Internet connections still use IPv4 as the primary address protocol and it is now facing exhaustion. However, academic institutions specifically in the Philippines should devise steps to address the exhaustion of IPv4. In this paper, this is brought to light as we present the IPv4 to IPv6 campus transition techniques to address the issue. The experiment is carried out in Central Luzon State University and is assessed if the university is able to adopt the IPv6 transition in their campus network. Two IPv6 transition mechanisms were implemented and tested. As a general result, it has been found out, through testbeds, that the dual-stack transition mechanism is more suitable than 6 to 4 tunnel broker. The results have also shown that 6 to 4 tunnel broker was outperformed by dual-stack transition mechanism in all areas and presents better performance. Additionally, results also showed that IPv4 presents slight advantages in terms of network performance than IPv6 with a very small percentage in difference, and this does mean that migration to IPv6 is possible without performance detriments. Furthermore, the results also provide a proof of concept for the university especially in the Philippines to consider IPv6 for future migration within their campus network.
TransPAC2 provides high-performance network connectivity between the US and Asia Pacific region. It employs various network measurement and monitoring techniques and tools like perfSONAR to provide views into application performance and troubleshoot issues. TransPAC2 has deployed the latest version of perfSONAR in Los Angeles and Tokyo and presents measurement data through tools like perfADMIN. It advocates for perfSONAR adoption in the Asia Pacific region and works with organizations to deploy perfSONAR resources. The work plan for 2009 involves continued perfSONAR development and outreach efforts to integrate measurement facilities across networks.
Ict status in higher education sector of pakistan june 2011Raheel Raza
This document summarizes ICT initiatives in higher education in Pakistan. It discusses the establishment of the Pakistan Education and Research Network (PERN) to connect universities, the expansion of PERN2 with more connectivity and bandwidth, and efforts to provide national digital libraries, online journals, unified communication services, and a higher education management information system across Pakistan. The future roadmap includes expanding wireless networks, increasing videoconferencing capabilities, and implementing campus management solutions at additional universities.
The document summarizes the history and activities of JUCC (Joint Universities Computer Centre) and HARNET (Hong Kong Academic and Research NETwork). It discusses how JUCC founded in 1970 leads IT excellence among Hong Kong universities through HARNET. It outlines HARNET's growth from 1985 connections to recent 155 Mbps internet links and 400 Mbps connections to HKIX. It also discusses JUCC's organization, services, funding, and vision to become a research internet hub for the Asia Pacific region.
A project funded by the US National Science Foundation (NSF) and the Higher Education Commission of Pakistan (HEC) has deployed a high-performance international research and education (R&E) network connection between PERN – and its successor network PERN2 – and the global research and education network community.
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONcseij
This is era of information blast. A huge quantity of information is pouring in from various sources. The
revolutionary advancement of Information and Communication technologies bring the world close
together.A pile of information in different formats is just a click away. Which motivate the organizations to
get more internet bandwidth to consume and publish theinformationoverexploding cloudof Internet. The
standard router redundancyprotocolis used to handle backup link showever it cannot aggregate
them.Whereas thelink standard aggregation protocol can aggregate the link but it support only Ethernet
technology.In this researchpaper a concept of Redundant Link Aggregation (RLA)is proposed. RLA can
aggregate and handle backup links with main links regardless of carriertechnology. Furthermore a
dataforwardingmechanism Odd Load Balancing (OLB) is also proposed for RLA scheme. For the sake of
performance evaluation, Redundant Link Aggregation (RLA) is compared with Virtual Router Redundancy
Protocol (VRRP). The simulation result reveals that Redundant Link Aggregation (RLA) can cover the
bandwidth demand of the network in peak hours by consuming backup links as well which with Virtual
Router Redundancy Protocol (VRRP)cannot.It is further noted thatOdd Load Balancing (OLB) feature can
be used to save the cost in terms of money per annum.
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
This document summarizes and compares three IPv6 mobility management schemes for multimedia services over LTE-A wireless networks: Mobile IPv6, IPv6-MPLS, and IPv6-GMPLS. It first provides background on these schemes and the LTE-A network architecture. It then discusses using OPNET simulations to evaluate and compare the schemes' performance based on metrics like throughput, delay, coverage area, and bandwidth. The document concludes that IPv6-GMPLS provides the best performance and is the best choice for improving multimedia quality of service over LTE-A networks.
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIScscpconf
As the future generation networks are envisioned to be heterogeneous in nature, seamless
mobility in such networks is an important issue. While IETF work groups have standardized
various mobility management protocols, such as Mobile IPv6 (MIPv6), Fast Handovers for
Mobile IPv6 (Predictive FMIPv6, and Reactive FMIPv6), Hierarchical Mobile IPv6 (HMIPv6),
Proxy Mobile IPv6 (PMIPv6) and Fast Handovers for PMIPv6 (Predictive FPMIPv6, and
Reactive FPMIPv6), out of which some are host based and some are network based, the
decision regarding which protocol suits the future networks is still a research issue. The study
of various mobility management protocols in terms handover latency and the number of hops is
needed to evaluate these protocols. Even though much study has been done in literature in terms
of handover latency, study still needs performance evaluation in terms of average hop delay. In
this paper we study various mobility management protocols by applying simple numerical
analysis. The study is carried out for performance evaluation of various mobility management
protocols in terms of average hop delay, wireless link delay, wired part delay, and binding
update and registration delay. In this work, the average hop delay is estimated in terms of total
handover latency and total number of hops contributing to each protocol. The study enables us
to make a few important observations regarding the performance of these mobility management
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...dbpublications
In Multi-hop wireless routing to successfully achieve high end to end throughput .To search a “best” node path from source node to the destination node .A large number of routing protocols use for minimum total transmission count/time for delivering a single packet, such transmission time minimizing protocols cannot be assured to successfully achieve maximum end to end throughput. Considering spatial reusability of the wireless media, increase the end-to-end throughput in multi-hop wireless network. To support a function in spatial reusability-aware Single path routing (SAAP) protocols, It compare with existing protocols, Results provide desired end to end throughputgain is up to 62.7%. and desired end to end delay.
TransPAC2 provides high-performance network connectivity between the US and Asia Pacific region. It employs various network measurement and monitoring techniques and tools like perfSONAR to provide views into application performance and troubleshoot issues. TransPAC2 has deployed the latest version of perfSONAR in Los Angeles and Tokyo and presents measurement data through tools like perfADMIN. It advocates for perfSONAR adoption in the Asia Pacific region and works with organizations to deploy perfSONAR resources. The work plan for 2009 involves continued perfSONAR development and outreach efforts to integrate measurement facilities across networks.
Ict status in higher education sector of pakistan june 2011Raheel Raza
This document summarizes ICT initiatives in higher education in Pakistan. It discusses the establishment of the Pakistan Education and Research Network (PERN) to connect universities, the expansion of PERN2 with more connectivity and bandwidth, and efforts to provide national digital libraries, online journals, unified communication services, and a higher education management information system across Pakistan. The future roadmap includes expanding wireless networks, increasing videoconferencing capabilities, and implementing campus management solutions at additional universities.
The document summarizes the history and activities of JUCC (Joint Universities Computer Centre) and HARNET (Hong Kong Academic and Research NETwork). It discusses how JUCC founded in 1970 leads IT excellence among Hong Kong universities through HARNET. It outlines HARNET's growth from 1985 connections to recent 155 Mbps internet links and 400 Mbps connections to HKIX. It also discusses JUCC's organization, services, funding, and vision to become a research internet hub for the Asia Pacific region.
A project funded by the US National Science Foundation (NSF) and the Higher Education Commission of Pakistan (HEC) has deployed a high-performance international research and education (R&E) network connection between PERN – and its successor network PERN2 – and the global research and education network community.
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONcseij
This is era of information blast. A huge quantity of information is pouring in from various sources. The
revolutionary advancement of Information and Communication technologies bring the world close
together.A pile of information in different formats is just a click away. Which motivate the organizations to
get more internet bandwidth to consume and publish theinformationoverexploding cloudof Internet. The
standard router redundancyprotocolis used to handle backup link showever it cannot aggregate
them.Whereas thelink standard aggregation protocol can aggregate the link but it support only Ethernet
technology.In this researchpaper a concept of Redundant Link Aggregation (RLA)is proposed. RLA can
aggregate and handle backup links with main links regardless of carriertechnology. Furthermore a
dataforwardingmechanism Odd Load Balancing (OLB) is also proposed for RLA scheme. For the sake of
performance evaluation, Redundant Link Aggregation (RLA) is compared with Virtual Router Redundancy
Protocol (VRRP). The simulation result reveals that Redundant Link Aggregation (RLA) can cover the
bandwidth demand of the network in peak hours by consuming backup links as well which with Virtual
Router Redundancy Protocol (VRRP)cannot.It is further noted thatOdd Load Balancing (OLB) feature can
be used to save the cost in terms of money per annum.
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
This document summarizes and compares three IPv6 mobility management schemes for multimedia services over LTE-A wireless networks: Mobile IPv6, IPv6-MPLS, and IPv6-GMPLS. It first provides background on these schemes and the LTE-A network architecture. It then discusses using OPNET simulations to evaluate and compare the schemes' performance based on metrics like throughput, delay, coverage area, and bandwidth. The document concludes that IPv6-GMPLS provides the best performance and is the best choice for improving multimedia quality of service over LTE-A networks.
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIScscpconf
As the future generation networks are envisioned to be heterogeneous in nature, seamless
mobility in such networks is an important issue. While IETF work groups have standardized
various mobility management protocols, such as Mobile IPv6 (MIPv6), Fast Handovers for
Mobile IPv6 (Predictive FMIPv6, and Reactive FMIPv6), Hierarchical Mobile IPv6 (HMIPv6),
Proxy Mobile IPv6 (PMIPv6) and Fast Handovers for PMIPv6 (Predictive FPMIPv6, and
Reactive FPMIPv6), out of which some are host based and some are network based, the
decision regarding which protocol suits the future networks is still a research issue. The study
of various mobility management protocols in terms handover latency and the number of hops is
needed to evaluate these protocols. Even though much study has been done in literature in terms
of handover latency, study still needs performance evaluation in terms of average hop delay. In
this paper we study various mobility management protocols by applying simple numerical
analysis. The study is carried out for performance evaluation of various mobility management
protocols in terms of average hop delay, wireless link delay, wired part delay, and binding
update and registration delay. In this work, the average hop delay is estimated in terms of total
handover latency and total number of hops contributing to each protocol. The study enables us
to make a few important observations regarding the performance of these mobility management
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...dbpublications
In Multi-hop wireless routing to successfully achieve high end to end throughput .To search a “best” node path from source node to the destination node .A large number of routing protocols use for minimum total transmission count/time for delivering a single packet, such transmission time minimizing protocols cannot be assured to successfully achieve maximum end to end throughput. Considering spatial reusability of the wireless media, increase the end-to-end throughput in multi-hop wireless network. To support a function in spatial reusability-aware Single path routing (SAAP) protocols, It compare with existing protocols, Results provide desired end to end throughputgain is up to 62.7%. and desired end to end delay.
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
This document presents a system for internet video streaming service for social networks. It aims to improve quality of service for video streaming on mobile devices by developing an adaptive streaming method using a Markov Decision Process. The system uses Dynamic Adaptive Streaming over HTTP (DASH) to store multiple compressed video versions at different resolutions and qualities in segments. It formulates the multi-link video streaming as a reinforcement learning task and models it as a finite state Markov Decision Process. An algorithm is proposed to find near-optimal solutions in real-time to select the best video quality based on factors like bandwidth, buffer occupancy, and device resolution to improve streaming performance metrics while saving network bandwidth and costs. The system was tested using an Android emulator and Scalable Video
This research paper discusses IPv6 flow label and LTE technology for wireless broadband. It provides background on IPv6 and the flow label field, which allows source nodes to label packets for quality of service. The paper proposes a design for the flow label field including how source nodes and routers should handle labeled packets. It also gives a brief introduction to LTE technology and discusses how IPv6 and LTE can work together to provide guaranteed quality of service for wireless broadband. Simulation results are presented showing that the proposed IPv6 flow label mechanism maintains performance during network congestion. In conclusion, the paper argues that IPv6 flow labeling combined with LTE has the potential to provide a futuristic technology solution for wireless broadband with quality of service guarantees.
Ipv6 and lte futuristic technology for wireless broadbandSasank Chaitanya
This research paper discusses IPv6 flow label and LTE technology for wireless broadband. It provides background on IPv6 and the flow label field, which allows labeling of packets to request quality of service. It proposes a methodology for using the flow label field, including having nodes label flows and forward labeled packets. It also gives a brief introduction to LTE, discussing its architecture and how IPv6 and LTE can work together. The paper aims to show through estimated results that the proposed flow label mechanism maintains performance during network congestion.
Analysis and overview of Flooding Attack in Optimized link State Routing prot...IJESM JOURNAL
During this last decade, mesh networks have experienced strong growth due to their ability to provide an additional and complementary support for existing infrastructure communication systems. In such a network, routers are supposed to be fixed for short (e.g. public safety deployment) or long (e.g. network operator extension) period. This relative stability of infrastructure makes proactive routing protocols appropriate. One of the well known proactive routing protocols is OLSR (Optimized Link State Routing), which routing decisions are based on exchanges of topology information using all-to-all flooding of local information in order for each router to build a global knowledge of the topology. This study first goal is to improve the performance of topology information flooding in OLSR by introducing network coding techniques, which leads to a decrease of signaling overhead.
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGijp2p
In this paper, we have proposed a hybrid push-pull protocol for peer-to-peer live video streaming. The
main goal of this research is to minimize the network end-to-end delay in comparison to pure mesh
networks. Hybrid protocols, in most cases, suffer from complex construction and maintenance. Therefore,
our proposed protocol uses a pure mesh topology and a single layer video coding. In summary, our pushpull protocol has two parts. The pull-based part which is done on the mesh network, and the push-based
part which consists of two phases: parent selection and tree construction. When a push procedure appears,
it is very important to prevent data redundancy. To satisfy this condition, we have introduced a parent
selection method. In this method, by parent selection based on the minimum arrival time, the most stable
node will be selected. This node has the advantage of maximizing the expected service time of the tree.
Using this method, there is no need for maintaining any extra information and topology control data.
Finally, we do performance evaluation using OMNeT++ simulator. The simulation results show that the
proposed architecture has better performance in start-up delay, end-to-end delay, and distortion than pure
mesh-based network.
A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...ijdpsjournal
The key concern on the bandwidth allocation and scheduling for non real time traffic are the fulfillment of its minimum throughput requirement and improvement of bandwidth utilization with acceptable delay. This paper proposes a simple and efficient scheduling framework for allocating bandwidth to non real time
polling service (nrtPS) users in IEEE 802.16 networks. In this framework, jointly selective repeat ARQ at the MAC layer and adaptive modulation and coding techniques at the physical are considered. Numerical simulations demonstrate that the proposed scheduling approach provides a graceful compromise between bandwidth utilization and packet delivery delay while maintaining the minimum throughput requirements of nrtPS applications. Thus proves the efficiency of the proposed framework. The simulation is done for unicast scenario.
Performance Analysis of Different Modulation Schemes using Wi-Max And LTEIRJET Journal
This document analyzes the performance of different modulation schemes using WiMAX and LTE. It compares these two advanced wireless technologies in the physical layer and provides performance analysis of modulation schemes like BPSK, QPSK, and 16-QAM based on SNR or Eb/No and BER. MATLAB is used to simulate and analyze the performance of modulation schemes in WiMAX and LTE networks. The document also discusses the evolution of wireless access technologies and highlights the need for higher data rate technologies like WiMAX and LTE.
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...ijwmn
1) The document discusses packet scheduling algorithms for LTE downlink systems that must operate under imperfect channel quality information (CQI) due to errors, delays, and other issues.
2) It proposes a new packet scheduling algorithm that uses a Kalman filter-based channel predictor in the frequency domain to estimate the true CQI from erroneous feedback, combined with a time domain grouping technique using proportional fair and modified largest weighted delay first algorithms.
3) Simulation results showed this approach achieves better performance than existing algorithms in terms of system throughput and packet loss ratio under imperfect CQI conditions.
This document discusses the transition from IPv4 to IPv6. It provides background on why IPv6 was developed, noting that IPv4 addresses were being depleted and IPv6 expands the address space from 32 to 128 bits. It summarizes three main transition strategies: dual stack, tunneling, and translation. The document warns that tunneling IPv6 packets inside IPv4 packets could allow hidden IPv6 traffic and security issues if deep packet inspection is not used. Overall it emphasizes that a gradual transition combining techniques will be needed to migrate from the current IPv4 internet to an IPv6 internet.
This document summarizes a study on the performance of LTE networks. The researchers conducted passive and active measurements on a commercial LTE network with over 300,000 users to analyze network characteristics and resource utilization. They found that while LTE provides higher bandwidth than 3G, TCP flows often underutilize available bandwidth due to factors like limited receive windows. On average, flows used only 52% of available bandwidth, lengthening transfers and wasting energy. The researchers developed techniques to estimate bandwidth and identify inefficient application behaviors to recommend protocol and design improvements.
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
WiMAX network introduces a multimedia data scheduling service with different quality of service (QoS) requirements. Transmission opportunities are scheduled by the service according to the types of traffic data for the different connections or users. In the paper, we first propose a uniform definition of QoS level for the multimedia data types in the service. The QoS level of a connection are determined by the type of data of the connection and its allocated resources. Based on these QoS levels, we propose a call admission control (CAC) scheme for the entry admission of a new connection without degrading the network performance and the QoS of ongoing connections. The key idea of this scheme is to regulate the arriving traffic of the network such that the network can work at an optimal point, given under a heavy load traffic. Taking advantage of the simulation experiments, we confirm the fact that the proposed scheme can achieve better trade-off between the overall performance of network system and the QoS level of individual connection.
Improving the Wi-Fi in the Carrier Dome Feasibility ReportKunal Sharma
This feasibility report analyzes options to improve the slow Wi-Fi network performance in the Carrier Dome during large events. The current network is unable to handle the large load from crowds of attendees using Wi-Fi devices. Three options are considered: restructuring the current network, limiting video content data, or installing a new network system. Research methods included interviews, online research on stadium Wi-Fi, and testing at Manley Field House. Based on the criteria of cost, time, and providing a long-term solution, the report recommends involving a WLAN vendor to install a new network setup to improve performance for modern stadium needs.
PERFORMANCE COMPARISON OF PACKET SCHEDULING ALGORITHMS FOR VIDEO TRAFFIC IN L...ijmnct
In this paper we have studied downlink packet scheduling algorithms proposed for LTE cellular networks.
The study emphasize on three most promising scheduling algorithms such as: FLS, EXP rule and LOG rule.
The performance of these three algorithms is conducted over video traffic in a vehicular environment using
LTE-Sim simulator. The simulation was setup with varying number of users from 10 - 60 in fixed bounded
regions of 1 km radius. The main goal this study is to provide results that will help in the design process of
packet scheduler for LTE cellular networks, aiming to get better overall performance users. Simulation
results show that, the FLS scheme outperforms in terms of average system throughput, average packet
delay, PLR; and with a satisfactory level of fairness index.
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...IJMER
With increasing demands for better and more reliable service, developing a method for designing a highly-reliability road network has become a critical issue. A Network Design Problem is used to determine a set of design parameters leading to the creation of an optimal road network. Moreover, the performance of an Origin-Destination pair with high traffic demands is a top priority in the optimizing process. A bi-level programming technique, that is upper-level and lower-level programs, can be used to formulate the Continuous Network Design Problem. This study establishes a new type of bi-level program based on unblocked reliability. The proposed bi-level program is applied to analyze a real local road network that has 22 nodes and 62 links. A set of link capacity expansions is determined by solving the proposed bi-level program using the Hooke-Jeeves algorithm. This kind of capacity expansion results in optimization by maximizing the balance between the unblocked reliability of the entire road network and the road network expansion ratio. The new, proposed bi-level program can comply with the various limits on environment and financial resources.
The document proposes a Crosslayered and Power Conserved Routing Topology (CPCRT) for congestion control in mobile ad hoc networks. CPCRT aims to distinguish between packet loss due to link failure versus other causes like congestion. It takes a cross-layer approach using information from the physical, MAC, and application layers. The proposed method also aims to conserve power during packet transmission by adjusting transmission power levels based on received signal strength. Simulation results show that CPCRT can better utilize resources and conserve power during congestion control compared to other approaches.
Multi Vendor Wireless Channel Interference.docxKunal Sharma
This document describes a study that tested whether different Wi-Fi access point vendors share bandwidth equally when operating on the same channel. The researchers tested upstream and downstream bandwidth between access points from ASUS and Netgear on both 2.4GHz and 5GHz frequencies. Their goal was to see if connection properties and bandwidth sharing differed between vendors or if certain chipsets affected performance. They found that access points sharing a channel performed better when they were from the same vendor compared to different vendors.
This document presents a case study of transitioning the network of the National Institute of Technology, Hamirpur campus from IPv4 to IPv6. It discusses setting up a test bench with Cisco routers and switches to establish communication between IPv4 and IPv6 networks using tunneling techniques. The objectives are to study current transition mechanisms, create a test network using the best techniques, and propose modifications to migrate the NIT Hamirpur network to IPv6. References include Indian government documents on IPv6 policy and deployment.
IRJET- Evaluating the Impact of IPv4 to IPv6 Tunneling with MPLS on VOIPIRJET Journal
This document summarizes a research paper that evaluates the impact of transitioning from IPv4 to IPv6 using tunneling with MPLS on voice over IP (VOIP) performance. It first provides background on the need to transition from IPv4 to IPv6 due to limited IPv4 address space. It then discusses different transition mechanisms like tunneling and their benefits. The paper reviews previous studies that found 6-to-4 tunneling provides VOIP performance similar to IPv6. It also discusses how MPLS can ensure quality of service for real-time applications like VOIP. The goal of the research was to analyze how tunneling from IPv4 to IPv6 with MPLS impacts VOIP performance metrics.
This document discusses strategies for transitioning from IPv4 to IPv6. It describes:
1. Dual-stack as the simplest approach, allowing IPv4 and IPv6 to operate simultaneously and maintain legacy IPv4 applications while adding new IPv6 applications.
2. Tunneling mechanisms like configured and automatic tunnels that allow IPv6 packets to be encapsulated and sent over IPv4 networks.
3. Transition scenarios involving gradual deployment of dual-stack systems and applications until pure IPv6 is achieved, maintaining compatibility with IPv4 nodes during transition.
The key recommendation is for applications to support dual-stack environments to facilitate a smooth transition and interoperability between IPv4 and IPv6 nodes. Careful planning
The issue of deploying IPv6 Technology has been a topic of debate for more than a decade now.
Professionals have been discussing on the transition from Internet Protocol version 4 (IPVv4) to Internet
Protocol version 6 (IPv6) due to the fact that the IPv4 address space would soon be exhausted.
In this paper, we analyse the IPv4 and IPv6 technologies and look at the benefits of migrating to IPv6,
its social implications, risks & challenges and the opportunities the IPv6 migration offers
This document discusses the deployment of IPv6 technology as the IPv4 address space is being depleted. It analyzes the IPv4 and IPv6 technologies and the benefits of migrating to IPv6, including increased address space. The social implications, risks, challenges, and opportunities of IPv6 deployment are examined. The document concludes by encouraging all internet stakeholders to consider migrating to IPv6 to take advantage of the opportunities it presents and ensure sustainability of the internet.
Analytical Review On The Stakeholders Perceptions About IPv6 Readiness And Th...Tracy Drey
This document analyzes the readiness of Higher Education Institutions (HEIs) in Oman to adopt IPv6. It finds that while the Telecommunications Regulatory Authority established an IPv6 project 10 years ago and issued guidelines for migrating to IPv6 by 2020, data on HEIs' responses is limited. The next stage of research will investigate stakeholders' perceptions of HEIs' actual readiness to implement IPv6 through surveys of ICT personnel, administrators, and senior staff. Globally, many countries and institutions have adopted IPv6 transition plans and policies, but implementation varies and often lacks services, funding, coordination or technical knowledge.
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
This document presents a system for internet video streaming service for social networks. It aims to improve quality of service for video streaming on mobile devices by developing an adaptive streaming method using a Markov Decision Process. The system uses Dynamic Adaptive Streaming over HTTP (DASH) to store multiple compressed video versions at different resolutions and qualities in segments. It formulates the multi-link video streaming as a reinforcement learning task and models it as a finite state Markov Decision Process. An algorithm is proposed to find near-optimal solutions in real-time to select the best video quality based on factors like bandwidth, buffer occupancy, and device resolution to improve streaming performance metrics while saving network bandwidth and costs. The system was tested using an Android emulator and Scalable Video
This research paper discusses IPv6 flow label and LTE technology for wireless broadband. It provides background on IPv6 and the flow label field, which allows source nodes to label packets for quality of service. The paper proposes a design for the flow label field including how source nodes and routers should handle labeled packets. It also gives a brief introduction to LTE technology and discusses how IPv6 and LTE can work together to provide guaranteed quality of service for wireless broadband. Simulation results are presented showing that the proposed IPv6 flow label mechanism maintains performance during network congestion. In conclusion, the paper argues that IPv6 flow labeling combined with LTE has the potential to provide a futuristic technology solution for wireless broadband with quality of service guarantees.
Ipv6 and lte futuristic technology for wireless broadbandSasank Chaitanya
This research paper discusses IPv6 flow label and LTE technology for wireless broadband. It provides background on IPv6 and the flow label field, which allows labeling of packets to request quality of service. It proposes a methodology for using the flow label field, including having nodes label flows and forward labeled packets. It also gives a brief introduction to LTE, discussing its architecture and how IPv6 and LTE can work together. The paper aims to show through estimated results that the proposed flow label mechanism maintains performance during network congestion.
Analysis and overview of Flooding Attack in Optimized link State Routing prot...IJESM JOURNAL
During this last decade, mesh networks have experienced strong growth due to their ability to provide an additional and complementary support for existing infrastructure communication systems. In such a network, routers are supposed to be fixed for short (e.g. public safety deployment) or long (e.g. network operator extension) period. This relative stability of infrastructure makes proactive routing protocols appropriate. One of the well known proactive routing protocols is OLSR (Optimized Link State Routing), which routing decisions are based on exchanges of topology information using all-to-all flooding of local information in order for each router to build a global knowledge of the topology. This study first goal is to improve the performance of topology information flooding in OLSR by introducing network coding techniques, which leads to a decrease of signaling overhead.
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGijp2p
In this paper, we have proposed a hybrid push-pull protocol for peer-to-peer live video streaming. The
main goal of this research is to minimize the network end-to-end delay in comparison to pure mesh
networks. Hybrid protocols, in most cases, suffer from complex construction and maintenance. Therefore,
our proposed protocol uses a pure mesh topology and a single layer video coding. In summary, our pushpull protocol has two parts. The pull-based part which is done on the mesh network, and the push-based
part which consists of two phases: parent selection and tree construction. When a push procedure appears,
it is very important to prevent data redundancy. To satisfy this condition, we have introduced a parent
selection method. In this method, by parent selection based on the minimum arrival time, the most stable
node will be selected. This node has the advantage of maximizing the expected service time of the tree.
Using this method, there is no need for maintaining any extra information and topology control data.
Finally, we do performance evaluation using OMNeT++ simulator. The simulation results show that the
proposed architecture has better performance in start-up delay, end-to-end delay, and distortion than pure
mesh-based network.
A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...ijdpsjournal
The key concern on the bandwidth allocation and scheduling for non real time traffic are the fulfillment of its minimum throughput requirement and improvement of bandwidth utilization with acceptable delay. This paper proposes a simple and efficient scheduling framework for allocating bandwidth to non real time
polling service (nrtPS) users in IEEE 802.16 networks. In this framework, jointly selective repeat ARQ at the MAC layer and adaptive modulation and coding techniques at the physical are considered. Numerical simulations demonstrate that the proposed scheduling approach provides a graceful compromise between bandwidth utilization and packet delivery delay while maintaining the minimum throughput requirements of nrtPS applications. Thus proves the efficiency of the proposed framework. The simulation is done for unicast scenario.
Performance Analysis of Different Modulation Schemes using Wi-Max And LTEIRJET Journal
This document analyzes the performance of different modulation schemes using WiMAX and LTE. It compares these two advanced wireless technologies in the physical layer and provides performance analysis of modulation schemes like BPSK, QPSK, and 16-QAM based on SNR or Eb/No and BER. MATLAB is used to simulate and analyze the performance of modulation schemes in WiMAX and LTE networks. The document also discusses the evolution of wireless access technologies and highlights the need for higher data rate technologies like WiMAX and LTE.
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...ijwmn
1) The document discusses packet scheduling algorithms for LTE downlink systems that must operate under imperfect channel quality information (CQI) due to errors, delays, and other issues.
2) It proposes a new packet scheduling algorithm that uses a Kalman filter-based channel predictor in the frequency domain to estimate the true CQI from erroneous feedback, combined with a time domain grouping technique using proportional fair and modified largest weighted delay first algorithms.
3) Simulation results showed this approach achieves better performance than existing algorithms in terms of system throughput and packet loss ratio under imperfect CQI conditions.
This document discusses the transition from IPv4 to IPv6. It provides background on why IPv6 was developed, noting that IPv4 addresses were being depleted and IPv6 expands the address space from 32 to 128 bits. It summarizes three main transition strategies: dual stack, tunneling, and translation. The document warns that tunneling IPv6 packets inside IPv4 packets could allow hidden IPv6 traffic and security issues if deep packet inspection is not used. Overall it emphasizes that a gradual transition combining techniques will be needed to migrate from the current IPv4 internet to an IPv6 internet.
This document summarizes a study on the performance of LTE networks. The researchers conducted passive and active measurements on a commercial LTE network with over 300,000 users to analyze network characteristics and resource utilization. They found that while LTE provides higher bandwidth than 3G, TCP flows often underutilize available bandwidth due to factors like limited receive windows. On average, flows used only 52% of available bandwidth, lengthening transfers and wasting energy. The researchers developed techniques to estimate bandwidth and identify inefficient application behaviors to recommend protocol and design improvements.
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
WiMAX network introduces a multimedia data scheduling service with different quality of service (QoS) requirements. Transmission opportunities are scheduled by the service according to the types of traffic data for the different connections or users. In the paper, we first propose a uniform definition of QoS level for the multimedia data types in the service. The QoS level of a connection are determined by the type of data of the connection and its allocated resources. Based on these QoS levels, we propose a call admission control (CAC) scheme for the entry admission of a new connection without degrading the network performance and the QoS of ongoing connections. The key idea of this scheme is to regulate the arriving traffic of the network such that the network can work at an optimal point, given under a heavy load traffic. Taking advantage of the simulation experiments, we confirm the fact that the proposed scheme can achieve better trade-off between the overall performance of network system and the QoS level of individual connection.
Improving the Wi-Fi in the Carrier Dome Feasibility ReportKunal Sharma
This feasibility report analyzes options to improve the slow Wi-Fi network performance in the Carrier Dome during large events. The current network is unable to handle the large load from crowds of attendees using Wi-Fi devices. Three options are considered: restructuring the current network, limiting video content data, or installing a new network system. Research methods included interviews, online research on stadium Wi-Fi, and testing at Manley Field House. Based on the criteria of cost, time, and providing a long-term solution, the report recommends involving a WLAN vendor to install a new network setup to improve performance for modern stadium needs.
PERFORMANCE COMPARISON OF PACKET SCHEDULING ALGORITHMS FOR VIDEO TRAFFIC IN L...ijmnct
In this paper we have studied downlink packet scheduling algorithms proposed for LTE cellular networks.
The study emphasize on three most promising scheduling algorithms such as: FLS, EXP rule and LOG rule.
The performance of these three algorithms is conducted over video traffic in a vehicular environment using
LTE-Sim simulator. The simulation was setup with varying number of users from 10 - 60 in fixed bounded
regions of 1 km radius. The main goal this study is to provide results that will help in the design process of
packet scheduler for LTE cellular networks, aiming to get better overall performance users. Simulation
results show that, the FLS scheme outperforms in terms of average system throughput, average packet
delay, PLR; and with a satisfactory level of fairness index.
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...IJMER
With increasing demands for better and more reliable service, developing a method for designing a highly-reliability road network has become a critical issue. A Network Design Problem is used to determine a set of design parameters leading to the creation of an optimal road network. Moreover, the performance of an Origin-Destination pair with high traffic demands is a top priority in the optimizing process. A bi-level programming technique, that is upper-level and lower-level programs, can be used to formulate the Continuous Network Design Problem. This study establishes a new type of bi-level program based on unblocked reliability. The proposed bi-level program is applied to analyze a real local road network that has 22 nodes and 62 links. A set of link capacity expansions is determined by solving the proposed bi-level program using the Hooke-Jeeves algorithm. This kind of capacity expansion results in optimization by maximizing the balance between the unblocked reliability of the entire road network and the road network expansion ratio. The new, proposed bi-level program can comply with the various limits on environment and financial resources.
The document proposes a Crosslayered and Power Conserved Routing Topology (CPCRT) for congestion control in mobile ad hoc networks. CPCRT aims to distinguish between packet loss due to link failure versus other causes like congestion. It takes a cross-layer approach using information from the physical, MAC, and application layers. The proposed method also aims to conserve power during packet transmission by adjusting transmission power levels based on received signal strength. Simulation results show that CPCRT can better utilize resources and conserve power during congestion control compared to other approaches.
Multi Vendor Wireless Channel Interference.docxKunal Sharma
This document describes a study that tested whether different Wi-Fi access point vendors share bandwidth equally when operating on the same channel. The researchers tested upstream and downstream bandwidth between access points from ASUS and Netgear on both 2.4GHz and 5GHz frequencies. Their goal was to see if connection properties and bandwidth sharing differed between vendors or if certain chipsets affected performance. They found that access points sharing a channel performed better when they were from the same vendor compared to different vendors.
This document presents a case study of transitioning the network of the National Institute of Technology, Hamirpur campus from IPv4 to IPv6. It discusses setting up a test bench with Cisco routers and switches to establish communication between IPv4 and IPv6 networks using tunneling techniques. The objectives are to study current transition mechanisms, create a test network using the best techniques, and propose modifications to migrate the NIT Hamirpur network to IPv6. References include Indian government documents on IPv6 policy and deployment.
IRJET- Evaluating the Impact of IPv4 to IPv6 Tunneling with MPLS on VOIPIRJET Journal
This document summarizes a research paper that evaluates the impact of transitioning from IPv4 to IPv6 using tunneling with MPLS on voice over IP (VOIP) performance. It first provides background on the need to transition from IPv4 to IPv6 due to limited IPv4 address space. It then discusses different transition mechanisms like tunneling and their benefits. The paper reviews previous studies that found 6-to-4 tunneling provides VOIP performance similar to IPv6. It also discusses how MPLS can ensure quality of service for real-time applications like VOIP. The goal of the research was to analyze how tunneling from IPv4 to IPv6 with MPLS impacts VOIP performance metrics.
This document discusses strategies for transitioning from IPv4 to IPv6. It describes:
1. Dual-stack as the simplest approach, allowing IPv4 and IPv6 to operate simultaneously and maintain legacy IPv4 applications while adding new IPv6 applications.
2. Tunneling mechanisms like configured and automatic tunnels that allow IPv6 packets to be encapsulated and sent over IPv4 networks.
3. Transition scenarios involving gradual deployment of dual-stack systems and applications until pure IPv6 is achieved, maintaining compatibility with IPv4 nodes during transition.
The key recommendation is for applications to support dual-stack environments to facilitate a smooth transition and interoperability between IPv4 and IPv6 nodes. Careful planning
The issue of deploying IPv6 Technology has been a topic of debate for more than a decade now.
Professionals have been discussing on the transition from Internet Protocol version 4 (IPVv4) to Internet
Protocol version 6 (IPv6) due to the fact that the IPv4 address space would soon be exhausted.
In this paper, we analyse the IPv4 and IPv6 technologies and look at the benefits of migrating to IPv6,
its social implications, risks & challenges and the opportunities the IPv6 migration offers
This document discusses the deployment of IPv6 technology as the IPv4 address space is being depleted. It analyzes the IPv4 and IPv6 technologies and the benefits of migrating to IPv6, including increased address space. The social implications, risks, challenges, and opportunities of IPv6 deployment are examined. The document concludes by encouraging all internet stakeholders to consider migrating to IPv6 to take advantage of the opportunities it presents and ensure sustainability of the internet.
Analytical Review On The Stakeholders Perceptions About IPv6 Readiness And Th...Tracy Drey
This document analyzes the readiness of Higher Education Institutions (HEIs) in Oman to adopt IPv6. It finds that while the Telecommunications Regulatory Authority established an IPv6 project 10 years ago and issued guidelines for migrating to IPv6 by 2020, data on HEIs' responses is limited. The next stage of research will investigate stakeholders' perceptions of HEIs' actual readiness to implement IPv6 through surveys of ICT personnel, administrators, and senior staff. Globally, many countries and institutions have adopted IPv6 transition plans and policies, but implementation varies and often lacks services, funding, coordination or technical knowledge.
Evolution of Mobile Networks and IPv6 - APEC TEL49APNIC
1) Mobile networks are transitioning to higher generations like 3G, 4G and LTE, bringing more smart devices online. This rapid growth is driving the need for more IP addresses.
2) Some mobile carriers like T-Mobile USA and Telstra have deployed IPv6 to support this expansion, allowing native IPv6 services on their 3G/4G networks.
3) Global IPv6 deployment is increasing steadily, with early adopters like Verizon seeing over 50% of traffic over IPv6. Mobile networks provide good opportunities to enable IPv6 as a default for new users and services.
A secure tunnel technique using i pv6 transition over ipv4 channelMade Artha
This document discusses secure tunneling techniques for IPv6 transition over IPv4 networks. It first provides background on the development of IPv6 and need to replace IPv4 due to limited address space. It then discusses three common approaches for IPv4-IPv6 transition: dual stack, translation, and tunneling. The document focuses on issues with the tunneling approach, such as one network attacking another or spoofing attacks. It proposes a solution using a test bed with two IPv6 networks connected via an IPv4 network and 6to4 routers, with outbound filtering to address security issues.
On the migration of a large scale network from i pv4 to ipv6 environmentIJCNCJournal
This document discusses the design of migrating a large-scale network from IPv4 to a dual-stack IPv4/IPv6 environment. It focuses on using dual-stack mechanisms, which allow both IPv4 and IPv6 protocol stacks to run simultaneously. The design considers aspects such as topology, addressing plans, routing protocols, and performance statistics. A dual-stack approach is proposed that involves transitioning the network core, perimeter routers, and other devices in stages to support both IPv4 and IPv6. Addressing plans are provided for infrastructure, loopbacks, and customer networks that aim to support future growth while allowing for aggregation.
The document discusses the network layer of the OSI model and the Internet Protocol (IP). It focuses on IP version 4 (IPv4), including the IPv4 packet structure, addressing modes of IPv4, and address resolution protocols. The network layer is responsible for identification of hosts based on logical addresses and routing data between hosts over underlying networks. IPv4 currently dominates but is being replaced by IPv6 due to address exhaustion issues in IPv4.
Performance Evaluation and Comparisons for IPv4&IPv6 using mpls Technologiesiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document compares the performance of IPv4 and IPv6 over MPLS networks. It summarizes the results of simulations run using OPNET 14.5 that evaluated packet delay, packet loss, and throughput for IPv4 and IPv6 over MPLS. The simulations found that IPv6 over MPLS exhibited higher packet loss, higher throughput, and higher delay compared to IPv4 over MPLS which had lower throughput and delay with less dropped packets. Therefore, IPv6 may be suitable for applications requiring high bandwidth but not for real-time applications due to its higher delays and packet loss.
The aim of this dissertation project was to investigate and improve the performance of the two most popular link-state routing protocols when configured in IPv4/IPv6 dual-stack enterprise networks. The thesis intended to make the first step of scientific research in performance comparison of different routing protocols in IPv4-IPv6 coexistence dual stack ipv4 and ipv6 coexistence
The document provides an overview of IPv6 adoption around the world and in Malaysia specifically. It discusses the depletion of IPv4 addresses forcing a transition to IPv6. The US government has mandated all federal agencies upgrade to IPv6 by certain deadlines. In Malaysia, the National IPv6 Council was established in 2004 to guide the transition. ISPs have undergone compliance audits to test IPv6 connectivity. The Malaysian government also released IPv6 transition guidelines for the public sector outlining a phased approach for agencies to upgrade networks and applications to IPv6.
IPv6 Deployment, Where are we now? - APEC TEL 48APNIC
This document summarizes the state of IPv6 deployment in Asia Pacific economies based on statistics and government initiatives. It finds that while IPv6 deployment is varied, some economies like Japan, China, and Australia have been very active. Government initiatives in these economies include national IPv6 plans, mandates, and monitoring of deployment. Mobile networks are seen as an important driver of IPv6 adoption as they transition to all-IP networks using LTE. Continued collaboration between governments and industry is needed to support current and future Internet growth.
Deploying Single Stack IPv4 with NAT44 is the most costly way for mobile operators to deal with IPv4 address exhaustion due to increasing bandwidth demands and NAT44 session state over time. Building a path to IPv6 is the most effective way to reduce per-subscriber capex costs associated with NAT44. Capex is neutral when transitioning to IPv6 by deploying Dual Stack IPv6 with NAT44 versus deploying Single Stack IPv6 with NAT64, though opex costs may vary between operators. A test of Single Stack IPv6 found 85-90% of smartphone apps worked via IPv6 or NAT64, with the remaining requiring support on the user endpoint for 464XLAT.
IPv6 Deployment, where are we now? - Asia Pacific Regional Internet Governanc...APNIC
This document summarizes the status of IPv6 deployment in the Asia Pacific region based on statistics from various sources. It finds that IPv6 readiness and adoption varies across countries and network operators in the region. Many governments have introduced initiatives and guidelines to promote IPv6 deployment, including national roadmaps and partnerships between public and private sectors. Key countries like Australia, China, India, Japan, Korea, Singapore, and Vietnam are highlighted for their active government support and progress in transitioning to IPv6.
The document evaluates and compares three techniques for migrating from IPv4 to IPv6 using the GNS3 simulator: dual stack, tunneling, and Network Address Translation - Protocol Translation (NAT-PT). It simulates the three migration techniques in GNS3 and analyzes network performance parameters such as latency, packet loss, and response time using Solarwinds. The results found that the tunneling technique had the best performance with the lowest latency and packet loss and fastest response time, making it the best approach for migration based on the simulation.
A Survey On Next Generation Internet Protocol IPv6Carrie Romero
This document discusses IPv6 and the need to transition from IPv4 to IPv6. It provides an overview of IPv6, including that IPv6 was developed to address the limited address space of IPv4 and improve security. It also discusses some of the key challenges in transitioning to IPv6, such as the need for IPv6 and IPv4 to coexist during transition. The document summarizes various transition techniques between IPv6 and IPv4, including dual stack, tunneling, and translation methods.
Similar to IPv6 campus transition: A Central Luzon State University case study (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
The document proposes using a particle swarm optimization (PSO) algorithm to optimize the hyperparameters of a convolutional neural network (CNN) for image classification. The PSO algorithm is used to find optimal values for CNN hyperparameters like the number and size of convolutional filters. In experiments on the MNIST handwritten digit dataset, the optimized CNN achieved a testing error rate of 0.87%, which is competitive with state-of-the-art models. The proposed approach finds optimized CNN architectures automatically without requiring manual design or encoding strategies during training.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
This document describes the implementation of a double-layer structure on an octagon microstrip yagi antenna (OMYA) to improve its performance at 5.8 GHz. The double-layer consists of two double positive (DPS) substrates placed above the OMYA. Simulation and experimental results show that the double-layer configuration increases the gain of the OMYA by 2.5 dB compared to without the double-layer. The measured bandwidth of the OMYA with double-layer is 14.6%, indicating the double-layer can increase both the gain and bandwidth of the OMYA.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
The document provides an overview of the key performance indicators (KPIs) for 6G wireless networks compared to 5G networks. Some of the major KPIs discussed for 6G include: achieving data rates of up to 1 Tbps and individual user data rates up to 100 Gbps; reducing latency below 10 milliseconds; supporting up to 10 million connected devices per square kilometer; improving spectral efficiency by up to 100 times through technologies like terahertz communications and smart surfaces; and achieving an energy efficiency of 1 pico-joule per bit transmitted through techniques like wireless power transmission and energy harvesting. The document outlines how 6G aims to integrate terrestrial, aerial and maritime communications into a single network to provide ubiquitous connectivity with higher
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Impartiality as per ISO /IEC 17025:2017 StandardMuhammadJazib15
This document provides basic guidelines for imparitallity requirement of ISO 17025. It defines in detial how it is met and wiudhwdih jdhsjdhwudjwkdbjwkdddddddddddkkkkkkkkkkkkkkkkkkkkkkkwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwioiiiiiiiiiiiii uwwwwwwwwwwwwwwwwhe wiqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq gbbbbbbbbbbbbb owdjjjjjjjjjjjjjjjjjjjj widhi owqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq uwdhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhwqiiiiiiiiiiiiiiiiiiiiiiiiiiiiw0pooooojjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj whhhhhhhhhhh wheeeeeeee wihieiiiiii wihe
e qqqqqqqqqqeuwiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiqw dddddddddd cccccccccccccccv s w c r
cdf cb bicbsad ishd d qwkbdwiur e wetwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww w
dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffw
uuuuhhhhhhhhhhhhhhhhhhhhhhhhe qiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii iqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc ccccccccccccccccccccccccccccccccccc bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbu uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuum
m
m mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm m i
g i dijsd sjdnsjd ndjajsdnnsa adjdnawddddddddddddd uw
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
We have designed & manufacture the Lubi Valves LBF series type of Butterfly Valves for General Utility Water applications as well as for HVAC applications.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
IPv6 campus transition: A Central Luzon State University case study
1. Bulletin of Electrical Engineering and Informatics
Vol. 9, No. 3, June 2020, pp. 1167~1175
ISSN: 2302-9285, DOI: 10.11591/eei.v9i3.2173 1167
Journal homepage: http://beei.org
IPv6 campus transition: A Central Luzon State University
case study
Marlon A. Naagas1
, Nemesio A. Macabale Jr2
, Thelma D. Palaoag3
1,2
Central Luzon State University, Philippines
3
University of the Cordilleras, Philippines
Article Info ABSTRACT
Article history:
Received Oct 30, 2019
Revised Jan 7, 2020
Accepted Feb 21, 2020
Internet connections still use IPv4 as the primary address protocol and it
is now facing exhaustion. However, academic institutions specifically
in the Philippines should devise steps to address the exhaustion of IPv4.
In this paper, this is brought to light as we present the IPv4 to IPv6 campus
transition techniques to address the issue. The experiment is carried out
in Central Luzon State University and is assessed if the university is able
to adopt the IPv6 transition in their campus network. Two IPv6 transition
mechanisms were implemented and tested. As a general result, it has
been found out, through testbeds, that the dual-stack transition mechanism
is more suitable than 6 to 4 tunnel broker. The results have also
shown that 6 to 4 tunnel broker was outperformed by dual-stack transition
mechanism in all areas and presents better performance. Additionally, results
also showed that IPv4 presents slight advantages in terms of network
performance than IPv6 with a very small percentage in difference, and this
does mean that migration to IPv6 is possible without performance detriments.
Furthermore, the results also provide a proof of concept for the university
especially in the Philippines to consider IPv6 for future migration within
their campus network.
Keywords:
IPv6
IPv6 campus model
IPv6 campus transition
IPv6 dual-stack model
IPv6 transition
This is an open access article under the CC BY-SA license.
Corresponding Author:
Marlon A. Naagas,
Central Luzon State University,
Science City of Munoz, NE, Philippines.
Email: manaagas@clsu.edu.ph
1. INTRODUCTION
The internet community was threatened by the fundamental resource scarcity issue of IPv4. Four out
of five (APNIC, RIPE, LACNIC, ARIN) of the regional internet registries (RIRs) have run out of freely
available IPv4 address space. The forecast of likely exhaustion dates for each RIR: ARIN reached IPv4
address exhaustion since 24 Sep-2015. The other pool depletion projections by other RIR: AFRINIC
late-2019, LACNIC late-2019, RIPE NCC mid-2020 and APNIC by mid-2021 [1]. As a result, the internet
engineering task force (IETF) developed IPv6 (internet protocol version 6) to address these limitations, along
with several protocol improvements like network performances, ease-of-configuration, address length
and network management issues [2].
Asia Pacific Network Information Center (APNIC) conducted a stakeholder’s internet forum in
the Philippines last 2014 [3]. The forum addressed the issues that the Internet industry in the Asia Pacific
is at a critical point. It also stated that internet addresses using IPv4 has begun to run out, technology
investors and stakeholders in the Philippines and the Asia Pacific are being urged to start their transition from
IPv4 to IPv6 in order to maintain a scalable Internet for the region. The Philippines was in 55th place during
2. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 3, June 2020 : 1167 – 1175
1168
that time, but in the latest survey, the Philippines was placed 133rd in the recent world rankings of IPv6 users
per country [4], and in google measurement, approximately 2.7% of the population uses IPv6 [5].
However, in the APNIC measurement, the Philippines scored 3.14% as IPv6 Capable and 3.05% prepared as
of December 2019 [4]. As a solution, the Philippine government issued E.O. No. 893 that encourages the
migration to IPv6 but was not taken seriously up until today. There’s still no IPv4 and IPv6 transition
mechanism framework established in the Philippines. The government has issued an executive order only to
encourage but not force implementation.
The internet has become an important component in the academic institutions because of the vital
role it plays in the gathering of information as well as means of communication. From anywhere in the world,
the internet has made it possible to access wide range of information, such as research, journal article, papers,
etc. It enables researchers, faculty, and students in this institution to spread learned facts to a wider audience
around the globe [6]. Adopting the IPv6 protocol maintains competitiveness, interoperability, and growth that
universities must become proactive in adopting this protocol. Most of the top universities in the world
have taken steps in implementing IPv6 in their campus network operations. However, IPv6 is being adopted
at a very slow pace in the Philippines because even major internet service providers (ISPs) doesn’t provide
IPv6 internet connectivity in their services. UP Diliman is one of the firsts to implement full-IPv6
connectivity from its core services down to its clients. This is the only university that participated in the IPv6
world launch day that was held in 2008 [7]. One question to ask, is Central Luzon State University next to
UP Diliman in terms of IPv6 campus connectivity?
This study aims to answer the question by implementing suitable IPv6 transition mechanisms based
on existing university network specifications of Central Luzon State University (CLSU). This study will
have a huge contribution in the IPv6 community especially in the academic sectors in the Philippines once
it is fully implemented. This study will enable other State Universities and Colleges (SUC) to follow
the track of UP Diliman and CLSU and for them to also consider future migration to IPv6 within their
campus network operation.
2. CAMPUS IPv6 TRANSITION TECHNIQUES
Many IPv6 transition techniques have been proposed by the IETF. T. Chown of the University
of Southampton proposed an IPv6 campus transition technique [8] that considers and analyzes the specific
scenario of IPv6 transition and implementation in a large department of a university campus network.
Transition to IPv6 campus cannot be implemented overnight. Proper planning and design are needed before
commencing the implementation phase. The transition process should be performed phase by phase due to
operating costs, utilities and changing factors that should be considered by an organization before initiating
the transition process [9]. Hence, the choice of appropriate IPv6 transition mechanisms can make sure that
the transition process goes smoothly. Proper testing procedures are the fundamental requirement in order to
test the IPv6 transition mechanism before implementing in the actual network [10].
IETF released RFC 4057 in 2005. The RFC defines the scenarios in deploying IPv6 in enterprise
networks. This RFC is beneficial to the network administration team to know the IPv6 transition strategy
used within the enterprise network. These IPv6 transition "scenarios" will also be described in this document.
It is stated in this document that it is impossible to define every possible enterprise scenario that will be
applied to IPv6 adoption and transition. It is appropriate for an organization or enterprise to select the best
technique that is suitable to support their network requirements. It is also mentioned in the document that any
attempt to define a default or a one-size-fits-all scenario simply won't work [11].
− Dual-stack: The primary technique for transitioning to IPv6 is the dual-stack approach. This migration
technique provides complete support for running both Internet Protocols IPv4 and IPv6 at the same time
in both hosts and routers. The Nodes support both protocol stacks (IPv4 and IPv6) that work in parallel
and allow the end device or router to operate via either protocol.
− Tunneling: Another transitioning technique for IPv6. It allows the movement of a packet from network to
another different network. It involves allowing the IPv6 network to be sent across an IPv4 network
through encapsulation. This technique encapsulates an IPv6 packet into an IPv4 packet so that it can be
delivered over IPv4-only networks [12]. Different types of Tunneling strategies have been developed
and it can be configured manually or automatically such as IPinIP, GRE, 6to4, Teredo, ISATAP, 6rd,
MPLS and others. However, this study only discussed 6 to 4 Tunnel Broker because it is more suitable for
rapid deployment where an IPv6 is not supported by an ISP in their location.
− Translation: Network address translation (NAT) is an old method in IPv4, it refers to the translation
of an IP address from public address into private address space. IPv6 also uses the same translation
technique as defined in RFC 2765 and RFC 2766 which is the network address translation-port translation
(NAT-PT) and is now substituted by NAT64. However, many benefits to network address translation
3. Bulletin of Electr Eng & Inf ISSN: 2302-9285
IPv6 campus transition: A Central Luzon State University case study (Marlon A. Naagas)
1169
(NAT) has been identified, but the primary benefit of this technique is only to "amplify" available
address space which is not needed in the IPv6 environment. IPv6 was designed to make NAT
unnecessary [13-15].
3. CAMPUS NETWORK SET-UP AND TRANSITION IMPLEMENTATION
This study adopts "Scenario 1" of the IPv6 enterprise network scenarios [11] of RFC 4057,
where the IPv6 network is to be deployed in parallel with the existing IPv4 network. We ensure that
the university’s existing IPv4 network infrastructure is not interrupted during the implementation stage
and IPv6 has an equivalent or better than the IPv4 network infrastructure. We also deployed IPv6 pervasively
in the wired and wireless networks of the university. This new network will become an enabler for
the faculty, developer and researchers to encourage them to experience and develop new applications that
focuses on IPv6.
The network performance testing focused on two important statistics: First, TCP throughput
measurement. Second, UDP connection-UDP throughput, jitter, and packet loss. Packet loss is defined as
the time it takes for a packet to traverse between two hosts on a network. Jitter is the difference or change
in the delay over time. Jitter calculations are continuously computed by the server, as specified by RTP
in RFC 1889 [16-17]. Each of these statistics is important in measuring the performance of computer
networks and will be analyzed for both IPv4 and IPv6 transition mechanisms.
3.1. Campus preparation and network specification
The existing network of CLSU is consisted of an IPv4 network with around 20 subnets
and the current network design is using internetwork or a hierarchical network model that combines
edge-core router down to the core to access switches’ functionality in central devices. The main routing
and switching equipment are all IPv6 and VLAN capable. The main site deployed IPv6 dual-stack to support
its users along with its teaching and research needs. The goal is for IPv6 to enable the network using wired
and wireless such that the whole operation is dual-stack. Tunneling using 6 to 4 Tunnel Broker is also tested
and implemented, this technique applies to the University that doesn't have an IPv6 internet connection due
to lack of IPv6 capability of the internet service provider (ISP) in the Philippines.
Philippine Research, Education, and Government Information Network or PREGINET is
the primary internet service provider (ISP) of CLSU, allocated /127 IPv6 prefix and/30 for IPv4 point to
point link for the WAN connection, see Figure 1. Also, PREGINET provides a routed IPv6 /56 prefix for
the university LAN. The university offers a /64 prefix and makes its prefix allocations for every subnet in
the university. Using /56 prefix there are 256/64 subnets allotted to the university to play with.
The implemented IPv6 addressing plan for the university is Dual-Stack migration in which IPv4 and IPv6
network co-existed.
3.2. Design and implementation of network topology
3.2.1. Multi-layer dual-stack model
Multi-layer dual-stack model is the primary model in our campus design. This model combines
the multi-layer architecture to a dual-stack IPv6 transition model. The multi-layer model is a useful
high-level model for designing reliable network infrastructure and it breaks the complex problem of network
design into smaller and more manageable areas [18, 19]. Core layer: Referred to as the network backbone
and it provides connectivity to the university distribution and access layer for the local area network
connectivity. It also provides fast transport between distribution switches within the university local area
network. Distribution layer: serves as the communication point between the access layer and the core. Access
layer: Provides end-users access to the network. Figure 1 shows the dual-stack campus model.
In addition, most of the current IPv4 migration for internal networks use a private IPv4 address
space for local area network (LAN) devices and network access translation (NAT) at the edge router
to translate a private address to a globally routable public IPv4 address. This is a common transition for
most local area network implementation and is partly responsible for having IPv4 public addresses alive until
this year. However, there are a lot of complications and problems with address translation (NAT), but IPv6
uses a different technique and eliminates these problems and complications. One of the new methods IPv6
uses is DHCPv6 with the prefix delegation option (sometimes referred to as DHCPv6-PD or DHCPv6
prefix delegation), which provides a mechanism for automated delegation of a globally routable IPv6
prefix from a provider's router to a customer's premises router using DHCPv6. DHCPv6-PD was described
in RFC 3633 [20].
4. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 3, June 2020 : 1167 – 1175
1170
Figure 1. Multi-layer IPv6 campus DUAL-STACK model
Our model adopts these concepts and as shown in Figures 1 and 2, there are two routers involved in
this design: Core Router, this is the router that acts as the DHCPv6 client, requesting the prefix(es) to be
assigned. Edge router, this is the router that acts as the DHCPv6 server, responding to the requesting router’s
IPv6 prefix request. The DHCPv6 message exchange between the core router and edge router. Although this
is similar to a state full DHCPv6 message exchange, you can see the differences in the SOLICIT and REPLY
messages, see Figure 2.
Figure 2. DHCPv6 with prefix delegation migration
5. Bulletin of Electr Eng & Inf ISSN: 2302-9285
IPv6 campus transition: A Central Luzon State University case study (Marlon A. Naagas)
1171
Figure 3. IPv6 campus tunnel model
3.2.2. 6 to 4 tunnel broker
Hurricane electric (HE.net or HE) Tunnel Broker is the main tunneling migration technique we
used. This technique enables to reach the IPv6 internet by tunneling over existing IPv4 connections from
IPv6 enabled host and will provide you a routed IPv6 space with a prefix of /48 or /64 free in charge [21].
The design goal of 6 to 4 tunnel broker is to give an idea to our fellow state universities and colleges (SUC)
that it is possible to implement or deploy an IPv6 network even without native IPv6 internet connectivity
in their location especially in the Philippines where major ISPs doesn't offer IPv6 in their major services.
Figure 3 shows the network topology for 6 to 4 tunneling using a router enabled tunnel broker.
4. EVALUATION AND ANALYSIS OF RESULTS
Several testing were done to evaluate network performance. IPERF was the primary network
throughput testing tool used in this study. To perform the TCP network stress testing, different sets of testing
parameters were used, and this includes the combination of both windows size [22], parallel streams with
a payload of 512MB sent to the server. This test generates 10 streams instead of the default of 1 and it also
sends TCP payload of 512MB for 180 seconds. This duly noted that while increasing the number of streams
may improve your overall throughput, there is a point of diminishing returns [23]. However, the same
parameters were set in UDP performance testing except for windows size, in addition, the rate of speed with
which the data is transferred was set to 100Mbps. TCP and UDP functions differently, TCP guarantees
delivery of data and also guarantees that packets will be delivered in the same order in which they were sent
whereas UDP doesn’t guarantee the delivery of the data but with has the advantage of being faster than TCP.
Table 1 and Figure 4 presents a summary of the TCP throughput measurement result. The result
shows that the dual-stack on both LAN and WAN migration is much better in all areas against 6 to 4 tunnel
broker. In the dual-stack performance testing (LAN), IPv4 has a slight advantage against IPv6 in terms of
time, transfer and bandwidth utilization [24]. 5120 Mbytes of the payload were sent in the maximum
bandwidth of 346 Mbits/Seconds within 124 seconds. However, 5120 Mbytes of the payload were also
transmitted in the maximum bandwidth of 339 Mbits/Seconds within 126 seconds of transmission time for
IPv6. The IPv6 is 2 seconds slower than the IPv4 protocol in the Local Area Network environment.
However, in the WAN (online) environment IPv4/IPv6 dual-stack and 6 to 4 tunnel were also evaluated. IPv4
also has a slight advantage in all areas versus IPv6 and 6 to 4 tunnel broker. As a result, both payloads were
delivered within 180-181.9 seconds but the server only received 346 (IPv4), 343 (IPv6) and 232 MBytes in
the maximum bandwidth of 16.1, 15.9, and 10.7 Mbits/Seconds respectively, see Figure 4. The results also
have shown that 6 to 4 tunnel broker was outperformed by dual-stack transition mechanism.
6. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 3, June 2020 : 1167 – 1175
1172
Table 1. Summary of TCP throughput measurement
Metric
Dual-stack (DS)
6 to 4
Online
Unit
LAN WAN (online)
IPv4 IPv6 IPv4 IPv6
Time 124 126 180 180 181.9 Secs
Transfer 5120 5120 346 343 232 Mbytes
Bandwidth 346 339 16.1 15.9 10.7 Mbits/S
Figure 4. TCP throughput
Table 2 and Figure 5 presents the summary of throughput measurement results for UDP. The quality
of a link in UDP was tested in jitter (latency variation or RTT) and datagram loss. As mentioned, UDP
packets are sent without any checks but with the advantage of being faster than TCP however,
one disadvantage is that there is no guarantee that the datagrams or packets sent would reach their
destination. Table 2 shows that dual-stack is superior in terms of bandwidth utilization against 6 to 4
tunneling during the test. IPv4/IPv6 dual-stack achieved 362 and 340 Mbits/Seconds throughput under local
area network setup while 16.7 and 12.88 Mbits/Seconds throughput achieved under WAN or online
dual-stack setup. This proved that the 6 to 4 tunneling has the poorest performance in terms of throughput
and that it only achieved 11.42 Mbits/Seconds.
Table 2. Summary of UDP throughput, jitter, and loss measurement
Metric
Dual-stack (DS)
6 to 4
Online
Unit
LAN WAN (online)
IPv4 IPv6 IPv4 IPv6
Time 121.8 129.6 44.1 44.1 44.0 Sec
Transfer 5248 5247 87.5 68.45 59.98 Mbytes
Bandwidth 362 340 16.7 12.88 11.42 Mbits/S
Jitter 0.227 0.217 8.03 9.48 9.69 Ms
Total Loss 0.31 1.309 83 87.2 88.4 %
Figure 5. UDP throughput
7. Bulletin of Electr Eng & Inf ISSN: 2302-9285
IPv6 campus transition: A Central Luzon State University case study (Marlon A. Naagas)
1173
Table 2 also shows that the dual-stack LAN transition mechanism has a huge advantage in all areas
of test parameters. The test also shows that dual-stack LAN has a low network latency and datagram loss
(see Table 2, Figures 6 and 7) with the average latency of 0.227ms, 0.217ms and .31%, 1.3% datagram loss
for both IPv4 and IPv6 respectively. However, the test also shows (see Table 2 and Figures 8 and 9) that
there are too much network latency (jitter) and datagram loss using WAN transmission in both IPv4/IPv6
dual-stack wan and 6 to 4 tunnel with the latency average of 8.03ms, 9.48ms and 9.69ms and average
datagram loss of 83%, 87.2%, and 88.4%. The test also shows that IPv6 under dual-stack WAN has a slight
advantage versus 6 to 4 tunnel broker.
Figure 6. LAN-UDP jitter Figure 7. WAN-UDP jitter
Figure 8. LAN-UDP datagram loss Figure 9. WAN-UDP datagram loss
Furthermore, IPv6 WAN and IPv6 6 to 4 tunnel broker (online) were only measured because
the purpose of 6 to 4 tunneling is to enable the network to reach the IPv6 internet by tunneling over existing
IPv4 connections from IPv6 enabled host or router to one of the tunnel broker IPv6 routers [25-26]. In short,
the 6 to 4 tunnel broker only provides an IPv6 internet connection to the IPv4 internet users that want to
experience IPv6 internet in their network. However, the tunnel is more suitable if IPv6 internet is not
available in the ISP services in your location.
Moreover, to complete the IPv6 migration process, Traffic Flow was also used. Traffic flow
provides real-time visibility into network bandwidth performance [27]. As shown in Figure 10, 41.1%
of IPv6 traffic was recorded. This is a good sign that the new IPv6 network migration has worked properly
and 41.1% of the university clients are IPv6 capable and IPv6 ready. This also concluded that CLSU is ready
to become a campus of the future.
8. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 3, June 2020 : 1167 – 1175
1174
Figure 10. CAMPUS IPv6 utilization
5. CONCLUSION
Due to the deterioration of IPv4 addresses, IPv6 has become a necessity to accommodate
the growing number of users especially in the field of academic institutions. The migration from IPv4 to IPv6
protocol in the university requires a long period of time to be implemented. The process requires IPv4
and IPv6 running in one network and IPv6 transition mechanism is needed to enable both protocols to
communicate. Proper planning and a suitable choice of transition mechanism can avoid any interferences to
the current campus network during the deployment stage.
In general, the testbed results found that the Dual-Stack transition mechanism is more suitable
than a 6 to 4 tunnel broker. The results also showed that the 6 to 4 Tunnel Broker was outperformed by
the dual-stack transition mechanism in all areas and presents better performance, however, the 6 to 4 tunnel
broker is best suited in locations that don't have access to native IPv6 internet connectivity. In addition,
the results showed that IPv4 presents a slight advantage in performance than IPv6. The difference is due to
the IPv6 header length, which is higher than that of an IPv4 (IPv4 header is 32 bit long while the source
and destination addresses of IPv6 header are 128 bits long). Furthermore, the results also showed that after
the deployment, the traffic flows captured 41.1% of IPv6 traffic along the network. This is a good sign for us
because this indicates that almost half of CLSU user devices are running on IPv6 network and were able to
access IPv6 websites. With the provision of IPv6 in the campus network, this allows future development
in terms of research, teaching, and collaboration with other universities, and in general, enhances the strength
of the school which is of utmost importance. However, IPv6 is still in its early stage; it has lots of bugs
and security issues that is still needed to be fixed. Our future research will focus on the IPv6 security issues
specifically in the campus network migration.
ACKNOWLEDGEMENTS
We would like to acknowledge the support of CLSU, UP EEEI-PRIME and ASTI-DOST SCIMIX
Project for allowing us to use their infrastructures and imparting their knowledge that has helped us finished
this research. Also, this research has been funded by the Commission of Higher Education (CHED)-K 12
scholarship program, Republic of the Philippines.
REFERENCES
[1] G. Huston, "Addressing 2018 | APNIC Blog," APNIC Blog, 2019. [Online], Available at:
https://blog.apnic.net/2019/01/30/addressing-2018/.
[2] The Government of Hong Kong Special Administrative Region, "IPv6 SECURITY," 2011. [Online], Available at:
https://www.infosec.gov.hk/english/technical/files/ipv6s.pdf.
[3] A. Mulingbayan, "International perspective on Philippine internet development," APNIC: Presentation, 2014.
[4] "Use of IPv6 for Philippines (PH)," APNIC LABS, 2019. [Online], Available at:
https://stats.labs.apnic.net/ipv6/PH.
[5] "Google `IPv6," Google, 2019, [Online], Available at: https://www.google.com/intl/en/ipv6/statistics.html.
[6] G. Singh and P. Rakesh, "Use of internet for research and educational activities by research scholars: A study of
D.S.B. campus of Kumaun University-Nainital," Int. J. of Eng. and Manag. Sci., vol. 4, no. 2, pp. 193-199, 2013.
[7] K. Babaran, "UP Diliman: A shift from IPv4 to IPv6," PREGINET Pilipinas, 2011, [Online], Available:
http://pregi.net/media/news/up-diliman-a-shift-from-ipv4-to-ipv6/.
[8] T. Chown, "IPv6 campus transition scenario description and analysis," IETF Tools, 2006.
9. Bulletin of Electr Eng & Inf ISSN: 2302-9285
IPv6 campus transition: A Central Luzon State University case study (Marlon A. Naagas)
1175
[9] P. Wu, Y. Cui, J. Wu, J. Liu, and C. Metz, "The transition from IPv4 to IPv6: A State-of-the-art survey," IEEE
Communications Surveys & Tutorials, vol. 15, no. 3, pp. 1407-1424, 2013.
[10] Z. Wang and W. Xu, "Exploration of IPv6 network construction on campus," 7th International Conference on
Wireless Communications, Networking and Mobile Computing, pp. 1-4, 2011.
[11] J. Bound, "IPv6 enterprise network scenarios-RCF 4057," Network Working Group, pp. 1-17, 2005
[12] F. Siddika, Md. A. Hossen, and S. Saha, "Transition from IPv4 to IPv6 in Bangladesh: The competent and
enhanced way to follow," International Conference on Networking, Systems and Security, pp. 174-179, 2017.
[13] F. Baker, X. Li, C. Bao, and K. Yin, "Framework for IPv4/IPv6 translation-RFC 6144," Internet Engineering Task
Force (IETF), pp. 1-31, 2011.
[14] G. Van de Velde et al, "Local network protection for IPv6-RFC 4864," Networking Working Group, pp. 1-36, 2007
[15] J. Arkko and F. Baker, "Guidelines for using IPv6 transition mechanisms during IPv6 deployment-RFC 6180,"
Internet Engineering Task Force (IETF), pp. 1-20, 2011.
[16] V. J. D. Barayuga and W. E. S. Yu, "Study of packet level UDP performance of NAT44, NAT64 and IPv6 using
Iperf in the context of IPv6 migration," Int.Conference on IT Convergence and Security (ICITCS), pp.1-6, 2014.
[17] Q. Li, T. Qin, X. Guan, and Q. Zheng, "Empirical analysis and comparison of IPv4-IPv6 traffic: A case study on
the campus network," 18th IEEE International Conference on Networks (ICON), pp. 395-399, 2012.
[18] Cisco Networking Academy, "Cisco networking academy connecting networks companion guide: Hierarchical
network design-Hierarchical network design overview (1.1)," Cisco press, 2014.
[19] M. A. Naagas, E. L. Mique Jr., T. D. Palaoag, and J. S. Dela Cruz, "Defense-through-deception network security
model: Securing university campus network from DOS/DDOS attack," Bulletin of Electrical Engineering and
Informatics, vol. 7, no. 4, pp. 593-600, 2018.
[20] O. Troan and R. Droms, "IPv6 prefix options for dynamic host configuration protocol (DHCP) version 6-RFC
3633," Network Working Group, pp. 1-19, 2002
[21] A. Durand, P. Fasano, I. Guardini, and D. Lento, "IPv6 tunnel broker-RFC 3053," Netw. Work. Group, pp. 1-13, 2001
[22] V. Jacobson, R. Braden, and D. Borman, "TCP extensions for high performance-RFC 1323," Netw. Work. Group,
pp. 1-37, 1992
[23] T. T. Zhang, J. Chen, H. Y. Wei, and J. Y. Jiang, "A research on IPv6/IPv4-based network performance test,"
International Workshop on Information and Electronics Engineering (IWIEE), vol. 29, pp. 1573-1577, 2012.
[24] K. el Khadiri, O. Labouidya, N. Elkamoun, and R. Hilal, "Performance evaluation of IPv4/IPv6 transition
mechanisms for real-time applications using OPNET modeler," Int. J. of Adv. Comp. Sci. and Appl., vol. 9,
no. 4, pp. 387-392, 2018.
[25] S. Frankel, R. Graveman, J. Pearce, and M. Rooks, "Guidelines for the secure deployment of IPv6," NIST Special
Publication-800-119, 2010
[26] A. Risdianto and R. Rumani, "IPv6 Tunnel Broker implementation and analysis for IPv6 and IPv4," 6th
International Conference on Telecommunication Systems, Services, and Applications (TSSA), pp. 139-144, 2011.
[27] A. Zakari, M. Musa, G. Bekaroo, S. A. Bala, I. A. T. Hashem, and S. Hakak, "IPv4 and IPv6 protocols: A
Comparative performance study," IEEE 10th Control and System Graduate Research Colloquium (ICSGRC),
pp. 1-4, 2019.
BIOGRAPHIES OF AUTHORS
Marlon A. Naagas is an Assistant Professor, former Department Chairman of Information
Technology Department of Central Luzon State University. He is also a former Network
Engineer in CLSU, former Network Consultant of DOST PCIEERD – CLSU Bayanihanets
Project. He is a CISCO Cyber Security Scholarship Awardee, CISCO Certified Network
Associate in Cyber Security Operations (CCNA - CyberOps).
Dr. Nemesio A. Macabale Jr. received his Ph.D. in electrical and electronics engineering
from the University of the Philippines, Quezon City, Philippines in 2013. He is currently
a professor at the Department of Information Technology and the Director of the Information
Systems Institute, Central Luzon State University, Science City of Munoz, Philippines.
Dr. Thelma D. Palaoag received her Doctorate Degree in Information Technology (DIT)
from the University of the Cordilleras, Baguio City, Philippines. She is a Professor and
Research Coordinator of the College of Information Technology and Computer Science,
University of the Cordilleras.