This research paper discusses IPv6 flow label and LTE technology for wireless broadband. It provides background on IPv6 and the flow label field, which allows labeling of packets to request quality of service. It proposes a methodology for using the flow label field, including having nodes label flows and forward labeled packets. It also gives a brief introduction to LTE, discussing its architecture and how IPv6 and LTE can work together. The paper aims to show through estimated results that the proposed flow label mechanism maintains performance during network congestion.
Ieee Transition Of I Pv4 To I Pv6 Network Applicationsguest0215f3
This document discusses transitioning IPv4 network applications to IPv6. It begins with an introduction to the need for IPv6 due to IPv4 address depletion. It then discusses IPv6 architecture and some key benefits of IPv6 like increased address space and built-in security. The document outlines three primary considerations for transitioning applications: using IPv6 multicast instead of IPv4 broadcast, enabling multicast reception, and ensuring dual stack compatibility. It categorizes transition complexity and provides examples of changes needed, such as replacing IPv4 data structures and function calls with IPv6 equivalents. Related work on transitioning applications is also discussed.
This document provides an overview of Internet Protocol version 6 (IPv6). It discusses some of the key features and advantages of IPv6, including its larger 128-bit address space that supports up to 3.4×1038 addresses compared to the 4.3 billion addresses supported by IPv4. The document also compares IPv6 to IPv4, noting they are not interoperable but that most transport and application protocols can operate over both with little change. Transition mechanisms have been developed to allow communication between IPv4 and IPv6 networks.
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...TELKOMNIKA JOURNAL
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLS-VPN network and a classic VPN network using simulation studies done on OPNET®. The performance metrics used to carry out the comparison include; End to End Delay, Voice Packet Sent/Received and Label Switched Path’s Traffic. The simulation study was carried out with Voice over Internet Protocol (VoIP) as the test bed. The result of the study showed that MPLS-based VPN networks outperform classic VPN networks.
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKIJCNCJournal
Internet of Things (IoT) deployments mostly relies on the establishment of Low-Power and Lossy Networks (LLNs) among a large number of constraint devices. The Internet Engineering Task Force (IETF) provides an effective IPv6-based LLN routing protocol, namely the IPv6 Routing Protocol for Low Power and Lossy Network (RPL). RPL provides adequate protection against external security attacks but stays vulnerable to internal routing attacks such as a rank attack. Malicious RPL nodes can carry out a rank attack in different forms and cause serious network performance degradation. An experimental study of the impact of the decreased rank attack on the overall network performance is presented in this paper. In also besides, it is
important to understand the main influencing factors in this context. In this study, several some many network scenarios were considered with varying network sizes, attacker properties, and topological setups. The experimental results indicate a noticeable adverse effect of the rank attack on the average PDR, delay, ETX, and beacon interval. However, such impact was varied according to network size, attacker position,
attacker neighbor count, number of attack-affected nodes, and overall hops increase. The results give a practical reference to the overall performance of RPL networks under rank attacks.
This document discusses Voice over MPLS (VoMPLS) as an improved solution for carrying voice traffic compared to Voice over IP (VoIP). It provides an overview of VoMPLS, including how it uses MPLS encapsulation and framing to provide lighter encapsulation than VoIP, while still guaranteeing quality of service. The document also compares IP and MPLS network models, highlighting how MPLS addresses limitations of IP like lack of guaranteed paths, slow routing lookups, and inability to differentiate services. VoMPLS is concluded to be a better future solution for transporting voice due to its inherited advantages from MPLS like reliability, scalability and ease of implementation.
This document appears to be a presentation on next generation networks and related topics. It includes sections on topics like passive optical networks versus Ethernet, MPLS VPNs, quality of service, IPv6 transition technologies, and network optimization approaches. The document contains diagrams, tables, and questions/answers related to these technical subject areas.
Introduction to Wireless cellular technologie and NGN,IMS ganeshmaali
This document provides an overview of wireless cellular technologies and introduces Next Generation Networks (NGN). It discusses 2G technologies like GSM and CDMA and how they focused on circuit switched voice, SMS, and low-speed data. It then covers 2.5G and 3G technologies like GPRS, EDGE, UMTS, CDMA2000, which enabled higher-speed packet-switched data. The document also discusses 4G technologies like LTE and LTE-Advanced, along with key aspects of their network architectures. Finally, it provides a brief introduction to NGN and the IP Multimedia Subsystem.
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSIJNSA Journal
One of the main purposes of Internet Protocol version 6 (IPv6) developments was to solve the IP address depletion concern due to the burgeoning growth of the Internet users. The new Internet protocol provides end-to-end communication, enhanced security and extensibility apart from the other features such as address auto-configuration or plug-and-play and faster packet processing in the routers. However, as a new technology, it is also reported that the protocol introduces some security vulnerabilities both in the header format and in the other protocols associated to it. This paper reviews IPv6 security vulnerabilities that have large potential exploitation in terms of denial of service attacks. The IPv6 security vulnerabilities are classified under three categories that include the IPv6 main header field, IPv6 extension header and Neighbour Discovery Protocol (NDP). This paper also summarizes the current mitigation methods proposed by researchers and practitioners to secure from these IPv6 security vulnerabilities.
Ieee Transition Of I Pv4 To I Pv6 Network Applicationsguest0215f3
This document discusses transitioning IPv4 network applications to IPv6. It begins with an introduction to the need for IPv6 due to IPv4 address depletion. It then discusses IPv6 architecture and some key benefits of IPv6 like increased address space and built-in security. The document outlines three primary considerations for transitioning applications: using IPv6 multicast instead of IPv4 broadcast, enabling multicast reception, and ensuring dual stack compatibility. It categorizes transition complexity and provides examples of changes needed, such as replacing IPv4 data structures and function calls with IPv6 equivalents. Related work on transitioning applications is also discussed.
This document provides an overview of Internet Protocol version 6 (IPv6). It discusses some of the key features and advantages of IPv6, including its larger 128-bit address space that supports up to 3.4×1038 addresses compared to the 4.3 billion addresses supported by IPv4. The document also compares IPv6 to IPv4, noting they are not interoperable but that most transport and application protocols can operate over both with little change. Transition mechanisms have been developed to allow communication between IPv4 and IPv6 networks.
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...TELKOMNIKA JOURNAL
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLS-VPN network and a classic VPN network using simulation studies done on OPNET®. The performance metrics used to carry out the comparison include; End to End Delay, Voice Packet Sent/Received and Label Switched Path’s Traffic. The simulation study was carried out with Voice over Internet Protocol (VoIP) as the test bed. The result of the study showed that MPLS-based VPN networks outperform classic VPN networks.
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKIJCNCJournal
Internet of Things (IoT) deployments mostly relies on the establishment of Low-Power and Lossy Networks (LLNs) among a large number of constraint devices. The Internet Engineering Task Force (IETF) provides an effective IPv6-based LLN routing protocol, namely the IPv6 Routing Protocol for Low Power and Lossy Network (RPL). RPL provides adequate protection against external security attacks but stays vulnerable to internal routing attacks such as a rank attack. Malicious RPL nodes can carry out a rank attack in different forms and cause serious network performance degradation. An experimental study of the impact of the decreased rank attack on the overall network performance is presented in this paper. In also besides, it is
important to understand the main influencing factors in this context. In this study, several some many network scenarios were considered with varying network sizes, attacker properties, and topological setups. The experimental results indicate a noticeable adverse effect of the rank attack on the average PDR, delay, ETX, and beacon interval. However, such impact was varied according to network size, attacker position,
attacker neighbor count, number of attack-affected nodes, and overall hops increase. The results give a practical reference to the overall performance of RPL networks under rank attacks.
This document discusses Voice over MPLS (VoMPLS) as an improved solution for carrying voice traffic compared to Voice over IP (VoIP). It provides an overview of VoMPLS, including how it uses MPLS encapsulation and framing to provide lighter encapsulation than VoIP, while still guaranteeing quality of service. The document also compares IP and MPLS network models, highlighting how MPLS addresses limitations of IP like lack of guaranteed paths, slow routing lookups, and inability to differentiate services. VoMPLS is concluded to be a better future solution for transporting voice due to its inherited advantages from MPLS like reliability, scalability and ease of implementation.
This document appears to be a presentation on next generation networks and related topics. It includes sections on topics like passive optical networks versus Ethernet, MPLS VPNs, quality of service, IPv6 transition technologies, and network optimization approaches. The document contains diagrams, tables, and questions/answers related to these technical subject areas.
Introduction to Wireless cellular technologie and NGN,IMS ganeshmaali
This document provides an overview of wireless cellular technologies and introduces Next Generation Networks (NGN). It discusses 2G technologies like GSM and CDMA and how they focused on circuit switched voice, SMS, and low-speed data. It then covers 2.5G and 3G technologies like GPRS, EDGE, UMTS, CDMA2000, which enabled higher-speed packet-switched data. The document also discusses 4G technologies like LTE and LTE-Advanced, along with key aspects of their network architectures. Finally, it provides a brief introduction to NGN and the IP Multimedia Subsystem.
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSIJNSA Journal
One of the main purposes of Internet Protocol version 6 (IPv6) developments was to solve the IP address depletion concern due to the burgeoning growth of the Internet users. The new Internet protocol provides end-to-end communication, enhanced security and extensibility apart from the other features such as address auto-configuration or plug-and-play and faster packet processing in the routers. However, as a new technology, it is also reported that the protocol introduces some security vulnerabilities both in the header format and in the other protocols associated to it. This paper reviews IPv6 security vulnerabilities that have large potential exploitation in terms of denial of service attacks. The IPv6 security vulnerabilities are classified under three categories that include the IPv6 main header field, IPv6 extension header and Neighbour Discovery Protocol (NDP). This paper also summarizes the current mitigation methods proposed by researchers and practitioners to secure from these IPv6 security vulnerabilities.
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
This document summarizes and compares three IPv6 mobility management schemes for multimedia services over LTE-A wireless networks: Mobile IPv6, IPv6-MPLS, and IPv6-GMPLS. It first provides background on these schemes and the LTE-A network architecture. It then discusses using OPNET simulations to evaluate and compare the schemes' performance based on metrics like throughput, delay, coverage area, and bandwidth. The document concludes that IPv6-GMPLS provides the best performance and is the best choice for improving multimedia quality of service over LTE-A networks.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document discusses ITU initiatives on next generation networks and the way forward. It provides an overview of ITU standardization work on NGN, including developing standards and recommendations. It also discusses ITU's developmental work on NGN through various programs and initiatives aimed at promoting NGN adoption. This includes efforts related to regulatory reforms, capacity building, and case studies. The document outlines ITU's vision of broadband as critical infrastructure and highlights its economic and social benefits.
This document summarizes options for providing Voice over IP (VoIP) services over a 3GPP Long Term Evolution (LTE) network. It begins by providing background on VoIP, including how voice is converted to digital packets and transmitted over an IP network. It then describes the key components and benefits of LTE networks, which were designed to be all-IP networks for data transmission. Finally, it states that the paper will explore various options for supporting VoIP services over LTE networks and discuss the benefits of carrying voice over LTE using VoIP.
RINA detailed components overview and implementation discussionEleni Trouva
The document discusses RINA and provides details on several key concepts:
1) Distributed applications in RINA use application naming, flows between applications can have different QoS characteristics, and there is a common application connection establishment phase.
2) The IPC process and API provide a communication service between applications using flows. The API supports operations like flow allocation and data transfer.
3) CDAP is the recommended application protocol for RINA applications to exchange shared state and establish connections. It defines messages and operations for managing objects.
Deploying Single Stack IPv4 with NAT44 is the most costly way for mobile operators to deal with IPv4 address exhaustion due to increasing bandwidth demands and NAT44 session state over time. Building a path to IPv6 is the most effective way to reduce per-subscriber capex costs associated with NAT44. Capex is neutral when transitioning to IPv6 by deploying Dual Stack IPv6 with NAT44 versus deploying Single Stack IPv6 with NAT64, though opex costs may vary between operators. A test of Single Stack IPv6 found 85-90% of smartphone apps worked via IPv6 or NAT64, with the remaining requiring support on the user endpoint for 464XLAT.
Performance Evaluation of Interactive Video Streaming over WiMAX Network IJECEIAES
Nowadays, the desire of internet access and the need of digital encodings have influenced quite a large number of users to access high quality video application. Offering multimedia services not only to the wired but to wireless mobile client is becoming more viable. In wireless medium, videostreaming still has high resource requirements, for example, bandwidth, traffic priority, smooth play-backs. Therefore, bandwidth demands of these applications are far exceeding the capacity of 3G and Wireless Local Area Networks (LANs). The current research demonstrates the introductory understanding of the Worldwide Interoperability for Microwave Access (WiMax) network, applications, the mechanisms, its potential features, and techniques used to provide QoS in WiMAX, and lastly the network is simulated to report the diverse requirements of streamed video conferencing traffic and its specifications. For this purpose two input parameters of video traffic are selected, i.e, refresh rate, which is monitored in terms of frames per second and pixel resolutions which basically counts the number of pixels in digital imaging. The network model is developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. Apart from this, the second aim of the current research is to address whether WiMAX access technology for streaming video applications could provide comparable network performance to Asymmetric Digital Subscriber Line (ADSL). For this purpose network metrices such as End to End delay and throughput is taken into consideration for optimization.
The document discusses the OSI model which consists of 7 layers - physical, data link, network, transport, session, presentation and application layer. Each layer has a specific processing function and data flows from top to bottom, with each layer adding its own header. The layers are described in detail with examples of protocols and functions at each layer.
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
This document reviews several studies that analyzed the performance of VoIP traffic over WiMAX networks using different VoIP codecs and WiMAX service classes. It summarizes the findings of various papers on how QoS parameters like throughput, delay, jitter compared for codecs like G.711, G.723, G.729 when using the UGS, rtPS, nrtPS and BE service classes. Most studies found that UGS generally performed best for VoIP due to its ability to guarantee bandwidth and minimize jitter and delay, while G.711 typically provided the best voice quality. The document aims to compare the results across different service classes and codecs.
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
Network Mobility Basic Support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 doesn’t deliver any kind of Quality of Service (QoS) guarantees to its clients. It can barely offer the same level of services (i.e. Best-Effort) to all the users without obligation to the application’s needs. This propositions a challenge to real-time applications that demand a precise level of QoS pledge. The Differentiated Services has recently come to be the most widely used QoS support technology in IP networks due to its relative simplicity and scalability benefits. This paper proposes a new scheme to provide QoS to mobile network nodes within NEMO context. The proposed scheme intends to reduce handover latency for the users of MNN as well as alleviates packet losses. The feasibility of the proposed enhancement is assessed by measuring its performance against the native NEMO BS standard protocol using NS-2 simulator. The obtained results in the simulation study have demonstrated that the proposed scheme outperforms the standard NEMO BS protocol.
The document discusses migrating legacy telephone networks to next generation networks (NGNs). It describes how NGNs can help reduce costs while enabling new services. A key step is moving legacy voice services onto NGN platforms using distributed access gateways. This provides flexibility while maintaining service continuity and revenue from legacy services. The document also outlines KEYMILE's solutions for supporting voice over IP through media gateways on their MileGate and UMUX platforms.
IRJET- Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET Journal
This document analyzes and compares the performance of MPLS-enabled networks and traditional IP networks. It discusses how MPLS protocol performs with OSPF protocol. Nine Cisco routers running IOS version 12.4 were used to test network performance with MPLS and traditional IP routing. The results show how service providers can benefit from MPLS services by increasing network latency and additional benefits obtained from MPLS. Key areas analyzed include latency, utilization in the network. MPLS networks offer benefits like traffic engineering, scalability, VPN services, and ability to carry layer 2 protocols over the MPLS core.
This document provides an overview of optimizing IP for IoT networks. It discusses how IP can be adapted or adopted for devices. It also describes constraints of IoT nodes and networks and how IP is optimized through protocols like 6LoWPAN, 6TiSCH, and RPL. It covers adaptation layers, packet headers, forwarding methods, and scheduling in these protocols. Authentication, application protocols like MQTT and CoAP, and the work of IETF groups on standards for IoT are also summarized.
This document discusses the transition to all-IP telecom networks. It begins by reviewing the evolution of telecommunications from past technologies like GSM to the present with 4G/LTE networks and the future of 5G. It then explains that all-IP networks will converge different services like data, voice and multimedia onto a single IP-based network. This will impact the telecom market by increasing competition and allowing new entrants. The document also summarizes the growth of the Saudi telecom market in mobile, fixed and broadband services. It provides overviews of the marketing, business operations and personnel planning needed to support all-IP networks.
IRJET- A Survey on Mobility in RPL for IoT ApplicationsIRJET Journal
This document summarizes a research paper that surveys mobility extensions for the Routing Protocol for Low-Power and Lossy Networks (RPL) in Internet of Things (IoT) applications. It begins by introducing RPL, a routing protocol designed for low-power and lossy networks. It then discusses various proposed methods for extending RPL to support node mobility, including methods that use signal strength to detect mobility and predict new parent nodes, and methods that introduce temporary parents to reduce routing failures during mobility. The document surveys these different RPL mobility extensions and their approaches to handling mobility in low-power and lossy networks.
Implementation of Steganographic Method Based on IPv4 Identification Field ov...IJERA Editor
This document presents a study on implementing a steganographic method (covert channel) to hide secret data in the IP identification field. The implementation was carried out using the Network Simulator 3 (NS-3).
The document first provides background on covert channels and discusses their application in TCP/IP layers for VoIP. It then analyzes each TCP/IP layer for their technical difficulty, generality, and reachability for covert channels. Specifically, the network layer presents opportunities due to unused or optional bits in the IP header.
The implementation hides the word "hello" by encoding each character into the IP identification field of successive packets. The simulation confirms successful transmission of the hidden message across the point-to-
Next Generation Network Architecture, by Sunny Yeung.
A presentation given at APRICOT 2016’s Opening Ceremony and APRICOT Plenary 1 session on 22 February 2016.
A Flexible Network Architecture for 5G SystemsEiko Seidel
In this paper, we define a flexible, adaptable, and programmable architecture for 5Gmobile networks, taking into consideration the requirements, KPIs, and the current gaps in the literature, based on three design fundamentals: (i) split of user and control plane, (ii) service-based architecturewithin the core network (in line with recent industry and standard consensus), and (iii) fully flexible support of E2E slicing via per-domain and cross-domain optimisation, devising inter-slice control and management functions, and refining the behavioural models via experiment-driven optimisation.The proposed architecture model further facilitates the
realisation of slices providing specific functionality, such as network resilience, security functions, and network elasticity. The proposed architecture consists of four different layers identified as network layer, controller layer, management and orchestration layer, and service layer. A key contribution of this paper is the definition of the role of each layer, the relationship between layers, and the identification of the required internal modules within each of the layers. In particular, the proposed architecture extends the reference architectures proposed in the Standards Developing Organisations like 3GPP and ETSI, by building on these while addressing several gaps identified within the corresponding baseline models. We additionally present findings, the design guidelines, and evaluation studies on a selected set of key concepts identified to enable flexible cloudification of the protocol stack, adaptive network slicing, and inter-slice control and management.
This document discusses strategies for transitioning from IPv4 to IPv6. It describes:
1. Dual-stack as the simplest approach, allowing IPv4 and IPv6 to operate simultaneously and maintain legacy IPv4 applications while adding new IPv6 applications.
2. Tunneling mechanisms like configured and automatic tunnels that allow IPv6 packets to be encapsulated and sent over IPv4 networks.
3. Transition scenarios involving gradual deployment of dual-stack systems and applications until pure IPv6 is achieved, maintaining compatibility with IPv4 nodes during transition.
The key recommendation is for applications to support dual-stack environments to facilitate a smooth transition and interoperability between IPv4 and IPv6 nodes. Careful planning
The document discusses the network layer of the OSI model and the Internet Protocol (IP). It focuses on IP version 4 (IPv4), including the IPv4 packet structure, addressing modes of IPv4, and address resolution protocols. The network layer is responsible for identification of hosts based on logical addresses and routing data between hosts over underlying networks. IPv4 currently dominates but is being replaced by IPv6 due to address exhaustion issues in IPv4.
A Survey On Next Generation Internet Protocol IPv6Carrie Romero
This document discusses IPv6 and the need to transition from IPv4 to IPv6. It provides an overview of IPv6, including that IPv6 was developed to address the limited address space of IPv4 and improve security. It also discusses some of the key challenges in transitioning to IPv6, such as the need for IPv6 and IPv4 to coexist during transition. The document summarizes various transition techniques between IPv6 and IPv4, including dual stack, tunneling, and translation methods.
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
This document summarizes and compares three IPv6 mobility management schemes for multimedia services over LTE-A wireless networks: Mobile IPv6, IPv6-MPLS, and IPv6-GMPLS. It first provides background on these schemes and the LTE-A network architecture. It then discusses using OPNET simulations to evaluate and compare the schemes' performance based on metrics like throughput, delay, coverage area, and bandwidth. The document concludes that IPv6-GMPLS provides the best performance and is the best choice for improving multimedia quality of service over LTE-A networks.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document discusses ITU initiatives on next generation networks and the way forward. It provides an overview of ITU standardization work on NGN, including developing standards and recommendations. It also discusses ITU's developmental work on NGN through various programs and initiatives aimed at promoting NGN adoption. This includes efforts related to regulatory reforms, capacity building, and case studies. The document outlines ITU's vision of broadband as critical infrastructure and highlights its economic and social benefits.
This document summarizes options for providing Voice over IP (VoIP) services over a 3GPP Long Term Evolution (LTE) network. It begins by providing background on VoIP, including how voice is converted to digital packets and transmitted over an IP network. It then describes the key components and benefits of LTE networks, which were designed to be all-IP networks for data transmission. Finally, it states that the paper will explore various options for supporting VoIP services over LTE networks and discuss the benefits of carrying voice over LTE using VoIP.
RINA detailed components overview and implementation discussionEleni Trouva
The document discusses RINA and provides details on several key concepts:
1) Distributed applications in RINA use application naming, flows between applications can have different QoS characteristics, and there is a common application connection establishment phase.
2) The IPC process and API provide a communication service between applications using flows. The API supports operations like flow allocation and data transfer.
3) CDAP is the recommended application protocol for RINA applications to exchange shared state and establish connections. It defines messages and operations for managing objects.
Deploying Single Stack IPv4 with NAT44 is the most costly way for mobile operators to deal with IPv4 address exhaustion due to increasing bandwidth demands and NAT44 session state over time. Building a path to IPv6 is the most effective way to reduce per-subscriber capex costs associated with NAT44. Capex is neutral when transitioning to IPv6 by deploying Dual Stack IPv6 with NAT44 versus deploying Single Stack IPv6 with NAT64, though opex costs may vary between operators. A test of Single Stack IPv6 found 85-90% of smartphone apps worked via IPv6 or NAT64, with the remaining requiring support on the user endpoint for 464XLAT.
Performance Evaluation of Interactive Video Streaming over WiMAX Network IJECEIAES
Nowadays, the desire of internet access and the need of digital encodings have influenced quite a large number of users to access high quality video application. Offering multimedia services not only to the wired but to wireless mobile client is becoming more viable. In wireless medium, videostreaming still has high resource requirements, for example, bandwidth, traffic priority, smooth play-backs. Therefore, bandwidth demands of these applications are far exceeding the capacity of 3G and Wireless Local Area Networks (LANs). The current research demonstrates the introductory understanding of the Worldwide Interoperability for Microwave Access (WiMax) network, applications, the mechanisms, its potential features, and techniques used to provide QoS in WiMAX, and lastly the network is simulated to report the diverse requirements of streamed video conferencing traffic and its specifications. For this purpose two input parameters of video traffic are selected, i.e, refresh rate, which is monitored in terms of frames per second and pixel resolutions which basically counts the number of pixels in digital imaging. The network model is developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. Apart from this, the second aim of the current research is to address whether WiMAX access technology for streaming video applications could provide comparable network performance to Asymmetric Digital Subscriber Line (ADSL). For this purpose network metrices such as End to End delay and throughput is taken into consideration for optimization.
The document discusses the OSI model which consists of 7 layers - physical, data link, network, transport, session, presentation and application layer. Each layer has a specific processing function and data flows from top to bottom, with each layer adding its own header. The layers are described in detail with examples of protocols and functions at each layer.
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
This document reviews several studies that analyzed the performance of VoIP traffic over WiMAX networks using different VoIP codecs and WiMAX service classes. It summarizes the findings of various papers on how QoS parameters like throughput, delay, jitter compared for codecs like G.711, G.723, G.729 when using the UGS, rtPS, nrtPS and BE service classes. Most studies found that UGS generally performed best for VoIP due to its ability to guarantee bandwidth and minimize jitter and delay, while G.711 typically provided the best voice quality. The document aims to compare the results across different service classes and codecs.
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
Network Mobility Basic Support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 doesn’t deliver any kind of Quality of Service (QoS) guarantees to its clients. It can barely offer the same level of services (i.e. Best-Effort) to all the users without obligation to the application’s needs. This propositions a challenge to real-time applications that demand a precise level of QoS pledge. The Differentiated Services has recently come to be the most widely used QoS support technology in IP networks due to its relative simplicity and scalability benefits. This paper proposes a new scheme to provide QoS to mobile network nodes within NEMO context. The proposed scheme intends to reduce handover latency for the users of MNN as well as alleviates packet losses. The feasibility of the proposed enhancement is assessed by measuring its performance against the native NEMO BS standard protocol using NS-2 simulator. The obtained results in the simulation study have demonstrated that the proposed scheme outperforms the standard NEMO BS protocol.
The document discusses migrating legacy telephone networks to next generation networks (NGNs). It describes how NGNs can help reduce costs while enabling new services. A key step is moving legacy voice services onto NGN platforms using distributed access gateways. This provides flexibility while maintaining service continuity and revenue from legacy services. The document also outlines KEYMILE's solutions for supporting voice over IP through media gateways on their MileGate and UMUX platforms.
IRJET- Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET Journal
This document analyzes and compares the performance of MPLS-enabled networks and traditional IP networks. It discusses how MPLS protocol performs with OSPF protocol. Nine Cisco routers running IOS version 12.4 were used to test network performance with MPLS and traditional IP routing. The results show how service providers can benefit from MPLS services by increasing network latency and additional benefits obtained from MPLS. Key areas analyzed include latency, utilization in the network. MPLS networks offer benefits like traffic engineering, scalability, VPN services, and ability to carry layer 2 protocols over the MPLS core.
This document provides an overview of optimizing IP for IoT networks. It discusses how IP can be adapted or adopted for devices. It also describes constraints of IoT nodes and networks and how IP is optimized through protocols like 6LoWPAN, 6TiSCH, and RPL. It covers adaptation layers, packet headers, forwarding methods, and scheduling in these protocols. Authentication, application protocols like MQTT and CoAP, and the work of IETF groups on standards for IoT are also summarized.
This document discusses the transition to all-IP telecom networks. It begins by reviewing the evolution of telecommunications from past technologies like GSM to the present with 4G/LTE networks and the future of 5G. It then explains that all-IP networks will converge different services like data, voice and multimedia onto a single IP-based network. This will impact the telecom market by increasing competition and allowing new entrants. The document also summarizes the growth of the Saudi telecom market in mobile, fixed and broadband services. It provides overviews of the marketing, business operations and personnel planning needed to support all-IP networks.
IRJET- A Survey on Mobility in RPL for IoT ApplicationsIRJET Journal
This document summarizes a research paper that surveys mobility extensions for the Routing Protocol for Low-Power and Lossy Networks (RPL) in Internet of Things (IoT) applications. It begins by introducing RPL, a routing protocol designed for low-power and lossy networks. It then discusses various proposed methods for extending RPL to support node mobility, including methods that use signal strength to detect mobility and predict new parent nodes, and methods that introduce temporary parents to reduce routing failures during mobility. The document surveys these different RPL mobility extensions and their approaches to handling mobility in low-power and lossy networks.
Implementation of Steganographic Method Based on IPv4 Identification Field ov...IJERA Editor
This document presents a study on implementing a steganographic method (covert channel) to hide secret data in the IP identification field. The implementation was carried out using the Network Simulator 3 (NS-3).
The document first provides background on covert channels and discusses their application in TCP/IP layers for VoIP. It then analyzes each TCP/IP layer for their technical difficulty, generality, and reachability for covert channels. Specifically, the network layer presents opportunities due to unused or optional bits in the IP header.
The implementation hides the word "hello" by encoding each character into the IP identification field of successive packets. The simulation confirms successful transmission of the hidden message across the point-to-
Next Generation Network Architecture, by Sunny Yeung.
A presentation given at APRICOT 2016’s Opening Ceremony and APRICOT Plenary 1 session on 22 February 2016.
A Flexible Network Architecture for 5G SystemsEiko Seidel
In this paper, we define a flexible, adaptable, and programmable architecture for 5Gmobile networks, taking into consideration the requirements, KPIs, and the current gaps in the literature, based on three design fundamentals: (i) split of user and control plane, (ii) service-based architecturewithin the core network (in line with recent industry and standard consensus), and (iii) fully flexible support of E2E slicing via per-domain and cross-domain optimisation, devising inter-slice control and management functions, and refining the behavioural models via experiment-driven optimisation.The proposed architecture model further facilitates the
realisation of slices providing specific functionality, such as network resilience, security functions, and network elasticity. The proposed architecture consists of four different layers identified as network layer, controller layer, management and orchestration layer, and service layer. A key contribution of this paper is the definition of the role of each layer, the relationship between layers, and the identification of the required internal modules within each of the layers. In particular, the proposed architecture extends the reference architectures proposed in the Standards Developing Organisations like 3GPP and ETSI, by building on these while addressing several gaps identified within the corresponding baseline models. We additionally present findings, the design guidelines, and evaluation studies on a selected set of key concepts identified to enable flexible cloudification of the protocol stack, adaptive network slicing, and inter-slice control and management.
This document discusses strategies for transitioning from IPv4 to IPv6. It describes:
1. Dual-stack as the simplest approach, allowing IPv4 and IPv6 to operate simultaneously and maintain legacy IPv4 applications while adding new IPv6 applications.
2. Tunneling mechanisms like configured and automatic tunnels that allow IPv6 packets to be encapsulated and sent over IPv4 networks.
3. Transition scenarios involving gradual deployment of dual-stack systems and applications until pure IPv6 is achieved, maintaining compatibility with IPv4 nodes during transition.
The key recommendation is for applications to support dual-stack environments to facilitate a smooth transition and interoperability between IPv4 and IPv6 nodes. Careful planning
The document discusses the network layer of the OSI model and the Internet Protocol (IP). It focuses on IP version 4 (IPv4), including the IPv4 packet structure, addressing modes of IPv4, and address resolution protocols. The network layer is responsible for identification of hosts based on logical addresses and routing data between hosts over underlying networks. IPv4 currently dominates but is being replaced by IPv6 due to address exhaustion issues in IPv4.
A Survey On Next Generation Internet Protocol IPv6Carrie Romero
This document discusses IPv6 and the need to transition from IPv4 to IPv6. It provides an overview of IPv6, including that IPv6 was developed to address the limited address space of IPv4 and improve security. It also discusses some of the key challenges in transitioning to IPv6, such as the need for IPv6 and IPv4 to coexist during transition. The document summarizes various transition techniques between IPv6 and IPv4, including dual stack, tunneling, and translation methods.
Review of IPv4 and IPv6 and various implementation methods of IPv6IRJET Journal
This document compares IPv4 and IPv6 and reviews various implementation methods of IPv6. It finds that while IPv6 provides many advantages over IPv4 like a vastly larger address space and improved security features, full deployment of IPv6 requires complete network participation which has hindered adoption. Various transition techniques allow IPv6 networks to communicate over existing IPv4 infrastructure to facilitate gradual deployment, including tunneling which encapsulates IPv6 packets in IPv4 packets to traverse IPv4 networks. Dual stack backbones that support both protocols and protocol translation mechanisms also help transition. Global IPv6 deployment continues to progress with over 30% user support currently.
IRJET- Evaluating the Impact of IPv4 to IPv6 Tunneling with MPLS on VOIPIRJET Journal
This document summarizes a research paper that evaluates the impact of transitioning from IPv4 to IPv6 using tunneling with MPLS on voice over IP (VOIP) performance. It first provides background on the need to transition from IPv4 to IPv6 due to limited IPv4 address space. It then discusses different transition mechanisms like tunneling and their benefits. The paper reviews previous studies that found 6-to-4 tunneling provides VOIP performance similar to IPv6. It also discusses how MPLS can ensure quality of service for real-time applications like VOIP. The goal of the research was to analyze how tunneling from IPv4 to IPv6 with MPLS impacts VOIP performance metrics.
Efficient addressing schemes for internet of thingsIJECEIAES
The internet of things (IoT) defines the connectivity of physical devices to provide the machine to machine communication. This communication is achieved through various wireless standards for sensor node connectivity. The IoT calls from the formation of various wireless sensor nodes (WSNs) in a network. The existing neighborhood discovery method had the disadvantage of time complexity to calculate the cluster distance. Our proposed method rectifies this issue and gives accurate execution time. This paper proposed mobility management system based on proxy mobile IPv6 as distributed PMIPv6 with constrained application protocol (CoAP-DPMIP) and PMIPv6 with constrained application protocol (CoAP-PMIP). It also provides the optimized transmission path to reduce the delay handover in IoT network. The PMIPv6 described the IPv6 address of mobile sensor device for efficient mobility management. The network architecture explains three protocol layers of open systems interconnection model (OSI model). The OSI layers are data link layer, network layer and transport layer. We have proposed the distance estimation algorithm for efficient data frames transmission. This paper mainly focuses the secure data transmission with minimum loss of error. The evaluation result proved that proposed technique performance with delay, energy, throughput and packet delivery ratio (PDR). Also, it measures the computational time very effectively.
On the migration of a large scale network from i pv4 to ipv6 environmentIJCNCJournal
This document discusses the design of migrating a large-scale network from IPv4 to a dual-stack IPv4/IPv6 environment. It focuses on using dual-stack mechanisms, which allow both IPv4 and IPv6 protocol stacks to run simultaneously. The design considers aspects such as topology, addressing plans, routing protocols, and performance statistics. A dual-stack approach is proposed that involves transitioning the network core, perimeter routers, and other devices in stages to support both IPv4 and IPv6. Addressing plans are provided for infrastructure, loopbacks, and customer networks that aim to support future growth while allowing for aggregation.
This document compares the performance of IPv4, IPv6, and tunneling (6to4) networks using computer simulations in OPNET 17.5. The simulation analyzed delay, throughput, and packet loss over 1 hour. The results showed that IPv6 had higher delay than IPv4 due to its larger header, while tunneling had the highest delay. Throughput was highest for IPv6 and lowest for IPv4. Packet loss was lowest for IPv4 and highest for IPv6. In conclusion, the network performance varied between the different addressing schemes and tunneling technique.
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...IOSR Journals
This document compares the performance of IPv4, IPv6, and tunneling (6to4) networks using computer simulations in OPNET 17.5. The simulation analyzed delay, throughput, and packet loss over 1 hour. The results showed that IPv6 had higher delay than IPv4 due to its larger header, while tunneling had the highest delay. Throughput was highest for IPv6 and lowest for IPv4. Packet loss was lowest for IPv4 and highest for IPv6. In conclusion, the network performance varied between the different addressing schemes and tunneling in terms of delay, throughput, and packet loss.
This document provides a report on a vocational training in IPV6 that was completed by Rashmi Kumari. It includes an introduction to IPV6 that compares it to IPV4 and highlights its larger address space, built-in multicasting, and network layer security. It also details IPV6's simplified packet format and routing. The report then discusses addressing, OSPF, implementing OSPF for IPV6, and building a simulated network with dual stack transition in GNS3 to test IPV6 functionality.
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
This paper is focused on the Translator strategy for migration of IPv4 to Ipv6 implemented in Cisco packet
tracer. It describes the design and configuration of network devices and packet transfer between devices of IPv4
and IPv6 networks using NAT-PT as transition mechanism. First major version of IP, IPv4 is the dominant
protocol of internet.IPv6 is developed to deal with long anticipated problem of IPv4 running out of addresses.
The migration from IPv4 to IPv6 must be implemented node by node by using auto-configuration procedures to
eliminate the need to configure IPv6 hosts manually.
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...IJCNCJournal
Migration from IPv4 to IPv6 is still visibly slow, mainly because of the inherent cost involved in the implementation, hardware and software acquisition. However, there are many values IPv6 can bring to the
IP enabled environment as compared to IPv4, particularly for Voice Over Internet Protocol (VoIP) solutions. Many companies are drifting away from circuit based switching such as PSTN to packet based switching (VoIP) for collaboration. There are several factors determining the effective utilization and
quality of VoIP solutions. These include the choice of codec, echo control, packet loss, delay, delay variation (jitter), and the network topology. The network is basically the environment in which VoIP is deployed. State of art network design for VoIP technologies requires impeccable Interior Gateway routing
protocols that will reduce the convergence time of the network, in the event of a link failure. Choice of CODEC is also a main factor. Since most research work in this area did not consider a particular CODEC as a factor in determining performance, this paper will compare the behaviour of RIP and OSPF in IPv4
and IPv6 using G.711 CODEC with riverbed modeller17.5.
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...IJCNCJournal
Migration from IPv4 to IPv6 is still visibly slow, mainly because of the inherent cost involved in the implementation, hardware and software acquisition. However, there are many values IPv6 can bring to the
IP enabled environment as compared to IPv4, particularly for Voice Over Internet Protocol (VoIP) solutions. Many companies are drifting away from circuit based switching such as PSTN to packet based switching (VoIP) for collaboration. There are several factors determining the effective utilization and
quality of VoIP solutions. These include the choice of codec, echo control, packet loss, delay, delay variation (jitter), and the network topology. The network is basically the environment in which VoIP is deployed. State of art network design for VoIP technologies requires impeccable Interior Gateway routing
protocols that will reduce the convergence time of the network, in the event of a link failure. Choice of CODEC is also a main factor. Since most research work in this area did not consider a particular CODEC as a factor in determining performance, this paper will compare the behaviour of RIP and OSPF in IPv4
and IPv6 using G.711 CODEC with riverbed modeller17.5.
IP QoS signaling in the IETF:Past, Present and FutureJohn Loughney
The document summarizes the past, present, and future work of the IETF related to QoS signaling. It describes the early work on RSVP and IntServ in the late 1990s. It then outlines the various working groups formed to develop differentiated services, resource allocation protocols, policy frameworks, and sub-IP technologies. Finally, it discusses the Next Steps in Signaling working group, which aims to standardize a new IP signaling protocol to simplify and generalize RSVP signaling, along with its goals and deliverables.
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONcseij
This is era of information blast. A huge quantity of information is pouring in from various sources. The
revolutionary advancement of Information and Communication technologies bring the world close
together.A pile of information in different formats is just a click away. Which motivate the organizations to
get more internet bandwidth to consume and publish theinformationoverexploding cloudof Internet. The
standard router redundancyprotocolis used to handle backup link showever it cannot aggregate
them.Whereas thelink standard aggregation protocol can aggregate the link but it support only Ethernet
technology.In this researchpaper a concept of Redundant Link Aggregation (RLA)is proposed. RLA can
aggregate and handle backup links with main links regardless of carriertechnology. Furthermore a
dataforwardingmechanism Odd Load Balancing (OLB) is also proposed for RLA scheme. For the sake of
performance evaluation, Redundant Link Aggregation (RLA) is compared with Virtual Router Redundancy
Protocol (VRRP). The simulation result reveals that Redundant Link Aggregation (RLA) can cover the
bandwidth demand of the network in peak hours by consuming backup links as well which with Virtual
Router Redundancy Protocol (VRRP)cannot.It is further noted thatOdd Load Balancing (OLB) feature can
be used to save the cost in terms of money per annum.
Abstract— Internet of things (IoT) is a new networks paradigm,
that billions of internet things can be connected at anytime and
anyplace, and it’s expected to include billions of smart devices,
these devices characterized by small memory, low transfer rate
and low energy, internet protocol version 6 (IPv6) it was
introduced to offer huge address space, however it doesn’t
compatible with capabilities of the constrained device, therefore
IPv6 over low power Wireless Personal Area network
(6LoWPAN) adaptation layer was introduced to carry IPv6
datagram over constrained links, in this paper, we first provide
intensive analysis of 6LoWPAN specifications that includes IPv6
encapsulation, frame format, 6LoWPAN header compression,
fragmentation of the payload datagram and encoding of user
datagram protocol UDP, in addition to the implementation of the
6LoWPAN in the NS-3 using different payload size, then we
evaluate the following metrics throughput, packets loss, delay
and jitter, the results showed that the fragmentation effects the
network throughput and increase the delay and the number of
lost packets, moreover, when payload fit within a single frame the
network show better performance , there are no packets lost as
well as minimum values of the delay and the jitter, and in the
two cases 6LoWPAN shows reasonable packets delivery ratio.
A secure tunnel technique using i pv6 transition over ipv4 channelMade Artha
This document discusses secure tunneling techniques for IPv6 transition over IPv4 networks. It first provides background on the development of IPv6 and need to replace IPv4 due to limited address space. It then discusses three common approaches for IPv4-IPv6 transition: dual stack, translation, and tunneling. The document focuses on issues with the tunneling approach, such as one network attacking another or spoofing attacks. It proposes a solution using a test bed with two IPv6 networks connected via an IPv4 network and 6to4 routers, with outbound filtering to address security issues.
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIScscpconf
As the future generation networks are envisioned to be heterogeneous in nature, seamless
mobility in such networks is an important issue. While IETF work groups have standardized
various mobility management protocols, such as Mobile IPv6 (MIPv6), Fast Handovers for
Mobile IPv6 (Predictive FMIPv6, and Reactive FMIPv6), Hierarchical Mobile IPv6 (HMIPv6),
Proxy Mobile IPv6 (PMIPv6) and Fast Handovers for PMIPv6 (Predictive FPMIPv6, and
Reactive FPMIPv6), out of which some are host based and some are network based, the
decision regarding which protocol suits the future networks is still a research issue. The study
of various mobility management protocols in terms handover latency and the number of hops is
needed to evaluate these protocols. Even though much study has been done in literature in terms
of handover latency, study still needs performance evaluation in terms of average hop delay. In
this paper we study various mobility management protocols by applying simple numerical
analysis. The study is carried out for performance evaluation of various mobility management
protocols in terms of average hop delay, wireless link delay, wired part delay, and binding
update and registration delay. In this work, the average hop delay is estimated in terms of total
handover latency and total number of hops contributing to each protocol. The study enables us
to make a few important observations regarding the performance of these mobility management
The support of multipath routing in IPv6-based internet of things IJECEIAES
The development of IPv6-based network architectures for Internet of Things (IoT) systems is a feasible approach to widen the horizon for more effective applications, but remains a challenge. Network routing needs to be effectively addressed in such environments of scarce computational and energy resources. The Internet Engineering Task Force (IETF) specified the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to provide a basic IPv6-based routing framework for IoT networks. However, the RPL design has the potential of extending its functionality to a further limit and incorporating the support of advanced routing mechanisms. These include multipath routing which has opened the doors for great improvements towards efficient energy balancing, load distribution, and even more. This paper fulfilled a need for an effective review of recent advancements in Internet of Things (IoT) networking. In particular, it presented an effective review and provided a taxonomy of the different multipath routing solutions enhancing the RPL protocol. The aim was to discover its current state and outline the importance of integrating such a mechanism into RPL to revive its potentiality to a wider range of IoT applications. This paper also discussed the latest research findings and provided some insights into plausible follow-up researches.
Similar to Ipv6 and lte futuristic technology for wireless broadband (20)
The support of multipath routing in IPv6-based internet of things
Ipv6 and lte futuristic technology for wireless broadband
1. Research Paper
IPV6 and LTE: Futuristic Technology for Wireless Broadband
Submitting
To
6th International Conference on Advanced Computing & Communication Technologies
By
V.Sasank Chaitanya Kumar
B.Tech
Network Engineer
Reliance Communications Ltd.
Under the Guidance of
Abhay Kumar Shukla
Research Scholar
General Manager
Reliance Communications Ltd.
2. IPV6 and LTE: Futuristic Technology for Wireless Broadband
Table of Contents
Sr. No. Contents Page No.
1 Abstract 2
Introduction
2 3
3 4
Problem Statement
Methodology of the Study
4.1.1 A brief history of the Flow Label
4.2.1 IPV6 Flow Label
4.2.2 The Flow Label and Quality of Service
4.2.3 IPv6 Flow Label Specification
4 4.2.4 IPV6 Flow Label Field description 5-20
4.2.5 End-to-End QoS Mechanism
4.3.1 LTE evolution
4.3.2 LTE Architecture
4.4 IPV6 and LTE: Putting the pieces together
4.5 The Expected graph’s of proposed Flow label
Key Findings and Conclusion
5 21
6 Related work and Comparisons 22
7 References 23
1|Page
3. IPV6 and LTE: Futuristic Technology for Wireless Broadband
1. Abstract
With the exponential rise in the number of multimedia applications available, the best-effort service
provided by the Internet today is insufficient. Researchers have been working on new architectures like
the Next Generation Network (NGN) which, by definition, will ensure Quality of Service (QoS) in an all-
IP based network.
IPv6 as IP next generation is the successor to IPv4. IPv6 solves the shortcomings problem of IPv4
address, Flow label field in IPv6 packet header provides an efficient way for packet marking, flow
identification, and flow state lookup.
This paper provides the design for IPv6 Flow Label field it will explain the requirements for IPv6
source node labeling flows, IPv6 nodes forwarding labeled packets etc… and this paper further provides
to use the power of LTE (Long Term Evolution) as an NSP (Network Service Provider) using IPv6, It
gives basic terminologies, key concepts, short introduction to such definitions / Specifications /
standards and Test Setups used to run such complex communication networks.
Finally, I provide the estimated results which show the performance of the proposed mechanism is
maintained during network congestion using Flow Label (FL) field of IPV6.
2|Page
4. IPV6 and LTE: Futuristic Technology for Wireless Broadband
2. Introduction
The traditional Internet as designed in the early 1970s was aimed primarily for packet transmission over
a switched network. Delay, latency, bandwidth, packet loss and jitter on the networks were factors that
were not considered to be of much importance when the initial simple networks were built. Due to the
complexity of present day applications and communication needs, the above factors which influence the
quality of communications bear a lot of significance.
Various efforts have been made is the past to introduce mechanisms to request, control and provide for
the requested quality of service over the Internet. In the context of this work Quality of Service refers to
the ability of the network provider or the network by itself to provide certain guarantees for the
transmission of the requestors’ traffic. This would eventually change the traditional Internets’ best-effort
service model to a controlled and regulated effort service model.
Multimedia applications on the Internet like triple play services( VoIP and Video on Demand ) require
guaranteed QoS which the current best-effort service cannot provide . IPv4 (Internet Protocol) has no
policing or flow control mechanisms.
IPv6 has been in the design and testing for many years, now when the Internet designers realized that the
community will run out of IP addresses soon under IPv4. IPv6 is a solution as it provides 2128 different
IP addresses which are way more than ever required. Another point to consider is that, in IPv4, features
to provide labeling of packets have not been implemented. The IPv6 header has two fields, TC and FL,
which can be used to make QoS requests and get accurate responses. This results in reduction in
processing time and routing is also simplified.
Seamless connectivity to the Internet with guaranteed QoS is the demand of today. Any user who is
fixed or mobile should be able to access the Internet irrespective of speed and location LTE (Long Term
Evolution) is a telecommunications technology that provides wireless internet access. It is a packet-
based i.e. an end-to-end all-IP technology which ensures that QoS is guaranteed.
Keywords: IPV6, Flow Label, End-to-End QoS and LTE.
3|Page
5. IPV6 and LTE: Futuristic Technology for Wireless Broadband
3. Problem Statement
Traditionally, flow classifiers have been based on the 5-tuple of the source and destination addresses,
ports, and the transport protocol type (IPV4). The usage of the 3-tuple of the Flow Label and the Source
and Destination Address fields enables efficient IPv6 flow classification.
Various proposals have been made to the IETF to define the 20 bits of the flow label field in the IPv6
header. These proposals have been made in the form of IETF drafts which are reviewed by the IETF
IPv6 working group. The IETF IPv6 working group reviews the drafts and if the proposals meet the
criteria, then they are converted to IETF standards. So far none of the proposals have been accepted for
standardization by the IETF.
This paper specifies the IPv6 Flow Label field and the requirements for IPv6 nodes labeling flows, IPv6
nodes forwarding labeled packets, and flow state establishment methods.
There has been a rapid increase in the use of data carried by cellular services, and this increase will only
become larger in what has been termed the "data explosion". To cater for this and the increased demands
for increased data transmission speeds and lower latency, further development of cellular technology
have been required.
The UMTS cellular technology upgrade has been dubbed LTE - Long Term Evolution. The idea is that
3G LTE will enable much higher speeds to be achieved along with much lower packet latency (a
growing requirement for many services these days), and that 3GPP LTE will enable cellular
communications services to move forward to meet the needs for cellular technology.
This paper gives short introduction to LTE and discuss its definitions / Specifications / standards, Test
Setups and data flow in this communication technology.
4|Page
6. IPV6 and LTE: Futuristic Technology for Wireless Broadband
4. Methodology of the Study
4.1.1 A Brief History of the Flow Label
The original proposal for a flow label has been attributed to Dave Clark [Deering93], who proposed that
it should contain a pseudorandom value. A Flow Label field was included in the packet header during
the preliminary design of IPv6, which followed an intense period of debate about several competing
proposals. The final choice was made in 1994 [RFC1752]. In particular, the IETF rejected a
Proposal known as the Common Architecture for Next Generation Internet Protocol (CATNIP)
[RFC1707], which included so-called ’cache handles’ to identify the next hop in high-performance
routers. Thus, CATNIP introduced the notion of a header field that would be share by all packets
belonging to a flow, to control packet forwarding on a hop-by-hop basis. We recognize this today as a
precursor of the MPLS label [RFC3031].
The IETF decided instead to develop a proposal known as the Simple Internet Protocol plus (SIPP)
[RFC1710] into IP version 6. SIPP included "labeling of packets belonging to particular traffic ’flows’
for which the sender requests special handling, such as non-default quality of service or ’real-time’
service" [RFC1710]. In 1994, this used a 28-bit Flow Label field. In 1995, it was down to 24 bits
[RFC1883], and it was finally reduced to 20 bits [RFC2460] to accommodate the IPv6 Traffic Class,
which is fully compatible with the IPv4 Type of Service byte.
There was considerable debate in the IETF about the very purpose of the flow label. Was it to be a
handle for fast switching, as in CATNIP, or was it to be meaningful to applications and used to
specify quality of service? Must it be set by the sending host, or could it be set by routers? Could it be
modified en route, or must it be delivered with no change?
Because of these uncertainties, and more urgent work, the flow label was consistently ignored by
implementers, and today is set to zero in almost every IPv6 packet. In fact, [RFC2460] defined it as
5|Page
7. IPV6 and LTE: Futuristic Technology for Wireless Broadband
"experimental and subject to change". There was considerable preliminary work, such as [Metzler00],
[Conta01a], [Conta01b], and [Hagino01]. The ensuing proposed standard "IPv6 Flow Label
Specification" (RFC 3697) [RFC3697] intended to clarify this situation by providing precise boundary
conditions for use of the flow label. However, this has not proved successful in promoting use of the
flow label in practice, as a result of which 20 bits are unused in every IPv6 packet header.
4.2.1 IPv6 Flow Label:
The IPv6 header includes a 20 bit field called the Flow Label field which adds flow labeling capability
for IPv6. The flow label field enables an IPv6 enabled host to label a sequence of packets for which the
host requests special handling by the IPv6 routers [RFC2460]. This enables the host to request non-
default quality of service from the IPv6 network
Fig (1): The above figure shows packet header differences between IPV4 packet and IPV6 packet
4.2.2 The Flow Label and Quality of Service
Developments in high-speed switch design, and the success of MPLS, have largely obviated
consideration of the flow label for high-speed switching. Thus, although various use cases for the flow
label have been proposed, most of them assume that it should be used principally to support the
provision of quality of service (QoS). For many years, it has been recognized that real-time Internet
6|Page
8. IPV6 and LTE: Futuristic Technology for Wireless Broadband
traffic requires a different QoS from general data traffic, and this remains true in the era of network
neutrality. Thus, an alternative to uniform best-effort service is needed, requiring packets to be
Classified as belonging to a particular class of service or flow. Currently, this leads to a layer violation
problem, since a 5-tuple is often used to classify each packet. The 5-tuple includes source and
destination addresses, port numbers, and the transport protocol type, so when we want to forward or
process packets, we need to extract information from the layer above IP. This may be impossible
when packets are encrypted such that port numbers are hidden, or when packets are fragmented, so the
layer violation is not an academic concern. The flow label, being exempt from IPSec encryption and
being replicated in packet fragments, avoids this difficulty. It has therefore attracted attention from the
designers of new approaches to QoS.
4.2.3 IPv6 Flow Label Specification
Standardized specification for the IPv6 flow label field. A summary of the specification as listed in
[RFC3697][RFC 6437] [RFC6294]is as follows :
1. The IPv6 20 bit flow label field is used by a source to label packets of a flow
2. Packets not belonging to any flow are labeled with a flow label value of zero
3. The triplet value of the Flow Label, Source Address, and Destination Address fields is used by the
packet classifiers to identify a particular packets’ flow
4. The Flow Label value set by the source MUST be delivered unchanged to the destination node(s).
5. The performance of the IPv6 routers should not depend on the distribution of the flow label values
and no mathematical or other properties should be assumed based on the flow label values
6. The flow State lifetime is 120 seconds and packets arriving with the same flow label value after
120 seconds should not be treated as belonging to the same old flow unless either the flow state has been
explicitly refreshed within the lifetime duration or the duration is explicitly specified to be a value other
than 120 seconds
7|Page
9. IPV6 and LTE: Futuristic Technology for Wireless Broadband
7. An IPv6 node that is not participating in the flow-specific treatment process must ignore the flow
label field when receiving or forwarding a packet
8. Accidental Flow Label value reuse must be avoided by providing for sequential or pseudo-random
generation of new flow values
9. In case of multicast sessions the destination may need to specify the Flow Label value to be used by
the sources
4.2.4 IPV6 Flow Label Field description
After reading all the given specifications in RFC’s Firstly, 20-bit flow label field in the IPv6 packet
header is divided into three parts detailed list as shown in figure 2. The first bit Label Flag (LF) set to 1
if flow label used. The 2-bit Label Type (LT) is the type of flow label. The rest of 17-bit Label Number
(LN) is randomly generated by source for flow identification.
LF(1) LT (2) LN(17)
Fig. 2: The proposed flow label field in IPv6 packet header
LF (Flow Label), LT (Label Type), LN-(Label number)
Table 1: the above table Describes the fields of Flow Label
8|Page
10. IPV6 and LTE: Futuristic Technology for Wireless Broadband
4.2.5 End-to-End QoS Mechanism
Some routers supporting flow label and DiffServ function (with Flow-Label-and- DiffServ capable)
have assumed according to the network topology show below.
Fig (3): The above figure shows proposed E-2-E architecture to explain the functionality of Flow Label
Let us assume there should be a marking table at each and every router In the network to maintain the
flow I.E., FLMT (Flow Label Marking Table) records Permit, 3- tuple of the flow label and the source
and destination address, and TOS data for different kind of flow classification.
We will consider one example to explain the operation of Flow Label and its field’s. Let us assume user
on PC-0 wants to communicate with the user on PC-3.
9|Page
11. IPV6 and LTE: Futuristic Technology for Wireless Broadband
Initially PC-0 generates a random number (LN), PC-0 generates a random number based on
application and port number .Now PC-0 will frame a Flow Label for connection request with the
remote host as [LF-1, LN-01, LN-RAND] using this fields upper layer protocol stack sends a packet
to Edge router(Gate way). Edge router will open IP packet see the destination address, if the router
has forwarding route, router will consider packet it will open Flow label field refer LN, if LN is
unique router will make a record of 3-tuple and TOS in FLMT. If not router will reply host (PC-0)
with an ICMP message requesting new LN for request message. Finally Edge router check’s LF,LT
and LN of Flow Label field like gate way. Now it will select next hop [with Flow- Label-and-
DiffServ capable] from the routing table.
When a core router in network receives an IP packet it will create an entry in a FLMT and forward
the packet finally packet reaches PC-3.
Now PC-3 on other side of the network receive a packet and modify the Flow Label sends a permit
response with LF-1, LT-01 and LN-RAND along the same path to PC-0. It completes the
authentication process.
A Data connection establishes after permitting the request from remote end. PC-0 will modify its
FL with LF-1, LT-10 and LN-RAND to deliver the data and insert the related TOS to the traffic
class field of IPV6 header and sends the packet. When an Edge router receives an IP packet, Router
will open IP packet and make a recursive look up with FLMT, classify the packet and forward the
packet till end.
Once the forwarding of data is completed by source, PC-0 will modify its Flow label value to LF-1,
LT-11and LN-RAND. And send the packet to Edge router. Now gate way (Edge router) and can
delete the matching LN entry respectively.
The proposed mechanism presented in this paper improves the end-to-end QOS provision and also
reduces the load on routers.
10 | P a g e
12. IPV6 and LTE: Futuristic Technology for Wireless Broadband
4.3 Long Term Evolution (LTE)
4.3.1 LTE evolution
Although there are major step changes between LTE and its 3G predecessors, it is nevertheless looked
upon as an evolution of the UMTS / 3GPP 3G standards. Although it uses a different form of radio
interface, using OFDMA / SC-FDMA instead of CDMA, there are many similarities with the earlier
forms of 3G architecture and there is scope for much re-use.
LTE can be seen for provide a further evolution of functionality, increased speeds and general improved
performance.
Parameters WCDMA HSPA HSPA+ LTE
(UMTS) HSDPA /
HSUPA
Max downlink speed 384 k 14 M 28 M 100M
bps
Max uplink speed 128 k 5.7 M 11 M 50 M
bps
Latency 150 ms 100 ms 50ms (max) ~10 ms
round trip time
approx
3GPP releases Rel 99/4 Rel 5 / 6 Rel 7 Rel 8
Approx years of initial roll 2003 / 4 2005 / 6 HSDPA 2008 / 9 2009 / 10
out 2007 / 8 HSUPA
Access methodology CDMA CDMA CDMA OFDMA / SC-FDMA
Table (2) Comparison with previous technologies
In addition to this, LTE is an all IP based network, supporting both IPv4 and IPv6. There is also no basic
provision for voice, although this can be carried as VoIP.
11 | P a g e
13. IPV6 and LTE: Futuristic Technology for Wireless Broadband
4.3.2 LTE Architecture
Figure (4): the above figure shows LTE generalized architecture
LTE Network Elements
LTE network comprises of two main segments.
1. LTE EUTRAN
2. LTE-SAE Evolved Packet Core.
12 | P a g e
14. IPV6 and LTE: Futuristic Technology for Wireless Broadband
LTE EUTRAN: -
EUTRAN consists of eNB.
EUTRAN is responsible for complete radio management in LTE. When UE comes up eNB is
responsible for Radio Resource Management, i.e it shall do the radio bearer control, radio admission
control, allocation of uplink and downlink to UE etc. When a packet from UE arrives to eNB, eNB shall
compress the IP header and encrypt the data stream. It is also responsible for adding a GTP-U header to
the payload and sending it to the SGW. Before the data is actually transmitted the control plane has to be
established. eNB is responsible for choosing a MME using MME selection function.
As the eNB is only entity on radio side, the whole QoS is taken care by it. It shall mark the packetsin
uplink, i.e Diffserv based on QCI, and also schedule the data. Other functionalities include scheduling
and transmission of paging messages, broadcast messages, and bearer level rate enforcements based on
UE-AMBR and MBR etc.
LTE System Architecture Evolution (SAE) Evolved Packet Core (EPC)
LTE EPC comprises of MME, SGW and PGW.
MME: - Mobility Management Entity
MME is a control entity, which means it’s completely responsible for all the control plane operations.
All the NAS signaling originates at UE and terminates in MME. MME does tracking area list
management, selection of PGW/SGW and also selection of other MME during handovers.
It is the first contact point for the 2G and 3G networks. MME is also responsible for SGSN selection
during LTE to 2G/3G handovers.
13 | P a g e
15. IPV6 and LTE: Futuristic Technology for Wireless Broadband
The UE is also authenticated by MME. All signaling traffic flow through MME so the same can lawfully
intercepted. MME is also responsible for bearer management functions including establishment of
dedicated bearers.
SGW: - Serving Gateway
The Serving Gateway, SGW, is a data plane element within the LTE SAE. Its main purpose is to
manage the user plane mobility and it also acts as the main border between the Radio Access Network,
RAN and the core network. The SGW also maintains the data paths between the eNodeBs and the PDN
Gateways. In this way the SGW forms a interface for the data packet network at the E-UTRAN.
Also when UEs move across areas served by different eNodeBs, the SGW serves as a mobility anchor
ensuring that the data path is maintained.
PGW: - PDN Gateway
PGW terminates SGi interface towards the PDN.
PGW is responsible for all the IP packet based operations such as deep packet inspection, UE IP address
allocation, Transport level packet marking in uplink and downlink, accounting etc. PGW contacts PCRF
to determine the QoS for bearers. It is also responsible for UL and DL rate enforcement based on APN-
AMBR. It is synonymous to GGSN of pre release 8 networks.
Policy and Charging Rules Function, PCRF: This is the generic name for the entity within the
LTE SAE EPC which detects the service flow, enforces charging policy. For applications that
require dynamic policy or charging control, a network element entitled the Applications
Function, AF is used.
LTE Radio Network
LTE Physical Layer
LTE physical layer is quite complex and consists of mixture of technologies. With OFDMA as access
technology, QAM as modulation scheme and multiple antennas we can achieve high speeds.
14 | P a g e
16. IPV6 and LTE: Futuristic Technology for Wireless Broadband
QAM: - Quadrature Amplitude Modulation
Going back to engineering basics, we have a simple modulation scheme called PSK. Phase shift keying,
which is analog to digital modulation scheme (transmitter side). In PSK we have 1 bit per symbol .0 and
1. Each bit is associated with a Phase shift. With 4 Phase shifts we can transmit 2 bits per symbol. As
with 64 QAM we shall be able to transmit 6 bits per symbol. If we look at this scheme in the given
bandwidth, by changing the modulation scheme, we are able to transmit more and more bits. This is
resulting in increase of data rates.
Looking at Shannon's theorem:
As I said above, changing the modulation scheme gives us more throughputs. However high modulation
schemes can be only be used when the signal to noise ratio is high. From above theorem, channel
capacity is bandwidth multiplied by logarithm of SNR. Higher the SNR higher is the channel capacity,
which means more throughputs.
Second factor that increases channel capacity is bandwidth. Now bandwidth is directly proportional to
symbol rate. Higher the symbol rate then higher is the bandwidth. But again, increasing the symbol rate
doesn't increase the channel efficiency as channel bandwidth is fixed because available spectrum is
finite. So there is a tradeoff between symbol rate and channel throughput. The basic idea is keeping on
increasing the symbol rate (modulation scheme) doesn't always improve the efficiency. So considering
these factors 64 QAM should be a suitable choice for LTE.
OFDM: - Orthogonal Frequency Division Multiplexing
Consider we have X amount of spectrum. This can be divided into channels of each Y amount of
bandwidth. Each channel is separated by Guard band to avoid interference. This is basic idea in
normal multiplexing schemes. In CDMA we identify each channel by a code. So what is happening
is we have equally spaced channels occupying the entire bandwidth. Note that these channels are
non-overlapping. Each channel has a subcarrier.
15 | P a g e
17. IPV6 and LTE: Futuristic Technology for Wireless Broadband
Figure (5): FDMA
With OFDM systems, it is possible to increase throughput in a given channel without increasing
channel bandwidth or the order of the modulation scheme. This is done using digital signal
processing methods that enable a single channel to be created out of a series of orthogonal
subcarriers. As below figure illustrates, subcarriers are orthogonal to one another such that the
maximum power of each subcarrier corresponds with the minimum power (zero-crossing point) of
the adjacent subcarrier. In a typical system, the bit stream for a channel is multiplexed across various
subcarriers. These subcarriers are processed with an inverse Fourier transform (IFT) and combined
into a single stream. As a result, multiple streams can be transmitted in parallel while preserving the
relative phase and frequency relationship between them.
Figure (6): OFDMA
This way we can include more number of subcarriers in a given bandwidth thus increasing the overall
system throughput.
16 | P a g e
18. IPV6 and LTE: Futuristic Technology for Wireless Broadband
MIMO: - Multiple Input Multiple Output
The Shannon's theorem above is assumed to have 1 transmitter and 1 receiver antenna. If we
consider multiple antennas then the theorem could be modified as
Thus in theory increasing the antennas will effectively increase the channel capacity without any change
in available bandwidth. Now what we can do with MIMO is increase SNR by transmitting a unique bit
stream using multiple antennas in the same channel. This is called Spatial Multiplexing. With MIMO
systems, the bit stream is multiplexed to multiple transmitters without changing the symbol rate of each
independent transmitter. Thus, by adding more transmitters, we can increase the throughput of the
system without affecting the channel bandwidth.
Thus the combination of OFDMA, MIMO and QAM will give us more bandwidth and higher data
rates in LTE.
The main interfaces in LTE are Uu, S1-MME, X2, S1-U, S11 and S5.
LTE Uu: -
This is the air interface between UE and eNB. LTE layer 1 is dealt with later. RRC is the protocol that is
used for communication between UE and eNB. Above RRC there is a NAS layer in UE. This NAS layer
terminates at MME and eNB shall silently pass the NAS messages to MME.
LTE S1-MME: -
eNB and MME communicate using this IP interface. S1-AP is application layer interface. The transport
protocols used here is SCTP. (Stream control transmission protocol)
LTE X2: -
This interface is used by a eNB to communicate to other eNB. This again is a IP interface with SCTP as
transport. X2-AP is the application protocol used by eNB’s to communicate.
LTE S11: -
An IP interface between MME and SGW! GTPv2 is the protocols used at the application layer. GTPv2
runs on UDP transport. This interface must and should run GTPv2.
17 | P a g e
19. IPV6 and LTE: Futuristic Technology for Wireless Broadband
LTE S5: -
This is the interface between SGW and PGW. This again is an IP interface and has two variants. S5 can
be a GTP interface or PMIP interface. PMIP variant is used to support non-trusted 3GPP network
access.
LTE S1-U: -
User plane interface between eNB and SGW! GTP-U v1 is the application protocol that encapsulates the
UE payload. GTP-U runs on UDP.
All the above IP interfaces can be of IPv4 or IPv6. Few interfaces can be of IPv4 and few can be of
IPv6. From the specification side there are no restrictions.
4.4 IPV6 and LTE: Putting the pieces together
As we all aware LTE is totally packet switching based technology I.e., E-2-E IP communication.IPv6 as
IP next generation is the successor to IPv4. IPv6 solves the shortcomings problem of IPv4 address, so
we can assign an individual IP to each and every UE. This reduces a delay in E2E communication. As
UE no need to request DHCP to give an IP.
In LTE technology TFT (Traffic flow template) and bearers are responsible for E-2-E communication.
Typically TFT includes the information about the type of traffic. TFT indicates IP header information
such as an IP address or TCP/UDP port numbers etc. Instead of creating an individual TFT we can use
FLMT which includes information about 3-tuple and Qos which can perform dual functions.
1. To classify the data as mentioned in end to end Qos mechanism which helps for achieving
better through put and overall delay.
2. Which helps in achieving dedicated bearer to the UE
18 | P a g e
20. IPV6 and LTE: Futuristic Technology for Wireless Broadband
4.5 The Expected graph’s of proposed Flow label
Fig. 7: The TCP Flow (throughput v.s. time)
Fig. 8: The UDP Flow (throughput v.s. time)
19 | P a g e
21. IPV6 and LTE: Futuristic Technology for Wireless Broadband
4.5.1 LTE (Long term Evolution):
If we compare round trip delay of LTE with other technologies latency has decreased. With increased
levels of interaction being required and much faster responses, the new SAE concepts have been evolved
to ensure that the levels of latency have been reduced to around 10 ms. this will ensure that applications
reduced
using 3G LTE will be sufficiently responsive.
Figure (9): The above figure shows the comparison of round trip delays of different echnologies.
):
Figure (10): The above figure shows the comparison of data rates offered by different technologies
):
20 | P a g e
22. IPV6 and LTE: Futuristic Technology for Wireless Broadband
5 Key Findings and Conclusion
In this paper, my proposal to use the 20 bit Flow Label field in the IPv6 protocol header has been
discussed. As an outcome, I hope an efficient approach has been proposed which utilizes the 20 bits of
the Flow Label field to indicate Quality of Service requirements to the network and i gave basics to
understand about LTE technology. Finally discussed IPV6 and LTE putting the pieces together.
6 RELATED WORK AND COMPARISONS:
Other Papers My paper
‘RFC3697’,’RFC6294’ Gives a definite explanation of Flow label
By usage with justification
IETF-
Specifies ways which the flow label can be
defined
End -to-End Qos Provisioning by Flow Label Provides End -to-End Qos Provisioning by
in IPV6 using FLMT and FLFT Flow Label in IPV6 using FLMT only
By
Chuan-Neng Lin, Pei-Chen Tseng, and Wen-
Shyang Hwang.
NGN and Wimax : Putting the pieces together My paper says IPV6 and LTE: Futuristic
technology for Wireless Broadband
By
Team ‘NETworthy’- Khaled Abdel Naby (3363685) &
Chetan Govind Bhatia (3554260), MITM, UOWD, UAE
21 | P a g e
23. IPV6 and LTE: Futuristic Technology for Wireless Broadband
REFERENCES:
[1] S. Deering, R. Hinden, “Internet Protocol, version 6”, IETF Network Working Group RFC 2460,
1998.
[2] S. Amante, B. Carpenter, S. Jiang, J. Rajahalme “ IPv6 Flow Label Specification” ”, IETF Network
Working Group RFC 6437, 2011.
[3] Chuan-Neng Lin, Pei-Chen Tseng, and Wen-Shyang Hwang.” End-to-End QoS Provisioning Flow
Label in IPv6”
[4] Khaled Abdel Naby & Chetan Govind Bhatia” NGN and WiMAX: Putting the Pieces Together”,
2011.
[5] Santosh Kumar Dornal “LTE Whitepaper “2009.
[6] 4G Americas White Paper New_Wireless_Broadband_Applications_and_Devices May 2012.
22 | P a g e