Deployment and Performance Evaluation of Teredo and ISATAP over Real Test-bed Setup

Size: px
Start display at page:

Download "Deployment and Performance Evaluation of Teredo and ISATAP over Real Test-bed Setup"

Transcription

1 Deployment and Performance Evaluation of Teredo and ISATAP over Real Test-bed Setup Mohammad Aazam 1,2 1 Mohi-ud-Din Islamic University, Islamabad, Pakistan aazam@corenet.org.pk Syed Atif Hussain Shah Shaheed Zulfikar Ali Bhutto Institute of Science and Technology (SZABIST), a.shahgee@gmail.com Imran Khan 2 Center of Research in Networks and Telecom (CoReNeT), Mohammad Ali Jinnah University, imran@corenet.org.pk Amir Qayyum Center of Research in Networks and Telecom (CoReNeT), Mohammad Ali Jinnah University, aqayyum@ieee.org ABSTRACT Coexistence of IPv4 and IPv6 bears problem of incompatibility, as IPv6 and IPv4 headers are different from each other. To counter this problem, three solutions are possible: a) making every device dual stack, b) translation, c) tunneling. Tunneling stands out as the best possible solution. Among the IPv6 tunneling techniques, this paper evaluates the performance of two recent IPv6 tunneling techniques: Teredo, and ISATAP. These protocols were implemented on real test bed setup, on Microsoft Windows (MS Windows XP and MS Windows Server 2003) and Linux operating systems. Five to six devices were used to setup the whole test bed. Each protocol was then implemented on the setup using specific configuration commands. UDP audio streaming, video streaming and ICMPping traffic was run. Four different runs of traffic were routed over the setup for each protocol. The average of the data was taken to generate graphs and final results. The performance of these tunneling techniques has been evaluated through certain parameters, namely: throughput, end to end delay (E2ED), round trip time (RTT), and jitter. Categories and Subject Descriptors C.2.2 [Computer-Communication Networks]: Network Protocols-IP General Terms experimentation, measurement, performance Keywords IPv6 tunneling, Teredo, ISATAP, encapsulation 1. INTRODUCTION Transitioning towards IPv6 is inevitable. Very soon, IPv6 will be running on every IP device. Transitioning towards IPv6 won t be an overnight project. It would be incremental and step Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. MEDES 10, October 26-29, 2010, Bangkok, Thailand. Copyright 2010 ACM /10/10...$ by step. IPv4 and IPv6 will coexist even after about a decade of IPv6 deployment [11]. Keeping in view the importance of IPv6, the transition from IPv4 to IPv6 has started [6]. To make this transition manageable and easy, a lot of research has been done. It is not practical to change the Internet, or any large network altogether into an IPv6 network at once. All the routers cannot be upgraded simultaneously [10]. Hence transition is only feasible in a gradual manner due to complexity of the Internet and huge number of devices accessing it. Migration towards IPv6 would be in such a manner that for certain time, both IPv4 and IPv6 capable devices will co-exist [2]. Also, there will be islands of both IPv4 and IPv6 networks. For example, two IPv6 devices want to communicate with each other but there is an IPv4 network between them, IPv6 packets has to be routed from that IPv4 network. As IPv4 and IPv6 headers are different from each other (fields, the address format and address size are different), so IPv6 packet has to be tunneled to route through the incompatible IPv4 network. For this purpose, three mechanisms are available in the literature [10]: (a). Dual Stack (b). Translation (c). Tunneling. In dual stack, routers and nodes can understand both IPv4 and IPv6 packets and translate between each other and make communication seamless. To achieve this, the router or node should be enhanced to a dual stack node, which may not be easily possible all the time. Translation refers to the direct conversion of protocols (e.g., between IPv4 and IPv6) and may include transformation of both the protocol headers and the protocol payload. Translation can occur at several layers in the protocol stack, including network, transport, and application layers. Protocol translation often results in feature loss, when there is no clear mapping between the features provided by translated protocols. For instance, translation of an IPv6 header into an IPv4 header will lead to the loss of IPv6 flow label field. Tunneling is a technique in which one protocol is encapsulated in another protocol [11], according to the network where the packet is to be routed [5]. As discussed, if an IPv6 source communicating with an IPv6 destination and an IPv4 network is between them, then IPv6 packets must be tunneled into the IPv4 header so that the IPv6 packet get routed through the IPv4 network and reaches its IPv6 destination. It won t be feasible to upgrade each and every device to make incompatible devices interoperate with each other. Similarly, data loss or feature loss won t also not appreciable at all. Thence tunneling comes up to be the most feasible way for transitioning towards IPv

2 1.1. IPv6 Tunneling Techniques Teredo Teredo provides a service that enables nodes located behind one or more IPv4 NATs to obtain IPv6 connectivity by tunneling packets over UDP. With Teredo, the current IPv4 network is treated as the link layer, and the existing IPv4 routing mechanism is utilized to forward IPv6-in-UDP-in-IPv4 encapsulated packets. Teredo host first gets an IPv6 prefix from the Teredo Server, then an IPv6 address is formed with special format (Prefix : Server IPv4 : Flags :Port : Client IPv4) [3]. The communication between Teredo hosts can be made directly with an IPv6-in-UDP-in-IPv4 tunnel. The connectivity to IPv6 native network will be achieved with the Teredo relay gateway. The automatic tunnels between Teredo hosts distribute the traffic between them and share the burden of Teredo relay gateway Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) ISATAP is designed for the intra-site scope. ISATAP connects isolated nodes within IPv4 sites via automatic IPv6-in-IPv4 tunnels. That is why it is called intra-site [4]. With ISATAP, the intra-site IPv4 network is viewed as a link layer for IPv6, and other nodes in the intra-site network are viewed as potential IPv6 hosts/routers. An automatic tunneling abstraction is supported, which is similar to the Non-Broadcast Multiple Access (NBMA) model. An ISATAP host gets a 64-bit prefix from the ISATAP Server. Then an ISATAP address is formed with its own interface identifier (::0:5EFE:IPv4Address). After that, the ISATAP hosts can connect with each other via the IPv6-in-IPv4 tunnel with ISATAP addresses. Furthermore, ISATAP can be used to provide connectivity to the outside IPv6 network together with other transition mechanisms. For example, if the site gateway is supported with 6to4 and holds the 6to4 prefix as an ISATAP Server and the IPv6 hosts among this site can use ISATAP to get intra/inter-site IPv6 connectivity. node, then an ISATAP setup was in such a way that Host 1 (H1), as shown in the figure 1, is a dual stack node, residing in an IPv4 network. This node has to communicate to another dual stack node, residing in an IPv6 network. Now, the traffic of and from both, H1 and H2, has to go through IPv4 network. Those IPv6 packets have to be tunneled through IPv4 network. By default, the IPv6 protocol for Windows XP Professional with SP2 and Windows Server 2003 with SP1, Standard Edition, configures a link-local ISATAP address on the Automatic Tunneling Pseudo-Interface for each IPv4 address assigned to a computer. To configure global ISATAP addresses, or to communicate beyond the logical subnet defined by the IPv4 intranet, an ISATAP router is needed [12]. ISATAP router performs two functions: a). advertises its presence and address prefixes, enabling global ISATAP addresses to be configured. b). optionally forwards IPv6 packets between ISATAP hosts on the IPv4 intranet and IPv6 hosts beyond it [14]. An ISATAP router is typically configured to perform both functions, but can perform either individually. Most often, an ISATAP router acts as the forwarder between ISATAP hosts on an IPv4 intranet and IPv6 hosts on an IPv6-enabled portion of an intranet. To demonstrate the use of an ISATAP router between IPv6 and IPv4 intranets, first the test lab was separated into a portion that has IPv4 and IPv6 connectivity and another that has IPv4 connectivity only [11]. Then, router1 is configured as an ISATAP router so that hosts on the IPv4-only portion of the intranet can communicate with hosts on the IPv6-enabled portion of the intranet. To do this, IPv6 forwarding and advertising was disabled on the Subnet 2 Connection interface of router1 and both interfaces of router2. This emulates an intranet in which a portion is IPv6-enabled (Subnet 1) and a portion is not (Subnet 2 and Subnet 3). Teredo setup was more or less in the same way except a couple of additions. One is the addition of NAT boxes, behind which both the clients reside and the other is Teredo Server with Linux running on it. In this setup, Fedora Core 10 was used. For the complete configuration of Teredo, the Miredo package [12] was used. 2. PERFORMANCE EVALUATION USING TEST BED SETUP There were no simulation patches available for these techniques. To evaluate the performance, the other option was to deploy these techniques practically on a test lab and then run the traffic using each technique Test-bed Setup Description IPv6 test-bed setup was needed to evaluate the performance of these protocols. Using minimum possible nodes required to setup the test bed, IPv6 was configured and tested. It required 5 nodes to setup the test-bed, which was first configured for IPv6 and later on each protocol was deployed on it. These five nodes are: two hosts, one DNS server, two routers. Cables and hubs/switches were used to connect them. The following figure depicts the setup more comprehensively. ISATAP works where one node (dual stack ISATAP node) is residing inside an IPv4 network and it has to communicate to an IPv6-only node, sitting inside an IPv6 network [4]. When ISATAP node wants to communicate to the other end IPv6-only Figure 1. Test bed setup 2.2. Performance Evaluation The performance was evaluated based on certain parameters. The parameters were selected keeping in view the attributes related to tunneling and network layer or routing, like: throughput, round trip time, jitter, and end to end delay, were used to evaluate the performance

3 Throughput It describes the overall throughput of the protocols. i.e. number of packets received per second. Formula to calculate throughput is: Throughput pps = No_of_pkts_rcvd / timestamp sec pps (1) Where pps is packets per second. UDP audio streaming traffic was run end to end to calculate the throughput. There were basically four runs of traffic, whose average was calculated and the final graph, shown below, was generated. Figure 2 shows that ISATAP has got relatively better throughput as compared to Teredo. The packet size remained 1500 bytes. Traffic was run for about five minutes over the test bed setup, which was sniffed using the most widely used packet sniffing tool, called Wireshark. The graph shows that ISATAP performs better in respect of throughput. Its throughput remained packets per second. As Teredo performs two-level encapsulation, in which it encapsulates every IPv6 packet inside UDP and then that UDP packet, containing IPv6 in its payload, is encapsulated in the IPv4 packet, so its performance is degraded. Its throughput remained packets per second. But Teredo is still acceptable because it was meant to traverse IPv6 through NAT boxes, so in such scenarios, where a dual stack end-user is sitting in a private IPv4 network, behind NAT, and wants to communicate to an IPv6 node, then Teredo will be the solution for tunneling. The ultimate, average throughput in Kbps comes out as: Throughput = ((No_of_pkts_rcvd / timestamp sec ) X 1500 X 8) / 1000 Kbps (2) As the network conditions were more or less stable, because it was a test bed setup, so there is apparently not a huge difference among the protocols. But when deployed over the Internet, this difference will surely increase. The average throughput was calculated to make things more comprehensive. As shown in the table 1, in relatively stable conditions, ISATAP has the edge of around 20 Kbps on Teredo. End to End Delay (E2ED) It describes delay in milliseconds the traffic incurs. The formula for end to end delay is: E2ED = timestamp msg_rcvd - timestamp msg_sent (3) Figure 3. Teredo-ISATAP end to end delay milliseconds Delay was also calculated on UDP audio streams. It was calculated by subtracting the timestamp of packet received at the receive end with the timestamp of packet sent by the sender. Again, in terms of delay, ISATAP has got the edge. Its performance is better than Teredo. Teredo traffic incurs more delay. This is because Teredo has more overhead due to dual encapsulation (IPv6 encapsulated in UDP-IPv4). This extra encapsulation, which is for a good reason of traversing NATs, adds extra overhead of encapsulation and decapsulation. On the other hand, ISATAP is most recent among its contenders and involve least number of intermediate devices to route traffic. Average delay is shown in the following table: Table 2. Average end to end delay in milliseconds Figure 2. Teredo-ISATAP throughput (in Kbps) Average throughput is shown in the following table: Table 1. Average throughput in Kbps Average Delay (ms) Table 2 shows that ISATAP incurs least amount of delay in comparison with Teredo. When these techniques are deployed over the Internet, there would be lot more devices each packet has to travel through. This difference would be lot more then. Average Throughput (Kbps) Jitter

4 Jitter, variation in delay, was calculated on the basis of the end to end delay. The formula is given below; Jitter = Absolute (delay current_pkt delay prev_pkt ) milliseconds (4) The first packet won t be having any previous packet, so its jitter is 0. received by the sender. To get this, TCP based ICMP-ping traffic was used. Formula is given below: RTT = timestamp pkt_rcvd - timestamp pkt_sent milliseconds (5) Figure 4. Teredo-ISATAP jitter Jitter is the only parameter in which ISATAP s performance is inferior from Teredo. This is because in ISATAP, tunnel refresh packets; which are meant to refresh the tunnels; are send more frequently. They are sent after every 13 data packets. When the tunnel is being refreshed and maintained, the data traffic is halted for that while. In Teredo, tunnel refresh packets are sent after every 21 data packets. This is the reason for Teredo being less jittery. When real time streaming traffic has to be tunneled through IPv4 network, then Teredo is the best option. Average jitter is shown in the following table: Figure 5. Teredo-ISATAP round trip time The difference between E2ED and RTT is that different traffics were used to calculate each. For E2ED, UDP audio/video streams were used, while for RTT, TCP based ICMP-ping traffic was used. Average RTT is shown in the following table: Table 4. Average round trip time in milliseconds Average RTT (ms) Table 3. Average jitter in milliseconds Average Jitter (ms) The difference revealed from the above mentioned table 3 shows that when these techniques would be deployed over the Internet, ISATAP tunneled traffic would be containing even more jitter, because when there would be lot more devise involved and the network conditions would also be unpredictable, then those refresh packets would take more time to travel through the network between the client and the ISATAP server. Thence, incurring more jitter and also, affecting the bandwidth as well. Round Trip Time (RTT) Round trip time is also regarded as one of the key parameter when talking about networks and network layer protocols. RTT is the time taken in total starting from the moment packet left the sending machine till the reply packet In terms of RTT, ISATAP is again the better choice, because of the very reason of lesser encapsulation overhead. 3. CONCLUSION For the performance evaluation of recent IPv6 tunneling techniques: ISATAP and Teredo; UDP audio streams, video streams, and ICMP-ping traffic were used. Traffic was run end to end and sniffed at every node for better analysis. Four separate runs of traffic were routed over the most common and recommended setup for each protocol. At the end, the average of those four runs of traffic was calculated to generate final results. After all this research activity, it is concluded that based on the most common parameters: throughput, end to end delay (E2ED), round trip time (RTT), and jitter, ISATAP has got the edge on Teredo in every parameter, except jitter. ISATAP server sends tunnel refresh packets most frequently, in comparison to Teredo, so for that span of time, when the tunnel is refreshed, the data traffic is halted. It makes ISATAP more jittery. Teredo remains the best choice for real time traffic

5 4. FUTURE WORK In future, a further deeper study is required in this regard to evaluate these protocols. The test-bed used in this research work was just to evaluate the techniques in stable network conditions, which give an idea that how much different both these protocols are, with respect to performance, from each other. In future, relatively complex scenarios would be created and also, conditions more close to the Internet environment would tried to be incorporated, to get even more extended evaluation of these recent IPv6 tunneling techniques. 5. REFERENCES [1] B. Carpenter, K. Moore, Connection of IPv6 Domains via IPv4 Clouds, RFC 3056, February 2001 [2] C. Huitema, et al, Evaluation of IPv6 Transition Mechanisms for Unmanaged Networks, RFC 3904, September 2004 [3] C. Huitema, Teredo: Tunneling IPv6 over UDP through Network Address Translators (NATs), RFC 4380, February 2006 [4] F. Templin, et al, Intra-Site Automatic Tunnel Addressing Protocol (ISATAP), RFC 5214, March 2008 [5] Jivika Govil, Jivesh Govil, Navkeerat Kaur, and Harkeerat Kaur, "An Examination of IPv4 and IPv6 Networks: Constraints and Various Transition Mechanisms", IEEE Region 3 Huntsville Section (IEEE SoutheastCon 2008), April 3-6, 2008, Huntsville, Alabama, USA [6] Jun Bi, Jianping Wu, and Xiaoxiang Leng, IPv4/IPv6 Transition Technologies and Univer6 Architecture, International Journal of Computer Science and Network Security (IJCSNS), VOL.7 No.1, Beijing, China, January 2007 [7] Manageable Transition to IPv6 using ISATAP, IPv6 Integration Paper Series, Cisco Systems, May 2006 [8] Miredo: Teredo for Linux and BSD, available online at [9] Pete Loshin, IPv6 Theory Protocol & Practice 2nd edition, Elsevier, Morgan Kaufmann Publishers, 2004 [10] Ra ed AlJa afreh, John Mellor, and Irfan Awan, A Comparison between the Tunneling process and Mapping schemes for IPv4/IPv6 Transition, in the proceedings of 2009 International Conference on Advanced Information Networking and Applications Workshops, Bradford, UK, 2009 [11] R. Gilligan, E. Nordmark, Transition Mechanisms for IPv6 Hosts and Routers, RFC 1933, April 1996 [12] Sang-Do Lee, Myung-Ki Shin, and Hyoung-Jun Kim, Implementation of ISATAP Router, In the proceedings of The 8th International Conference of Advanced Communication Technology (ICACT 2006), Phoenix Park, Korea, February, 2006 [13] Shiang-Ming Huang, Quincy Wu, and Yi-Bing Lin, Enhancing Teredo IPv6 Tunneling to Traverse the Symmetric NAT, IEEE Communication Letters, Vol. 10, No. 05, May 2006 [14] Shubhangi Kharche and B D Biranale, IPv4 to IPv6 Transition Using Windows OS, Proceedings of the SPIT-IEEE Colloquium and International Conference, Mumbai, India, February 2008 [15] Vasaka Visoottiviseth and Niwat Bureenok, Performance Comparison of ISATAP Implementations on FreeBSD, RedHat, and Windows 2003, Proceedings of the IEEE 22nd International Conference on Advanced Information Networking and Applications, Okinawa, Japan,

Impact of IPv4-IPv6 Coexistence in Cloud Virtualization Environment

Impact of IPv4-IPv6 Coexistence in Cloud Virtualization Environment Impact of IPv4-IPv6 Coexistence in Cloud Virtualization Environment Mohammad Aazam, Eui-Nam Huh 2 Innovative Cloud and Security Lab, Department of Computer Engineering Kyung Hee University, Suwon, South

More information

CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6

CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6 CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6 1 MS. CHAITA JANI, 2 PROF.MEGHA MEHTA 1 M.E.[C.E] Student, Department Of Computer Engineering, Noble Group Of Institutions, Junagadh,Gujarat

More information

System Performance Analysis of IPv6 Transition Mechanisms over MPLS

System Performance Analysis of IPv6 Transition Mechanisms over MPLS System Performance Analysis of IPv6 Transition Mechanisms over MPLS Parisa Grayeli, Dr. Shahram Sarkani, Dr. Thomas Mazzuchi 1776 G Street NW Washington DC 20052, USA The George Washington University Phone:

More information

MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE

MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE 1 SHEETAL BORSE, 2 MRUDUL DIXIT 1,2 Department of Electronics and Telecommunication, Cummins College of Engineering

More information

IPv6 Transition Technologies (TechRef)

IPv6 Transition Technologies (TechRef) Tomado de: http://technet.microsoft.com/en-us/library/dd379548.aspx IPv6 Transition Technologies (TechRef) Updated: January 7, 2009 IPv6 Transition Technologies Protocol transitions are not easy, and the

More information

Chapter 15 IPv6 Transition Technologies

Chapter 15 IPv6 Transition Technologies Chapter 15 IPv6 Transition Technologies Published: April 18, 2006 Updated: November 06, 2006 Writer: Joe Davies 1 Abstract This chapter describes the mechanisms that aid in the transition of Internet Protocol

More information

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6 5.1 Tunneling 5.1.1 Automatic Tunneling 5.1.2 Configured Tunneling 5.2 Dual Stack 5.3 Translation 5.4 Migration Strategies for Telcos and ISPs Introduction - Transition - the process or a period of changing

More information

A Multihoming based IPv4/IPv6 Transition Approach

A Multihoming based IPv4/IPv6 Transition Approach A Multihoming based IPv4/IPv6 Transition Approach Lizhong Xie, Jun Bi, and Jianping Wu Network Research Center, Tsinghua University, China Education and Research Network (CERNET) Beijing 100084, China

More information

Performance Comparison of Internet Protocol v4 with Internet Protocol v6

Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Mrs. Sheetal Mali Department of Electronics and Telecommunication Parvatibai Genba Sopanrao Moze College of Engineering Wagholi,

More information

TOWARD IPV4 TO IPV6 MIGRATION WITHIN A CAMPUS NETWORK

TOWARD IPV4 TO IPV6 MIGRATION WITHIN A CAMPUS NETWORK TOWARD IPV4 TO IPV6 MIGRATION WITHIN A CAMPUS NETWORK MOHAMMAD MIRWAIS YOUSAFZAI, 1 NOR EFFENDY OTHMAN, ROSILAH HASSAN Research Center for Software Technology and Management, Faculty of Information Science

More information

Implementing Cisco IP Routing

Implementing Cisco IP Routing Implementing Cisco IP Routing Cisco 300-101 Dumps Available Here at: /cisco-exam/300-101-dumps.html Enrolling now you will get access to 190 questions in a unique set of 300-101 dumps Question 1 Automatic

More information

Performance Analysis of Video Conferencing over Various IPv4/IPv6 Transition Mechanisms

Performance Analysis of Video Conferencing over Various IPv4/IPv6 Transition Mechanisms IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.7, July 2018 83 Performance Analysis of Video Conferencing over Various IPv4/IPv6 Transition Mechanisms Khalid EL KHADIRI,

More information

IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol

IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol Ryuji Wakikawa Carl Williams Keisuke Uehara Jun Murai Keio University. Graduate School of Media and Governance KDDI

More information

A 6to4 Gateway with Co-located NAT

A 6to4 Gateway with Co-located NAT A Gateway with NAT Anthony K. Tsetse, Alexander L. Wijesinha, Ramesh K. Karne, and Alae Loukili Department of Computer & Information Sciences Towson University Towson, MD 21252, U.S.A. {atsetse, awijesinha,

More information

Performance Analysis of IPv6 Transition Mechanisms over MPLS

Performance Analysis of IPv6 Transition Mechanisms over MPLS Performance Analysis of IPv6 Transition Mechanisms over MPLS Parisa Grayeli 1, Shahram Sarkani 2, and Thomas Mazzuchi 3 1 The George Washington University, School of Engineering, Washington DC 20052, USA

More information

IPv6 Technical Challenges

IPv6 Technical Challenges IPv6 Technical Challenges Peter Palúch, CCIE #23527, CCIP University of Zilina, Slovakia Academy Salute, April 15 th 16 th, Bucharest IPv6 technical challenges What challenges do I meet if I decide to

More information

Providing Reliable IPv6 Access Service Based on Overlay Network

Providing Reliable IPv6 Access Service Based on Overlay Network Providing Reliable IPv6 Access Service Based on Overlay Network Xiaoxiang Leng, Jun Bi, and Miao Zhang Network Research Center, Tsinghua University Beijing 100084, China Abstract. During the transition

More information

Network Layer (4): ICMP

Network Layer (4): ICMP 1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet

More information

CCNA Questions/Answers IPv6. Select the valid IPv6 address from given ones. (Choose two) A. FE63::0043::11:21 B :2:11.1 C.

CCNA Questions/Answers IPv6. Select the valid IPv6 address from given ones. (Choose two) A. FE63::0043::11:21 B :2:11.1 C. Select the valid IPv6 address from given ones. (Choose two) A. FE63::0043::11:21 B. 191.2.1.2:2:11.1 C. 2001::98 D. 2002:c0a8:101::42 E. :2001:: F. 2002.cb0a:3cdd:1::1 Answer: C, D. 2013 1 Which method

More information

Federal Agencies and the Transition to IPv6

Federal Agencies and the Transition to IPv6 Federal Agencies and the Transition to IPv6 Introduction Because of the federal mandate to transition from IPv4 to IPv6, IT departments must include IPv6 as a core element of their current and future IT

More information

IPv6 Transitioning. An overview of what s around. Marco Hogewoning Trainer, RIPE NCC

IPv6 Transitioning. An overview of what s around. Marco Hogewoning Trainer, RIPE NCC IPv6 Transitioning An overview of what s around Marco Hogewoning Trainer, RIPE NCC There Was a Plan The original idea was to have IPv6 deployed before we were out of IPv4 addresses By now the whole of

More information

IPv4-v6 Configured Tunnel and 6to4 Transition Mechanisms Network Performance Evaluation on Linux Operating Systems

IPv4-v6 Configured Tunnel and 6to4 Transition Mechanisms Network Performance Evaluation on Linux Operating Systems IPv4-v6 Configured Tunnel and 6to4 Transition Mechanisms Network Performance Evaluation on Linux Operating Systems Shaneel Narayan, Sotharith Tauch Unitec Institute of Technology, Department of Computing,

More information

IPv6 Transition Mechanisms

IPv6 Transition Mechanisms IPv6 Transition Mechanisms Petr Grygárek rek 1 IPv6 and IPv4 Coexistence Expected to co-exist together for many years Some IPv4 devices may exist forever Slow(?) transition of (part of?) networks to IPv6

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

IPv6. Internet Technologies and Applications

IPv6. Internet Technologies and Applications IPv6 Internet Technologies and Applications Contents Summary of IPv6 core features Auto-configuration IPv4-IPv6 transition techniques IPv6 networks today ITS 413 - IPv6 2 Motivation Current version of

More information

Evaluating the Effect of IP and IGP on the ICMP Throughput of a WAN

Evaluating the Effect of IP and IGP on the ICMP Throughput of a WAN Evaluating the Effect of IP and IGP on the ICMP Throughput of a WAN Burhan ul Islam Khan 1,a, Humaira Dar 2,b, Asadullah Shah 3,c and Rashidah F. Olanrewaju 4,d 1,2,4 Department of Computer and Information

More information

Transition To IPv6 October 2011

Transition To IPv6 October 2011 Transition To IPv6 October 2011 Fred Bovy ccie #3013 fred@fredbovy.com 2011 Fred Bovy fred@fredbovy.com. Transition to IPv6 1 1st Generation: The IPv6 Pioneers Tunnels for Experimental testing or Enterprises

More information

FiberstoreOS IPv6 Security Configuration Guide

FiberstoreOS IPv6 Security Configuration Guide FiberstoreOS IPv6 Security Configuration Guide Contents 1 Configuring IPv6 over IPv4 Tunnel...4 1.1 Overview... 4 1.1.2 Manual Tunnel... 5 1.1.3 6to4 Tunnel... 6 1.1.4 ISATAP Tunnel...7 1.2 Configure Manual

More information

IPv6 Addressing. There are three types of IPV6 Addresses. Unicast:Multicast:Anycast

IPv6 Addressing. There are three types of IPV6 Addresses. Unicast:Multicast:Anycast IPv6 Addressing There are three types of IPV6 Addresses. Unicast:Multicast:Anycast Unicast IPv6 addresses A unicast address identifies a single interface within the scope of the type of unicast address.

More information

Performance Evaluation of IPv4/IPv6 Transition Mechanisms for Real-Time Applications using OPNET Modeler

Performance Evaluation of IPv4/IPv6 Transition Mechanisms for Real-Time Applications using OPNET Modeler Performance Evaluation of IPv4/IPv6 Transition Mechanisms for Real-Time Applications using OPNET Modeler Khalid EL KHADIRI 1, Ouidad LABOUIDYA 2, Najib ELKAMOUN 3, Rachid HILAL 4 STIC Laboratory Chouaib

More information

Table of Contents Chapter 1 Tunneling Configuration

Table of Contents Chapter 1 Tunneling Configuration Table of Contents Table of Contents... 1-1 1.1 Introduction to Tunneling... 1-1 1.1.1 IPv6 over IPv4 Tunnel... 1-2 1.1.2 IPv4 over IPv4 Tunnel... 1-7 1.2 Tunneling Configuration Task List... 1-8 1.3 Configuring

More information

CSCI-1680 Network Layer:

CSCI-1680 Network Layer: CSCI-1680 Network Layer: Wrapup Rodrigo Fonseca Based partly on lecture notes by Jennifer Rexford, Rob Sherwood, David Mazières, Phil Levis, John JannoA Administrivia Homework 2 is due tomorrow So we can

More information

IPv6 Transition Mechanisms

IPv6 Transition Mechanisms IPv6 Transition Mechanisms Petr Grygárek rek 1 IPv6 and IPv4 Coexistence Expected to co-exist together for many years Some IPv4 devices may exist forever Slow(?) transition of (part of?) networks to IPv6

More information

Network Working Group. Category: Informational Bay Networks Inc. September 1997

Network Working Group. Category: Informational Bay Networks Inc. September 1997 Network Working Group Request for Comments: 2185 Category: Informational R. Callon Cascade Communications Co. D. Haskin Bay Networks Inc. September 1997 Routing Aspects Of IPv6 Transition Status of this

More information

Transition Strategies from IPv4 to IPv6: The case of GRNET

Transition Strategies from IPv4 to IPv6: The case of GRNET Transition Strategies from IPv4 to IPv6: The case of GRNET C. Bouras 1,2, P. Ganos 1, A. Karaliotas 1,2 1 Research Academic Computer Technology Institute, Patras, Greece 2 Department of Computer Engineering

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

USING HIP TO SOLVE MULTI-HOMING IN IPV6 NETWORKS

USING HIP TO SOLVE MULTI-HOMING IN IPV6 NETWORKS USING HIP TO SOLVE MULTI-HOMING IN IPV6 NETWORKS Zhangyi Yuan 1, Xiaohong Huang 1, Junyi Zhang 2, Fred Baker 3 1 Research Institute of Networking Technology, Beijing University of Posts and Telecommunications,

More information

IPv4 to IPv6 Network Migration and Coexistence

IPv4 to IPv6 Network Migration and Coexistence IPv4 to IPv6 Network Migration and Coexistence A.Chandra 1, K. Lalitha 2 1 Assistant Professor, Department of CSSE, Sree Vidyanikethan Engg. College, Tirupati, Andhra Pradesh, India 2 Assistant Professor(SL),

More information

IPv4 TO IPv6 Transition Using Windows OS

IPv4 TO IPv6 Transition Using Windows OS IPv4 TO IPv6 Transition Using Windows OS Shubhangi Kharche 1 and B D Biranale 2 Vol. 3, 115 Abstract Internet Protocol version-4 (IPv4) to Internet Protocol version-6 (IPv6) transition is necessary in

More information

IPv4 to IPv6 Transition Mechanisms

IPv4 to IPv6 Transition Mechanisms IPv4 to IPv6 The mechanisms for the changeover from IPv4 to IPv6 are described in RFC 4213, updating the original mechanisms described in RFC 2893. As mentioned in the notes for IP, a portion of the IPv6

More information

FiberstoreOS IPv6 Service Configuration Guide

FiberstoreOS IPv6 Service Configuration Guide FiberstoreOS IPv6 Service Configuration Guide Contents 1 Configuring IPv6 over IPv4 Tunnel...5 1.1 Overview...5 1.1.2 Manual Tunnel...6 1.1.3 6to4 Tunnel...6 1.1.4 ISATAP Tunnel...7 1.2 Configure Manual

More information

Measuring MPLS overhead

Measuring MPLS overhead Measuring MPLS overhead A. Pescapè +*, S. P. Romano +, M. Esposito +*, S. Avallone +, G. Ventre +* * ITEM - Laboratorio Nazionale CINI per l Informatica e la Telematica Multimediali Via Diocleziano, 328

More information

Developing ILNP. Saleem Bhatti, University of St Andrews, UK FIRE workshop, Chania. (C) Saleem Bhatti.

Developing ILNP. Saleem Bhatti, University of St Andrews, UK FIRE workshop, Chania. (C) Saleem Bhatti. Developing ILNP Saleem Bhatti, University of St Andrews, UK 2010-07-16 FIRE workshop, Chania. (C) Saleem Bhatti. 1 What is ILNP? Identifier Locator Network Protocol: http://ilnp.cs.st-andrews.ac.uk/ ILNP

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

Evaluating IPv6 in Peer-to-Peer Gigabit Ethernet for UDP using Modern Operating Systems

Evaluating IPv6 in Peer-to-Peer Gigabit Ethernet for UDP using Modern Operating Systems Evaluating IPv6 in Peer-to-Peer Gigabit Ethernet for UDP using Modern Operating Systems Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of

More information

Research Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network

Research Article A Novel Solution based on NAT Traversal for High-speed Accessing the Campus Network from the Public Network Research Journal of Applied Sciences, Engineering and Technology 7(2): 221-226, 2014 DOI:10.19026/rjaset.7.244 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted: March

More information

IPv4/v6 Considerations Ralph Droms Cisco Systems

IPv4/v6 Considerations Ralph Droms Cisco Systems Title IPv4/v6 Considerations Ralph Droms Cisco Systems Agenda Motivation for IPv6 Review of IPv6 Impact of differences Tools and techniques Why IPv6? More addresses More addresses More addresses Security,

More information

ECE 697J Advanced Topics in Computer Networks

ECE 697J Advanced Topics in Computer Networks ECE 697J Advanced Topics in Computer Networks Network Measurement 12/02/03 Tilman Wolf 1 Overview Lab 3 requires performance measurement Throughput Collecting of packet headers Network Measurement Active

More information

The OSI model of network communications

The OSI model of network communications The OSI model of network communications The TCP/IP networking layers are mapped to the OSI model The Next Generation TCP/IP stack IPv6 is supported natively in Windows Vista, Windows 7, Windows Server

More information

Implementation of Multicast Routing on IPv4 and IPv6 Networks

Implementation of Multicast Routing on IPv4 and IPv6 Networks Implementation of Multicast Routing on IPv4 and IPv6 Networks Dr.Sridevi, Assistant Professor, Dept of Computer Science, Karnatak University, Dharwad. Abstract: Fast developing world of technology, multimedia

More information

Cisco Network Address Translation (NAT)

Cisco Network Address Translation (NAT) Cisco Network Address Translation (NAT) Introduction IETF NGTrans working group defined several translation mechanisms to enable communications between IPv6-only and IPv4-only hosts. One such example is

More information

CHAPTER 2 LITERATURE SURVEY

CHAPTER 2 LITERATURE SURVEY 23 CHAPTER 2 LITERATURE SURVEY The current version of the Internet Protocol IPv4 was first developed in the 1970s (Tanenbaum 2002), and the main protocol standard RFC 791 that governs IPv4 functionality

More information

IPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC

IPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC IPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC The IPv6 Timeline 1990 2000 2010 2020 The IPv6 Timeline Yes, we ve been working on this for close to 30 years! 1990 2000 2010 2020 In-situ

More information

Tunnels. Jean Yves Le Boudec 2015

Tunnels. Jean Yves Le Boudec 2015 Tunnels Jean Yves Le Boudec 2015 1. Tunnels Definition: a tunnel, also called encapsulation occurs whenever a communication layer carries packets of a layer that is not the one above e.g.: IP packet in

More information

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers Network Working Group H. Soliman, Ed. Request for Comments: 5555 Elevate Technologies Category: Standards Track June 2009 Status of This Memo Mobile IPv6 Support for Dual Stack Hosts and Routers This document

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch

Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch Introduction When using static routing, you may experience a situation where a static route is active, but the destination network

More information

LONG Laboratories Over Next Generation Networks

LONG Laboratories Over Next Generation Networks LONG Laboratories Over Next Generation Networks Participants : Portugal Telecom Inovacao (PTIN), Telefónica I+D (TID), Universidad Carlos III de Madrid (UC3M), Universidad de Evora (UEV), Universitat Politècnica

More information

Migration to IPv6 from IPv4. Is it necessary?

Migration to IPv6 from IPv4. Is it necessary? Introduction Today Internet plays a big role in every aspect of our lives and IP acted as an important pillar of Internet. Since its inception the Internet has reached almost all corners of globe and it

More information

A NOVICE APPROACH ON TRANSITION FROM IPV4-IPV6 USING TUNNELING AND PROTOCOLS OF TUNNELING

A NOVICE APPROACH ON TRANSITION FROM IPV4-IPV6 USING TUNNELING AND PROTOCOLS OF TUNNELING A NOVICE APPROACH ON TRANSITION FROM IPV4-IPV6 USING TUNNELING AND PROTOCOLS OF TUNNELING Harjeet Singh Mehta 1, Dilip Kumar 2, Hemant Singhtth Rawat 3 1,2,3 Computer Science and Engineering Department,

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

For the free video please see

For the free video please see For the free video please see http://itfreetraining.com/ipv6/teredo-windows This video will look at how to configure Teredo on Windows. If your Windows computer does not have a native IPv6 connection,

More information

Computer Networks Security: intro. CS Computer Systems Security

Computer Networks Security: intro. CS Computer Systems Security Computer Networks Security: intro CS 166 - Computer Systems Security A very easy network 3/14/16 Computer Networks: Intro 2 Two philosophers example Translator Language Translator Engineer Communication

More information

Performance Evaluation of NEMO Basic Support Implementations

Performance Evaluation of NEMO Basic Support Implementations Performance Evaluation of NEMO Basic Support Implementations Romain Kuntz, Koshiro Mitsuya, Ryuji Wakikawa Keio University, Japan E-mail: {kuntz,mitsuya,ryuji}@sfc.wide.ad.jp Abstract. The NEMO Basic Support

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

IPv4-to-IPv6 Transition Strategies

IPv4-to-IPv6 Transition Strategies IPv4-to-IPv6 Transition Strategies By Tim Rooney Director, Product Management INS IPv4-to-IPv6 Transition Strategies February 2007 INS Whitepaper Table of Contents INTRODUCTION...1 MIGRATION TECHNOLOGIES

More information

Comparision study of MobileIPv4 and MobileIPv6

Comparision study of MobileIPv4 and MobileIPv6 Comparision study of MobileIPv4 and MobileIPv6 Dr. Sridevi Assistant Professor, Dept. of Computer Science, Karnatak University,Dharwad Abstract: IPv4 is being replaced by IPv6 due to the increased demand

More information

B. Carpenter. January Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice

B. Carpenter. January Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice IETF Internet Draft January 1999 B. Carpenter K. Moore Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels Copyright Notice Placeholder for ISOC copyright if needed Abstract draft-ietf-ngtrans-6to4-00.txt

More information

MIGRATING TO INTERNET PROTOCOL VERSION 6 (IPV6)

MIGRATING TO INTERNET PROTOCOL VERSION 6 (IPV6) MIGRATING TO INTERNET PROTOCOL VERSION 6 (IPV6) Dennis Underwood - dennis.underwood@gmail.com Jonathan Lavender - jonlavender@gmail.com University of North Carolina at Charlotte November 15, 2007 USENIX

More information

R. van Rein OpenFortress November A Comparison of IPv6-over-IPv4 Tunnel Mechanisms

R. van Rein OpenFortress November A Comparison of IPv6-over-IPv4 Tunnel Mechanisms Independent Submission Request for Comments: 7059 Category: Informational ISSN: 2070-1721 S. Steffann S.J.M. Steffann Consultancy I. van Beijnum Institute IMDEA Networks R. van Rein OpenFortress November

More information

IPv6 : Internet Protocol Version 6

IPv6 : Internet Protocol Version 6 IPv6 : Internet Protocol Version 6 History Internet growth was faster than anticipated In early 1990 s, it was realized that we may run out of IPv4 addresses somewhere between 2000 and 2010 Also, experiences

More information

History. IPv6 : Internet Protocol Version 6. IPv4 Year-Wise Allocation (/8s)

History. IPv6 : Internet Protocol Version 6. IPv4 Year-Wise Allocation (/8s) History IPv6 : Internet Protocol Version 6 Internet growth was faster than anticipated In early 1990 s, it was realized that we may run out of IPv4 addresses somewhere between 2000 and 2010 Also, experiences

More information

CSCI Computer Networks Fall 2016

CSCI Computer Networks Fall 2016 source: computer-s-webdesign.com CSCI 4760 - Computer Networks Fall 2016 Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu These slides are adapted from the textbook slides by J.F. Kurose and K.W.

More information

Implementing Tunneling for IPv6

Implementing Tunneling for IPv6 Implementing Tunneling for IPv6 Last Updated: July 31, 2012 This module describes how to configure overlay tunneling techniques used by the Cisco IOS software to support the transition from IPv4-only networks

More information

IP version 6. The not so new next IP version. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam.

IP version 6. The not so new next IP version. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. IP version 6 The not so new next IP version dr. C. P. J. Koymans Informatics Institute University of Amsterdam February 5, 2008 dr. C. P. J. Koymans (UvA) IP version 6 February 5, 2008 1 / 35 1 Rationale

More information

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet

More information

NAT, IPv6, & UDP CS640, Announcements Assignment #3 released

NAT, IPv6, & UDP CS640, Announcements Assignment #3 released NAT, IPv6, & UDP CS640, 2015-03-03 Announcements Assignment #3 released Overview Network Address Translation (NAT) IPv6 Transport layer User Datagram Protocol (UDP) Network Address Translation (NAT) Hacky

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

ILNP: a whirlwind tour

ILNP: a whirlwind tour ILNP: a whirlwind tour Saleem Bhatti, University of St Andrews, UK 2010-10-03 NANOG50. Copyright 2010 Saleem Bhatti. 1 Outline 1. What? Basic information about ILNP. 2. Why? The rationale for ILNP. 3.

More information

Datagram. Source IP address. Destination IP address. Options. Data

Datagram. Source IP address. Destination IP address. Options. Data Datagram Version H. len Service Datagram length Datagram identifier FR-FR FR-FR-FR-FR Time-to-live Transp. prot. H. Checksum Source IP address Destination IP address Options Data Each line represents a

More information

Intended status: Standards Track Expires: April 26, 2012 Y. Ma Beijing University of Posts and Telecommunications October 24, 2011

Intended status: Standards Track Expires: April 26, 2012 Y. Ma Beijing University of Posts and Telecommunications October 24, 2011 softwire Internet-Draft Intended status: Standards Track Expires: April 26, 2012 Z. Li China Mobile Q. Zhao X. Huang Y. Ma Beijing University of Posts and Telecommunications October 24, 2011 DS-Lite Intra-Domain

More information

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class Computer Network Homework#3 COMPUTER NETWORK Homework #3 Due Date: May 22, 2017 in class Question 1 Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes

More information

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: IPv6 Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS IPv6 datagram format:

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Performance Comparison of IPv4 and IPv6 on Various Windows Operating Systems

Performance Comparison of IPv4 and IPv6 on Various Windows Operating Systems Performance Comparison of IPv4 and IPv6 on Various Windows Operating Systems Shaneel Narayan, Samad S. Kolahi, Yonathan Sunarto, Du D. T. Nguyen, Paul Mani School of Computing and Information Technology,

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Business Objects Product Suite

Business Objects Product Suite Business Objects Product Suite IPv6 Support in BusinessObjects XI 3.1 Overview Contents With the growth of Internet Protocol Version 6 (IPv6) technology, demand for IPv6 compatible applications has increased

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

A Scheme of Primary Path Switching for Mobile Terminals using SCTP Handover

A Scheme of Primary Path Switching for Mobile Terminals using SCTP Handover Proceedings of the 2007 WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, January 17-19, 2007 218 A Scheme of Primary Path Switching for Mobile Terminals using

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

IPv6 in Campus Networks

IPv6 in Campus Networks IPv6 in Campus Networks Dave Twinam Manager, Technical Marketing Engineering Internet Systems Business Unit dtwinam@cisco.com Cisco Twinam IPv6 Summit 2003 Cisco Systems, Inc. All rights reserved. 1 IPv6

More information

Internet of Things (IOT) Things that you do not know about IOT

Internet of Things (IOT) Things that you do not know about IOT 1 Internet of Things (IOT) Things that you do not know about IOT Technical Track Inspiring People Connecting Ideas SingTel Group Learning Fiesta 6 Sep 2013, 11.30am 12.30pm Progreso Networks (S) Pte Ltd

More information

A Service Management Architecture for NEMO in IPv4 and IPv6 Networks

A Service Management Architecture for NEMO in IPv4 and IPv6 Networks A Service Management Architecture for NEMO in IPv4 and IPv6 Networks JinHoKim,ChoongSeonHong, Dae Sun Kim Department of Computer Engineering, Kyung Hee University, Seocheon, Giheung, Yongin, Gyeonggi,

More information

ECE 435 Network Engineering Lecture 14

ECE 435 Network Engineering Lecture 14 ECE 435 Network Engineering Lecture 14 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 25 October 2018 Announcements HW#6 was due HW#7 will be posted 1 IPv4 Catastrophe 2 Out of

More information

Internet Protocol, Version 6

Internet Protocol, Version 6 Outline Protocol, Version 6 () Introduction to Header Format Addressing Model ICMPv6 Neighbor Discovery Transition from to vs. Taken from:chun-chuan Yang Basics: TCP/ Protocol Suite Protocol (IP) Features:

More information