like InfiniBand and RoCE have evolved with unique features viz. RDMA
(Remote Direct Memory Access). RDMA is an effective technology, which is used for reducing system load &
improves the performance. InfiniBand is a well known technology, which provides high-bandwidth and lowlatency
and makes optimal use of in-built features like RDMA. With the rapid evolution of InfiniBand technology
and Ethernet lacking the RDMA and zero copy protocol, the Ethernet community has came out with a new
enhancements that bridges the gap between InfiniBand and Ethernet. By adding the RDMA and zero copy
protocol to the Ethernet a new networking technology is evolved called RDMA over Converged Ethernet
(RoCE). RoCE is a standard released by the IBTA standardization body to define RDMA protocol over
Ethernet. With the emergence of lossless Ethernet, RoCE uses InfiniBand efficient transport to provide the
platform for deploying RDMA technology in mainstream data centres over 10GigE, 40GigE and beyond. RoCE
provide all of the InfiniBand benefits transport benefits and well established RDMA ecosystem combined with
converged Ethernet. In this paper, we evaluate the heterogeneous Linux cluster, having multi nodes with fast
interconnects i.e. gigabit Ethernet & Soft RoCE. This paper presents the heterogeneous Linux cluster
configuration & evaluates its performance using Intel’s MPI Benchmarks. Our result shows that Soft RoCE is
performing better than Ethernet in various performance metrics like bandwidth, latency & throughput.
Keywords: Ethernet, InfiniBand, MPI, RoCE, RDMA, Soft RoCE
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
UNIT IV MOBILE NETWORK AND TRANSPORT LAYERS
Mobile IP – Dynamic Host Configuration Protocol-Mobile Ad Hoc Routing Protocols–Multicast routing-TCP over Wireless Networks – Indirect TCP – Snooping TCP – Mobile TCP – Fast Retransmit / Fast Recovery – Transmission/Timeout Freezing-Selective Retransmission – Transaction Oriented TCP- TCP over 2.5 / 3G wireless Networks
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...CSCJournals
End-System multicasting (ESM) is a promising application-layer scheme that has been recently proposed for implementing multicast routing in the application layer as a practical alternative to the IP multicasting. Moreover, ESM is an efficient application layer solution where all the multicast functionality is shifted to the end users. However, the limitation in bandwidth and the fact that the message needs to be forwarded from host-to-host using unicast connection, and consequently incrementing the end-to-end delay of the transmission process, contribute to the price to pay for this new approach. Therefore, supporting high-speed real-time applications such as live streaming multimedia, videoconferencing, distributed simulations, and multiparty games require a sound understanding of these multicasting schemes such as IP multicast and ESM and the factors that might affect the end-user requirements. In this paper, we present both the analytical and the mathematical models for formalizing the end-to-end delay and the bandwidth efficiency of both IP and ESM multicast system. For the sake of the experimental verifications of the proposed models, numerical and simulation results are presented in this paper. Finally, the proposed formulization can be used to design and implement a more robust and efficient multicast systems for the future networks
Overview of VPN protocols.
VPNs (Virtual Private Networks) are often viewed from the perspective of security with the goal of providing authentication and confidentiality.
However, the primary purpose of VPNs is to connect 2 topologically separated private networks over a public network (typically the Internet).
VPNs basically hook a network logically into another network so that both appear as one private local network.
Security is a possible add-on to VPNs. In many cases it makes perfectly sense to secure the VPNs communication over the unsecure public network.
VPN protocols typically employ a tunnel where data packets of the local network are encapsulated in an outer protocol for transmission over the public network.
The most important VPN protocols are IPSec, PPTP and L2TP. In recent years SSL/TLS based VPNs such as OpenVPN have gained widespread adoption.
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A Novel Information Accountability Framework for Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
The properties of polynomial hermitian, polynomial normal and polynomial unitary
matrices are discussed. A characterization for polynomial normal matrix is obtained
GPS cycle slips detection and repair through various signal combinationsIJMER
GPS Cycle slips affect the measured spatial distance between the satellite and the receiver,
thus affecting the accuracy of the derived 3D coordinates of any ground station. Therefore, cycle slips
must be detected and repaired before performing any data processing. The objectives of this research are
to detect the Cycle slips by using various types of GPS signal combinations with graphical and statistical
tests techniques, and to repair cycle slips by using average and time difference geometry techniques.
Results of detection process show that the graphical detection can be used as a primary detection
technique whereas the statistical approaches of detection are proved to be superior. On the other hand,
results of repairing process show that any trial can be used for such process except for the 1st and 2nd
time differences averaging all data as they give very low accuracy of the cycle slip fixation
Enhancement in viscosity of diesel by adding vegetable oilIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
This paper is focused on the Translator strategy for migration of IPv4 to Ipv6 implemented in Cisco packet
tracer. It describes the design and configuration of network devices and packet transfer between devices of IPv4
and IPv6 networks using NAT-PT as transition mechanism. First major version of IP, IPv4 is the dominant
protocol of internet.IPv6 is developed to deal with long anticipated problem of IPv4 running out of addresses.
The migration from IPv4 to IPv6 must be implemented node by node by using auto-configuration procedures to
eliminate the need to configure IPv6 hosts manually.
On the migration of a large scale network from i pv4 to ipv6 environmentIJCNCJournal
This work mainly addresses the design a large scale network using dual stack mechanisms. We focused on
the most important theoretical concepts of the IPv6 protocol, such as addressing, address allocation,
routing with the OSPF and BGP protocols and routing protocols performance in dual stack network using
GNS3 and Wireshark simulators. we have a tendency to measure a perfect model and a true large-scale
network atmosphere victimization out there end-to-end activity techniques that focuses on a large-scale
IPv4 and IPv6 backbone and created performance the IPv4 and IPv6 network. In this paper, we compiled
IPv6 address planning in large scale network, performance statistics of each network in terms of TCP
throughput, delay jitters, packet loss rate, and round trip time. It is found that, a minor degradation within
the throughput of the TCP, delay jitter, a lower packet loss rate, and a rather longer round trip time are
occurred in a real large scale dual stack network
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...ijceronline
IPSec, an Internet layer three (3)-security protocol suite is often characterising with introducing an additional space and processing overhead when implemented on a network for secured communication using either internet protocol version 4 or 6; IPv4 or IPv6. The use of Internet protocol security (IPSec) on IPv4 is an alternative that offers solutions and addresses the security vulnerabilities in network layer of the open system interconnect (OSI) and transmission control protocol/internet protocol (TCP/IP) protocol stack. In IPv6, IPSec is one among many other features added to the earlier Internet protocol to enhance efficiency and security. This paper, set as its objective to reports on the impact of processing and space overhead introduced by IPSec on both IPv4 and IPv6 in relation to packet end-to-end delay based on different IPSec transformations with different authentication and encryption algorithms deployed in different scenarios simulated using NS2. The experiment result reveals that the cost of IPSec added overhead is relatively small when smaller packet sizes are involved for both protocols in comparison with large packet sizes that were IPSec protected with the same configuration as the smaller packet, unless in the cases whereby the packet was very large which has to be fragmented. This paper can therefore, serve as a guide for network administrators to trade up between processing cost and larger address space specifically for transmission involving larger IP packets
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSIJNSA Journal
One of the main purposes of Internet Protocol version 6 (IPv6) developments was to solve the IP address depletion concern due to the burgeoning growth of the Internet users. The new Internet protocol provides end-to-end communication, enhanced security and extensibility apart from the other features such as address auto-configuration or plug-and-play and faster packet processing in the routers. However, as a new technology, it is also reported that the protocol introduces some security vulnerabilities both in the header format and in the other protocols associated to it. This paper reviews IPv6 security vulnerabilities that have large potential exploitation in terms of denial of service attacks. The IPv6 security vulnerabilities are classified under three categories that include the IPv6 main header field, IPv6 extension header and Neighbour Discovery Protocol (NDP). This paper also summarizes the current mitigation methods proposed by researchers and practitioners to secure from these IPv6 security vulnerabilities.
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
- Translucent concrete is a concrete based material with light-transferring properties,
obtained due to embedded light optical elements like Optical fibers used in concrete. Light is conducted
through the concrete from one end to the other. This results into a certain light pattern on the other
surface, depending on the fiber structure. Optical fibers transmit light so effectively that there is
virtually no loss of light conducted through the fibers. This paper deals with the modeling of such
translucent or transparent concrete blocks and panel and their usage and also the advantages it brings
in the field. The main purpose is to use sunlight as a light source to reduce the power consumption of
illumination and to use the optical fiber to sense the stress of structures and also use this concrete as an
architectural purpose of the building
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
A low cost automation system for removal of lint from cottonseed is to be designed and
developed. The setup consists of stainless steel drum with stirrer in which cottonseeds having lint is mixed
with concentrated sulphuric acid. So lint will get burn. This lint free cottonseed treated with lime water to
neutralize acidic nature. After water washing this cottonseeds are used for agriculter purpose
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
The incorporation of natural fibres such as munja fiber composites has gained
increasing applications both in many areas of Engineering and Technology. The aim of this study is to
evaluate mechanical properties such as flexural and tensile properties of reinforced epoxy composites.
This is mainly due to their applicable benefits as they are light weight and offer low cost compared to
synthetic fibre composites. Munja fibres recently have been a substitute material in many weight-critical
applications in areas such as aerospace, automotive and other high demanding industrial sectors. In
this study, natural munja fibre composites and munja/fibreglass hybrid composites were fabricated by a
combination of hand lay-up and cold-press methods. A new variety in munja fibre is the present work
the main aim of the work is to extract the neat fibre and is characterized for its flexural characteristics.
The composites are fabricated by reinforcing untreated and treated fibre and are tested for their
mechanical, properties strictly as per ASTM procedures.
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are
connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of
this is to run the automobile using a Hybrid engine
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
The present day technology demands eco-friendly developments. In this era the
composite material are playing a vital roal in different field of Engineering .The composite materials
are using as a principle materials. Nowaday the composite materials are utilizing as a important
component of engineering field .Where as the importance of the applications of composites is well
known, but thrust on the use of natural fibres in it for reinforcement has been given priority for some
times. But changing from synthetic fibres to natural fibres provides only half green-composites. A
partial green composite will be achieved if the matrix component is also eco-friendly. Keeping this in
view, a detailed literature surveyed has been carried out through various issues of the Journals
related to this field. The material systems used are sunnhemp fibres. Some epoxy and hardener has
been also added for stability and drying of the bio-composites. Various graphs and bar-charts are
super-imposed on each other for comparison among themselves and Graphs is plotted on MAT LAB
and ORIGIN 6.0 software. To determining tensile strengths, Various properties for different biocomposites
have been compared among themselves. Comparison of the behaviour of bio-composites of
this work has been also compare with other works. The bio-composites developed in this work are
likely to get applications in fall ceilings, partitions, bio-degradable packagings, automotive interiors,
sports things (e.g. rackets, nets, etc.), toys etc.
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
The Greenstone belts of Karnataka are enriched in BIFs in Dharwar craton, where Iron
formations are confined to the basin shelf, clearly separated from the deeper-water iron formation that
accumulated at the basin margin and flanking the marine basin. Geochemical data procured in terms of
major, trace and REE are plotted in various diagrams to interpret the genesis of BIFs. Al2O3, Fe2O3 (T),
TiO2, CaO, and SiO2 abundances and ratios show a wide variation. Ni, Co, Zr, Sc, V, Rb, Sr, U, Th,
ΣREE, La, Ce and Eu anomalies and their binary relationships indicate that wherever the terrigenous
component has increased, the concentration of elements of felsic such as Zr and Hf has gone up. Elevated
concentrations of Ni, Co and Sc are contributed by chlorite and other components characteristic of basic
volcanic debris. The data suggest that these formations were generated by chemical and clastic
sedimentary processes on a shallow shelf. During transgression, chemical precipitation took place at the
sediment-water interface, whereas at the time of regression. Iron ore formed with sedimentary structures
and textures in Kammatturu area, in a setting where the water column was oxygenated.
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
In this paper, the mechanical characteristics of C45 medium carbon steel are investigated
under various working conditions. The main characteristic to be studied on this paper is impact toughness
of the material with different configurations and the experiment were carried out on charpy impact testing
equipment. This study reveals the ability of the material to absorb energy up to failure for various
specimen configurations under different heat treated conditions and the corresponding results were
compared with the analysis outcome
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
Robot guns are being increasingly employed in automotive manufacturing to replace
risky jobs and also to increase productivity. Using a single robot for a single operation proves to be
expensive. Hence for cost optimization, multiple guns are mounted on a single robot and multiple
operations are performed. Robot Gun structure is an efficient way in which multiple welds can be done
simultaneously. However mounting several weld guns on a single structure induces a variety of
dynamic loads, especially during movement of the robot arm as it maneuvers to reach the weld
locations. The primary idea employed in this paper, is to model those dynamic loads as equivalent G
force loads in FEA. This approach will be on the conservative side, and will be saving time and
subsequently cost efficient. The approach of the paper is towards creating a standard operating
procedure when it comes to analysis of such structures, with emphasis on deploying various technical
aspects of FEA such as Non Linear Geometry, Multipoint Constraint Contact Algorithm, Multizone
meshing .
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
This paper aims to do modelling, simulation and performing the static analysis of a go
kart chassis consisting of Circular beams. Modelling, simulations and analysis are performed using 3-D
modelling software i.e. Solid Works and ANSYS according to the rulebook provided by Indian Society of
New Era Engineers (ISNEE) for National Go Kart Championship (NGKC-14).The maximum deflection is
determined by performing static analysis. Computed results are then compared to analytical calculation,
where it is found that the location of maximum deflection agrees well with theoretical approximation but
varies on magnitude aspect.
In récent year various vehicle introduced in market but due to limitation in
carbon émission and BS Séries limitd speed availability vehicle in the market and causing of
environnent pollution over few year There is need to decrease dependancy on fuel vehicle.
bicycle is to be modified for optional in the future To implement new technique using change in
pedal assembly and variable speed gearbox such as planetary gear optimise speed of vehicle
with variable speed ratio.To increase the efficiency of bicycle for confortable drive and to
reduce torque appli éd on bicycle. we introduced epicyclic gear box in which transmission done
throgh Chain Drive (i.e. Sprocket )to rear wheel with help of Epicyclical gear Box to give
number of différent Speed during driving.To reduce torque requirent in the cycle with change in
the pedal mechanism
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
The proposal of this paper is to present Spring Framework which is widely used in
developing enterprise applications. Considering the current state where applications are developed using
the EJB model, Spring Framework assert that ordinary java beans(POJO) can be utilize with minimal
modifications. This modular framework can be used to develop the application faster and can reduce
complexity. This paper will highlight the design overview of Spring Framework along with its features that
have made the framework useful. The integration of multiple frameworks for an E-commerce system has
also been addressed in this paper. This paper also proposes structure for a website based on integration of
Spring, Hibernate and Struts Framework.
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
Microcontroller based Automatic Sprinkler System is a new concept of using
intelligence power of embedded technology in the sprinkler irrigation work. Designed system replaces
the conventional manual work involved in sprinkler irrigation to automatic process. Using this system a
farmer is protected against adverse inhuman weather conditions, tedious work of changing over of
sprinkler water pipe lines & risk of accident due to high pressure in the water pipe line. Overall
sprinkler irrigation work is transformed in to a comfortableautomatic work. This system provides
flexibility & accuracy in respect of time set for the operation of a sprinkler water pipe lines. In present
work the author has designed and developed an automatic sprinkler irrigation system which is
controlled and monitored by a microcontroller interfaced with solenoid valves.
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
In this paper we introduce and characterize some new generalized locally closed sets
known as
δ
ˆ
s-locally closed sets and spaces are known as
δ
ˆ
s-normal space and
δ
ˆ
s-connected space and
discussed some of their properties
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
This paper present an approach based on the combination of, two techniques using
decision tree and Association rule mining for Probe attack detection. This approach proves to be
better than the traditional approach of generating rules for fuzzy expert system by clustering methods.
Association rule mining for selecting the best attributes together and decision tree for identifying the
best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert
system are generated using association rule mining and decision trees. Decision trees is generated for
dataset and to find the basic parameters for creating the membership functions of fuzzy inference
system. Membership functions are generated for the probe attack. Based on these rules we have
created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference
system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for
outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were
done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach
based on the combination of, two techniques using decision tree and Association rule mining
efficiently detected probe attacks. Experimental results shows better results for detecting intrusions as
compared to others existing methods
Natural Language Ambiguity and its Effect on Machine LearningIJMER
"Natural language processing" here refers to the use and ability of systems to process
sentences in a natural language such as English, rather than in a specialized artificial computer
language such as C++. The systems of real interest here are digital computers of the type we think of as
personal computers and mainframes. Of course humans can process natural languages, but for us the
question is whether digital computers can or ever will process natural languages. We have tried to
explore in depth and break down the types of ambiguities persistent throughout the natural languages
and provide an answer to the question “How it affects the machine translation process and thereby
machine learning as whole?” .
Today in era of software industry there is no perfect software framework available for
analysis and software development. Currently there are enormous number of software development
process exists which can be implemented to stabilize the process of developing a software system. But no
perfect system is recognized till yet which can help software developers for opting of best software
development process. This paper present the framework of skillful system combined with Likert scale. With
the help of Likert scale we define a rule based model and delegate some mass score to every process and
develop one tool name as MuxSet which will help the software developers to select an appropriate
development process that may enhance the probability of system success.
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
The present study investigates the creep in a thick-walled composite cylinders made
up of aluminum/aluminum alloy matrix and reinforced with silicon carbide particles. The distribution
of SiCp is assumed to be either uniform or decreasing linearly from the inner to the outer radius of
the cylinder. The creep behavior of the cylinder has been described by threshold stress based creep
law with a stress exponent of 5. The composite cylinders are subjected to internal pressure which is
applied gradually and steady state condition of stress is assumed. The creep parameters required to
be used in creep law, are extracted by conducting regression analysis on the available experimental
results. The mathematical models have been developed to describe steady state creep in the composite
cylinder by using von-Mises criterion. Regression analysis is used to obtain the creep parameters
required in the study. The basic equilibrium equation of the cylinder and other constitutive equations
have been solved to obtain creep stresses in the cylinder. The effect of varying particle size, particle
content and temperature on the stresses in the composite cylinder has been analyzed. The study
revealed that the stress distributions in the cylinder do not vary significantly for various combinations
of particle size, particle content and operating temperature except for slight variation observed for
varying particle content. Functionally Graded Materials (FGMs) emerged and led to the development
of superior heat resistant materials.
Energy Audit is the systematic process for finding out the energy conservation
opportunities in industrial processes. The project carried out studies on various energy conservation
measures application in areas like lighting, motors, compressors, transformer, ventilation system etc.
In this investigation, studied the technical aspects of the various measures along with its cost benefit
analysis.
Investigation found that major areas of energy conservation are-
1. Energy efficient lighting schemes.
2. Use of electronic ballast instead of copper ballast.
3. Use of wind ventilators for ventilation.
4. Use of VFD for compressor.
5. Transparent roofing sheets to reduce energy consumption.
So Energy Audit is the only perfect & analyzed way of meeting the Industrial Energy Conservation.
An Implementation of I2C Slave Interface using Verilog HDLIJMER
The focus of this paper is on implementation of Inter Integrated Circuit (I2C) protocol
following slave module for no data loss. In this paper, the principle and the operation of I2C bus protocol
will be introduced. It follows the I2C specification to provide device addressing, read/write operation and
an acknowledgement. The programmable nature of device provide users with the flexibility of configuring
the I2C slave device to any legal slave address to avoid the slave address collision on an I2C bus with
multiple slave devices. This paper demonstrates how I2C Master controller transmits and receives data to
and from the Slave with proper synchronization.
The module is designed in Verilog and simulated in ModelSim. The design is also synthesized in Xilinx
XST 14.1. This module acts as a slave for the microprocessor which can be customized for no data loss.
Discrete Model of Two Predators competing for One PreyIJMER
This paper investigates the dynamical behavior of a discrete model of one prey two
predator systems. The equilibrium points and their stability are analyzed. Time series plots are obtained
for different sets of parameter values. Also bifurcation diagrams are plotted to show dynamical behavior
of the system in selected range of growth parameter
Discrete Model of Two Predators competing for One Prey
Da3210751081
1. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645
www.ijmer.com 1075 | Page
Bikki Lakshmi Manasa, 1
Guttikonda Chaitra Bharti, 2
Mikkili Ramya Teja, 3
Akkela Rama Krishna4
1234
Dept. of Electronics and Communication Engineering, K L University, India
Abstract: On February 3, 2011 the current version of the Internet IPv4 was depleted of addresses. Since the Internet today
uses IPv4 for 99% of the traffic, it will be a slow migration to IPv6.1.The shortage of addresses has led to the introduction of
IPv6 which has 128-bit (16-byte) source and destination IP addresses. Many organizations do not see a reason to convert to
IPv6, and believe they are not running IPv6.2 whether an organization knows it or not, any laptop/PC running Vista or
Windows 7 is a vulnerability from which attacks can come that will be invisible to IPv4 networks. Three transition strategies
are being employed: header translation, dual stack and tunneling of IPv6 inside IPv4.4 Tunneling is the most precarious
method for today’s IPv4 networks. The IPv6 packet is included inside the message field of an IPv4 packet. The contents of
the IPv6 packet will not be noticed by an IPv4 firewall or intrusion detection system. Hidden IPv6 traffic running across an
organization’s network can wreak havoc, allow malware to enter the network, and be the basis for a denial of service attack.
The only defense against such attacks is deep packet inspection (DPI). The widespread use of DPI is inevitable. The first
serious security breach caused by tunneled IPv6 inside an IPv4 packet is certain to come in the near future. This event will
be a motivation to organizations to defend against such attacks.
Keywords: IPv4, IPv6, deep packet inspection, cyber terrorism, security
I. Introduction
Under the Action Plan Europe 2005, it was recognized by the Commission that “IPv6 is essential on the road
leading to network-based technologies, products and services that will contribute to an "everywhere", user-centric
Information Society”.
This gave rise to the European Commission's Communication to the Council and the European Parliament
(COM/2002/96) – “Next Generation Internet – priorities for action in migrating to the new Internet protocol IPv6”, which
creates a context for the EU Members to take action in focusing on broadband availability and the development of IPv6.
These developments require a concerted action aiming at the structuring, consolidation and integration of European
efforts on IPv6, notably through:
1. Increased support towards IPv6 in public networks and services;
2. The establishment and launch of educational programmers on IPv6;
3. The adoption of IPv6 through awareness raising campaigns;
4. The continued stimulation of the Internet take-up across the European Union;
5. Increased support to IPv6 activities in the Framework’s Programme;
6. The strengthening of the support towards the IPv6 enabling of national and European Research Networks;
7. An active contribution towards the promotion of IPv6 standards work;
8. The integration of IPv6 in all strategic plans concerning the use of new Internet services.
In order to take some of the proposed actions, various European Countries have created an IPv6 Task Force group
open to the different market players, including manufactures, operators, providers, applications developers, academic
institutions, etc.
Following the European Commission's Communication, the present document explains the different aspects
involved in IPv6 implementation that could lead to guidelines on the priorities for implementing and adopting IPv6 in public
networks and services. The consequences for the market parties, including the users are also discussed.
II. Ipv6 – The Next Generation of Ip
“In the general sense, an internet is a computer network that connects several networks. The Internet is a publicly
available internationally interconnected system of computers plus the information and services provided to their users using
a TCP/IP suite of packet switching communications protocols1
”.
To interconnect two or more computer networks it is necessary to have a routing device to exchange traffic, and
steer traffic via several different nodes on the path across a network to its destination. The devices used to interconnect
different networks are routers. Others devices with specific functions like gateways or bridge are also used. All network
elements such as routers, switches, gateways, bridges, LAN cards, need to have at least one IP address.
IPv6, an Internet Protocol for efficient expansion capacity
in addressing and routing
2. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645
www.ijmer.com 1076 | Page
Figure 1: Use of routers
Different IP packet networks are normally interconnected by Routers that have added functionality to permit
accounting between the interconnected networks. In other configurations they act also as interworking devices between
different protocols.
2.1 Major benefits of the IPv6 – Why change?
The new version of IPv6 was conceived to replace the previous IPv4 standard that was adopted two decades ago as
a robust, easily implemented standard.
However IPv4 is being used successfully to support the communications systems in the emerging information
society and has been updated to extend its useful life (e.g. NAT mechanism, IPsec protocol), MPLS, Tunneling). However
its capabilities are somewhat limited in the following areas:
Exhaustion of the IPv4 address space;
Growth of the Internet and the maintenance of routing tables
Auto-configuration
Mobility
Security
Quality of service
And the purpose of developing IPv6 is to overcome these limitations.
The areas where IPv6 offers improvement are:
Expansion capacity for addressing and routing – the IP address space is expanded from 32 bits to 128 bits, enabling a
greatly increased number of address combinations, levels of hierarchical address organization and auto-configuration of
addresses;
Simplified header format – the IPv6 basic header is only 40 bytes long in spite of the greatly increased address
allocation;
Enhanced options support – several different, separate “extension headers” are defined, which enable flexible support
for options without all of the header structure having to be interpreted and manipulated at every router point along the
way;
Quality of service – the Flow Label and the Priority fields in the IPv6 header are used by a host to identify packets that
need special handling by IPv6 routers, such as non-default quality of service or "real-time" service. This capability is
important in that it needs to support applications that require some degree of consistent throughput, delay, and jitter;
Auto-configuration – adds the concept of dynamic assignment of part of the address space, based on geographic and
topographic features of a given physical connection
Elimination of the need for NATs (network address translators) – since the IP address space supports
approximately 3.4 x 1038
possible combinations, the need for private addressing schemes behind NATs is unnecessary
on grounds of address conservation;
Improved security with mandatory IPsec implementation – IPv6 provides for integral support for authentication,
privacy and data integrity measures, by requiring all implementations to support these features;
Mobility - mobile computers are assigned with at least two IPv6 addresses whenever they are roaming away from their
home network. One (the home address) is permanent; the other (the IPv6 link-local address) is used temporarily. In
addition, the mobile node will typically auto-configure a globally-routable address at each new point of attachment.
Every IPv6 router supports encapsulation, so every router is capable of serving as a home agent on the network(s) to
which it is attached.
2.2IP addressing architecture
An IP address is a binary number, which identifies any user’s computer directly connected to the Internet. An IPv4 address
consists of 32 bits, but it is usually represented by a group of four numbers (8 bits hexadecimal), from 0 to 255 ranges and
separated by full stops. An example of this representation is showed below
3. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645
www.ijmer.com 1077 | Page
124.32.43.4
Several domain names can also be linked to the same IP address, in effect similar to having more than one name for
the same person.
The most recognized change from IPv4 to IPv6 is the length of network addresses. The IPv6 addresses have 128
bits length. The 128 bits provide approximately 3.4x1038
separate values. An IPv6 address consists of eight numbers in the
hexadecimal format, from 0 to 65535 (decimal) ranges and separated by a colon “:”. An example of this new representation
is showed following:
FECA: 0000:234A:0043:AB45: FFFF: 9A3E:000B
In order to compare with the IPv4 header next figure 3 shows the IPv6 header format:
Figure 3: IPv6 Structure
III. Services and Equipments
The "converging" new generation communication networks are using and planning to use an IP based network
infrastructure with multi-functional end-devices, always on, always reachable peer-to-peer, with mobility, quality of service
and end-to-end security. Even non telecom industries such as music, radio and television will be supported in the IP
environment. There are applications that need or will benefit from IPv6 such as:
Mobile broadband IP;
Mobile IP broadcast;
Peer to peer VoIP;
Digital radio;
iTV and IPTV;
Grids;
P2P multiplayer games;
RFID;
Control networks;
Remote manufacturing systems;
Sensor networks;
Microsoft (native support of IPv6 in the next version of Windows – Longhorn).
There are also a few technologies that will support the migration to IPv6 like:
Power line Communication;
Wi-Fi;
Wi-Max;
ZigBee;
Unlicensed Mobile Access (UMA).
IV. Migration
The current IP-based network will gradually migrate from IPv4 to IPv6. Signaling interworking will need to be
supported between the IPv6 network and the existing IPv4 network. Mapping of signaling between IPv6 and IPv4 is
required. From the deployment point of view, there are three stages of evolution scenarios:
First stage (stage 1): IPv4 ocean and IPv6 island;
Second stage (stage 2): IPv6 ocean and IPv4 island;
Third stage (stage 3): IPv6 Ocean and IPv6 Island.
00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Version Flow Label
Destination Address
(128 bits)
Source Address
(128 bits)
Payload Length Next Header Hop Limit
Traffic Class1
2
3
4
5
6
7
8
9
10
4. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645
www.ijmer.com 1078 | Page
There are several migration mechanisms from the IPv4 protocol to IPv6 protocol. The most discussed techniques are:
Dual stack – to allow IPv4 and IPv6 to coexist in the same devices and networks;
Tunneling – to avoid order dependencies when upgrading hosts, routers or regions;
Translation – to allow IPv6 only devices to communicate with IPv4 only devices.
Most of these techniques can be combined in a migration scenario to permit a smooth transition from IPv4 to IPv6.
In the following sub-sections, these three techniques are described briefly.
4.1 Dual Stack Technique
In this method it is proposed to implement two protocols stacks in the same device. The protocol stack used for each
link depends on the device used at the other end of the link. Figure 4 shows this arrangement.
Figure 4: Dual stack operation
4.2 Tunnelling Techniques
Tunneling techniques are used in two phases in the migration to a fully IPv6 network. In the first phase the core of
the network uses the IPv4 protocol and there are only small islands IPv6. Figure 5 shows this phase. The IPv6 protocol is
encapsulated in IPv4 tunnels.
Figure 5: IPv4 Tunneling with islands of IPv6 in and IPv4 core network (phase 1)
In a second phase, when many nodes in the core of the network have already changed to IPv6, the situation is
reversed and IPv4 is encapsulated in IPv6 tunnels. The following figure shows this second phase.
Figure 6: IPv6 Tunneling with islands of IPv4 in and IPv6 core network (phase 2)
5. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645
www.ijmer.com 1079 | Page
4.3 Translation Techniques
This technique uses a device, the NATPT (Network Address Translation – Protocol Translation) that translates in
both directions between IPv4 and IPv6 at the boundary between an IPv4 network and an IPv6 network. Figure 7 shows this
arrangement.
Figure 7: the arrangement with Network Address Translation – Protocol Translation
4.4 Some Proposals
As it was stated before that the solution for the migration from IPv4 to IPv6 will be a combination of the techniques
described above.
The most preferable solution on the backbone of the IP Network is the use of the dual stack technique by ISPs and
Network operators. This solution is already possible, because almost all hardware providers have already updated the
software to support this technique.
In the access network, considering that there are many routers at the user’s premises and these routers do not
support IPv6 at present, the best solution is the use of the translation technique by access devices. In a further phase is
possible to switch to the dual stack technique.
V. Security
“Security is the most common concern with regard to the Internet and to financial transactions via the Internet in
particular. Security issues such as authenticating users, controlling access to resources, encrypting communications, and
generally ensuring the privacy of transactions all need to be addressed” (European Commission).
The IPv6 is considered to have “Native Security” included by adding different extensions headers in the protocol.
This security has the following characteristics:
It works end-to-end – it is possible to have IPsec services between a pair of hosts; the authentication is separate from the
encryption;
It has an Authentication Header (AH) – this header refers to the entire packet; providing data integrity and
authentication and mitigating the replay;
It has an Encapsulating Security Payload (ESP) Header - encapsulated payload packet (tunnel); providing data integrity
and authentication and/or confidentiality; mitigating the replay and limits sniffing when confidentiality is enabled.
Network Address Translation (NAT) appears to add little value in the IPv6 environment. With the increased
capacity of addressing, there is no need to continue to use NATs to conserve addresses.
The Firewalls have following functions:
They enforce uniform policy at perimeter;
They stop outsiders from performing dangerous operations;
They provide a check point and scalable, centralized control.
In an IPv6 network end-to-end connectivity, tunneling and encryptions can conflict with this policy. To avoid these
limitations, in an IPv6 network it is necessary to combine the firewall functions and the router functions in the same
equipment and to locate it in the edge of the private network. See figure 8 below:
Figure 8: Combined firewall and router
6. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645
www.ijmer.com 1080 | Page
VI. Ipv6 and the Ngn
The current IP network is in a process of transition from IPv4 to IPv6. Mobile access networks are one of the major
potential application areas for IPv6. This is mainly due to the large address space of IPv6. Besides, a large percentile of
packets in such networks will carry real time traffic such as voice or video. These applications are expected to be important
for IPv6, as they may depend heavily on the QoS mechanism in IPv6 networks. Nevertheless 3GPP is considering using
IPv4 addresses initially instead of IPv6 addresses.
From the signaling point of view, the IPv6 protocol has many features related to QoS and other capabilities. By
utilizing IPv6 features, such as ease of defining explicit route, flow labeling capability and improved support for extensions
and options like hop-by-hop option header or destination option header, it is possible to improve the efficiency of IPv6
networks without modifying the existing signaling protocols.
VII. Standards and Tests
The IETF (Internet Engineering Task Force) created a working group to develop the IPv6 protocol. The "IPv6
Working Group" is responsible for the specification and standardization of the Internet Protocol version 6 (IPv6). IETF
produced several specifications and protocols; these can be found at the following URL:
http://playground.sun.com/pub/ipng/html/specs/specifications.htm
The core IPv6 standards are widely implemented and are starting to see global deployment.
A European IPv6 Task Force has also been created. Delegates of the different national Task Forces take part. The
link for the documents prepared for this TF is showed:
http://www.ec.ipv6tf.org/in/i-documentos.php
Another organization founded to promote de IPv6 protocol and implementation was the IPv6 Forum. IPv6 Forum is
a world-wide consortium of leading Internet vendors, Research & Education Networks, with a clear mission to promote IPv6
by dramatically improving the market and user awareness of IPv6, creating a quality and secure Next Generation Internet
and allowing world-wide equitable access to knowledge and technology.
To achieve these proposals the IPv6 FORUM will:
Establish an open, international FORUM of IPv6 expertise;
Share IPv6 knowledge and experience among members;
Promote new IPv6-based applications and global solutions;
Promote interoperable implementations of IPv6 standards;
Co-operate to achieve end-to-end quality of service;
Resolve issues that create barriers to IPv6 deployment.
The web site from this forum can be found in:
http://www.ipv6forum.com
The European Commission has been instrumental in providing necessary funding for the research and development
of IPv6 related issues. In particular, and in response to the conclusions of the Stockholm Summit, the Commission stepped
up its R&D efforts. A large number of IPv6 projects are currently operational, including two large-scale IPv6 trials, namely
6NET and Euro6IX.
These trials are fully complementary to the efforts deployed at national level and at European level in the context of
initiatives such as GEANT.
VIII. Possible Actions
In order to complete some of the actions proposed by the Commission and the European Task Force, guidelines
should be developed to help the operators and the users gradually take the necessary steps to start the migration to IPv6 and
in a near future to adopt the new version of IP protocol (IPv6).
Technical guidance is a valuable way to promote the adoption of IPv6 in public networks and services.
IX. Conclusion
The deployment of IPv6 is important to the future health of the Internet. An average of 4Tbps of traffic per day is
seen for a one-year measurement period. This provides a best available estimate of overall IPv6 traffic on the Internet. The
dwindling supply of available IPv4 addresses has been broadly documented, as have the challenges faced by those wishing to
migrate to IPv6.
In terms of hard data, however, industry and academia have had little visibility into the rate of IPv6 deployment in
the Internet.
Providing support for IPv6 in the world is still predominantly IPv4 based. Also, it seems interesting that there is no
significant migration of users from IPv4 to IPv6 as per the data. However, the significant growth of IPv4 traffic implies that
the usage of IPv6 is also increasing, but at a comparatively slower pace.
7. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1075-1081 ISSN: 2249-6645
www.ijmer.com 1081 | Page
References
[1] C. Caicedo, J. Joshi, and S. Tuladhar, “IPv6 Security Challenges”, Computer, IEEE Computer Society, February 2009
[2] Bihrouzan A. Forouzan, “TCP/IP Protocol Suite”, 4th Edition, McGraw Hill, ISBN: 978- 0-07-337604-2, 2010
[3] C. Balanis, Antenna Theory, Analysis and Design, 3rd edition, New York: Wiley, 2005.
[4] S. Bradner and A. Mankin, “The Recommendation for the Next Generation IP Protocol”, RFC 1752, Jan. 1995
[5] Christian Huitema, “IPv6: The New Internet Protocol (2nd Edition)”, Jan. 1998.
[6] Andrew S. Tanenbaum,David J. Wetherall,“Computer Networks (5th
edition)”,Oct. 2010.
Bikki Lakshmi Manasa was born in Guntur District ,Andhra Pradesh, India on 1st
August 1992, is currently pursuing
B.TECH (4th year) in Electronics and Communication Engineering(ECE) in K.L.University. Areas of interest are Digital
Communications, Computer Networks, Antennas and Wave Propagation, VLSI and Digital Signal Processing.
Guttikonda Chaitra Bharti was born in Warangal District ,Andhra Pradesh, India on 23rd February 1992, is currently
pursuing B.TECH (4th year) in Electronics and Communication Engineering(ECE) in K L University. Areas of interest are
Digital Communications, Computer Networks, Antennas and Wave Propagation, VLSI and Digital Signal Processing.
Mikkili Ramya Teja was born in Guntur District, Andhra Pradesh, India, on 30th
may 1992, and is currently pursuing
B.TECH (4th year) in Electronics and Communication Engineering (ECE) in K L University. Areas of interest are Digital
Communications, Computer networks, Antennas and Wave Propagation and Digital Signal Processing.
Akkela Rama Krishna is working as an Asst. Professor in the department of Electronics and Computers Engineering at K
L University. Areas of interest are Artificial Intelligence, Digital Communications and Computer Networks.