IPv4-v6 Configured Tunnel and 6to4 Transition Mechanisms Network Performance Evaluation on Linux Operating Systems
|
|
- Annabelle Charles
- 6 years ago
- Views:
Transcription
1 IPv4-v6 Configured Tunnel and 6to4 Transition Mechanisms Network Performance Evaluation on Linux Operating Systems Shaneel Narayan, Sotharith Tauch Unitec Institute of Technology, Department of Computing, Auckland, New Zealand Abstract Last few decades has brought many fundamental changes to data communications and the Internet. Internet has its roots in a networking project started by ARPA which consisted of four computers. Now the Internet spans the globe, and has become the default communication mechanism for businesses and individuals. IPv4 addresses will soon be exhausted, which has initiated development of IPv6. The new IP version provides solution to problems that were inherent in the earlier version, and also offers additional opportunities. However transition to the new version has been remarkably slow. Thus in the interim, various transition mechanisms can be employed. In this paper two such mechanisms, namely configured tunnel and 6to4 transition mechanism, have been empirically evaluated for performance. Both mechanisms are implemented on two different Linux distributions, and performance related metrics like throughput, delay, jitter and CPU usage of the transition end nodes are measured. The results obtained on the test-bed show that TCP/UDP throughput and jitter values of the two mechanisms are similar, but delay reading is significantly different depending on the choice of transition mechanism and operating system. Index Terms- IPv4, IPv6, transition mechanism, configured tunnel, 6to4, performance evaluation, Linux Fedora, Linux Ubuntu. I. INTRODUCTION Information technology continues to rapidly change in 21st century. Computers and networks are a prerequisite to almost all facades of human, business and societal activities. The Internet affects not only its users, but also computing technology itself. And communication links to Ver4 Time to live IHL Identification Type of service Protocol F l a g s Source address (32 bits) Total length Fragment offset Header checksum Ver6 Traffic class Payload Length Flow label Next header Source address (128 bits) Hop limit the Internet are a common feature to almost all computer systems. Information technology is a term that describes combination of computers and communication technologies. TCP/IP is the protocol suite that facilitates global Internet connectivity, and IPv4 is the current widely used version. However, depletion of IPv4 address has been a concern to users for a number of years now. This schema offers only 232 addresses. There are numerous predictions related to exhaustion of IPv4 addresses, all predictions indicate that this will happen soon rather than later. IPv6 fixes many shortages in IPv4, including the limited number of available IPv4 addresses. It also adds many improvements to IPv4 including: 340 undecillion IP addresses; plug and play configurations; better network bandwidth efficiency using multicast and anycast; better QOS support for all types of applications; native information security framework; and enhanced mobility with fast handover, better route optimization and hierarchical mobility. Migrating from IPv4 to IPv6 is complicated and cannot be done in a short period of time. The size and complexity of the Internet cause this migration task to become enormously difficult and time consuming undertaking. IETF took this migration issue into consideration and came up with transition mechanisms as interim solutions that allow IPv4 to be able to operate alongside IPv6 networks. These transition mechanisms are discussed in the next section, and performance of two such mechanism, configured tunnel and 6to4, is the subject of this research. In this paper, configured tunnel and 6to4 are implemented on two Linux based operating systems and performance related metrics have been measured on a test-bed setup. The rest of the paper is organized as follows: Section II contains a background on transition mechanisms, Section III discusses some of similar work undertaken by other researchers, and Section IV outlines the experimental setup used in this research. We present the results and discuss the findings in Section V. Finally, the research is concluded. II. BACKGROUND Destination address (32 bits) IP options Padding IPv4 Header Legend Fields kept Deleted fields Name and position change New field Destination address (128 bits) IPv6 Header Figure 1: IPv4 and IPv6 packet structure schematic Figure 2: IPv4-6 Configured Tunnel /$26.00 C 2010 IEEE V2-113
2 There are multiple solutions that can be employed to interoperate IPv4 and IPv6 nodes/networks together in the transition path to pure IPv6 networks. The easiest of all solutions is to implement dual IP layer on all IPv6 nodes, enabling these nodes to interoperate with IPv4 nodes using IPv4 packets, and also directly interoperate with IPv6 nodes using IPv6 packets. The problem with this solution is that it does not solve IPv4 address shortage problem. Also dual IP stacks make nodes resource inefficient. Tunneling IPv6 traffic through IPv4 network by encapsulating IPv6 datagrams within IPv4 packets can route IPv6 traffic through IPv4 network. Tunneling can be used in a variety of ways [1]: Router-to-Router: IPv6/IPv4 routers interconnected by an IPv4 infrastructure can tunnel IPv6 packets between themselves. In this case, the tunnel spans one segment of the end-to-end path that the IPv6 packet takes. Host-to-Router: IPv6/IPv4 hosts can tunnel IPv6 packets to an intermediary IPv6/IPv4 router that is reachable via an IPv4 infrastructure. This type of tunnel spans the first segment of the packet's end-to-end path. Host-to-Host: IPv6/IPv4 hosts that are interconnected by an IPv4 infrastructure can tunnel IPv6 packets between themselves. In this case, the tunnel spans the entire end-to-end path that the packet takes. Router-to-Host: IPv6/IPv4 routers can tunnel IPv6 packets to their final destination IPv6/IPv4 host. This tunnel spans only the last segment of the end-to-end path. The way a node determines the address of the node at the end of a tunnel usually classifies the tunneling technique. In some techniques, intermediary router is present which decapsulates the IPv6 packet and forwards it on to its final destination and while in others IPv6 packets are sent all the way to the final destination. Router-to-Router and Host-to-Router use the former technique while the Host-to-Host and Routerto-Host is based on the latter. Irrespective of the tunnel classification, the tunnel end address may be determined automatically or maybe manually configured. In manually configured tunnel, aka configured tunnel, IPv6 address is manually configured on a tunnel interface and IPv4 addresses are manually configured at the tunnel source and the tunnel destination facilitating a point to point connection. III. RELATED RESEARCH Research pertaining to IPv6 relevant to this research is discussed here. In [2] and [3], an overview of the transition mechanisms is presented, grouped into three categories dual stacks, tunneling and translation. Technical issues related to deployment of IPv6 are also mentioned. In [4], error cases taken by harmful specification, poor implementations and wrong operation of IPv6 dual stack are mentioned. Constraints of various transition mechanisms are discussed in [5] and the authors mention that choice of the actual mechanism is site specific. Merits of dual stack transition mechanism (DSTM) are discussed in [6] with empirical evaluation of latency and response time of DNS traffic type on such networks. A similar research, in which personal experiences with implementation of DSTM on a test-bed, is the subject in [7]. In [8] implementation of an IPv6 network on a gigabit network infrastructure is presented and the experiences discussed. A feature of IPv6 that automatically discovers network topology between two routers, namely network topology discovery, is featured in [9]. Two transition mechanisms, Bi-directional Mapping System (BDMS) and DSTM is compared using simulation and shown that different performance results are ascertained in the two scenarios [10] [11]. Another two mechanisms, 6to4 and tunneling are empirically compared on a test-bed setup with Windows 2000 operating system in [12]. Application Layer Gateway (ALG) for IPv6, which translates application layer data in Network Address Translation - Protocol Translation (NAT-PT) transition mechanism is performance analyzed in [13]. Teredo mechanism, which was introduced to enable the hosts located behind one or multiple IPv4 NATs to obtain IPv6 nodes connectivity by tunneling packets over UDP, has been evaluated using simulation is [14]. Multiple transition mechanisms have been tested for performance in [15] [16] and shown that although overheads are minimal, performance degradation does occur as data traverses transition border. In this research undertaking, two transition mechanisms, 6to4 and configured tunnel has been network performance tested on a two Linux based operating systems. Typical performance related metrics are empirically measured on a testbed setup, discussed next. IV. EXPERIMENTAL SETUP Four computers (Intel Core 2 Duo E6300, GHz: RAM 2GB) were connected using Cat5e cables as in figure 2. All computers had two network interfaces (Broadcom Figure 2: Experimental Setup NetXtreme Gigabit and Ethernet Intel 100s Fast Ethernet) with computers at the ends using faster NICs. Computers at the ends acted as the client nodes while computers in the middle were configured as routers. Keeping all hardware constant, operating system software on all computers was changes to Linux Fedora 9.10 or Linux Ubuntu 11.0 at a time. With each operating system, IPv4, IPv6 or IPv4/IPv6 configured tunnel and 6to4 transition mechanism was implemented and performance related metrics were measured. These metrics values were measured using D-ITG [17] which measures by using two components of D-ITG which include ITG-Send and ITG-Receive. D-ITG is capable of producing traffic at packet level for both IDT (Inter Departure Time) and PS (Packet Size). D-ITG can be used to measure throughput, packet loss, delay, and jitter analysis across heterogeneous network such as wired network, wireless network, GPRS, and Bluetooth. And in this research, we V2-114
3 measured throughput, jitter and delay for both TCP and UDP traffic types. To ensure high data accuracy, all tests were executed 20 times, and to get the maximum throughput for a given packet size, each run had duration of 30 seconds. The results are presented and discussed next. V. RESULTS AND DISCUSSION We now present and discuss the results of this research. In Graph 1, TCP throughput values of the two operating systems with the two tunnel types are presented. Here is it seen that for most packet sizes, throughput values are almost identical. There is a dramatic difference in throughput values for packet size 64Bytes and the rest, with most values averaging approximately 85Mbps. It is noted that for packets 128 and 256Bytes, Ubuntu with configured tunnel values are approximately 5% lower than the rest of the throughput values. Theoretically, the maximum achievable throughput value is 100Mbps (due to the type of cable and network interface card used), however it is seen that TCP throughput values are almost 10-15% lower. TCP jitter values (Graph 2) show that there is consistency between the operating systems. For most packet sizes, jitter averages approximately 0.4ms with variations of approximately 0.2ms. Highest jitter values for all four scenarios are for the smallest packet size (64Bytes). Comparing delays experienced by the tunnels on the two operating systems (Graph 3), it is seen that there is a clear distinction between Fedora with configured tunnel and the other three scenarios (almost 10 fold). The former has average delay of approximately 1100ms and that for the other three operating systems is less than 200ms. Fedora with 6to4 as the transition mechanism has values marginally higher (200ms) than with that of Ubuntu with the two tunnel types. For both Ubuntu operating systems, delay is almost zero milliseconds. Finally CPU usage values on Router 1 and Router 2 are presented in graphs 4 and 5 respectively. In all scenarios, CPU usage is between 9 & 25% of total availability. There Graph 4: TCP CPU Usage Router 1 Graph 1: TCP Throughput Graph 5: TCP CPU Usage Router 2 Graph 2: TCP Jitter Graph 3: TCP Delay Graph 6: UDP Throughput V2-115
4 does not appear to be any distinct pattern between the operating systems or the tunnel types, however Fedora with configured tunnel registers lower CPU usage consistently on Router 1. Performance related metric values pertaining to UDP traffic type are presented next. UDP throughput values are shown in Graph 6 and it is seen that there is hardly any difference between the operating systems or the tunnel types for most packet sizes. Fedora with configured tunnel, with packet size of 128Bytes registers the lowest of all values, and for the others, the values gradually increase as packet sizes increase. For larger packets, most throughput values are between 80 and 90Mbps, with all operating systems reporting almost identical values. configured tunnel values almost close to 1200ms for all packet sizes. Fedora with 6to4 as the transition mechanism has values averaging 200ms for most packets sizes. Both Graph 9: UDP CPU Usage Router 1 Graph 7: UDP Jitter UDP jitter values show an interesting pattern (Graph 7). For almost all packet sizes, the operating systems and the two tunnel types give jitter values with hardly any variation. For packet sizes less than 1024Bytes, most values average around 0.25ms and for all packets larger than 1024Bytes, there is a steep incline in values with increased packet sizes. The highest jitter values for all four scenarios are evidently for the largest packet size of 1536Bytes. Graph 8: UDP Delay Delay values for the operating systems with the transition mechanisms are shown in Graph 8. A huge difference between the operating systems is shown, with Fedora with Graph 10: UDP CPU Usage Router 2 Ubuntu operating systems delay values are in close proximity to zero. It is seen that average delay values in all scenarios are constant for all packet sizes for each operating system and transition mechanism. Finally, UDP CPU values for both the routers are shown in Graphs 9 and 10. Most values are in the range 9 to 20% CPU usage. On router 1, it is seen that Fedora operating system with the both the transition mechanisms register lower values than the two Ubuntu scenarios. And for Router 2, there is no distinct pattern between the operating systems or the transition mechanisms. On comparing TCP and UDP performance metrics, throughput values show that for larger packets, the values for both traffic types are almost similar, but for some of the smaller packets (128 and 256Bytes) TCP values are significantly higher (almost 35%). This is true for both operating systems with both the transition mechanisms. Theoretically, UDP values should be higher (due to lack of error-checking, resending and similar), however this research results show that practically this is not the case. TCP and UDP jitter values, opposite trends exist for TCP largest jitter values are V2-116
5 for smaller packet sizes, but for UDP larger packet have comparatively higher jitter. Average jitter values for both traffic types is almost the same and in both cases Fedora with configured tunnel as the transition mechanism has substantially higher values for all packet sizes. Both graphs have lines similar in appearance, indicating that operating systems and the transition mechanisms behave similarly for the two traffic types. Comparing CPU usage of the two traffic types for the four scenarios, no distinct patterns are obvious the only consistency is that on Router 1, variation in values for on given scenario is significantly lower than that on Router 2. On Router1, Fedora operating system with the two transition mechanism generally is registering lower CPU usage for most packet sizes. VI. CONCLUSION In this research, we empirically evaluated performance of two transition mechanisms (configured tunnel and 6to4) on two Linux distributions (Fedora and Ubuntu) by measuring four performance metrics (throughput, jitter, delay and CPU usage). TCP and UDP traffic types were simulated using D- ITG on a test-bed setup. From this empirical test-bed evaluation, the following specific conclusions can be drawn: 1. Throughput values for both operating systems with the two transition mechanisms are comparable. There is hardly any difference in values in the four scenarios. 2. Jitter values all follow a similar pattern for both TCP and UDP traffic type in all four scenarios. Again there is hardly any significant difference between the operating systems or the two transition mechanisms. 3. Delay experienced in the four scenarios show that Fedora with configured tunnel has significantly higher delays than the other three scenarios. For both TCP and UDP, Windows Server 1200ms with configured tunnel has delay values approximately 1100ms and the rest has less than 200ms. 4. CPU usage of the two routers show hardly any difference in values, however on Router 1, Fedora with the two transition mechanisms CPU usage is lower than that of Ubuntu. This research has shown that the performance of transition mechanisms is generally consistent on the two operating systems tested, however one metrics in particular, average delay, is different depending on the operating system and the transition mechanism. The research team aims to extend this study to incorporate more operating systems including Windows operating systems. REFERENCES [1] R. Gilligan and E. Nordmark, Transition Mechanisms for IPv6 Hosts and Routers Internet Engineering Task Force RFC 2893, Aug 2000; [2] D. G. Waddington and F. Chang, Realizing the Transition to IPv6, IEEE Communications Magazine, vol. 40, issue 6, pp , June [3] I.Hsieh and S. Kao, Managing the co-existing network of IPv6 and IPv4 under various transition mechanisms, Proceedings of the Third International Conference on Information Technology and Applications (ICITA), pp , July [4] R. Hiromi and H. Yoshifuji, Problems on IPv4-IPv6 network transition, Proceedings of the International Symposium on Applications and the Internet Workshops (SAINT), pp , January [5] J. Govil, J. Govil, N. Kaur and H. Kaur, An examination of IPv4 and IPv6 networks: Constraints and various transition mechanisms, Proceedings of IEEE Sounteastcon, pp , April [6] E. Park, J. Lee and B. Choe, An IPv4-to-IPv6 dual stack transition mechanism supporting transparent connections between IPv6 hosts and IPv4 hosts in integrated IPv6/IPv4 network, Proceedings of the IEEE International Conference on Communications, vol. 2, pp , June [7] H. M. Tahir, A. Taa, N. B. Nasir, Implementation of IPv4 Over IPv6 using Dual Stack Transition Mechanism (DSTM) on 6iNet, Proceedings of the International Conference on Information & Communication Technologies: From Theory to Applications (ICTTA), vol. 2, pp , [8] K. Kobayashi, S. Katsuno, K. Nakamura, Y. Mikamo, H. Hayashi, A. Machizawa, Y. Kitatsuji and H. Esaki, JGN IPv6 network, Proceedings of the Symposium on Applications and the Internet Workshops, pp , January [9] K. Xiaorui and W. Qingxian, Discovering IPv6 network topology, Proceedings of the IEEE International Symposium on Communications and Information Technology (ISCIT), pp , October [10] R. AlJa'afreh, J. Mellor and I. Awan, Comparison Between the Tunneling Process and Mapping Schemes for IPv4/IPv6 Transition Proceedings of the International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp , May [11] R. AlJa'afreh, J. Mellor and I. Awan, Evaluating BDMS and DSTM Transition Mechanisms Proceedings of the Second UKSIM European Symposium on Computer Modeling and Simulation (EMS), pp , September [12] I. Raicu and S. Zeadally, Evaluating IPv4 to IPv6 transition mechanisms, Proceedings of the 10th International Conference on Telecommunications (ICT), vol. 2, pp , February [13] Y. Hong, M. Shin and H. Kim, Application translation for IPv6 at NAT-PT, Proceedings of the 9th Asia-Pacific Conference on Communications (APCC), vol.1, pp , September [14] B. N. A. Al-tamimi, A. M. Taib and R. Budiarto, Protecting teredo clients from source routing exploits, Proceedings of the First International Conference on Distributed Framework and Applications (DFmA), pp , October [15] M. Shin, H. Kim, D. Santay and D. Montgomery, An empirical analysis of IPv6 transition mechanisms, Proceedings of the 8th International Conference on Advanced Communication Technology (ICACT), vol. 3, pp , February [16] E. Chen, T. Teo, B. Issac and N. Ting, Analysis of IPv6 Network Communication Using Simulation, Proceedings of the 4th Student Conference on Research and Development (SCOReD), pp , June [17] A. Botta, A Dainotti, A Pescapè, "Multi-protocol and multi-platform traffic generation and measurement", INFOCOM 2007 DEMO Session, May 2007, Anchorage (Alaska, USA). V2-117
Performance Comparison of IPv4 and IPv6 on Various Windows Operating Systems
Performance Comparison of IPv4 and IPv6 on Various Windows Operating Systems Shaneel Narayan, Samad S. Kolahi, Yonathan Sunarto, Du D. T. Nguyen, Paul Mani School of Computing and Information Technology,
More informationSystem Performance Analysis of IPv6 Transition Mechanisms over MPLS
System Performance Analysis of IPv6 Transition Mechanisms over MPLS Parisa Grayeli, Dr. Shahram Sarkani, Dr. Thomas Mazzuchi 1776 G Street NW Washington DC 20052, USA The George Washington University Phone:
More informationPerformance Analysis of Video Conferencing over Various IPv4/IPv6 Transition Mechanisms
IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.7, July 2018 83 Performance Analysis of Video Conferencing over Various IPv4/IPv6 Transition Mechanisms Khalid EL KHADIRI,
More informationOSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most
More informationCONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6
CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6 1 MS. CHAITA JANI, 2 PROF.MEGHA MEHTA 1 M.E.[C.E] Student, Department Of Computer Engineering, Noble Group Of Institutions, Junagadh,Gujarat
More informationEvaluating IPv6 in Peer-to-Peer Gigabit Ethernet for UDP using Modern Operating Systems
Evaluating IPv6 in Peer-to-Peer Gigabit Ethernet for UDP using Modern Operating Systems Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
More informationIPv6: An Introduction
Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with
More informationGESJ: Computer Science and Telecommunications 2016 No.4(50) ISSN
PERFORMANCE EVALUATION OF LINUX AND MICROSOFT WINDOWS OPERATING SYSTEMS ON CONFIGURED TUNNELS OF IPV6 AND IPV4 1 OGUNLEYE G.O, 2 Bankole B. 1 Department of Computer Science, Federal University, Oye-Ekiti,
More informationIPv4/v6 Considerations Ralph Droms Cisco Systems
Title IPv4/v6 Considerations Ralph Droms Cisco Systems Agenda Motivation for IPv6 Review of IPv6 Impact of differences Tools and techniques Why IPv6? More addresses More addresses More addresses Security,
More informationTransition Strategies from IPv4 to IPv6: The case of GRNET
Transition Strategies from IPv4 to IPv6: The case of GRNET C. Bouras 1,2, P. Ganos 1, A. Karaliotas 1,2 1 Research Academic Computer Technology Institute, Patras, Greece 2 Department of Computer Engineering
More informationUnit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6
5.1 Tunneling 5.1.1 Automatic Tunneling 5.1.2 Configured Tunneling 5.2 Dual Stack 5.3 Translation 5.4 Migration Strategies for Telcos and ISPs Introduction - Transition - the process or a period of changing
More informationPlanning for Information Network
Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of
More informationPerformance Evaluation of NEMO Basic Support Implementations
Performance Evaluation of NEMO Basic Support Implementations Romain Kuntz, Koshiro Mitsuya, Ryuji Wakikawa Keio University, Japan E-mail: {kuntz,mitsuya,ryuji}@sfc.wide.ad.jp Abstract. The NEMO Basic Support
More informationPerformance Comparison of Internet Protocol v4 with Internet Protocol v6
Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Mrs. Sheetal Mali Department of Electronics and Telecommunication Parvatibai Genba Sopanrao Moze College of Engineering Wagholi,
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationECE 435 Network Engineering Lecture 14
ECE 435 Network Engineering Lecture 14 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 25 October 2018 Announcements HW#6 was due HW#7 will be posted 1 IPv4 Catastrophe 2 Out of
More informationA 6to4 Gateway with Co-located NAT
A Gateway with NAT Anthony K. Tsetse, Alexander L. Wijesinha, Ramesh K. Karne, and Alae Loukili Department of Computer & Information Sciences Towson University Towson, MD 21252, U.S.A. {atsetse, awijesinha,
More informationGoals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks
Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.
More informationInitial motivation: 32-bit address space soon to be completely allocated. Additional motivation:
IPv6 Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS IPv6 datagram format:
More informationIPv4 to IPv6 Network Migration and Coexistence
IPv4 to IPv6 Network Migration and Coexistence A.Chandra 1, K. Lalitha 2 1 Assistant Professor, Department of CSSE, Sree Vidyanikethan Engg. College, Tirupati, Andhra Pradesh, India 2 Assistant Professor(SL),
More informationNetwork Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class
Goals of This Lecture Network Layer Kuang Chiu Huang TCM NCKU Through the lecture and in-class discussion, students are enabled to describe role and functions of the network layer, and compare different
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking
More informationThe Interconnection Structure of. The Internet. EECC694 - Shaaban
The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense
More informationIPv6 Transition Technologies (TechRef)
Tomado de: http://technet.microsoft.com/en-us/library/dd379548.aspx IPv6 Transition Technologies (TechRef) Updated: January 7, 2009 IPv6 Transition Technologies Protocol transitions are not easy, and the
More informationAn Industry view of IPv6 Advantages
An Industry view of IPv6 Advantages March 2002 Yanick.Pouffary@Compaq.Com Imagine what IPv6 can do for you! 1 Where we are Today IPv4 a victim of its own success IPv4 addresses consumed at an alarming
More informationIPv6 Next generation IP
Seminar Presentation IPv6 Next generation IP N Ranjith Kumar 11/5/2004 IPv6 : Next generation IP 1 Network Problems Communication Problem Identification Problem Identification of Networks Logical Addressing
More informationNetwork Configuration Example
Network Configuration Example Configuring Dual-Stack Lite for IPv6 Access Release NCE0025 Modified: 2016-10-12 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
More informationHierarchical Routing. Our routing study thus far - idealization all routers identical network flat no true in practice. administrative autonomy
Hierarchical Routing Our routing study thus far - idealization all routers identical network flat no true in practice scale: with 50 million destinations: can t store all dest s in routing tables! routing
More informationImplementation of Multicast Routing on IPv4 and IPv6 Networks
Implementation of Multicast Routing on IPv4 and IPv6 Networks Dr.Sridevi, Assistant Professor, Dept of Computer Science, Karnatak University, Dharwad. Abstract: Fast developing world of technology, multimedia
More informationExecutive Summary...1 Chapter 1: Introduction...1
Table of Contents Executive Summary...1 Chapter 1: Introduction...1 SSA Organization... 1 IRM Strategic Plan Purpose... 3 IRM Strategic Plan Objectives... 4 Relationship to Other Strategic Planning Documents...
More informationPerformance Analysis of IPv6 Transition Mechanisms over MPLS
Performance Analysis of IPv6 Transition Mechanisms over MPLS Parisa Grayeli 1, Shahram Sarkani 2, and Thomas Mazzuchi 3 1 The George Washington University, School of Engineering, Washington DC 20052, USA
More informationTOWARD IPV4 TO IPV6 MIGRATION WITHIN A CAMPUS NETWORK
TOWARD IPV4 TO IPV6 MIGRATION WITHIN A CAMPUS NETWORK MOHAMMAD MIRWAIS YOUSAFZAI, 1 NOR EFFENDY OTHMAN, ROSILAH HASSAN Research Center for Software Technology and Management, Faculty of Information Science
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationIPv6 Technical Challenges
IPv6 Technical Challenges Peter Palúch, CCIE #23527, CCIP University of Zilina, Slovakia Academy Salute, April 15 th 16 th, Bucharest IPv6 technical challenges What challenges do I meet if I decide to
More informationIPv6 migration challenges and Security
IPv6 migration challenges and Security ITU Regional Workshop for the CIS countries Recommendations on transition from IPv4 to IPv6 in the CIS region, 16-18 April 2014 Tashkent, Republic of Uzbekistan Desire.karyabwite@itu.int
More informationIPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC
IPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC The IPv6 Timeline 1990 2000 2010 2020 The IPv6 Timeline Yes, we ve been working on this for close to 30 years! 1990 2000 2010 2020 In-situ
More informationIPv6 : Internet Protocol Version 6
IPv6 : Internet Protocol Version 6 History Internet growth was faster than anticipated In early 1990 s, it was realized that we may run out of IPv4 addresses somewhere between 2000 and 2010 Also, experiences
More informationHistory. IPv6 : Internet Protocol Version 6. IPv4 Year-Wise Allocation (/8s)
History IPv6 : Internet Protocol Version 6 Internet growth was faster than anticipated In early 1990 s, it was realized that we may run out of IPv4 addresses somewhere between 2000 and 2010 Also, experiences
More informationMigration to IPv6 from IPv4. Is it necessary?
Introduction Today Internet plays a big role in every aspect of our lives and IP acted as an important pillar of Internet. Since its inception the Internet has reached almost all corners of globe and it
More informationEC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane
EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:
More informationCommunication Systems IPv6
Communication Systems IPv6 Computer Science Network Layer from IPv4 to IPv6 Staying on the third layer but exchange the protocol Introduction to future IP The IP v6 address IP v6 header and extension headers
More informationA Service Management Architecture for NEMO in IPv4 and IPv6 Networks
A Service Management Architecture for NEMO in IPv4 and IPv6 Networks JinHoKim,ChoongSeonHong, Dae Sun Kim Department of Computer Engineering, Kyung Hee University, Seocheon, Giheung, Yongin, Gyeonggi,
More informationMIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE
MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE 1 SHEETAL BORSE, 2 MRUDUL DIXIT 1,2 Department of Electronics and Telecommunication, Cummins College of Engineering
More informationChapter 15 IPv6 Transition Technologies
Chapter 15 IPv6 Transition Technologies Published: April 18, 2006 Updated: November 06, 2006 Writer: Joe Davies 1 Abstract This chapter describes the mechanisms that aid in the transition of Internet Protocol
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationNetworking: Network layer
control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer
More informationNetwork Working Group. Category: Informational Bay Networks Inc. September 1997
Network Working Group Request for Comments: 2185 Category: Informational R. Callon Cascade Communications Co. D. Haskin Bay Networks Inc. September 1997 Routing Aspects Of IPv6 Transition Status of this
More informationNAT, IPv6, & UDP CS640, Announcements Assignment #3 released
NAT, IPv6, & UDP CS640, 2015-03-03 Announcements Assignment #3 released Overview Network Address Translation (NAT) IPv6 Transport layer User Datagram Protocol (UDP) Network Address Translation (NAT) Hacky
More informationIPv6 tutorial. RedIRIS Miguel Angel Sotos
IPv6 tutorial RedIRIS Miguel Angel Sotos miguel.sotos@rediris.es Agenda History Why IPv6 IPv6 addresses Autoconfiguration DNS Transition mechanisms Security in IPv6 IPv6 in Windows and Linux IPv6 now 2
More informationEEC-684/584 Computer Networks
EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationPerformance Evaluation of IPv4/IPv6 Transition Mechanisms for Real-Time Applications using OPNET Modeler
Performance Evaluation of IPv4/IPv6 Transition Mechanisms for Real-Time Applications using OPNET Modeler Khalid EL KHADIRI 1, Ouidad LABOUIDYA 2, Najib ELKAMOUN 3, Rachid HILAL 4 STIC Laboratory Chouaib
More informationCPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer
1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer
More informationChapter 18 and 22. IPv4 Address. Data Communications and Networking
University of Human Development College of Science and Technology Department of Information Technology Chapter 18 and 22 Data Communications and Networking IPv4 Address 1 Lecture Outline IPv4 Addressing
More informationTable of Contents Chapter 1 Tunneling Configuration
Table of Contents Table of Contents... 1-1 1.1 Introduction to Tunneling... 1-1 1.1.1 IPv6 over IPv4 Tunnel... 1-2 1.1.2 IPv4 over IPv4 Tunnel... 1-7 1.2 Tunneling Configuration Task List... 1-8 1.3 Configuring
More informationThis tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.
About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described
More informationB. Carpenter. January Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice
IETF Internet Draft January 1999 B. Carpenter K. Moore Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels Copyright Notice Placeholder for ISOC copyright if needed Abstract draft-ietf-ngtrans-6to4-00.txt
More informationA Comparison of VoIP Performance on IPv6 and IPv4 Networks
A Comparison of VoIP Performance on IPv6 and IPv4 Networks Roman Yasinovskyy, Alexander L. Wijesinha, Ramesh K. Karne, and Gholam Khaksari Towson University Abstract We compare VoIP performance on IPv6
More informationCS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network
CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network Question No: 1( M a r k s: 1 ) A ---------- Relies on the hardware manufacturer to assign a unique physical
More informationTransition To IPv6 October 2011
Transition To IPv6 October 2011 Fred Bovy ccie #3013 fred@fredbovy.com 2011 Fred Bovy fred@fredbovy.com. Transition to IPv6 1 1st Generation: The IPv6 Pioneers Tunnels for Experimental testing or Enterprises
More informationQuality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel
Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Semra.gulder@crc.ca, mathieu.deziel@crc.ca Abstract: This paper describes a QoS mechanism suitable for Mobile Ad Hoc Networks
More informationEE 610 Part 2: Encapsulation and network utilities
EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationMobility Management - Basics
Mobility Management - Basics Summer Semester 2012 Integrated Communication Systems Group Ilmenau University of Technology Content Motivation Problem and possible solutions IP-based mobility management
More informationChapter 5 OSI Network Layer
Chapter 5 OSI Network Layer The protocols of the OSI model Network layer specify addressing and processes that enable Transport layer data to be packaged and transported. The Network layer encapsulation
More informationIPv6 Transition Mechanisms
IPv6 Transition Mechanisms Petr Grygárek rek 1 IPv6 and IPv4 Coexistence Expected to co-exist together for many years Some IPv4 devices may exist forever Slow(?) transition of (part of?) networks to IPv6
More informationIntroduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁
II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:
More informationAuthors Ioan Raicu Ahmad Naveed
Page 1 of 19 Tunneling: A Transition Mechanism to Deploy IPv6 Networks Authors Ioan Raicu Course: CSC8260 Advisor Dr. Sherali Zeadally Wayne State University Document Created: 11/5/2001 Last Date Modified:
More informationChapter 5 Network Layer
Chapter 5 Network Layer Network Layer IPv4 2 IP Header Application Header + data 3 IP IP IP IP 4 Focus on Transport Layer IP IP 5 Network Layer The Network layer (Layer 3) provides services to exchange
More informationInformation Network Systems The network layer. Stephan Sigg
Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order
More informationIPv6 Transition Mechanism on UKMNet Network Environment
Journal of Computer Sciences Original Research Paper IPv6 Transition Mechanism on UKMNet Network Environment 1 Mohd Azi Bin Abdullah and 2 Nor Effendy Othman 1 Department of Network, Center for Information
More informationLANCOM Techpaper Routing Performance
LANCOM Techpaper Routing Performance Applications for communications and entertainment are increasingly based on IP networks. In order to ensure that the necessary bandwidth performance can be provided
More informationMODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:
BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT
More informationA Multihoming based IPv4/IPv6 Transition Approach
A Multihoming based IPv4/IPv6 Transition Approach Lizhong Xie, Jun Bi, and Jianping Wu Network Research Center, Tsinghua University, China Education and Research Network (CERNET) Beijing 100084, China
More informationIPv6 (IP( version 6) 6 Essentials Ch0: Overwiew. Louis Chuang Fu Jen Catholic University EE ENCL
IPv6 (IP( version 6) 6 Essentials Ch0: Overwiew Louis Chuang Fu Jen Catholic University EE ENCL What s s the Internet Protocols control sending, receiving of msgs e.g., TCP, IP, HTTP, FTP, PPP Internet:
More informationNetworks. an overview. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. February 4, 2008
Networks an overview dr. C. P. J. Koymans Informatics Institute University of Amsterdam February 4, 2008 dr. C. P. J. Koymans (UvA) Networks February 4, 2008 1 / 53 1 Network modeling Layered networks
More informationPrinciples. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model
Principles IP QoS DiffServ Differentiated Services Architecture DSCP, CAR Integrated Services Model does not scale well flow based traffic overhead (RSVP messages) routers must maintain state information
More informationPosition of IP and other network-layer protocols in TCP/IP protocol suite
Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,
More informationChapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview
Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network
More informationQoS Provisioning Using IPv6 Flow Label In the Internet
QoS Provisioning Using IPv6 Flow Label In the Internet Xiaohua Tang, Junhua Tang, Guang-in Huang and Chee-Kheong Siew Contact: Junhua Tang, lock S2, School of EEE Nanyang Technological University, Singapore,
More informationIPv6 Addressing. There are three types of IPV6 Addresses. Unicast:Multicast:Anycast
IPv6 Addressing There are three types of IPV6 Addresses. Unicast:Multicast:Anycast Unicast IPv6 addresses A unicast address identifies a single interface within the scope of the type of unicast address.
More informationPerformance of an IPv6 Web Server under Congestion
Performance of an IPv6 Web Server under Congestion A. Loukili, A. K. Tsetse, A. L. Wijesinha, R. K. Karne, and P. Appiah-Kubi Department of Computer & Information Sciences Towson University Towson, MD
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration
More informationFixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering
Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile
More informationComputer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William
Dr. John Keeney 3BA33 TCP/IP protocol architecture with IP OSI Model Layers TCP/IP Protocol Architecture Layers TCP/IP Protocol Suite Application Layer Application Layer Telnet FTP HTTP DNS RIPng SNMP
More informationPerformance Evaluation of IPv4 and IPv6 over MPLS using OPNET
Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET Suhail Ahmad Wajid Ali Hamdani Mohsin Hassan Magray ABSTRACT Over the last two decades, we have witnessed a rapid deployment of real-time applications
More informationTesting the Channel Aggregation Capability of the MPT Multipath Communication Library
Testing the Channel Aggregation Capability of the MPT Multipath Communication Library Gábor Lencse Department of Telecommunications Széchenyi István University Győr, Hungary lencse@sze.hu Ákos Kovács Department
More informationDeployment and Performance Evaluation of Teredo and ISATAP over Real Test-bed Setup
Deployment and Performance Evaluation of Teredo and ISATAP over Real Test-bed Setup Mohammad Aazam 1,2 1 Mohi-ud-Din Islamic University, Islamabad, Pakistan aazam@corenet.org.pk Syed Atif Hussain Shah
More informationINTRODUCTION OF IPV6. Ravikumar Naik 21/11/2011
INTRODUCTION OF IPV6 Ravikumar Naik 21/11/2011 Outline Why we need a new version of the IP protocol? IPv6 Basics IPv6 Addressing Why we need a new version of the IP protocol? Contemporary studies indicated
More informationOSI Network Layer. Chapter 5
OSI Network Layer Network Fundamentals Chapter 5 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most common Network
More informationNetwork Layer: Internet Protocol
Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in
More informationIPv6 in Campus Networks
IPv6 in Campus Networks Dave Twinam Manager, Technical Marketing Engineering Internet Systems Business Unit dtwinam@cisco.com Cisco Twinam IPv6 Summit 2003 Cisco Systems, Inc. All rights reserved. 1 IPv6
More informationCisco CCNA (ICND1, ICND2) Bootcamp
Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills
More informationLecture 8. Network Layer (cont d) Network Layer 1-1
Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network
More informationCSCI-1680 Network Layer:
CSCI-1680 Network Layer: Wrapup Rodrigo Fonseca Based partly on lecture notes by Jennifer Rexford, Rob Sherwood, David Mazières, Phil Levis, John JannoA Administrivia Homework 2 is due tomorrow So we can
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More information