SlideShare a Scribd company logo
An Innovative Simulation, Comparison Methodology & Framework for evaluating the Performance evaluation of a Novel IPv4 -IPv6 Transition Mechanisms : BD-SIIT vs DSTM. Dr.Manjaiah.D.H. Chairman  and Professor, Dept of CS, Mangalagangotri, Mangalore University, Mangalore-31739   Hanumanthappa.J.,  Aravinda.C.V. B.E., M.Tech.,(Ph.D) ,  M.Sc.,M.Phil.,M.Tech.,(Ph.D).,  Asst.Professor,DOS in CS,UOM,   Research Scholar, Manasagangotri,   Mangalagangotri, Mysore.   Mangalore University, Mangalore.
This paper clearly specifies comparative and behavior analysis carried out on the two major IPv6 interoperation mechanisms:  BD-SIIT  and  DSTM  for the high level compatibility smooth transition, and interoperation between IPv4 and IPv6.  This  paper proposes the  performance analysis of the difference between  the  BD-SIIT and DSTM. We  Implement  the  BD-SIIT and DSTM in order to Study their behavior using  various evaluation metrics such as Throughput,End-to-End delay(EED),RTT.   The Simulation results of  our experiment shows that  DSTM RTT,EED, and Throughput performance metrics are better  than BD-SIIT when we are using Large size IPv6 packet . ABSTRACT ICIIC2010,Aug-5,6,7.
[object Object],Contents ICIIC2010,Aug-5,6,7.
Definition of IP ,[object Object],ICIIC2010,Aug-5,6,7.
[object Object],[object Object],[object Object],[object Object],[object Object],ICIIC2010,Aug-5,6,7.
IPV6: Distinctive features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ICIIC2010,Aug-5,6,7.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ICIIC2010,Aug-5,6,7.
IPv6 Header Format Traffic Class Flow Label Vers Payload Length Next Header Hop Limit Source Address Destination Address 0 4 12 16 24 31
 
Related work . ,[object Object],ICIIC2010,Aug-5,6,7.
Fig.2.Translation of IPv6 to IPv4 Header .
BD-SIIT Translation process . ,[object Object],[object Object],[object Object],[object Object],ICIIC2010,Aug-5,6,7.
ICIIC2010,Aug-5,6,7. IPv4-mapped  -IPv6 Address . 0  79  80  95  ,[object Object],80- bits of zero FFFF(16 bits ) 32 bits (IPv4 address
Operations of BD-SIIT. ,[object Object],ICIIC2010,Aug-5,6,7. ,[object Object],IPv4  Address IPv6 Address Address mapping 195.18.23.17 ABC2::4321 1 210.154.76.91 ABC2:4321 2 IPv6 Address IPv4 Mapping Mapping_value ABC2::4321 195.18.231.17 1 CDEF::5672 223.18.231.17 2
DSTM ICIIC2010,Aug-5,6,7.
Performance evaluation metrics and Simulation parameters of BD-SIIT and DSTM. In this Paper we have calculated three performance evaluation metrics. 1.End to End delay 2.Throughput 3.Round trip time(RTT)  N rec 1.Mean End to End delay=  ∑  i=1  EEDi/Nrec where  EEDi =  Tdi- Tsi where EEDi is the end to end delay of ith packet. Tsi is the  Source packet i created and Tdi is the Destination packet which is created at Destination. Nrec is the total number of packets received at Dest host and Mean EED is the mean value of each communication session . ICIIC2010,Aug-5,6,7.
The mean throughput for a sequence of packets of specific size is calculated by using equations 1 and 2. MeanThr = Σ N  j =1  Thrj   /N  -------------(1) where  Thr=Packetsreceived(Pr)/Packets generated(Pg)*100%.--------------(2) Where  Thrj is the value of the throughput when the packet j is received at intermediate device like DSTM gateway,BD-SIIT Gateway,v4/v6 Router and N is the number of received packets at intermediate device,Pr is the no of packets received at intermediate device and Pg is the number of packets created by  source host. ICIIC2010,Aug-5,6,7.
ICIIC2010,Aug-5,6,7. Simulation Parameters Value 1.Buffer Size 500 Packets 2. Propogation Delay 10ms 3.payload size 200 Bytes 4.Very traffic Load 6~240 Nodes. 5.Queue Management Scheme Drop tail.
Conclusions . ICIIC2010,Aug-5,6,7.
References References   [1].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” A Study on IPv6 in IPv4 Static Tunneling threat issues in 4G Networks using OOAD Class and Instance Diagrams” ,Proceedings of the International  Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA, January 09-11,2010,[Paper code CSCIT-152][CSCITOP113].   [2].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” An IPv4-to-IPv6 threat reviews with dual stack transition mechanism considerations a transitional threat model in 4G Wireless networks ”Proceedings of the International Conference on Emerging Trends in Computer Science, Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA,January 09-11,2010,[Paper code CSCIT-157] [CSCITOP115].   [3].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” Implementation,Comparative and Performance Analysis of IPv6 over IPv4 QoS metrics in 4G Networks: Single-source-destination paths Delay, Packet Loss Performance and Tunnel Discovery Mechanisms", Proceedings  of the International  Conference on Information Science and Applications(ICISA-2010)organized by Dept. of Master of Computer Applications,Panimalar Engineering College,Chennai-600 123,Tamilnadu,India.,February-06-2010,[Paper code ICISA-293(with serial no-101)].   [4].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi ,”High Performance evaluation of Multimedia Video Streaming over IP networks” ,Proceedings of the National conference on Computing communications and Information systems(NCCCIS-2010)organized by Department of Information Technology Sri Krishna College of Engineering and Technology,Kuniamuthur,Coimbatore-641008,INDIA,February-12-13,2010,[Paper id NCCCIS-MM-03],pp-88-92.   ICIIC2010,Aug-5,6,7.
ICIIC2010,Aug-5,6,7.
ICIIC2010,Aug-5,6,7.
ICIIC2010,Aug-5,6,7. July 27-28 ICEMC2-2010,Kuppam,AP,INDIA. Any Questions ?
ICIIC2010,Aug-5,6,7. July 27-28 ICEMC2-2010,Kuppam,AP,INDIA.

More Related Content

What's hot

Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
IJCNCJournal
 
Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...
Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...
Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...
Kaushik Panta
 

What's hot (17)

Shilpa ppt
Shilpa pptShilpa ppt
Shilpa ppt
 
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
 
FINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCES
FINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCESFINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCES
FINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCES
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
 
Analysis of a hybrid cipher algorithm
Analysis of a hybrid cipher algorithmAnalysis of a hybrid cipher algorithm
Analysis of a hybrid cipher algorithm
 
집합모델 확장불린모델
집합모델  확장불린모델집합모델  확장불린모델
집합모델 확장불린모델
 
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
 
Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...
Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...
Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...
 
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
 
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AEBank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
 
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
 
Bhadale group of companies ai neural networks and algorithms catalogue
Bhadale group of companies ai neural networks and algorithms catalogueBhadale group of companies ai neural networks and algorithms catalogue
Bhadale group of companies ai neural networks and algorithms catalogue
 
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
 
Grouping of Hashtags using Co-relating the Occurrence in Microblogs
Grouping of Hashtags using Co-relating the Occurrence in MicroblogsGrouping of Hashtags using Co-relating the Occurrence in Microblogs
Grouping of Hashtags using Co-relating the Occurrence in Microblogs
 

Viewers also liked (7)

Icemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmIcemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstm
 
IPv4 vs IPv6
IPv4 vs IPv6IPv4 vs IPv6
IPv4 vs IPv6
 
Kkbnet 2010-a compa
Kkbnet 2010-a  compaKkbnet 2010-a  compa
Kkbnet 2010-a compa
 
Kkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithmsKkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithms
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 

Similar to Iciic 2010 114

Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
hanums1
 
Icemc2 kuppam
Icemc2 kuppamIcemc2 kuppam
Icemc2 kuppam
hanums1
 
Icemc22010 ppt 29
Icemc22010 ppt 29Icemc22010 ppt 29
Icemc22010 ppt 29
hanums1
 
Iccci10 bd siit
Iccci10 bd siitIccci10 bd siit
Iccci10 bd siit
hanums1
 
Respond 3 of your colleagues postings in one or more of the fol.docx
 Respond  3 of your colleagues postings in one or more of the fol.docx Respond  3 of your colleagues postings in one or more of the fol.docx
Respond 3 of your colleagues postings in one or more of the fol.docx
aryan532920
 
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
Procedia Computer Science   46  ( 2015 )  1072 – 1078 187.docxProcedia Computer Science   46  ( 2015 )  1072 – 1078 187.docx
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
AASTHA76
 
Iccci2010 fipv6
Iccci2010 fipv6Iccci2010 fipv6
Iccci2010 fipv6
hanums1
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
IJECEIAES
 
Algorithms,graph theory and combinatorics
Algorithms,graph theory and combinatoricsAlgorithms,graph theory and combinatorics
Algorithms,graph theory and combinatorics
Prof.Dr.Hanumanthappa J
 

Similar to Iciic 2010 114 (20)

Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
 
Icemc2 kuppam
Icemc2 kuppamIcemc2 kuppam
Icemc2 kuppam
 
Icemc22010 ppt 29
Icemc22010 ppt 29Icemc22010 ppt 29
Icemc22010 ppt 29
 
Iccci10 bd siit
Iccci10 bd siitIccci10 bd siit
Iccci10 bd siit
 
M017147275
M017147275M017147275
M017147275
 
Major Report on ADIAN
Major Report on ADIANMajor Report on ADIAN
Major Report on ADIAN
 
Protocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationProtocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulation
 
Respond 3 of your colleagues postings in one or more of the fol.docx
 Respond  3 of your colleagues postings in one or more of the fol.docx Respond  3 of your colleagues postings in one or more of the fol.docx
Respond 3 of your colleagues postings in one or more of the fol.docx
 
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
Procedia Computer Science   46  ( 2015 )  1072 – 1078 187.docxProcedia Computer Science   46  ( 2015 )  1072 – 1078 187.docx
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
 
Iccci2010 fipv6
Iccci2010 fipv6Iccci2010 fipv6
Iccci2010 fipv6
 
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSREVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
 
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a Network
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a NetworkAnalysis of RIP, EIGRP, and OSPF Routing Protocols in a Network
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a Network
 
Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Performance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition TechniquesPerformance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition Techniques
 
Algorithms,graph theory and combinatorics
Algorithms,graph theory and combinatoricsAlgorithms,graph theory and combinatorics
Algorithms,graph theory and combinatorics
 
IPv6 Implementation challenges
IPv6 Implementation challengesIPv6 Implementation challenges
IPv6 Implementation challenges
 

More from hanums1

Iccsit 2010 rljit
Iccsit 2010 rljitIccsit 2010 rljit
Iccsit 2010 rljit
hanums1
 
Iccsit 2010 p_1
Iccsit 2010 p_1Iccsit 2010 p_1
Iccsit 2010 p_1
hanums1
 
Iccsit 2010 paper1
Iccsit 2010 paper1Iccsit 2010 paper1
Iccsit 2010 paper1
hanums1
 
Iccsit2010 p 1-dummy
Iccsit2010 p 1-dummyIccsit2010 p 1-dummy
Iccsit2010 p 1-dummy
hanums1
 
Iccsit2010 p 1
Iccsit2010 p 1Iccsit2010 p 1
Iccsit2010 p 1
hanums1
 
Iccci2010
Iccci2010 Iccci2010
Iccci2010
hanums1
 
Iccci2010
Iccci2010Iccci2010
Iccci2010
hanums1
 
Iccana 2011 jan8th
Iccana 2011 jan8thIccana 2011 jan8th
Iccana 2011 jan8th
hanums1
 
Iccana 2011
Iccana 2011Iccana 2011
Iccana 2011
hanums1
 

More from hanums1 (9)

Iccsit 2010 rljit
Iccsit 2010 rljitIccsit 2010 rljit
Iccsit 2010 rljit
 
Iccsit 2010 p_1
Iccsit 2010 p_1Iccsit 2010 p_1
Iccsit 2010 p_1
 
Iccsit 2010 paper1
Iccsit 2010 paper1Iccsit 2010 paper1
Iccsit 2010 paper1
 
Iccsit2010 p 1-dummy
Iccsit2010 p 1-dummyIccsit2010 p 1-dummy
Iccsit2010 p 1-dummy
 
Iccsit2010 p 1
Iccsit2010 p 1Iccsit2010 p 1
Iccsit2010 p 1
 
Iccci2010
Iccci2010 Iccci2010
Iccci2010
 
Iccci2010
Iccci2010Iccci2010
Iccci2010
 
Iccana 2011 jan8th
Iccana 2011 jan8thIccana 2011 jan8th
Iccana 2011 jan8th
 
Iccana 2011
Iccana 2011Iccana 2011
Iccana 2011
 

Recently uploaded

Recently uploaded (20)

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Iciic 2010 114

  • 1. An Innovative Simulation, Comparison Methodology & Framework for evaluating the Performance evaluation of a Novel IPv4 -IPv6 Transition Mechanisms : BD-SIIT vs DSTM. Dr.Manjaiah.D.H. Chairman and Professor, Dept of CS, Mangalagangotri, Mangalore University, Mangalore-31739 Hanumanthappa.J., Aravinda.C.V. B.E., M.Tech.,(Ph.D) , M.Sc.,M.Phil.,M.Tech.,(Ph.D)., Asst.Professor,DOS in CS,UOM, Research Scholar, Manasagangotri, Mangalagangotri, Mysore. Mangalore University, Mangalore.
  • 2. This paper clearly specifies comparative and behavior analysis carried out on the two major IPv6 interoperation mechanisms: BD-SIIT and DSTM for the high level compatibility smooth transition, and interoperation between IPv4 and IPv6. This paper proposes the performance analysis of the difference between the BD-SIIT and DSTM. We Implement the BD-SIIT and DSTM in order to Study their behavior using various evaluation metrics such as Throughput,End-to-End delay(EED),RTT. The Simulation results of our experiment shows that DSTM RTT,EED, and Throughput performance metrics are better than BD-SIIT when we are using Large size IPv6 packet . ABSTRACT ICIIC2010,Aug-5,6,7.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. IPv6 Header Format Traffic Class Flow Label Vers Payload Length Next Header Hop Limit Source Address Destination Address 0 4 12 16 24 31
  • 9.  
  • 10.
  • 11. Fig.2.Translation of IPv6 to IPv4 Header .
  • 12.
  • 13.
  • 14.
  • 16. Performance evaluation metrics and Simulation parameters of BD-SIIT and DSTM. In this Paper we have calculated three performance evaluation metrics. 1.End to End delay 2.Throughput 3.Round trip time(RTT) N rec 1.Mean End to End delay= ∑ i=1 EEDi/Nrec where EEDi = Tdi- Tsi where EEDi is the end to end delay of ith packet. Tsi is the Source packet i created and Tdi is the Destination packet which is created at Destination. Nrec is the total number of packets received at Dest host and Mean EED is the mean value of each communication session . ICIIC2010,Aug-5,6,7.
  • 17. The mean throughput for a sequence of packets of specific size is calculated by using equations 1 and 2. MeanThr = Σ N j =1 Thrj /N -------------(1) where Thr=Packetsreceived(Pr)/Packets generated(Pg)*100%.--------------(2) Where Thrj is the value of the throughput when the packet j is received at intermediate device like DSTM gateway,BD-SIIT Gateway,v4/v6 Router and N is the number of received packets at intermediate device,Pr is the no of packets received at intermediate device and Pg is the number of packets created by source host. ICIIC2010,Aug-5,6,7.
  • 18. ICIIC2010,Aug-5,6,7. Simulation Parameters Value 1.Buffer Size 500 Packets 2. Propogation Delay 10ms 3.payload size 200 Bytes 4.Very traffic Load 6~240 Nodes. 5.Queue Management Scheme Drop tail.
  • 20. References References [1].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” A Study on IPv6 in IPv4 Static Tunneling threat issues in 4G Networks using OOAD Class and Instance Diagrams” ,Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA, January 09-11,2010,[Paper code CSCIT-152][CSCITOP113].   [2].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” An IPv4-to-IPv6 threat reviews with dual stack transition mechanism considerations a transitional threat model in 4G Wireless networks ”Proceedings of the International Conference on Emerging Trends in Computer Science, Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA,January 09-11,2010,[Paper code CSCIT-157] [CSCITOP115].   [3].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” Implementation,Comparative and Performance Analysis of IPv6 over IPv4 QoS metrics in 4G Networks: Single-source-destination paths Delay, Packet Loss Performance and Tunnel Discovery Mechanisms", Proceedings of the International Conference on Information Science and Applications(ICISA-2010)organized by Dept. of Master of Computer Applications,Panimalar Engineering College,Chennai-600 123,Tamilnadu,India.,February-06-2010,[Paper code ICISA-293(with serial no-101)].   [4].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi ,”High Performance evaluation of Multimedia Video Streaming over IP networks” ,Proceedings of the National conference on Computing communications and Information systems(NCCCIS-2010)organized by Department of Information Technology Sri Krishna College of Engineering and Technology,Kuniamuthur,Coimbatore-641008,INDIA,February-12-13,2010,[Paper id NCCCIS-MM-03],pp-88-92.   ICIIC2010,Aug-5,6,7.
  • 23. ICIIC2010,Aug-5,6,7. July 27-28 ICEMC2-2010,Kuppam,AP,INDIA. Any Questions ?
  • 24. ICIIC2010,Aug-5,6,7. July 27-28 ICEMC2-2010,Kuppam,AP,INDIA.