Providing Reliable IPv6 Access Service Based on Overlay Network

Size: px
Start display at page:

Download "Providing Reliable IPv6 Access Service Based on Overlay Network"

Transcription

1 Providing Reliable IPv6 Access Service Based on Overlay Network Xiaoxiang Leng, Jun Bi, and Miao Zhang Network Research Center, Tsinghua University Beijing , China Abstract. During the transition from IPv4 to IPv6, it is necessary to provide IPv6 access service for IPv6 islands inside the native IPv4 network to access the native IPv6 network. The existing IPv4/IPv6 transition methods make IPv6- relay gateways maintained by IPv6 service providers become potential communication bottlenecks. In this paper, a new method PS6 is presented to reduce the reliance on these relay gateways by shifting the burden to edge gateways on each IPv6 island. In this method, direct tunnels are set up between IPv6 islands, and a overlay network is maintained between edge gateways of IPv6 islands to propagate information of tunnel end points. After describing the algorithm and overlay network design, we analyze the scalability of the algorithm. The simulation results and theoretical analysis show that the proposed method is reliable and scalable. Keywords: IPv6 Access Service, Overlay Network, IPv4/IPv6 Transition. 1 Introduction Mainly due to the fast expansion of the Internet and the lack of unallocated global IPv4 addresses, the transition from IPv4 to IPv6 [1] is now a reality and a growing trend while the Internet develops. Because of the sheer scale of the existing IPv4 network, the transition will need considerable time to complete. Some IPv4 subnets may, while having had their network infrastructure upgraded to support IPv6, still lack direct links to the native IPv6 network. That is, they will be isolated IPv6 islands inside the global IPv4 network. It is common for these IPv6 islands to use IPv6-in- IPv4 tunnels [2] via relay gateways maintained by IPv6 service providers in order to join the native IPv6 network. However, in these scenarios, all traffic from an IPv6 island to another IPv6 island will be forwarded via the IPv6-relay gateways from the source island to IPv6 network, and then be forwarded back from the IPv6 network to the destination island. While IPv6 is still emerging, a lot of IPv6 traffic may be transmitted between IPv6 islands. Therefore, these relay gateways maintained by IPv6 service providers can potentially become the communication bottlenecks. A peer-to-peer (P2P) [3] based algorithm PS6 is proposed in this paper, in which direct tunnels are built between IPv6 islands to reduce the burden of IPv6-relay gateways maintained by IPv6 service providers. A P2P overlay network is set up among the gateways of IPv6 islands to propagate TEP (tunnel end point) information (<IPv6 prefixes, IPv4 address of edge gateway>). When an IPv6 island dual-stack R. Meersman, Z. Tari, P. Herrero et al. (Eds.): OTM Workshops 2006, LNCS 4278, pp , Springer-Verlag Berlin Heidelberg 2006

2 Providing Reliable IPv6 Access Service Based on Overlay Network 1501 gateway receives a data packet sent to the IPv6 network, it firstly checks whether there is a direct tunnel to the destination address. For packets being transmitted, the shortcut tunnels between the source and destination islands are assigned higher route precedence than tunnels to relay gateways of service providers. In P6P [4], P2P technology is also utilized to build the IPv6 backbone over the existing IPv4 network. It directly uses a DHT-based [5] P2P network to forward the IPv6 data packets. There are some drawbacks for this scheme. Firstly, DHT is usually used for exact matching, and is not suitable for the longest matching in packet forwarding. Secondly, there is problem in the performance of forwarding lookup on the distributed storage P2P network. In contrast to P6P, the PS6 algorithm only uses the P2P network for transferring control messages between edge gateways of IPv6 islands. Data packets are forwarded to the destination gateways by the source gateways of IPv6 islands directly after looking up their tunnel tables, allowing for better forwarding performance. The rest of the paper is organized as follows. Section 2 shows the problem statement; Section 3 presents the PS6 algorithm; in Section 4, the design of the overlay network used in PS6 is introduced; In Section 5, the scalability of the proposed algorithm is discussed by theoretical analysis, and Section 6 summarizes this paper and proposes future work. 2 Problem Statement In the course of the deployment of IPv6, native IPv6 networks - both IPv6-only and dual stacks - will connect with each other to eventually become an IPv6 continent. The upgrade of IPv4 networks to support IPv6, due to the huge existing investment in IPv4, will necessarily be a gradual process, and native IPv4 networks and native IPv6 networks will coexist for a long time. During this period of coexistence, there are two methods for dual stack hosts in an IPv4 continent to communicate with hosts in an IPv6 continent and to use IPv6 application. The first way is to directly set up an IPv6 tunnel - with the mechanisms ISATAP [6], Teredo [7], etc. - between a dual stack host and an IPv6-relay gateway provided by a service provider. The second way is to set up an IPv6 tunnel between an edge gateway of the local network and an IPv6-relay gateway. In this second method, the local network becomes an IPv6 island. When the internal information of local network needs to be protected, it is recommended that the second solution be used [8]. Existing methods for providing IPv6 access service for IPv6 islands include: 6to4 mechanism [9] in which 6to4 IPv6 addresses are used, and IPv6 configured tunnel [2] in which global IPv6 addresses are used. Without explicit tunnel setup, 6to4 technology is a simple solution for isolated IPv6 islands to communicate with each other and access the IPv6 continent with the help of 6to4 relays. The automatic tunnels between 6to4 networks can effectively mitigate the burden of 6to4 relays. This method does, however, pose significant management challenges for ISPs, and there are also security problems with 6to4 brought about by the automatic tunneling mechanism [10]. With IPv6 configured tunnels using global IPv6 addresses, the addresses of IPv6 islands are assigned by the providers of IPv6 access service. This manual configuration makes this kind of tunnel easy to control, and the security

3 1502 X. Leng, J. Bi, and M. Zhang problems are greatly diminished when compared with 6to4. Furthermore, no extra route need be imported into the IPv6 network. The IPv6 islands can be treated as natural extensions of the IPv6 continent. For the purpose of decreasing the configuration overhead, a Tunnel Broker (TB) [11] is often used to manage the configured tunnels automatically. IPv6-in-IPv4 Fig. 1. Scenario of IPv6 islands The mechanisms with global IPv6 addresses (such as IPv6 configured tunnel and Tunnel Broker) generally use IPv6-relay gateways to provide the IPv6 access service. As shown in Figure 1, all the traffic from IPv6 islands will be forwarded by the relay gateways, even if the traffic is between IPv6 islands. The relay gateways can potentially become communication bottlenecks. Since the existing optimization algorithms are mainly focusing on the service providers, the only way to increase overall performance is to increase the performance or the number of relay gateways, which could be a costly exercise. 3 The Algorithm In this paper, we present an optimizing algorithm PS6 for the scenario above to provide high performance IPv6 access service. Besides the service providers, we also consider the customers - the edge gateways of IPv6 islands. When an IPv6 island gateway receives a data packet with a destination address in another IPv6 island, it directly forwards this packet to the destination island gateway through the IPv4 network. Otherwise, it sends the packet to the relay gateway of the service provider.

4 Providing Reliable IPv6 Access Service Based on Overlay Network 1503 Fig. 2. Forwarding flow of IPv6 island gateway As shown in Figure 2, in PS6, a lookup operation is inserted into the flow for packet forwarding of IPv6 island edge gateways. The steps of the proposed algorithm are described as follows: (1) Form a Tunnel Table (as shown in Table 1) on each IPv6 island gateway by exchanging TEP information (<IPv6 prefixes, IPv4 address of edge gateway>) between the gateways. (2) When an island gateway receives an IPv6 data packet, Firstly, it looks up the Tunnel Table to find out whether there is a direct tunnel to the destination. If yes, it then sends this packet directly to the IPv4 address specified by the Tunnel Table; Otherwise, it then forwards this packet to the IPv6-relay gateway of service provider Table 1. Tunnel Table of IPv6 island gateway IPv6 prefix IPv4 address of gateway 2001:250:f001:f002:20a::/ :250:f001:f002:28ba::/ :250:f001:f002:fe30::/ The PS6 algorithm is based on that for IPv6 configured tunnels, inheriting the advantages for control, management and security. In addition, as with 6to4, the direct tunnels between IPv6 islands can effectively reduce the burden on the IPv6 relay gateways. In contrast to 6to4, the global IPv6 addresses of IPv6 islands make it impossible for the island gateways to get the TEP information from the destination IPv6 address of a data packet. How a gateway of IPv6 island gets the TEP information of all the other IPv6 islands is the key consideration in this algorithm. One solution is to set up a

5 1504 X. Leng, J. Bi, and M. Zhang central server to hold all the information, send it to each island gateway and to propagate the updates. However, this method will make the central server a weak point of the system. Another solution is to build a P2P overlay network between the edge gateways of IPv6 islands with the help of a Registration Server. The TEP information is propagated by the P2P network. In the PS6 algorithm, we adopt this second option. IPv6 Island B IPv6 Island A Router B Router C Router A IPv4 Continent IPv6 Island C Registration Server IPv6 Continent IPv6-relay Configured Tunnel P2P Neighborhood Register Automatic Tunnel Fig. 3. The PS6 algorithm The architecture of IPv6 overlay network is shown in Figure 3. Router A, Router B and Router C are edge gateways of three IPv6 islands. A P2P network is maintained by them to share TEP information. With the TEP information, shortcut tunnels are set up on each gateway for transferring data packets between IPv6 islands. After presenting the PS6 algorithm, we describe the design of the overlay network and analyze the scalability of the proposed algorithm in the following parts. 4 Overlay Network Design 4.1 IPv6 Overlay Network An IPv6 overlay network is set up to propagate TEP information among the IPv6 island gateways. Each IPv6 island edge gateway broadcasts its TEP information inside the overlay network and gets the other gateways TEP information from its peers. There are two classes of P2P overlay networks: Structured and Unstructured [12]. In the Structured P2P networks, a lot of overhead, either from network or computing,

6 Providing Reliable IPv6 Access Service Based on Overlay Network 1505 is introduced into the system in order to maintain the structure of the network. In contrast, in the Unstructured P2P network, there is no special global structure to be maintained. Instead, a partial view of the network is held for each node. The overheads for maintaining network topology can be much lower than those for the structured ones. In the scenario proposed in this paper, the gateways of IPv6 islands are usually lightweight devices such as NAT Boxes which are not capable of maintaining large amounts of topology information. Therefore, in PS6, we have chosen to use an Unstructured P2P network in which each node chooses its neighbors randomly. Since there is no special structure to this P2P network, it is necessary to find a way to keep the nodes inside this P2P network connected with each other. A Registration Server on which the IPv4 addresses of all nodes in the IPv6 overlay network are held is set up to help the gateways of IPv6 islands join the overlay network gradually. The Registration Server has to discover the changes of the overlay network, either from the removal or failure of nodes or from the changes of IPv4 addresses. Fortunately, these are already contained within the information spread inside the overlay network. We put the Registration Server into the P2P network as a normal node. Therefore, these changes are easily noticed by the update scheme of the IPv6 overlay network. Similar to some routing protocols, such as OSPF [13], the flooding scheme is used to broadcast the TEP information inside the overlay network. When a node receives an update packet from one of its neighbors, it refreshes the related items in its local database, and then forwards the packet to all the other neighbors. Although flooding can be a waste of network resources, it s a reliable scheme to spread TEP information to all nodes in the IPv6 overlay network. 4.2 IPv6 Service Subscription In PS6, a Registration Server is set up to help the IPv6 island gateways join the IPvt overlay network. When the Registration Server receives a subscription request from a newly arrived gateway, it randomly chooses 20 of all existing nodes and sends their IPv4 addresses to the new one. The new node then gets the TEP information of all the islands corresponding to the nodes specified by the received IPv4 addresses and forms a Tunnel Tables for data forwarding. The steps of a new subscription are shown in Figure 4 and described as follows: (1) Register. The new arrived node registers at the Registration Server, and gets a list of IPv4 addresses for 20 existing nodes. (2) Make overlay neighborhoods. The new node tries to make overlay neighborhoods with the nodes specified by the received IPv4 addresses. (3) Exchange TEP information. The new node gets the TEP information of all other islands from its neighbors. Meanwhile, it spreads its TEP information inside the P2P network. (4) Form a Tunnel Table. With the TEP information received, the new node sets up a Tunnel Table for data transmission.

7 1506 X. Leng, J. Bi, and M. Zhang Fig. 4. New subscription 4.3 Failure Detection It is common to hold the overlay neighborhoods of the IPv6 overlay network by sending keep-alive messages periodically. When a node detects that it hasn t received such keep-alive message from its neighbor for a certain time, it broadcasts the failure notice to the whole IPv6 overlay network through its live neighbors. Furthermore, in order to increase the stability of the overlay network, we set the minimal degrees d for each node to be 5. When a node finds the count of its live neighbors is less than d, it randomly chooses some nodes from the TEP information stored locally and tries to make new overlay neighborhoods until the count of its live neighbors reaches d. The simulation shows that when the node number is less than 10000, the IPv6 overlay network used in PS6 can keep connected as long as the minimal degree of each node d is equal to or more than 3. We can infer that when d is equal to or more than 3, the overlay network can always keep connected. Therefore, in the PS6 algorithm, d is set to 5. This should be enough to prevent disconnection of the IPv6 overlay network. 5 Scalability Study During the transition from IPv4 to IPv6, isolated IPv6 islands will exist widely in the current IPv4 network. The PS6 algorithm must scale enough to support many IPv6 islands (i.e., 10,000). On the data plane, the forwarding performance with such a huge number of tunnels on each gateway should be considered. There are already plenty of studies on the area of fast data forwarding. A trie-tree [14] structure is used to form the Tunnel Table and limit the overhead of prefix lookup. On the control plane, the scalability of the IPv6 overlay network should be discussed. A flooding-based Unstructured P2P network (i.e., Gnutella [15]) may not be scalable because of the heavy flooding overhead cased by transient peers [15]. Fortunately, the edge gateways of IPv6 islands are much more stable, so the P2P network used in PS6 can support many more nodes. Since there is no consumed

8 Providing Reliable IPv6 Access Service Based on Overlay Network 1507 computing for each gateway upon receiving an update packet, the flooding overhead of the proposed P2P network scheme is mostly from the cost of network bandwidth. Assume the duration time that each node (IPv6 island gateway) stays connected to the IPv6 overlay network independently has an exponential distribution with parameter λ. Within one second, a single node is destroyed with probability 1-e -λ. When the node number of the IPv6 overlay network is N, the number of nodes failed in one second is expected to be N (1-e -λ ). And the expected size S of each update packet flooding inside the IPv6 overlay network is S 0 N (1-e -λ ), where S 0 indicates the size of each failure notice. According to the founding process of the IPv6 overlay network with minimal degree d, the neighbor number of node i is expected to be: E( n ) i N d d +,0 < i d + 1 l 1 l= d+ 2 = N d +, + 1 < d d i N l=+ i 1 l 1 From (1), we can see that the first d+1 nodes have the maximum neighbor number on average. These nodes may have more trouble with flooding. We consider the worst case that one of the first d+1 nodes receives the update packet from all its neighbors at the same time. Meanwhile, this node should forward the packet to all its neighbors after receiving it for the first time. In this case, the cost of network bandwidth of this node is expected to be: N 1 λ C = 2S max( E( ni )) = 2 ds0 N(1 + )(1 e ) (2) 0< i N l 1 l= d+ 2 Suppose that the bandwidths of the nodes are independent, and each can most spend 10% of its total bandwidth B on flooding control packets, we have the restriction: C B 10% (3) When B =10Mb/s, S 0 = 256bits, d =5, λ =1/1800 (the duration time of each node is 0.5 hour on average), from (2) and (3), the max node number that the IPv6 overlay network can support in worst case is This result shows that the P2P network used in PS6 scales enough to meet the scalability requirements during IPv6 transition. (1) 6 Conclusion In this paper, we present a peer-to-peer based method PS6 to provide IPv6 access service for isolated IPv6 islands. This algorithm distributes the traffic between IPv6 islands directly though IPv4 network and mitigates the burden of IPv6-relay gateways of service provider. The scalability of the proposed algorithm i also analyzed. The simulation results show that the P2P network can keep connected with the Random Recovery Scheme; and the theoretical analysis indicates that the PS6 algorithm can meet the scalability requirements during IPv6 transition. In other words, the proposed algorithm is reliable and scalable.

9 1508 X. Leng, J. Bi, and M. Zhang The PS6 algorithm inherits the advantages of IPv6 configured tunnel in control, management and security, gets the high access performance and mitigates the burden of relay gateways like 6to4. The comparison to the existing tunneling mechanisms that can be used in the IPv6 island scenario is shown in Table 2. The PS6 algorithm has better qualities in access performance, reliability and scalability as well as lower investment cost for IPv6 ISPs to provide feasible IPv6 access service, especially along with the increasing number of isolated IPv6 islands. Table 2. Comparison between PS6 and other tunneling mechanisms used for IPv6 islands H = High, M = Moderate, L = Low Performance Investment Reliability Scalability Drawbacks 1. Special 6to4 prefix 2. Difficult control and 6to4 H L H H management 3. Terrible security problems L H L L 1. Manual configure 2. That as TB 1. Single point of failure Tunnel L H L L 2.Communication Broker bottleneck Configured tunnel P6P L M H M PS6 H L H H 1. Low performance on route lookup 2. Low performance on data transmission Up to now, the architecture and protocol details of PS6 has been designed already. A prototype system has also been developed. In future, we will do some further study on more security considerations of this algorithm. Since the edge gateways of IPv6 islands are sometimes lightweight devices and cannot support the heavy overhead of an end-to-end security scheme IPSec between each pair of TEPs [16], the SPM [17] technology can be deployed to provide a lightweight security guarantee for data transmission. Besides, the robustness of the registration scheme should also be increased. The failure of the Registration Server may make it impossible for a new node to join the P2P network. Some backup scheme, for example, using multiple records for the same domain name of Registration Server in DNS, should be introduced into this algorithm. References 1. S. Deering, R. Hinden: Internet Protocol, version 6 (IPv6) specifications, RFC 2460, December E. Nordmark, R. Gilligan: Basic Transition Mechanisms for IPv6 Hosts and Routers, RFC 4213, October 2005.

10 Providing Reliable IPv6 Access Service Based on Overlay Network A. Oram: Peer-To-Peer: Harnessing the Power of Disruptive Technologies, O Reilly Press, Lidong Zhou, Robbert van Renesse: P6P: A Peer-to-Peer Approach to Internet Infrastructure, IPTPS 04, Ion Stoica, Robert Morris et al: Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, SIGCOM'01, F. Templin, T. Gleeson, M. Talwar, D. Thaler: Intra-Site Automatic Tunnel Addressing Protocol (ISATAP), draft-ietf-ngtrans-isatap-22, May, C. Huitema: Tunneling IPv6 over UDP through NATs(Teredo), draft-huitema-v6opsteredo-05, April 5, E. Davies, S. Krishnan, P. Savola: IPv6 Transition/Co-existence Security Considerations, draft-ietf-v6ops-security-overview-03, October B. Carpenter, K. Moore: Connection of IPv6 Domains via IPv4 Clouds, RFC 3056, February P. Savola, C. Patel: Security Considerations for 6to4, RFC 3964, December A. Durand, P. Fasano, D. Lento: IPv6 Tunnel Broker, RFC 3053, January Eng Keong Lua, Jon Crowcroft, Marcelo Pias: A Survey and Comparison of Peer-to-peer Overlay Network Schemes, IEEE Communications Surveys & Tutorials, Second Quarter, J. Moy: OSPF Version 2, RFC 2328, April Miguel A.Ruiz-Sanchez et al.: Survey and taxonomy of IP address lookup algorithms, IEEE Network March/April J. Guterman: Gnutella to the Rescue? Not so Fast, Napster fiends. Link to article at September R. Graveman, M. Parthasarathy, P. Savola, H. Tschofenig: Using IPsec to Secure IPv6-in- IPv4 Tunnels, draft-ietf-v6ops-ipsec-tunnels-01, August A. Bermlerand, H. Levy: Spoofing Prevention Method, INFOCOM 05, 2005.

A Multihoming based IPv4/IPv6 Transition Approach

A Multihoming based IPv4/IPv6 Transition Approach A Multihoming based IPv4/IPv6 Transition Approach Lizhong Xie, Jun Bi, and Jianping Wu Network Research Center, Tsinghua University, China Education and Research Network (CERNET) Beijing 100084, China

More information

Transition Strategies from IPv4 to IPv6: The case of GRNET

Transition Strategies from IPv4 to IPv6: The case of GRNET Transition Strategies from IPv4 to IPv6: The case of GRNET C. Bouras 1,2, P. Ganos 1, A. Karaliotas 1,2 1 Research Academic Computer Technology Institute, Patras, Greece 2 Department of Computer Engineering

More information

Federal Agencies and the Transition to IPv6

Federal Agencies and the Transition to IPv6 Federal Agencies and the Transition to IPv6 Introduction Because of the federal mandate to transition from IPv4 to IPv6, IT departments must include IPv6 as a core element of their current and future IT

More information

CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6

CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6 CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6 1 MS. CHAITA JANI, 2 PROF.MEGHA MEHTA 1 M.E.[C.E] Student, Department Of Computer Engineering, Noble Group Of Institutions, Junagadh,Gujarat

More information

Performance Analysis of Video Conferencing over Various IPv4/IPv6 Transition Mechanisms

Performance Analysis of Video Conferencing over Various IPv4/IPv6 Transition Mechanisms IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.7, July 2018 83 Performance Analysis of Video Conferencing over Various IPv4/IPv6 Transition Mechanisms Khalid EL KHADIRI,

More information

Experience with SPM in IPv6

Experience with SPM in IPv6 Experience with SPM in IPv6 Mingjiang Ye, Jianping Wu, and Miao Zhang Department of Computer Science, Tsinghua University, Beijing, 100084, P.R. China yemingjiang@csnet1.cs.tsinghua.edu.cn {zm,jianping}@cernet.edu.cn

More information

Network Working Group. Category: Informational Bay Networks Inc. September 1997

Network Working Group. Category: Informational Bay Networks Inc. September 1997 Network Working Group Request for Comments: 2185 Category: Informational R. Callon Cascade Communications Co. D. Haskin Bay Networks Inc. September 1997 Routing Aspects Of IPv6 Transition Status of this

More information

Forming an IPv6-only Core for Today s Internet

Forming an IPv6-only Core for Today s Internet Forming an IPv6-only Core for Today s Internet Hong Zhang Department of Electronic Engineering Tsinghua University Beijing, 100084, P R China neilzh@ns.6test.edu.cn Maoke Chen Network Research Center Tsinghua

More information

IPv6 support. Chris Mitchell. Program Manager Microsoft Corporation Windows Networking & Communications IPv6

IPv6 support. Chris Mitchell. Program Manager Microsoft Corporation Windows Networking & Communications IPv6 IPv6 support Chris Mitchell Program Manager Microsoft Corporation Windows Networking & Communications IPv6 Introduction New scenarios and IPv6 Microsoft s IPv6 support Migration and roadmap 2 New Engaging

More information

IPv6 Transitioning. An overview of what s around. Marco Hogewoning Trainer, RIPE NCC

IPv6 Transitioning. An overview of what s around. Marco Hogewoning Trainer, RIPE NCC IPv6 Transitioning An overview of what s around Marco Hogewoning Trainer, RIPE NCC There Was a Plan The original idea was to have IPv6 deployed before we were out of IPv4 addresses By now the whole of

More information

Request for Comments: 3904 Category: Informational ISC S. Satapati Cisco Systems, Inc. R. van der Pol NLnet Labs September 2004

Request for Comments: 3904 Category: Informational ISC S. Satapati Cisco Systems, Inc. R. van der Pol NLnet Labs September 2004 Network Working Group Request for Comments: 3904 Category: Informational C. Huitema Microsoft R. Austein ISC S. Satapati Cisco Systems, Inc. R. van der Pol NLnet Labs September 2004 Evaluation of IPv6

More information

6to4 Reverse DNS Delegation

6to4 Reverse DNS Delegation NRO Document G. Huston APNIC August 18, 2004 6to4 Reverse DNS Delegation Abstract This memo describes a potential mechanism for entering a description of DNS servers which provide "reverse lookup" of 6to4

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

CHAPTER 2 LITERATURE SURVEY

CHAPTER 2 LITERATURE SURVEY 23 CHAPTER 2 LITERATURE SURVEY The current version of the Internet Protocol IPv4 was first developed in the 1970s (Tanenbaum 2002), and the main protocol standard RFC 791 that governs IPv4 functionality

More information

P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility

P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility Rubén Cuevas, Carmen Guerrero, Ángel Cuevas, María Calderón, Carlos J. Bernardos Departamento de Ingeniería Telemática, Universidad

More information

Chapter 15 IPv6 Transition Technologies

Chapter 15 IPv6 Transition Technologies Chapter 15 IPv6 Transition Technologies Published: April 18, 2006 Updated: November 06, 2006 Writer: Joe Davies 1 Abstract This chapter describes the mechanisms that aid in the transition of Internet Protocol

More information

The Migration from IPv4 to IPv6

The Migration from IPv4 to IPv6 56982_CH12I 12/12/97 4:01 PM Page 227 12 CHAPTER The Migration from IPv4 to IPv6 Migrating from IPv4 to IPv6 in an instant is impossible because of the huge size of the Internet and of the great number

More information

An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network

An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network Lizhong Xie, Jun Bi, and Jianpin Wu Network Research Center, Tsinghua University, Beijing, 100084, China

More information

IPv6 Transition Mechanisms

IPv6 Transition Mechanisms IPv6 Transition Mechanisms Petr Grygárek rek 1 IPv6 and IPv4 Coexistence Expected to co-exist together for many years Some IPv4 devices may exist forever Slow(?) transition of (part of?) networks to IPv6

More information

Migration to IPv6 from IPv4. Is it necessary?

Migration to IPv6 from IPv4. Is it necessary? Introduction Today Internet plays a big role in every aspect of our lives and IP acted as an important pillar of Internet. Since its inception the Internet has reached almost all corners of globe and it

More information

Executive Summary...1 Chapter 1: Introduction...1

Executive Summary...1 Chapter 1: Introduction...1 Table of Contents Executive Summary...1 Chapter 1: Introduction...1 SSA Organization... 1 IRM Strategic Plan Purpose... 3 IRM Strategic Plan Objectives... 4 Relationship to Other Strategic Planning Documents...

More information

IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol

IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol Ryuji Wakikawa Carl Williams Keisuke Uehara Jun Murai Keio University. Graduate School of Media and Governance KDDI

More information

IPv6 Feature Facts

IPv6 Feature Facts 12.1.2 IPv6 Feature Facts The current IP addressing standard, version 4, will eventually run out of unique addresses, so a new system is being developed. It is named IP version 6 or IPv6. You should know

More information

Table of Contents Chapter 1 Tunneling Configuration

Table of Contents Chapter 1 Tunneling Configuration Table of Contents Table of Contents... 1-1 1.1 Introduction to Tunneling... 1-1 1.1.1 IPv6 over IPv4 Tunnel... 1-2 1.1.2 IPv4 over IPv4 Tunnel... 1-7 1.2 Tunneling Configuration Task List... 1-8 1.3 Configuring

More information

Security Concerns With Tunneling draft-ietf-v6ops-tunnel-security-concerns-00

Security Concerns With Tunneling draft-ietf-v6ops-tunnel-security-concerns-00 Security Concerns With Tunneling draft-ietf-v6ops-tunnel-security-concerns-00 Dave Thaler Suresh Krishnan Jim Hoagland IETF 72 1 Status Formerly draft-ietf-v6ops-teredo-securityconcerns-02.txt Most points

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of

More information

IPv6 Transition Mechanisms

IPv6 Transition Mechanisms IPv6 Transition Mechanisms Petr Grygárek rek 1 IPv6 and IPv4 Coexistence Expected to co-exist together for many years Some IPv4 devices may exist forever Slow(?) transition of (part of?) networks to IPv6

More information

Performance Comparison of Internet Protocol v4 with Internet Protocol v6

Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Mrs. Sheetal Mali Department of Electronics and Telecommunication Parvatibai Genba Sopanrao Moze College of Engineering Wagholi,

More information

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6 5.1 Tunneling 5.1.1 Automatic Tunneling 5.1.2 Configured Tunneling 5.2 Dual Stack 5.3 Translation 5.4 Migration Strategies for Telcos and ISPs Introduction - Transition - the process or a period of changing

More information

B. Carpenter. January Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice

B. Carpenter. January Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice IETF Internet Draft January 1999 B. Carpenter K. Moore Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels Copyright Notice Placeholder for ISOC copyright if needed Abstract draft-ietf-ngtrans-6to4-00.txt

More information

IPv6 Transition Strategies

IPv6 Transition Strategies IPv6 Transition Strategies Philip Smith MENOG 14 Dubai 1 st April 2014 Last updated 5 th March 2014 1 Presentation Slides p Will be available on n http://thyme.apnic.net/ftp/seminars/

More information

IPv6 Transition Strategies

IPv6 Transition Strategies IPv6 Transition Strategies Philip Smith APNIC 36 Xi an 20 th -30 th August 2013 Last updated 25 July 2013 1 Presentation Slides p Will be available on n http://thyme.apnic.net/ftp/seminars/apnic36-

More information

Request for Comments: 5569 Category: Informational January 2010 ISSN:

Request for Comments: 5569 Category: Informational January 2010 ISSN: Independent Submission R. Despres Request for Comments: 5569 RD-IPtech Category: Informational January 2010 ISSN: 2070-1721 Abstract IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) IPv6 rapid deployment

More information

The STRIDE towards IPv6: A Threat Model for IPv6 Transition Technologies

The STRIDE towards IPv6: A Threat Model for IPv6 Transition Technologies iplab The STRIDE towards IPv6: A Threat Model for IPv6 Transition Technologies draft-georgescu-opsec-ipv6-trans-tech-threat-model-01 Marius Georgescu Nara Institute of Science and Technology Internet Engineering

More information

Deployment and Performance Evaluation of Teredo and ISATAP over Real Test-bed Setup

Deployment and Performance Evaluation of Teredo and ISATAP over Real Test-bed Setup Deployment and Performance Evaluation of Teredo and ISATAP over Real Test-bed Setup Mohammad Aazam 1,2 1 Mohi-ud-Din Islamic University, Islamabad, Pakistan aazam@corenet.org.pk Syed Atif Hussain Shah

More information

IPv6 in Campus Networks

IPv6 in Campus Networks IPv6 in Campus Networks Dave Twinam Manager, Technical Marketing Engineering Internet Systems Business Unit dtwinam@cisco.com Cisco Twinam IPv6 Summit 2003 Cisco Systems, Inc. All rights reserved. 1 IPv6

More information

CCNA Questions/Answers IPv6. Select the valid IPv6 address from given ones. (Choose two) A. FE63::0043::11:21 B :2:11.1 C.

CCNA Questions/Answers IPv6. Select the valid IPv6 address from given ones. (Choose two) A. FE63::0043::11:21 B :2:11.1 C. Select the valid IPv6 address from given ones. (Choose two) A. FE63::0043::11:21 B. 191.2.1.2:2:11.1 C. 2001::98 D. 2002:c0a8:101::42 E. :2001:: F. 2002.cb0a:3cdd:1::1 Answer: C, D. 2013 1 Which method

More information

Integrated Security 22

Integrated Security 22 OUR 15TH YEAR CISCO SYSTEMS USERS MAGAZINE FIRST QUARTER 2003 Integrated Security 22 Safeguarding the Network from Within 18 IPv6 ing Strategies 55 Managed Services on the Rise 68 From Networking Academy

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

Transition To IPv6 October 2011

Transition To IPv6 October 2011 Transition To IPv6 October 2011 Fred Bovy ccie #3013 fred@fredbovy.com 2011 Fred Bovy fred@fredbovy.com. Transition to IPv6 1 1st Generation: The IPv6 Pioneers Tunnels for Experimental testing or Enterprises

More information

IPv6 Transition Technologies (TechRef)

IPv6 Transition Technologies (TechRef) Tomado de: http://technet.microsoft.com/en-us/library/dd379548.aspx IPv6 Transition Technologies (TechRef) Updated: January 7, 2009 IPv6 Transition Technologies Protocol transitions are not easy, and the

More information

A Location Management-aware Mapping System for ID/Locator Separation to Support Mobility

A Location Management-aware Mapping System for ID/Locator Separation to Support Mobility A Location Management-aware Mapping System for ID/Locator Separation to Support Mobility Mukankunga Bisamaza Angel and Choong Seon Hong Departement of Computer Engineering Kyung Hee University 1 Seocheon,

More information

A Scenario-Based Review of IPv6 Transition Tools

A Scenario-Based Review of IPv6 Transition Tools A Scenario-Based Review of IPv6 Transition Tools Moving Toward an IPv6 Future Momentum for IPv6 transition is on the rise, and many transition tools and techniques are available to ISPs, enterprise networks,

More information

Implementing Cisco IP Routing

Implementing Cisco IP Routing Implementing Cisco IP Routing Cisco 300-101 Dumps Available Here at: /cisco-exam/300-101-dumps.html Enrolling now you will get access to 190 questions in a unique set of 300-101 dumps Question 1 Automatic

More information

Application Layer Multicast Extensions to RELOAD

Application Layer Multicast Extensions to RELOAD Application Layer Multicast Extensions to RELOAD Mario Kolberg University of Stirling Stirling, United Kingdom mko@cs.stir.ac.uk Abstract Native multicast deployment is relatively slow and linked with

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

A 6to4 Gateway with Co-located NAT

A 6to4 Gateway with Co-located NAT A Gateway with NAT Anthony K. Tsetse, Alexander L. Wijesinha, Ramesh K. Karne, and Alae Loukili Department of Computer & Information Sciences Towson University Towson, MD 21252, U.S.A. {atsetse, awijesinha,

More information

Network Working Group Request for Comments: 5158 Category: Informational March 2008

Network Working Group Request for Comments: 5158 Category: Informational March 2008 Network Working Group G. Huston Request for Comments: 5158 APNIC Category: Informational March 2008 Status of This Memo 6to4 Reverse DNS Delegation Specification This memo provides information for the

More information

Akamai's V6 Rollout Plan and Experience from a CDN Point of View. Christian Kaufmann Director Network Architecture Akamai Technologies, Inc.

Akamai's V6 Rollout Plan and Experience from a CDN Point of View. Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. Akamai's V6 Rollout Plan and Experience from a CDN Point of View Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. Agenda About Akamai General IPv6 transition technologies Challenges

More information

Network Working Group. Category: Informational March 2008

Network Working Group. Category: Informational March 2008 Network Working Group T. Chown Request for Comments: 5157 University of Southampton Category: Informational March 2008 Status of This Memo IPv6 Implications for Network Scanning This memo provides information

More information

HSRP (Hot Stand by Routing Protocol) Reliability Issues Over the Internet Service Provider s Network

HSRP (Hot Stand by Routing Protocol) Reliability Issues Over the Internet Service Provider s Network ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal www.computerscijournal.org ISSN: 0974-6471 December 2011, Vol. 4, No. (2): Pgs. 399-404

More information

An Adaptive Routing Scheme for Wireless Mobile Computing

An Adaptive Routing Scheme for Wireless Mobile Computing An Adaptive Routing Scheme for Wireless Mobile Computing Ruixi Yuan C&C Software Technology Center, NEC Systems Laboratory, Inc. 1901 Gateway Drive, Irving, TX 75038 yuan@syl.dl.nec.com Abstract This paper

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

Intransa, Inc. Basic Transition Mechanisms for IPv6 Hosts and Routers <draft-ietf-v6ops-mech-v2-06.txt> Status of this Memo

Intransa, Inc. Basic Transition Mechanisms for IPv6 Hosts and Routers <draft-ietf-v6ops-mech-v2-06.txt> Status of this Memo INTERNET-DRAFT September 1, 2004 Obsoletes: 2893 E. Nordmark Sun Microsystems, Inc. R. E. Gilligan Intransa, Inc. Basic Transition Mechanisms for IPv6 Hosts and Routers

More information

Internet Engineering Task Force (IETF) Request for Comments: Category: Best Current Practice May 2015 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: Category: Best Current Practice May 2015 ISSN: Internet Engineering Task Force (IETF) O. Troan Request for Comments: 7526 Cisco BCP: 196 B. Carpenter, Ed. Obsoletes: 3068, 6732 Univ. of Auckland Category: Best Current Practice May 2015 ISSN: 2070-1721

More information

Peer-To-Peer Techniques

Peer-To-Peer Techniques PG DynaSearch Markus Benter 31th October, 2013 Introduction Centralized P2P-Networks Unstructured P2P-Networks Structured P2P-Networks Misc 1 What is a Peer-to-Peer System? Definition Peer-to-peer systems

More information

IPv4 TO IPv6 Transition Using Windows OS

IPv4 TO IPv6 Transition Using Windows OS IPv4 TO IPv6 Transition Using Windows OS Shubhangi Kharche 1 and B D Biranale 2 Vol. 3, 115 Abstract Internet Protocol version-4 (IPv4) to Internet Protocol version-6 (IPv6) transition is necessary in

More information

Fault Resilience of Structured P2P Systems

Fault Resilience of Structured P2P Systems Fault Resilience of Structured P2P Systems Zhiyu Liu 1, Guihai Chen 1, Chunfeng Yuan 1, Sanglu Lu 1, and Chengzhong Xu 2 1 National Laboratory of Novel Software Technology, Nanjing University, China 2

More information

Effect of Links on DHT Routing Algorithms 1

Effect of Links on DHT Routing Algorithms 1 Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn

More information

Design Concept and Simulation of Migration from Present IPv4 Network to Future IPv6 Network Using Three Transition Mechanisms

Design Concept and Simulation of Migration from Present IPv4 Network to Future IPv6 Network Using Three Transition Mechanisms Design Concept and Simulation of Migration from Present IPv4 Network to Future IPv6 Network Using Three Transition Mechanisms Ms. Salama Sumara Prof. Arjav Bavarva Shree Ajay Shrivastava RK University

More information

My thoughts on the transition to IPv6

My thoughts on the transition to IPv6 How it is happening and how to join it @rfc1036 Italian Hacker Camp 2018-4 August 2018 Marco, an IPv6 early adopter IPv6 user since 2000. Enabled IPv6 for 130000 web sites in 2007. Manages

More information

IPv6 Transition: Why a new security mechanisms model is necessary

IPv6 Transition: Why a new security mechanisms model is necessary IPv6 Transition: Why a new security mechanisms model is necessary Abidah Hj Mat Taib Faculty of Information Technology and Quantitative Science Universiti Teknolgi Mara Perlis Malaysia abidah@perlis.uitm.edu.my

More information

IPv6 in 2G and 3G Networks. John Loughney. North American IPv6 Forum 2004

IPv6 in 2G and 3G Networks. John Loughney. North American IPv6 Forum 2004 IPv6 in 2G and 3G Networks John Loughney North American IPv6 Forum 2004 Introduction Relevant IPv6 Status in the IETF Relevant IPv6 Status in 3GPP Relevant IPv6 Status in 3GPP2 Conclusion What IPv6 Brings

More information

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers Network Working Group H. Soliman, Ed. Request for Comments: 5555 Elevate Technologies Category: Standards Track June 2009 Status of This Memo Mobile IPv6 Support for Dual Stack Hosts and Routers This document

More information

Deployment of IPv6 at Ss. Cyril and Methodius University in Skopje Goce Gjorgjijoski

Deployment of IPv6 at Ss. Cyril and Methodius University in Skopje Goce Gjorgjijoski Deployment of IPv6 at Ss. Cyril and Methodius University in Skopje Goce Gjorgjijoski University Computer Centre, Ss. Cyril and Methodius University in Skopje (UKIM) 2 Introduction February 2011 - IANA

More information

End-To-End Signaling and Routing for Optical IP Networks

End-To-End Signaling and Routing for Optical IP Networks End-To-End Signaling and Routing for Optical IP Networks Mark Joseph Francisco, Lambros Pezoulas, Changcheng Huang, Ioannis Lambadaris Carleton University Department of Systems and Computer Engineering

More information

Application Presence Fingerprinting for NAT-Aware Router

Application Presence Fingerprinting for NAT-Aware Router Application Presence Fingerprinting for NAT-Aware Router Jun Bi, Lei Zhao, and Miao Zhang Network Research Center, Tsinghua University Beijing, P.R. China, 100084 junbi@cernet.edu.cn Abstract. NAT-aware

More information

DOLPHIN: THE MEASUREMENT SYSTEM FOR THE NEXT GENERATION INTERNET

DOLPHIN: THE MEASUREMENT SYSTEM FOR THE NEXT GENERATION INTERNET DOLPHIN: THE MEASUREMENT SYSTEM FOR THE NEXT GENERATION INTERNET Xinpei Lang, Gang Zhou, Chen Gong, Wei Han National Lab of Software Development Environment Department of Computer Science Beihang University,

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Transitioning to IPv6

Transitioning to IPv6 Transitioning to IPv6 麟瑞科技區域銷售事業處副處長張晃崚 CCIE #13673 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0 7-1 IPv4 and IPv6 Currently, there are approximately 1.3 billion usable IPv4 addresses available.

More information

MPLS VPN Inter-AS Option AB

MPLS VPN Inter-AS Option AB First Published: December 17, 2007 Last Updated: September 21, 2011 The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol

More information

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast Contents Multicast overview 1 Introduction to multicast 1 Information transmission techniques 1 Multicast features 3 Common notations in multicast 4 Multicast benefits and applications 4 Multicast models

More information

Security Enhancement by Detecting Network Address Translation Based on Instant Messaging

Security Enhancement by Detecting Network Address Translation Based on Instant Messaging Security Enhancement by Detecting Network Address Translation Based on Instant Messaging Jun Bi, Miao Zhang, and Lei Zhao Network Research Center Tsinghua University Beijing, P.R.China, 100084 junbi@tsinghua.edu.cn

More information

NTS6: IPv6 based Network Topology Service System of CERNET2

NTS6: IPv6 based Network Topology Service System of CERNET2 NTS6: IPv6 based Network Topology Service System of CERNET2 Lin Cong, Bo Yang, Yang Chen, Guohan Lu, Beixing Deng, Xing Li, Ye Wang (Department of Electronic Engineering, Tsinghua University, Beijing 100084,

More information

Campus Networking Workshop CIS 399. Core Network Design

Campus Networking Workshop CIS 399. Core Network Design Campus Networking Workshop CIS 399 Core Network Design Routing Architectures Where do we route? At the point where we want to limit our layer-2 broadcast domain At your IP subnet boundary We can create

More information

Request for Comments: 3750 Category: Informational ISC S. Satapati Cisco Systems, Inc. R. van der Pol NLnet Labs April 2004

Request for Comments: 3750 Category: Informational ISC S. Satapati Cisco Systems, Inc. R. van der Pol NLnet Labs April 2004 Network Working Group Request for Comments: 3750 Category: Informational C. Huitema Microsoft R. Austein ISC S. Satapati Cisco Systems, Inc. R. van der Pol NLnet Labs April 2004 Status of this Memo Unmanaged

More information

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

Research Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network

Research Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network Research Journal of Applied Sciences, Engineering and Technology 7(2): 221-226, 2014 DOI:10.19026/rjaset.7.244 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted: March

More information

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast Contents Multicast overview 1 Introduction to multicast 1 Information transmission techniques 1 Multicast features 3 Common notations in multicast 4 Multicast advantages and applications 4 Multicast models

More information

A Service Management Architecture for NEMO in IPv4 and IPv6 Networks

A Service Management Architecture for NEMO in IPv4 and IPv6 Networks A Service Management Architecture for NEMO in IPv4 and IPv6 Networks JinHoKim,ChoongSeonHong, Dae Sun Kim Department of Computer Engineering, Kyung Hee University, Seocheon, Giheung, Yongin, Gyeonggi,

More information

Introduction to Peer-to-Peer Networks

Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks The Story of Peer-to-Peer The Nature of Peer-to-Peer: Generals & Paradigms Unstructured Peer-to-Peer Systems Sample Applications 1 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Han Zhi-nan Yan Wei Zhang Li Wang Yue Computer Network Laboratory Department of Computer Science & Technology, Peking University

More information

Migrating from Dynamic Multipoint VPN Phase 2 to Phase 3: Why and How to Migrate to the Next Phase

Migrating from Dynamic Multipoint VPN Phase 2 to Phase 3: Why and How to Migrate to the Next Phase Migration Guide Migrating from Dynamic Multipoint VPN Phase 2 to Phase 3: Why and How to Migrate to the Next Phase This guide shows how a Dynamic Multipoint VPN (DMVPN) deployment can be migrated to make

More information

IPv6 Addressing. There are three types of IPV6 Addresses. Unicast:Multicast:Anycast

IPv6 Addressing. There are three types of IPV6 Addresses. Unicast:Multicast:Anycast IPv6 Addressing There are three types of IPV6 Addresses. Unicast:Multicast:Anycast Unicast IPv6 addresses A unicast address identifies a single interface within the scope of the type of unicast address.

More information

BIBLIOGRAFÍA. 3. Bound, J., L. Toutain, O. Medina, F. Dupont, H. Afifi, A. Durand, Draft-ietfngtrans-dstm-07,

BIBLIOGRAFÍA. 3. Bound, J., L. Toutain, O. Medina, F. Dupont, H. Afifi, A. Durand, Draft-ietfngtrans-dstm-07, BIBLIOGRAFÍA 1. Internet Protocol Version 5 http://www.glossary-tech.com/ipv5.htm 2. What happened to IPv5? http://www.nokia.com/ipv6/faq.html 3. Bound, J., L. Toutain, O. Medina, F. Dupont, H. Afifi,

More information

Akamai's V6 Rollout Plan and Experience from a CDN Point of View. Christian Kaufmann Director Network Architecture Akamai Technologies, Inc.

Akamai's V6 Rollout Plan and Experience from a CDN Point of View. Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. Akamai's V6 Rollout Plan and Experience from a CDN Point of View Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. Agenda About Akamai General IPv6 transition technologies Challenges

More information

Shim6: Reference Implementation and Optimization

Shim6: Reference Implementation and Optimization Shim6: Reference Implementation and Optimization Jun Bi, Ping Hu, and Lizhong Xie Network Research Center, Tsinghua University, Beijing, 100084, China junbi@tsinghua.edu.cn Abstract. Shim6 is an important

More information

System Performance Analysis of IPv6 Transition Mechanisms over MPLS

System Performance Analysis of IPv6 Transition Mechanisms over MPLS System Performance Analysis of IPv6 Transition Mechanisms over MPLS Parisa Grayeli, Dr. Shahram Sarkani, Dr. Thomas Mazzuchi 1776 G Street NW Washington DC 20052, USA The George Washington University Phone:

More information

Intended status: Standards Track Expires: April 26, 2012 Y. Ma Beijing University of Posts and Telecommunications October 24, 2011

Intended status: Standards Track Expires: April 26, 2012 Y. Ma Beijing University of Posts and Telecommunications October 24, 2011 softwire Internet-Draft Intended status: Standards Track Expires: April 26, 2012 Z. Li China Mobile Q. Zhao X. Huang Y. Ma Beijing University of Posts and Telecommunications October 24, 2011 DS-Lite Intra-Domain

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs

Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs Hong-Jong Jeong, Dongkyun Kim, Jeomki Song, Byung-yeub Kim, and Jeong-Su Park Department of Computer Engineering, Kyungpook

More information

Lecture notes of G. Q. Maguire Jr. IK2555, Spring Module 10

Lecture notes of G. Q. Maguire Jr. IK2555, Spring Module 10 Lecture notes of G. Q. Maguire Jr. IK2555, Spring 2014 Module 10 1 Module 10 2 S. Deering and R. Hinden, Internet Protocol, Version 6 (IPv6) Specification, Internet Request for Comments, vol. RFC 1883

More information

MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE

MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE 1 SHEETAL BORSE, 2 MRUDUL DIXIT 1,2 Department of Electronics and Telecommunication, Cummins College of Engineering

More information

Request for Comments: 5156 Category: Informational April 2008

Request for Comments: 5156 Category: Informational April 2008 Network Working Group M. Blanchet Request for Comments: 5156 Viagenie Category: Informational April 2008 Status of This Memo Special-Use IPv6 Addresses This memo provides information for the Internet community.

More information

Results of a Security Assessment of the Internet Protocol version 6 (IPv6)

Results of a Security Assessment of the Internet Protocol version 6 (IPv6) Results of a Security Assessment of the Internet Protocol version 6 (IPv6) Fernando Gont DEEPSEC 2011 Conference Vienna, Austria, November 15-18, 2011 About... I have worked in security assessment of communication

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

ENTERPRISE MPLS. Kireeti Kompella

ENTERPRISE MPLS. Kireeti Kompella ENTERPRISE MPLS Kireeti Kompella AGENDA The New VLAN Protocol Suite Signaling Labels Hierarchy Signaling Advanced Topics Layer 2 or Layer 3? Resilience and End-to-end Service Restoration Multicast ECMP

More information

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Computer Communications and Networking (SC 546) Professor D. Starobinksi Brian Mitchell U09-62-9095 James Nunan U38-03-0277

More information

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or CS475 Networks Lecture 14 Chapter 4 Advanced Internetworking Assignments Reading for Lecture 15: Sections 5.1-5.2 Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted,

More information