IPv4-v6 Configured Tunnel and 6to4 Transition Mechanisms Network Performance Evaluation on Linux Operating Systems

Size: px
Start display at page:

Download "IPv4-v6 Configured Tunnel and 6to4 Transition Mechanisms Network Performance Evaluation on Linux Operating Systems"

Transcription

1 IPv4-v6 Configured Tunnel and 6to4 Transition Mechanisms Network Performance Evaluation on Linux Operating Systems Shaneel Narayan, Sotharith Tauch Unitec Institute of Technology, Department of Computing, Auckland, New Zealand Abstract Last few decades has brought many fundamental changes to data communications and the Internet. Internet has its roots in a networking project started by ARPA which consisted of four computers. Now the Internet spans the globe, and has become the default communication mechanism for businesses and individuals. IPv4 addresses will soon be exhausted, which has initiated development of IPv6. The new IP version provides solution to problems that were inherent in the earlier version, and also offers additional opportunities. However transition to the new version has been remarkably slow. Thus in the interim, various transition mechanisms can be employed. In this paper two such mechanisms, namely configured tunnel and 6to4 transition mechanism, have been empirically evaluated for performance. Both mechanisms are implemented on two different Linux distributions, and performance related metrics like throughput, delay, jitter and CPU usage of the transition end nodes are measured. The results obtained on the test-bed show that TCP/UDP throughput and jitter values of the two mechanisms are similar, but delay reading is significantly different depending on the choice of transition mechanism and operating system. Index Terms- IPv4, IPv6, transition mechanism, configured tunnel, 6to4, performance evaluation, Linux Fedora, Linux Ubuntu. I. INTRODUCTION Information technology continues to rapidly change in 21st century. Computers and networks are a prerequisite to almost all facades of human, business and societal activities. The Internet affects not only its users, but also computing technology itself. And communication links to Ver4 Time to live IHL Identification Type of service Protocol F l a g s Source address (32 bits) Total length Fragment offset Header checksum Ver6 Traffic class Payload Length Flow label Next header Source address (128 bits) Hop limit the Internet are a common feature to almost all computer systems. Information technology is a term that describes combination of computers and communication technologies. TCP/IP is the protocol suite that facilitates global Internet connectivity, and IPv4 is the current widely used version. However, depletion of IPv4 address has been a concern to users for a number of years now. This schema offers only 232 addresses. There are numerous predictions related to exhaustion of IPv4 addresses, all predictions indicate that this will happen soon rather than later. IPv6 fixes many shortages in IPv4, including the limited number of available IPv4 addresses. It also adds many improvements to IPv4 including: 340 undecillion IP addresses; plug and play configurations; better network bandwidth efficiency using multicast and anycast; better QOS support for all types of applications; native information security framework; and enhanced mobility with fast handover, better route optimization and hierarchical mobility. Migrating from IPv4 to IPv6 is complicated and cannot be done in a short period of time. The size and complexity of the Internet cause this migration task to become enormously difficult and time consuming undertaking. IETF took this migration issue into consideration and came up with transition mechanisms as interim solutions that allow IPv4 to be able to operate alongside IPv6 networks. These transition mechanisms are discussed in the next section, and performance of two such mechanism, configured tunnel and 6to4, is the subject of this research. In this paper, configured tunnel and 6to4 are implemented on two Linux based operating systems and performance related metrics have been measured on a test-bed setup. The rest of the paper is organized as follows: Section II contains a background on transition mechanisms, Section III discusses some of similar work undertaken by other researchers, and Section IV outlines the experimental setup used in this research. We present the results and discuss the findings in Section V. Finally, the research is concluded. II. BACKGROUND Destination address (32 bits) IP options Padding IPv4 Header Legend Fields kept Deleted fields Name and position change New field Destination address (128 bits) IPv6 Header Figure 1: IPv4 and IPv6 packet structure schematic Figure 2: IPv4-6 Configured Tunnel /$26.00 C 2010 IEEE V2-113

2 There are multiple solutions that can be employed to interoperate IPv4 and IPv6 nodes/networks together in the transition path to pure IPv6 networks. The easiest of all solutions is to implement dual IP layer on all IPv6 nodes, enabling these nodes to interoperate with IPv4 nodes using IPv4 packets, and also directly interoperate with IPv6 nodes using IPv6 packets. The problem with this solution is that it does not solve IPv4 address shortage problem. Also dual IP stacks make nodes resource inefficient. Tunneling IPv6 traffic through IPv4 network by encapsulating IPv6 datagrams within IPv4 packets can route IPv6 traffic through IPv4 network. Tunneling can be used in a variety of ways [1]: Router-to-Router: IPv6/IPv4 routers interconnected by an IPv4 infrastructure can tunnel IPv6 packets between themselves. In this case, the tunnel spans one segment of the end-to-end path that the IPv6 packet takes. Host-to-Router: IPv6/IPv4 hosts can tunnel IPv6 packets to an intermediary IPv6/IPv4 router that is reachable via an IPv4 infrastructure. This type of tunnel spans the first segment of the packet's end-to-end path. Host-to-Host: IPv6/IPv4 hosts that are interconnected by an IPv4 infrastructure can tunnel IPv6 packets between themselves. In this case, the tunnel spans the entire end-to-end path that the packet takes. Router-to-Host: IPv6/IPv4 routers can tunnel IPv6 packets to their final destination IPv6/IPv4 host. This tunnel spans only the last segment of the end-to-end path. The way a node determines the address of the node at the end of a tunnel usually classifies the tunneling technique. In some techniques, intermediary router is present which decapsulates the IPv6 packet and forwards it on to its final destination and while in others IPv6 packets are sent all the way to the final destination. Router-to-Router and Host-to-Router use the former technique while the Host-to-Host and Routerto-Host is based on the latter. Irrespective of the tunnel classification, the tunnel end address may be determined automatically or maybe manually configured. In manually configured tunnel, aka configured tunnel, IPv6 address is manually configured on a tunnel interface and IPv4 addresses are manually configured at the tunnel source and the tunnel destination facilitating a point to point connection. III. RELATED RESEARCH Research pertaining to IPv6 relevant to this research is discussed here. In [2] and [3], an overview of the transition mechanisms is presented, grouped into three categories dual stacks, tunneling and translation. Technical issues related to deployment of IPv6 are also mentioned. In [4], error cases taken by harmful specification, poor implementations and wrong operation of IPv6 dual stack are mentioned. Constraints of various transition mechanisms are discussed in [5] and the authors mention that choice of the actual mechanism is site specific. Merits of dual stack transition mechanism (DSTM) are discussed in [6] with empirical evaluation of latency and response time of DNS traffic type on such networks. A similar research, in which personal experiences with implementation of DSTM on a test-bed, is the subject in [7]. In [8] implementation of an IPv6 network on a gigabit network infrastructure is presented and the experiences discussed. A feature of IPv6 that automatically discovers network topology between two routers, namely network topology discovery, is featured in [9]. Two transition mechanisms, Bi-directional Mapping System (BDMS) and DSTM is compared using simulation and shown that different performance results are ascertained in the two scenarios [10] [11]. Another two mechanisms, 6to4 and tunneling are empirically compared on a test-bed setup with Windows 2000 operating system in [12]. Application Layer Gateway (ALG) for IPv6, which translates application layer data in Network Address Translation - Protocol Translation (NAT-PT) transition mechanism is performance analyzed in [13]. Teredo mechanism, which was introduced to enable the hosts located behind one or multiple IPv4 NATs to obtain IPv6 nodes connectivity by tunneling packets over UDP, has been evaluated using simulation is [14]. Multiple transition mechanisms have been tested for performance in [15] [16] and shown that although overheads are minimal, performance degradation does occur as data traverses transition border. In this research undertaking, two transition mechanisms, 6to4 and configured tunnel has been network performance tested on a two Linux based operating systems. Typical performance related metrics are empirically measured on a testbed setup, discussed next. IV. EXPERIMENTAL SETUP Four computers (Intel Core 2 Duo E6300, GHz: RAM 2GB) were connected using Cat5e cables as in figure 2. All computers had two network interfaces (Broadcom Figure 2: Experimental Setup NetXtreme Gigabit and Ethernet Intel 100s Fast Ethernet) with computers at the ends using faster NICs. Computers at the ends acted as the client nodes while computers in the middle were configured as routers. Keeping all hardware constant, operating system software on all computers was changes to Linux Fedora 9.10 or Linux Ubuntu 11.0 at a time. With each operating system, IPv4, IPv6 or IPv4/IPv6 configured tunnel and 6to4 transition mechanism was implemented and performance related metrics were measured. These metrics values were measured using D-ITG [17] which measures by using two components of D-ITG which include ITG-Send and ITG-Receive. D-ITG is capable of producing traffic at packet level for both IDT (Inter Departure Time) and PS (Packet Size). D-ITG can be used to measure throughput, packet loss, delay, and jitter analysis across heterogeneous network such as wired network, wireless network, GPRS, and Bluetooth. And in this research, we V2-114

3 measured throughput, jitter and delay for both TCP and UDP traffic types. To ensure high data accuracy, all tests were executed 20 times, and to get the maximum throughput for a given packet size, each run had duration of 30 seconds. The results are presented and discussed next. V. RESULTS AND DISCUSSION We now present and discuss the results of this research. In Graph 1, TCP throughput values of the two operating systems with the two tunnel types are presented. Here is it seen that for most packet sizes, throughput values are almost identical. There is a dramatic difference in throughput values for packet size 64Bytes and the rest, with most values averaging approximately 85Mbps. It is noted that for packets 128 and 256Bytes, Ubuntu with configured tunnel values are approximately 5% lower than the rest of the throughput values. Theoretically, the maximum achievable throughput value is 100Mbps (due to the type of cable and network interface card used), however it is seen that TCP throughput values are almost 10-15% lower. TCP jitter values (Graph 2) show that there is consistency between the operating systems. For most packet sizes, jitter averages approximately 0.4ms with variations of approximately 0.2ms. Highest jitter values for all four scenarios are for the smallest packet size (64Bytes). Comparing delays experienced by the tunnels on the two operating systems (Graph 3), it is seen that there is a clear distinction between Fedora with configured tunnel and the other three scenarios (almost 10 fold). The former has average delay of approximately 1100ms and that for the other three operating systems is less than 200ms. Fedora with 6to4 as the transition mechanism has values marginally higher (200ms) than with that of Ubuntu with the two tunnel types. For both Ubuntu operating systems, delay is almost zero milliseconds. Finally CPU usage values on Router 1 and Router 2 are presented in graphs 4 and 5 respectively. In all scenarios, CPU usage is between 9 & 25% of total availability. There Graph 4: TCP CPU Usage Router 1 Graph 1: TCP Throughput Graph 5: TCP CPU Usage Router 2 Graph 2: TCP Jitter Graph 3: TCP Delay Graph 6: UDP Throughput V2-115

4 does not appear to be any distinct pattern between the operating systems or the tunnel types, however Fedora with configured tunnel registers lower CPU usage consistently on Router 1. Performance related metric values pertaining to UDP traffic type are presented next. UDP throughput values are shown in Graph 6 and it is seen that there is hardly any difference between the operating systems or the tunnel types for most packet sizes. Fedora with configured tunnel, with packet size of 128Bytes registers the lowest of all values, and for the others, the values gradually increase as packet sizes increase. For larger packets, most throughput values are between 80 and 90Mbps, with all operating systems reporting almost identical values. configured tunnel values almost close to 1200ms for all packet sizes. Fedora with 6to4 as the transition mechanism has values averaging 200ms for most packets sizes. Both Graph 9: UDP CPU Usage Router 1 Graph 7: UDP Jitter UDP jitter values show an interesting pattern (Graph 7). For almost all packet sizes, the operating systems and the two tunnel types give jitter values with hardly any variation. For packet sizes less than 1024Bytes, most values average around 0.25ms and for all packets larger than 1024Bytes, there is a steep incline in values with increased packet sizes. The highest jitter values for all four scenarios are evidently for the largest packet size of 1536Bytes. Graph 8: UDP Delay Delay values for the operating systems with the transition mechanisms are shown in Graph 8. A huge difference between the operating systems is shown, with Fedora with Graph 10: UDP CPU Usage Router 2 Ubuntu operating systems delay values are in close proximity to zero. It is seen that average delay values in all scenarios are constant for all packet sizes for each operating system and transition mechanism. Finally, UDP CPU values for both the routers are shown in Graphs 9 and 10. Most values are in the range 9 to 20% CPU usage. On router 1, it is seen that Fedora operating system with the both the transition mechanisms register lower values than the two Ubuntu scenarios. And for Router 2, there is no distinct pattern between the operating systems or the transition mechanisms. On comparing TCP and UDP performance metrics, throughput values show that for larger packets, the values for both traffic types are almost similar, but for some of the smaller packets (128 and 256Bytes) TCP values are significantly higher (almost 35%). This is true for both operating systems with both the transition mechanisms. Theoretically, UDP values should be higher (due to lack of error-checking, resending and similar), however this research results show that practically this is not the case. TCP and UDP jitter values, opposite trends exist for TCP largest jitter values are V2-116

5 for smaller packet sizes, but for UDP larger packet have comparatively higher jitter. Average jitter values for both traffic types is almost the same and in both cases Fedora with configured tunnel as the transition mechanism has substantially higher values for all packet sizes. Both graphs have lines similar in appearance, indicating that operating systems and the transition mechanisms behave similarly for the two traffic types. Comparing CPU usage of the two traffic types for the four scenarios, no distinct patterns are obvious the only consistency is that on Router 1, variation in values for on given scenario is significantly lower than that on Router 2. On Router1, Fedora operating system with the two transition mechanism generally is registering lower CPU usage for most packet sizes. VI. CONCLUSION In this research, we empirically evaluated performance of two transition mechanisms (configured tunnel and 6to4) on two Linux distributions (Fedora and Ubuntu) by measuring four performance metrics (throughput, jitter, delay and CPU usage). TCP and UDP traffic types were simulated using D- ITG on a test-bed setup. From this empirical test-bed evaluation, the following specific conclusions can be drawn: 1. Throughput values for both operating systems with the two transition mechanisms are comparable. There is hardly any difference in values in the four scenarios. 2. Jitter values all follow a similar pattern for both TCP and UDP traffic type in all four scenarios. Again there is hardly any significant difference between the operating systems or the two transition mechanisms. 3. Delay experienced in the four scenarios show that Fedora with configured tunnel has significantly higher delays than the other three scenarios. For both TCP and UDP, Windows Server 1200ms with configured tunnel has delay values approximately 1100ms and the rest has less than 200ms. 4. CPU usage of the two routers show hardly any difference in values, however on Router 1, Fedora with the two transition mechanisms CPU usage is lower than that of Ubuntu. This research has shown that the performance of transition mechanisms is generally consistent on the two operating systems tested, however one metrics in particular, average delay, is different depending on the operating system and the transition mechanism. The research team aims to extend this study to incorporate more operating systems including Windows operating systems. REFERENCES [1] R. Gilligan and E. Nordmark, Transition Mechanisms for IPv6 Hosts and Routers Internet Engineering Task Force RFC 2893, Aug 2000; [2] D. G. Waddington and F. Chang, Realizing the Transition to IPv6, IEEE Communications Magazine, vol. 40, issue 6, pp , June [3] I.Hsieh and S. Kao, Managing the co-existing network of IPv6 and IPv4 under various transition mechanisms, Proceedings of the Third International Conference on Information Technology and Applications (ICITA), pp , July [4] R. Hiromi and H. Yoshifuji, Problems on IPv4-IPv6 network transition, Proceedings of the International Symposium on Applications and the Internet Workshops (SAINT), pp , January [5] J. Govil, J. Govil, N. Kaur and H. Kaur, An examination of IPv4 and IPv6 networks: Constraints and various transition mechanisms, Proceedings of IEEE Sounteastcon, pp , April [6] E. Park, J. Lee and B. Choe, An IPv4-to-IPv6 dual stack transition mechanism supporting transparent connections between IPv6 hosts and IPv4 hosts in integrated IPv6/IPv4 network, Proceedings of the IEEE International Conference on Communications, vol. 2, pp , June [7] H. M. Tahir, A. Taa, N. B. Nasir, Implementation of IPv4 Over IPv6 using Dual Stack Transition Mechanism (DSTM) on 6iNet, Proceedings of the International Conference on Information & Communication Technologies: From Theory to Applications (ICTTA), vol. 2, pp , [8] K. Kobayashi, S. Katsuno, K. Nakamura, Y. Mikamo, H. Hayashi, A. Machizawa, Y. Kitatsuji and H. Esaki, JGN IPv6 network, Proceedings of the Symposium on Applications and the Internet Workshops, pp , January [9] K. Xiaorui and W. Qingxian, Discovering IPv6 network topology, Proceedings of the IEEE International Symposium on Communications and Information Technology (ISCIT), pp , October [10] R. AlJa'afreh, J. Mellor and I. Awan, Comparison Between the Tunneling Process and Mapping Schemes for IPv4/IPv6 Transition Proceedings of the International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp , May [11] R. AlJa'afreh, J. Mellor and I. Awan, Evaluating BDMS and DSTM Transition Mechanisms Proceedings of the Second UKSIM European Symposium on Computer Modeling and Simulation (EMS), pp , September [12] I. Raicu and S. Zeadally, Evaluating IPv4 to IPv6 transition mechanisms, Proceedings of the 10th International Conference on Telecommunications (ICT), vol. 2, pp , February [13] Y. Hong, M. Shin and H. Kim, Application translation for IPv6 at NAT-PT, Proceedings of the 9th Asia-Pacific Conference on Communications (APCC), vol.1, pp , September [14] B. N. A. Al-tamimi, A. M. Taib and R. Budiarto, Protecting teredo clients from source routing exploits, Proceedings of the First International Conference on Distributed Framework and Applications (DFmA), pp , October [15] M. Shin, H. Kim, D. Santay and D. Montgomery, An empirical analysis of IPv6 transition mechanisms, Proceedings of the 8th International Conference on Advanced Communication Technology (ICACT), vol. 3, pp , February [16] E. Chen, T. Teo, B. Issac and N. Ting, Analysis of IPv6 Network Communication Using Simulation, Proceedings of the 4th Student Conference on Research and Development (SCOReD), pp , June [17] A. Botta, A Dainotti, A Pescapè, "Multi-protocol and multi-platform traffic generation and measurement", INFOCOM 2007 DEMO Session, May 2007, Anchorage (Alaska, USA). V2-117

Performance Comparison of IPv4 and IPv6 on Various Windows Operating Systems

Performance Comparison of IPv4 and IPv6 on Various Windows Operating Systems Performance Comparison of IPv4 and IPv6 on Various Windows Operating Systems Shaneel Narayan, Samad S. Kolahi, Yonathan Sunarto, Du D. T. Nguyen, Paul Mani School of Computing and Information Technology,

More information

System Performance Analysis of IPv6 Transition Mechanisms over MPLS

System Performance Analysis of IPv6 Transition Mechanisms over MPLS System Performance Analysis of IPv6 Transition Mechanisms over MPLS Parisa Grayeli, Dr. Shahram Sarkani, Dr. Thomas Mazzuchi 1776 G Street NW Washington DC 20052, USA The George Washington University Phone:

More information

Performance Analysis of Video Conferencing over Various IPv4/IPv6 Transition Mechanisms

Performance Analysis of Video Conferencing over Various IPv4/IPv6 Transition Mechanisms IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.7, July 2018 83 Performance Analysis of Video Conferencing over Various IPv4/IPv6 Transition Mechanisms Khalid EL KHADIRI,

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6

CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6 CONCEPTION ON TRANSITION METHODS: DEPLOYING NETWORKS FROM IPV4 TO IPV6 1 MS. CHAITA JANI, 2 PROF.MEGHA MEHTA 1 M.E.[C.E] Student, Department Of Computer Engineering, Noble Group Of Institutions, Junagadh,Gujarat

More information

Evaluating IPv6 in Peer-to-Peer Gigabit Ethernet for UDP using Modern Operating Systems

Evaluating IPv6 in Peer-to-Peer Gigabit Ethernet for UDP using Modern Operating Systems Evaluating IPv6 in Peer-to-Peer Gigabit Ethernet for UDP using Modern Operating Systems Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

GESJ: Computer Science and Telecommunications 2016 No.4(50) ISSN

GESJ: Computer Science and Telecommunications 2016 No.4(50) ISSN PERFORMANCE EVALUATION OF LINUX AND MICROSOFT WINDOWS OPERATING SYSTEMS ON CONFIGURED TUNNELS OF IPV6 AND IPV4 1 OGUNLEYE G.O, 2 Bankole B. 1 Department of Computer Science, Federal University, Oye-Ekiti,

More information

IPv4/v6 Considerations Ralph Droms Cisco Systems

IPv4/v6 Considerations Ralph Droms Cisco Systems Title IPv4/v6 Considerations Ralph Droms Cisco Systems Agenda Motivation for IPv6 Review of IPv6 Impact of differences Tools and techniques Why IPv6? More addresses More addresses More addresses Security,

More information

Transition Strategies from IPv4 to IPv6: The case of GRNET

Transition Strategies from IPv4 to IPv6: The case of GRNET Transition Strategies from IPv4 to IPv6: The case of GRNET C. Bouras 1,2, P. Ganos 1, A. Karaliotas 1,2 1 Research Academic Computer Technology Institute, Patras, Greece 2 Department of Computer Engineering

More information

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6 5.1 Tunneling 5.1.1 Automatic Tunneling 5.1.2 Configured Tunneling 5.2 Dual Stack 5.3 Translation 5.4 Migration Strategies for Telcos and ISPs Introduction - Transition - the process or a period of changing

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of

More information

Performance Evaluation of NEMO Basic Support Implementations

Performance Evaluation of NEMO Basic Support Implementations Performance Evaluation of NEMO Basic Support Implementations Romain Kuntz, Koshiro Mitsuya, Ryuji Wakikawa Keio University, Japan E-mail: {kuntz,mitsuya,ryuji}@sfc.wide.ad.jp Abstract. The NEMO Basic Support

More information

Performance Comparison of Internet Protocol v4 with Internet Protocol v6

Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Mrs. Sheetal Mali Department of Electronics and Telecommunication Parvatibai Genba Sopanrao Moze College of Engineering Wagholi,

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

ECE 435 Network Engineering Lecture 14

ECE 435 Network Engineering Lecture 14 ECE 435 Network Engineering Lecture 14 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 25 October 2018 Announcements HW#6 was due HW#7 will be posted 1 IPv4 Catastrophe 2 Out of

More information

A 6to4 Gateway with Co-located NAT

A 6to4 Gateway with Co-located NAT A Gateway with NAT Anthony K. Tsetse, Alexander L. Wijesinha, Ramesh K. Karne, and Alae Loukili Department of Computer & Information Sciences Towson University Towson, MD 21252, U.S.A. {atsetse, awijesinha,

More information

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.

More information

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: IPv6 Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS IPv6 datagram format:

More information

IPv4 to IPv6 Network Migration and Coexistence

IPv4 to IPv6 Network Migration and Coexistence IPv4 to IPv6 Network Migration and Coexistence A.Chandra 1, K. Lalitha 2 1 Assistant Professor, Department of CSSE, Sree Vidyanikethan Engg. College, Tirupati, Andhra Pradesh, India 2 Assistant Professor(SL),

More information

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class Goals of This Lecture Network Layer Kuang Chiu Huang TCM NCKU Through the lecture and in-class discussion, students are enabled to describe role and functions of the network layer, and compare different

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

IPv6 Transition Technologies (TechRef)

IPv6 Transition Technologies (TechRef) Tomado de: http://technet.microsoft.com/en-us/library/dd379548.aspx IPv6 Transition Technologies (TechRef) Updated: January 7, 2009 IPv6 Transition Technologies Protocol transitions are not easy, and the

More information

An Industry view of IPv6 Advantages

An Industry view of IPv6 Advantages An Industry view of IPv6 Advantages March 2002 Yanick.Pouffary@Compaq.Com Imagine what IPv6 can do for you! 1 Where we are Today IPv4 a victim of its own success IPv4 addresses consumed at an alarming

More information

IPv6 Next generation IP

IPv6 Next generation IP Seminar Presentation IPv6 Next generation IP N Ranjith Kumar 11/5/2004 IPv6 : Next generation IP 1 Network Problems Communication Problem Identification Problem Identification of Networks Logical Addressing

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Dual-Stack Lite for IPv6 Access Release NCE0025 Modified: 2016-10-12 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat no true in practice. administrative autonomy

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat no true in practice. administrative autonomy Hierarchical Routing Our routing study thus far - idealization all routers identical network flat no true in practice scale: with 50 million destinations: can t store all dest s in routing tables! routing

More information

Implementation of Multicast Routing on IPv4 and IPv6 Networks

Implementation of Multicast Routing on IPv4 and IPv6 Networks Implementation of Multicast Routing on IPv4 and IPv6 Networks Dr.Sridevi, Assistant Professor, Dept of Computer Science, Karnatak University, Dharwad. Abstract: Fast developing world of technology, multimedia

More information

Executive Summary...1 Chapter 1: Introduction...1

Executive Summary...1 Chapter 1: Introduction...1 Table of Contents Executive Summary...1 Chapter 1: Introduction...1 SSA Organization... 1 IRM Strategic Plan Purpose... 3 IRM Strategic Plan Objectives... 4 Relationship to Other Strategic Planning Documents...

More information

Performance Analysis of IPv6 Transition Mechanisms over MPLS

Performance Analysis of IPv6 Transition Mechanisms over MPLS Performance Analysis of IPv6 Transition Mechanisms over MPLS Parisa Grayeli 1, Shahram Sarkani 2, and Thomas Mazzuchi 3 1 The George Washington University, School of Engineering, Washington DC 20052, USA

More information

TOWARD IPV4 TO IPV6 MIGRATION WITHIN A CAMPUS NETWORK

TOWARD IPV4 TO IPV6 MIGRATION WITHIN A CAMPUS NETWORK TOWARD IPV4 TO IPV6 MIGRATION WITHIN A CAMPUS NETWORK MOHAMMAD MIRWAIS YOUSAFZAI, 1 NOR EFFENDY OTHMAN, ROSILAH HASSAN Research Center for Software Technology and Management, Faculty of Information Science

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

IPv6 Technical Challenges

IPv6 Technical Challenges IPv6 Technical Challenges Peter Palúch, CCIE #23527, CCIP University of Zilina, Slovakia Academy Salute, April 15 th 16 th, Bucharest IPv6 technical challenges What challenges do I meet if I decide to

More information

IPv6 migration challenges and Security

IPv6 migration challenges and Security IPv6 migration challenges and Security ITU Regional Workshop for the CIS countries Recommendations on transition from IPv4 to IPv6 in the CIS region, 16-18 April 2014 Tashkent, Republic of Uzbekistan Desire.karyabwite@itu.int

More information

IPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC

IPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC IPv6: Are we really ready to turn off IPv4? Geoff Huston APNIC The IPv6 Timeline 1990 2000 2010 2020 The IPv6 Timeline Yes, we ve been working on this for close to 30 years! 1990 2000 2010 2020 In-situ

More information

IPv6 : Internet Protocol Version 6

IPv6 : Internet Protocol Version 6 IPv6 : Internet Protocol Version 6 History Internet growth was faster than anticipated In early 1990 s, it was realized that we may run out of IPv4 addresses somewhere between 2000 and 2010 Also, experiences

More information

History. IPv6 : Internet Protocol Version 6. IPv4 Year-Wise Allocation (/8s)

History. IPv6 : Internet Protocol Version 6. IPv4 Year-Wise Allocation (/8s) History IPv6 : Internet Protocol Version 6 Internet growth was faster than anticipated In early 1990 s, it was realized that we may run out of IPv4 addresses somewhere between 2000 and 2010 Also, experiences

More information

Migration to IPv6 from IPv4. Is it necessary?

Migration to IPv6 from IPv4. Is it necessary? Introduction Today Internet plays a big role in every aspect of our lives and IP acted as an important pillar of Internet. Since its inception the Internet has reached almost all corners of globe and it

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

Communication Systems IPv6

Communication Systems IPv6 Communication Systems IPv6 Computer Science Network Layer from IPv4 to IPv6 Staying on the third layer but exchange the protocol Introduction to future IP The IP v6 address IP v6 header and extension headers

More information

A Service Management Architecture for NEMO in IPv4 and IPv6 Networks

A Service Management Architecture for NEMO in IPv4 and IPv6 Networks A Service Management Architecture for NEMO in IPv4 and IPv6 Networks JinHoKim,ChoongSeonHong, Dae Sun Kim Department of Computer Engineering, Kyung Hee University, Seocheon, Giheung, Yongin, Gyeonggi,

More information

MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE

MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE 1 SHEETAL BORSE, 2 MRUDUL DIXIT 1,2 Department of Electronics and Telecommunication, Cummins College of Engineering

More information

Chapter 15 IPv6 Transition Technologies

Chapter 15 IPv6 Transition Technologies Chapter 15 IPv6 Transition Technologies Published: April 18, 2006 Updated: November 06, 2006 Writer: Joe Davies 1 Abstract This chapter describes the mechanisms that aid in the transition of Internet Protocol

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

Network Working Group. Category: Informational Bay Networks Inc. September 1997

Network Working Group. Category: Informational Bay Networks Inc. September 1997 Network Working Group Request for Comments: 2185 Category: Informational R. Callon Cascade Communications Co. D. Haskin Bay Networks Inc. September 1997 Routing Aspects Of IPv6 Transition Status of this

More information

NAT, IPv6, & UDP CS640, Announcements Assignment #3 released

NAT, IPv6, & UDP CS640, Announcements Assignment #3 released NAT, IPv6, & UDP CS640, 2015-03-03 Announcements Assignment #3 released Overview Network Address Translation (NAT) IPv6 Transport layer User Datagram Protocol (UDP) Network Address Translation (NAT) Hacky

More information

IPv6 tutorial. RedIRIS Miguel Angel Sotos

IPv6 tutorial. RedIRIS Miguel Angel Sotos IPv6 tutorial RedIRIS Miguel Angel Sotos miguel.sotos@rediris.es Agenda History Why IPv6 IPv6 addresses Autoconfiguration DNS Transition mechanisms Security in IPv6 IPv6 in Windows and Linux IPv6 now 2

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Performance Evaluation of IPv4/IPv6 Transition Mechanisms for Real-Time Applications using OPNET Modeler

Performance Evaluation of IPv4/IPv6 Transition Mechanisms for Real-Time Applications using OPNET Modeler Performance Evaluation of IPv4/IPv6 Transition Mechanisms for Real-Time Applications using OPNET Modeler Khalid EL KHADIRI 1, Ouidad LABOUIDYA 2, Najib ELKAMOUN 3, Rachid HILAL 4 STIC Laboratory Chouaib

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

Chapter 18 and 22. IPv4 Address. Data Communications and Networking

Chapter 18 and 22. IPv4 Address. Data Communications and Networking University of Human Development College of Science and Technology Department of Information Technology Chapter 18 and 22 Data Communications and Networking IPv4 Address 1 Lecture Outline IPv4 Addressing

More information

Table of Contents Chapter 1 Tunneling Configuration

Table of Contents Chapter 1 Tunneling Configuration Table of Contents Table of Contents... 1-1 1.1 Introduction to Tunneling... 1-1 1.1.1 IPv6 over IPv4 Tunnel... 1-2 1.1.2 IPv4 over IPv4 Tunnel... 1-7 1.2 Tunneling Configuration Task List... 1-8 1.3 Configuring

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

B. Carpenter. January Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice

B. Carpenter. January Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels. Copyright Notice IETF Internet Draft January 1999 B. Carpenter K. Moore Connection of IPv6 Domains via IPv4 Clouds without Explicit Tunnels Copyright Notice Placeholder for ISOC copyright if needed Abstract draft-ietf-ngtrans-6to4-00.txt

More information

A Comparison of VoIP Performance on IPv6 and IPv4 Networks

A Comparison of VoIP Performance on IPv6 and IPv4 Networks A Comparison of VoIP Performance on IPv6 and IPv4 Networks Roman Yasinovskyy, Alexander L. Wijesinha, Ramesh K. Karne, and Gholam Khaksari Towson University Abstract We compare VoIP performance on IPv6

More information

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network Question No: 1( M a r k s: 1 ) A ---------- Relies on the hardware manufacturer to assign a unique physical

More information

Transition To IPv6 October 2011

Transition To IPv6 October 2011 Transition To IPv6 October 2011 Fred Bovy ccie #3013 fred@fredbovy.com 2011 Fred Bovy fred@fredbovy.com. Transition to IPv6 1 1st Generation: The IPv6 Pioneers Tunnels for Experimental testing or Enterprises

More information

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Semra.gulder@crc.ca, mathieu.deziel@crc.ca Abstract: This paper describes a QoS mechanism suitable for Mobile Ad Hoc Networks

More information

EE 610 Part 2: Encapsulation and network utilities

EE 610 Part 2: Encapsulation and network utilities EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Mobility Management - Basics

Mobility Management - Basics Mobility Management - Basics Summer Semester 2012 Integrated Communication Systems Group Ilmenau University of Technology Content Motivation Problem and possible solutions IP-based mobility management

More information

Chapter 5 OSI Network Layer

Chapter 5 OSI Network Layer Chapter 5 OSI Network Layer The protocols of the OSI model Network layer specify addressing and processes that enable Transport layer data to be packaged and transported. The Network layer encapsulation

More information

IPv6 Transition Mechanisms

IPv6 Transition Mechanisms IPv6 Transition Mechanisms Petr Grygárek rek 1 IPv6 and IPv4 Coexistence Expected to co-exist together for many years Some IPv4 devices may exist forever Slow(?) transition of (part of?) networks to IPv6

More information

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁 II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:

More information

Authors Ioan Raicu Ahmad Naveed

Authors Ioan Raicu Ahmad Naveed Page 1 of 19 Tunneling: A Transition Mechanism to Deploy IPv6 Networks Authors Ioan Raicu Course: CSC8260 Advisor Dr. Sherali Zeadally Wayne State University Document Created: 11/5/2001 Last Date Modified:

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter 5 Network Layer Network Layer IPv4 2 IP Header Application Header + data 3 IP IP IP IP 4 Focus on Transport Layer IP IP 5 Network Layer The Network layer (Layer 3) provides services to exchange

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

IPv6 Transition Mechanism on UKMNet Network Environment

IPv6 Transition Mechanism on UKMNet Network Environment Journal of Computer Sciences Original Research Paper IPv6 Transition Mechanism on UKMNet Network Environment 1 Mohd Azi Bin Abdullah and 2 Nor Effendy Othman 1 Department of Network, Center for Information

More information

LANCOM Techpaper Routing Performance

LANCOM Techpaper Routing Performance LANCOM Techpaper Routing Performance Applications for communications and entertainment are increasingly based on IP networks. In order to ensure that the necessary bandwidth performance can be provided

More information

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates: BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT

More information

A Multihoming based IPv4/IPv6 Transition Approach

A Multihoming based IPv4/IPv6 Transition Approach A Multihoming based IPv4/IPv6 Transition Approach Lizhong Xie, Jun Bi, and Jianping Wu Network Research Center, Tsinghua University, China Education and Research Network (CERNET) Beijing 100084, China

More information

IPv6 (IP( version 6) 6 Essentials Ch0: Overwiew. Louis Chuang Fu Jen Catholic University EE ENCL

IPv6 (IP( version 6) 6 Essentials Ch0: Overwiew. Louis Chuang Fu Jen Catholic University EE ENCL IPv6 (IP( version 6) 6 Essentials Ch0: Overwiew Louis Chuang Fu Jen Catholic University EE ENCL What s s the Internet Protocols control sending, receiving of msgs e.g., TCP, IP, HTTP, FTP, PPP Internet:

More information

Networks. an overview. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. February 4, 2008

Networks. an overview. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. February 4, 2008 Networks an overview dr. C. P. J. Koymans Informatics Institute University of Amsterdam February 4, 2008 dr. C. P. J. Koymans (UvA) Networks February 4, 2008 1 / 53 1 Network modeling Layered networks

More information

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model Principles IP QoS DiffServ Differentiated Services Architecture DSCP, CAR Integrated Services Model does not scale well flow based traffic overhead (RSVP messages) routers must maintain state information

More information

Position of IP and other network-layer protocols in TCP/IP protocol suite

Position of IP and other network-layer protocols in TCP/IP protocol suite Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

QoS Provisioning Using IPv6 Flow Label In the Internet

QoS Provisioning Using IPv6 Flow Label In the Internet QoS Provisioning Using IPv6 Flow Label In the Internet Xiaohua Tang, Junhua Tang, Guang-in Huang and Chee-Kheong Siew Contact: Junhua Tang, lock S2, School of EEE Nanyang Technological University, Singapore,

More information

IPv6 Addressing. There are three types of IPV6 Addresses. Unicast:Multicast:Anycast

IPv6 Addressing. There are three types of IPV6 Addresses. Unicast:Multicast:Anycast IPv6 Addressing There are three types of IPV6 Addresses. Unicast:Multicast:Anycast Unicast IPv6 addresses A unicast address identifies a single interface within the scope of the type of unicast address.

More information

Performance of an IPv6 Web Server under Congestion

Performance of an IPv6 Web Server under Congestion Performance of an IPv6 Web Server under Congestion A. Loukili, A. K. Tsetse, A. L. Wijesinha, R. K. Karne, and P. Appiah-Kubi Department of Computer & Information Sciences Towson University Towson, MD

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William Dr. John Keeney 3BA33 TCP/IP protocol architecture with IP OSI Model Layers TCP/IP Protocol Architecture Layers TCP/IP Protocol Suite Application Layer Application Layer Telnet FTP HTTP DNS RIPng SNMP

More information

Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET

Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET Suhail Ahmad Wajid Ali Hamdani Mohsin Hassan Magray ABSTRACT Over the last two decades, we have witnessed a rapid deployment of real-time applications

More information

Testing the Channel Aggregation Capability of the MPT Multipath Communication Library

Testing the Channel Aggregation Capability of the MPT Multipath Communication Library Testing the Channel Aggregation Capability of the MPT Multipath Communication Library Gábor Lencse Department of Telecommunications Széchenyi István University Győr, Hungary lencse@sze.hu Ákos Kovács Department

More information

Deployment and Performance Evaluation of Teredo and ISATAP over Real Test-bed Setup

Deployment and Performance Evaluation of Teredo and ISATAP over Real Test-bed Setup Deployment and Performance Evaluation of Teredo and ISATAP over Real Test-bed Setup Mohammad Aazam 1,2 1 Mohi-ud-Din Islamic University, Islamabad, Pakistan aazam@corenet.org.pk Syed Atif Hussain Shah

More information

INTRODUCTION OF IPV6. Ravikumar Naik 21/11/2011

INTRODUCTION OF IPV6. Ravikumar Naik 21/11/2011 INTRODUCTION OF IPV6 Ravikumar Naik 21/11/2011 Outline Why we need a new version of the IP protocol? IPv6 Basics IPv6 Addressing Why we need a new version of the IP protocol? Contemporary studies indicated

More information

OSI Network Layer. Chapter 5

OSI Network Layer. Chapter 5 OSI Network Layer Network Fundamentals Chapter 5 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most common Network

More information

Network Layer: Internet Protocol

Network Layer: Internet Protocol Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

IPv6 in Campus Networks

IPv6 in Campus Networks IPv6 in Campus Networks Dave Twinam Manager, Technical Marketing Engineering Internet Systems Business Unit dtwinam@cisco.com Cisco Twinam IPv6 Summit 2003 Cisco Systems, Inc. All rights reserved. 1 IPv6

More information

Cisco CCNA (ICND1, ICND2) Bootcamp

Cisco CCNA (ICND1, ICND2) Bootcamp Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

CSCI-1680 Network Layer:

CSCI-1680 Network Layer: CSCI-1680 Network Layer: Wrapup Rodrigo Fonseca Based partly on lecture notes by Jennifer Rexford, Rob Sherwood, David Mazières, Phil Levis, John JannoA Administrivia Homework 2 is due tomorrow So we can

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information