39
IPv6 Tunnelling Algorithms IPv6 Tunnelling Algorithms in 4G Networks in 4G Networks

Kkbnet2010 i pv6 tunneling algorithms

  • Upload
    hanums1

  • View
    449

  • Download
    3

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Kkbnet2010 i pv6 tunneling algorithms

IPv6 Tunnelling Algorithms in IPv6 Tunnelling Algorithms in 4G Networks4G Networks

Page 2: Kkbnet2010 i pv6 tunneling algorithms

Mr. Hanumanthappa.JMr. Hanumanthappa.J11,Dr.Manjaiah.D.H,Dr.Manjaiah.D.H2 2 &Aravinda.C.V&Aravinda.C.V33. .

11DoS in CS,Manasagangothri,University of Mysore, Mysore -06DoS in CS,Manasagangothri,University of Mysore, Mysore -06

[email protected]. .

2 2 Dept.of.Computer Science,Dept.of.Computer Science,Mangalagangothri, Mangalore UniversityMangalagangothri, Mangalore University

Mangalore,INDIA Mangalore,INDIA [email protected]..

33M.Tech.,K.S.O.U.,Manasagangotri,Mysore,INDIAM.Tech.,K.S.O.U.,Manasagangotri,Mysore,[email protected]@gmail.com

Page 3: Kkbnet2010 i pv6 tunneling algorithms

Theme of the PaperTheme of the Paper Tunneling Algorithms are playing a vital role in IPv6..

Tunneling Algorithms are playing a vital role in IPv6.Tunneling is the process of embedding IPv6 packet in IPv4 protocol or IPv4 packet in IPv6 protocol.

Tunnels playing important role for the quick access to the IPv6 network which relies on IPv6–in –IPv4 tunnels where native connectivity is not available.

The term Tunneling is widely used both to enhance networks without having to deploy native infrastructure and to improve security.

8-9,2010 3KKBNET-2010.,N.I.T.K.,Surathkal.

Page 4: Kkbnet2010 i pv6 tunneling algorithms

ContentsContents•Limitations of IPv4.Limitations of IPv4.

•Introduction .Introduction .

-Overview of IPv6-Overview of IPv6

-IPv6 : Distinctive Features.-IPv6 : Distinctive Features.

-IPv6 Header Format.-IPv6 Header Format.

•Literature review.Literature review.

• Types of IPv6 Tunnels.Types of IPv6 Tunnels.

•Related work(IPv6 Tunneling Algorithms)Related work(IPv6 Tunneling Algorithms)

•Simulation and Results.Simulation and Results.

•Conclusion.Conclusion.

•Bibliography.Bibliography.

Page 5: Kkbnet2010 i pv6 tunneling algorithms

5

Problems with IPv4 : Limited Address SpaceProblems with IPv4 : Limited Address Space

• IPv4 has 32 bit addresses.IPv4 has 32 bit addresses.• Flat addressing (only netid + hostid with “fixed” boundaries)Flat addressing (only netid + hostid with “fixed” boundaries)• Results in inefficient use of address space.Results in inefficient use of address space.• Class B addresses are almost over.Class B addresses are almost over.• Addresses will exhaust in the next 5 years.Addresses will exhaust in the next 5 years.• IPv4 is victim of its own success.IPv4 is victim of its own success.

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.

Page 6: Kkbnet2010 i pv6 tunneling algorithms

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal. 6

Page 7: Kkbnet2010 i pv6 tunneling algorithms

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal. 7

Page 8: Kkbnet2010 i pv6 tunneling algorithms

8

Problems with IPv4 : Routing Table ExplosionProblems with IPv4 : Routing Table Explosion

• IP does not permit route aggregationIP does not permit route aggregation

(limited super netting possible with new routers)(limited super netting possible with new routers)• Mostly only class C addresses remainMostly only class C addresses remain• Number of networks is increasing very fastNumber of networks is increasing very fast

(number of routes to be advertised goes up)(number of routes to be advertised goes up)• Very high routing overheadVery high routing overhead

• lot more memory needed for routing tablelot more memory needed for routing table• lot more bandwidth to pass routing informationlot more bandwidth to pass routing information• lot more processing needed to compute routes lot more processing needed to compute routes

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.

Page 9: Kkbnet2010 i pv6 tunneling algorithms

9

Problems with IPv4 : Header LimitationsProblems with IPv4 : Header Limitations

• Maximum header length is 60 octets.Maximum header length is 60 octets.(Restricts options)(Restricts options)

• Maximum packet length is 64K octets.Maximum packet length is 64K octets.(Do we need more than that ?)(Do we need more than that ?)

• ID for fragments is 16 bits. Repeats every 65537th packet.ID for fragments is 16 bits. Repeats every 65537th packet. (Will two packets in the network have same ID?)(Will two packets in the network have same ID?)

• Variable size header.Variable size header.(Slower processing at routers.)(Slower processing at routers.)

• No ordering of options.No ordering of options.(All routers need to look at all options.)(All routers need to look at all options.)

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.

Page 10: Kkbnet2010 i pv6 tunneling algorithms

10

Problems with IPv4 : Other LimitationsProblems with IPv4 : Other Limitations

• Lack of quality-of-service support.Lack of quality-of-service support.• Only an 8-bit ToS field, which is hardly used.Only an 8-bit ToS field, which is hardly used.• Problem for multimedia services.Problem for multimedia services.

• No support for security at IP layer.No support for security at IP layer.• Mobility support is limited.Mobility support is limited.

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.

Page 11: Kkbnet2010 i pv6 tunneling algorithms

Introduction to IPv6Introduction to IPv6

IPv6 addressing :IPv6 addressing : An IPv6 address consists of 16 bytes (octets).It is 128 bits long.128 bits are divided into 8(eight) sections, size of each section is 2 bytes. Each section of IPv6 is represented by 4 Hexadecimal digits. Therefore it is totally represented by 32 Hexadecimal digits with every four digits separated by a colon.

•IPv6 quadruples the size of an IPv4 address from 32 bits to 128 bits. The IPv6 address is so large that it cannot be exhausted in the foreseeable future..

8-9,2010 11KKBNET-2010.,N.I.T.K.,Surathkal.

Page 12: Kkbnet2010 i pv6 tunneling algorithms

12

IPv6 Address

Fig-1.

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.

Page 13: Kkbnet2010 i pv6 tunneling algorithms

13

IPv6: Distinctive FeaturesIPv6: Distinctive Features• Larger address space.Larger address space.• Header format simplificationHeader format simplification• Expanded routing and addressing capabilitiesExpanded routing and addressing capabilities• Improved support for extensions and optionsImproved support for extensions and options• Flow labeling (for QoS) capabilityFlow labeling (for QoS) capability• Auto-configuration and Neighbour discoveryAuto-configuration and Neighbour discovery• Authentication and privacy capabilitiesAuthentication and privacy capabilities• Simple transition from IPv4.Simple transition from IPv4.• Encryption and Decryption.Encryption and Decryption.• Real time applications like Video & Audio.Real time applications like Video & Audio.

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.

Page 14: Kkbnet2010 i pv6 tunneling algorithms

IPv6 Header FormatIPv6 Header Format

Traffic Class Flow LabelVers

Payload Length Next Header Hop Limit

Source Address

Destination Address

0 4 12 16 24 31

8-9,2010 14KKBNET-2010.,N.I.T.K.,Surathkal.

Page 15: Kkbnet2010 i pv6 tunneling algorithms

Perspective of IPv6 Services in INDIAPerspective of IPv6 Services in INDIA..

Mob

ile N

etw

ork

Home

Broadcast Center

SchoolHospital Governmen

t

Broadband Access

(ADSL, CATV, FWA, FTTH)

VoIP

Intelligent Transport System

BankBusiness Store

PSTN

Broadband Always-On Seamless Connection to PSTN/Mobile Network Application of Contents(Stream) Delivery and Electronic Commerce

Telephony

Electronic Commerce

Internet Broadcasting Electronic

Government

Mobile IPMusic/Video Download

8-9,2010 15KKBNET-2010.,N.I.T.K.,Surathkal.

Page 16: Kkbnet2010 i pv6 tunneling algorithms

• 4G is one which is used to resolve all the problems of 3G Technology4G is one which is used to resolve all the problems of 3G Technology ..

• 4G advanced wireless communication system is designed to allow seamless 4G advanced wireless communication system is designed to allow seamless integration and Communication between wireless devices across diverse integration and Communication between wireless devices across diverse wireless standards as well as broadband networks wirelessly.wireless standards as well as broadband networks wirelessly.

• 4G expands the terms like MAGIC4G expands the terms like MAGIC

• Mobile Multimedia(M),Anytime Anywhere(A),Global mobility Mobile Multimedia(M),Anytime Anywhere(A),Global mobility support(G),Integrated wireless solutions(I),and Customized Personnel support(G),Integrated wireless solutions(I),and Customized Personnel service(C). service(C).

• 4G not only supports Mobile service and also it supports Fixed wireless 4G not only supports Mobile service and also it supports Fixed wireless

networksnetworks..

Overview of 4G NetworksOverview of 4G Networks

8-9,2010 16KKBNET-2010.,N.I.T.K.,Surathkal.

Page 17: Kkbnet2010 i pv6 tunneling algorithms

• 4G must be more powerful than 3G in terms 4G must be more powerful than 3G in terms

• Services.Services.

• Applications.Applications.

• Technology.Technology.

• 4G is not a High speed uplink or a downlink packet access(HSUPA/HSDPA) or WLAN4G is not a High speed uplink or a downlink packet access(HSUPA/HSDPA) or WLAN . . o 3G+WLAN<4G.3G+WLAN<4G.o 3G+HSDPA+WLAN<4G.3G+HSDPA+WLAN<4G.o 3G+HSDPA+HSUPA+WLAN<4G.3G+HSDPA+HSUPA+WLAN<4G. 4G is to replace entire core of cellular networks Single worldwide cellular nets using 4G is to replace entire core of cellular networks Single worldwide cellular nets using

IPv6 for video,voice, Multimedia applicationsIPv6 for video,voice, Multimedia applications..

4G Primary Goals4G Primary Goals

8-9,2010 17KKBNET-2010.,N.I.T.K.,Surathkal.

Page 18: Kkbnet2010 i pv6 tunneling algorithms

• High User-level Customization.High User-level Customization.

-QoS,radio environment.-QoS,radio environment.

• Carrier Frequency-5Ghz.Carrier Frequency-5Ghz.

• Channel Bandwidth/Operator-50MHz.Channel Bandwidth/Operator-50MHz.

• Data rate-100 to 1000 Mbits/Sec.Data rate-100 to 1000 Mbits/Sec.

• Bandwidth efficiency- 2 to 20 bits/hertz.Bandwidth efficiency- 2 to 20 bits/hertz.o Ubiquity-Ubiquity-o IPv6,MIPv6,Single carrier(SC),Multi IPv6,MIPv6,Single carrier(SC),Multi

carrier(MC),OFDM,TDMA,CDMA.carrier(MC),OFDM,TDMA,CDMA.

18

Salient features of 4G advanced Wireless NetworksSalient features of 4G advanced Wireless Networks

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.

Page 19: Kkbnet2010 i pv6 tunneling algorithms

19

Transition to IPv6 : Design GoalTransition to IPv6 : Design Goal

• No “flag”day.No “flag”day.• Incremental upgrade and deployment.Incremental upgrade and deployment.• Minimum upgrade dependencies.Minimum upgrade dependencies.• Interoperability of IPv4 and IPv6 nodes.Interoperability of IPv4 and IPv6 nodes.• Let sites transition at their own pace.Let sites transition at their own pace.• Basic migration toolsBasic migration tools

• Dual stack and tunnelingDual stack and tunneling• TranslationTranslation

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.

Page 20: Kkbnet2010 i pv6 tunneling algorithms

2020

Transition from IPv4 to IPv6Transition from IPv4 to IPv6..

Figure-1. IPv6 Transition Mechanisms.

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.

Page 21: Kkbnet2010 i pv6 tunneling algorithms

Transition Mechanisms: Dual StackTransition Mechanisms: Dual Stack

• New nodes support both IPv4 and IPv6.New nodes support both IPv4 and IPv6.• Upgrading from IPv4 to v4/v6 does not break anything.Upgrading from IPv4 to v4/v6 does not break anything.• Same transport layer and application above both.Same transport layer and application above both.• Provides complete interoperability with IPv4 nodes.Provides complete interoperability with IPv4 nodes.

8-9,2010 21KKBNET-2010.,N.I.T.K.,Surathkal.

Page 22: Kkbnet2010 i pv6 tunneling algorithms

22

Fig.2.Dual Stack.

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal.

Page 23: Kkbnet2010 i pv6 tunneling algorithms

Introduction to IPv6 TunnelingIntroduction to IPv6 Tunneling. .

• Tunnel is a bidirectional point–to-point link between two Tunnel is a bidirectional point–to-point link between two network endpoints.network endpoints.

8-9,2010 23KKBNET-2010.,N.I.T.K.,Surathkal.

A B C D Tunneling

Original Packet Source Node

Tunnel Entry Point Node

Tunnel End Point Node

Original Packet Destination Node

Page 24: Kkbnet2010 i pv6 tunneling algorithms

• The term “tunneling” refers to a means to encapsulate one version of The term “tunneling” refers to a means to encapsulate one version of IP in another so the packets can be sent over a backbone that does not IP in another so the packets can be sent over a backbone that does not support the encapsulated IP versionsupport the encapsulated IP version..

• Tunneling strategies are mainly categorized into four types for Tunneling strategies are mainly categorized into four types for deploying IPv6,Deploying IPv6 over IPv4 tunnels , Deploying IPv6 deploying IPv6,Deploying IPv6 over IPv4 tunnels , Deploying IPv6 over dedicated data links, Deploying IPv6 over MPLS backbones.over dedicated data links, Deploying IPv6 over MPLS backbones.

• Topology and the evolution of the IPv6 network and is useful for Topology and the evolution of the IPv6 network and is useful for troubleshooting and performance optimization.troubleshooting and performance optimization.

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal. 24

Page 25: Kkbnet2010 i pv6 tunneling algorithms

Types of IPv6 TunnelsTypes of IPv6 Tunnels... .

Fig.2.Instance diagram of IPv6 TunnelingFig.2.Instance diagram of IPv6 Tunneling..

8-9,2010 25KKBNET-2010.,N.I.T.K.,Surathkal.

Page 26: Kkbnet2010 i pv6 tunneling algorithms

IPv6 Automatic Tunneling.

Fig.3.Automatic Tunneling.

8-9,2010 26KKBNET-2010.,N.I.T.K.,Surathkal.

Page 27: Kkbnet2010 i pv6 tunneling algorithms

Receiving Host ->{Rh}Receiving Host ->{Rh}

IPv6 compatible address->{IPv6ca}IPv6 compatible address->{IPv6ca}

Sender->S,Receiver->R.,Da->Destination address,Sa->Source AddresSender->S,Receiver->R.,Da->Destination address,Sa->Source Addresss..

1.Suppose If Rh uses IPv6c then1.Suppose If Rh uses IPv6c then

2.Print “Tunneling occurs automatically with reconfiguration”2.Print “Tunneling occurs automatically with reconfiguration”

3.If sender sends the receiver an IPv6 packet with IPv6c as a Da then3.If sender sends the receiver an IPv6 packet with IPv6c as a Da then

4.Suppose If the packet reaches boundary of IPv4 net then 4.Suppose If the packet reaches boundary of IPv4 net then

5.Print “Router encapsulated IPv6 packet it in an IPv4 packet format” then5.Print “Router encapsulated IPv6 packet it in an IPv4 packet format” then

6.When to send an IPv6 packet in the form of IPv4 packet then6.When to send an IPv6 packet in the form of IPv4 packet then

7.We need IPv4 address.7.We need IPv4 address.

8.If Router extracts IPv4 address embedded in the IPv6 then8.If Router extracts IPv4 address embedded in the IPv6 then

9.When a packet starts its rest of journey as in the form of IPv4 packet then 9.When a packet starts its rest of journey as in the form of IPv4 packet then

10.Dh using dual stack receives IPv4 packet then 10.Dh using dual stack receives IPv4 packet then

11.If it recognizes its IPv4 address then 11.If it recognizes its IPv4 address then

12.It reads the header and then packet is forwarded(carrying) in the form of IPv4 packet then 12.It reads the header and then packet is forwarded(carrying) in the form of IPv4 packet then

13.Finally packet is sent it to IPv6 Software for processing[10].13.Finally packet is sent it to IPv6 Software for processing[10].

14.[End].14.[End].

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal. 27

Page 28: Kkbnet2010 i pv6 tunneling algorithms

Fig.4.Configured Tunnelling.

8-9,2010 28KKBNET-2010.,N.I.T.K.,Surathkal.

Page 29: Kkbnet2010 i pv6 tunneling algorithms

IPv6 in IPv4 Static TunnelingIPv6 in IPv4 Static Tunneling. . • Static tunneling is also called as Configured tunneling. Static tunneling can be Static tunneling is also called as Configured tunneling. Static tunneling can be

used to link isolated islands of IPv6, in which the network domains are well used to link isolated islands of IPv6, in which the network domains are well known and unlikely to change without noticeknown and unlikely to change without notice..

• A static configured tunneling is equal to a permanent link of two IPv6 domains A static configured tunneling is equal to a permanent link of two IPv6 domains with the permanent connectivity provided over an IPv4 backbonewith the permanent connectivity provided over an IPv4 backbone..

• Static tunneling assigned IPv4 addresses are manually configured to the tunnel Static tunneling assigned IPv4 addresses are manually configured to the tunnel source and the tunnel destination.source and the tunnel destination.

• In a static tunneling the host or router at each end of a static configured tunnel In a static tunneling the host or router at each end of a static configured tunnel must support both IPv4 and IPv6 protocol stacksmust support both IPv4 and IPv6 protocol stacks..

• The static tunneling in 4G networks was most preferred when the necessary of The static tunneling in 4G networks was most preferred when the necessary of a few tunnels to forward a packets from source host to the destination host via a few tunnels to forward a packets from source host to the destination host via tunnel end pointstunnel end points..

8-9,2010 29KKBNET-2010.,N.I.T.K.,Surathkal.

Page 30: Kkbnet2010 i pv6 tunneling algorithms

8-9,2010 30KKBNET-2010.,N.I.T.K.,Surathkal.

Page 31: Kkbnet2010 i pv6 tunneling algorithms

Static Tunneling AlgorithmStatic Tunneling Algorithm

NomenclatureNomenclature::

Tunnel Source->{Ts},Tunnel destination->{Td}.Tunnel Source->{Ts},Tunnel destination->{Td}.

Static tunneling->{St},Routing Table{Rt}.Static tunneling->{St},Routing Table{Rt}.

  

1.If St assigned IPv4 addresses are manually configured to the Ts and Td then1.If St assigned IPv4 addresses are manually configured to the Ts and Td then

2.To identify the packets which has to forward through tunnel via Rt in the tunnel end 2.To identify the packets which has to forward through tunnel via Rt in the tunnel end points thenpoints then

3.The Rt forwards packets based on their destination using prefix mask and match 3.The Rt forwards packets based on their destination using prefix mask and match techniquetechnique

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal. 31

Page 32: Kkbnet2010 i pv6 tunneling algorithms

Future Research Areas of 4GFuture Research Areas of 4GNew Decoding Algorithms for turbo codes for Wireless Channels.New Decoding Algorithms for turbo codes for Wireless Channels.New Coding/modulation techniques for reducing the peak-to-mean envelope ratio-New Coding/modulation techniques for reducing the peak-to-mean envelope ratio-maximizing the data rate, and providing large coding gain.maximizing the data rate, and providing large coding gain.Transition from 3G Cellular networks to Wireless Networks.Transition from 3G Cellular networks to Wireless Networks.QoS application oriented services like Integrated services and Differentiated Services.QoS application oriented services like Integrated services and Differentiated Services.New approaches to jointly designing modulation techniques and power amplifiers to New approaches to jointly designing modulation techniques and power amplifiers to simultaneously obtain high power added efficiency along with bandwidth efficiency.simultaneously obtain high power added efficiency along with bandwidth efficiency.Research in methodologies for an integrated approach to wireless communications,(Research in methodologies for an integrated approach to wireless communications,(Device layer ex:-Power and low noise amplifiers, mixers,filters,physical layer : Device layer ex:-Power and low noise amplifiers, mixers,filters,physical layer : Coding,modulation,Medium access layer:CDMA/FDMA/TDMA data link,Hybrid ARQ, Coding,modulation,Medium access layer:CDMA/FDMA/TDMA data link,Hybrid ARQ, network layer,routing etc[38].network layer,routing etc[38].Communication problems unique to high frequency systems (ex:-Channel estimation).Communication problems unique to high frequency systems (ex:-Channel estimation).Multi-access technologies for multi-rate systems with variable quality of requirements.Multi-access technologies for multi-rate systems with variable quality of requirements.Ultra–wide band systems and hardware design.Ultra–wide band systems and hardware design.Analog ,decoding techniques for high speed,low power systems etc.Analog ,decoding techniques for high speed,low power systems etc.

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal. 32

Page 33: Kkbnet2010 i pv6 tunneling algorithms

Conclusions

In this paper we proposed the IPv6 tunneling algorithms for 4G networks.In this paper we proposed the IPv6 tunneling algorithms for 4G networks.Static tunnels are always better than Automatic and Configured tunneling Algorithms.Static tunnels are always better than Automatic and Configured tunneling Algorithms.

8-9,2010 KKBNET-2010.,N.I.T.K.,Surathkal. 33

Page 34: Kkbnet2010 i pv6 tunneling algorithms

ReferencesReferences[1].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,”[1].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,”A Study on IPv6 in IPv4 Static Tunneling threat issues in 4G Networks using OOAD A Study on IPv6 in IPv4 Static Tunneling threat issues in 4G Networks using OOAD Class and Instance Diagrams”Class and Instance Diagrams” ,Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and ,Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA, January 09-11,2010,[Paper code CSCIT-152][CSCITOP113].Mahavidyalaya,Nanded,Maharastra,INDIA, January 09-11,2010,[Paper code CSCIT-152][CSCITOP113].

  

[2].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,”[2].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,”An IPv4-to-IPv6 threat reviews with dual stack transition mechanism considerations a An IPv4-to-IPv6 threat reviews with dual stack transition mechanism considerations a transitional threat model in 4G Wireless networkstransitional threat model in 4G Wireless networks”Proceedings of the International Conference on Emerging Trends in Computer ”Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA,January 09-11,2010,[Paper code CSCIT-157] [CSCITOP115].Mahavidyalaya,Nanded,Maharastra,INDIA,January 09-11,2010,[Paper code CSCIT-157] [CSCITOP115].

  

[3].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,”[3].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,”Implementation,Comparative and PerformanceImplementation,Comparative and Performance

Analysis of IPv6 over IPv4 QoS metrics in 4G Networks:Single-source-destination paths Delay,Packet Loss Performance and Tunnel Discovery Analysis of IPv6 over IPv4 QoS metrics in 4G Networks:Single-source-destination paths Delay,Packet Loss Performance and Tunnel Discovery Mechanisms”Mechanisms”,Proceedings of the International Conference on Information Science and Applications(ICISA-2010)organized by Dept. of Master ,Proceedings of the International Conference on Information Science and Applications(ICISA-2010)organized by Dept. of Master of Computer Applications,Panimalar Engineering College,Chennai-600 123,Tamilnadu,India.,February-06-2010,[Paper code ICISA-293(with of Computer Applications,Panimalar Engineering College,Chennai-600 123,Tamilnadu,India.,February-06-2010,[Paper code ICISA-293(with serial no-101)].serial no-101)].

  

[4].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi[4].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi ,”High Performance evaluation of Multimedia Video Streaming over IP ,”High Performance evaluation of Multimedia Video Streaming over IP networks”networks”,Proceedings of the National conference on Computing communications and Information systems(NCCCIS-2010)organized by ,Proceedings of the National conference on Computing communications and Information systems(NCCCIS-2010)organized by Department of Information Technology Sri Krishna College of Engineering and Technology,Kuniamuthur,Coimbatore-641008,INDIA,February-Department of Information Technology Sri Krishna College of Engineering and Technology,Kuniamuthur,Coimbatore-641008,INDIA,February-12-13,2010,[Paper id NCCCIS-MM-03],pp-88-9212-13,2010,[Paper id NCCCIS-MM-03],pp-88-92..

Page 35: Kkbnet2010 i pv6 tunneling algorithms

[5].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,”[5].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,”IPv6 Tunneling Algorithms in 4G NetworksIPv6 Tunneling Algorithms in 4G Networks”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 thth and 9 and 9thth 2010. 2010.

  

[6].Sridevi.,Hanumanthappa.J.,Manjaiah.D.H,”[6].Sridevi.,Hanumanthappa.J.,Manjaiah.D.H,”A Novel IPv4/IPv6 Transition scenarios in 4G NetworksA Novel IPv4/IPv6 Transition scenarios in 4G Networks”,Proceedings of the National conference on ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8Technology(NIT),Karnataka,Surathkal,INDIA,April,8thth and 9 and 9th th 2010.2010.

  

[7].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,”[7].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,”A Comparison of Performance evaluation metrics and Simulation parametersA Comparison of Performance evaluation metrics and Simulation parameters”,Proceedings of the National conference ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8Technology(NIT),Karnataka,Surathkal,INDIA,April,8thth and 9 and 9thth 2010. 2010.

  

[8].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K[8].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K.,“Comparison and Contrast between Bellman ford and Dijkstra’s algorithms”.,“Comparison and Contrast between Bellman ford and Dijkstra’s algorithms”,Proc.of. the National Conference on ,Proc.of. the National Conference on Wireless Networks-09(NCOWN-2010),organized by RLJIT,Kodigehalli,Doddaballapur,Kerala,INDIA,FebruaryWireless Networks-09(NCOWN-2010),organized by RLJIT,Kodigehalli,Doddaballapur,Kerala,INDIA,February ,2010,[Paper code 05]. ,2010,[Paper code 05].

  

[9].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi,”[9].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi,”Emerging technologies for the 4G Wireless communicationsEmerging technologies for the 4G Wireless communications”,Proceedings of the National conference on ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8Technology(NIT),Karnataka,Surathkal,INDIA,April,8thth and 9 and 9thth 2010. 2010.

  

[10].Hanumanthappa.J.,Manjaiah.D.H[10].Hanumanthappa.J.,Manjaiah.D.H.,”IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model: A Case .,”IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model: A Case Study for University of Mysore Network”,Study for University of Mysore Network”,International Journal of Computer Science and Information(IJCSIS)Vol.3.,No.1,July-2009,ISSN 1947-5500,Paper ID: 12060915] International Journal of Computer Science and Information(IJCSIS)Vol.3.,No.1,July-2009,ISSN 1947-5500,Paper ID: 12060915]

  

[11].Hanumanthappa.J.,Manjaiah.D.H[11].Hanumanthappa.J.,Manjaiah.D.H.,”Transition of IPv4 Network Applications to IPv6 Applications”[TIPv4 to TIPv6],.,”Transition of IPv4 Network Applications to IPv6 Applications”[TIPv4 to TIPv6],Proceedings of IEEE International Conference on Proceedings of IEEE International Conference on emerging trends in computing(ICETiC-2009),Virudhunagar,Tamilnadu 8-10,January 2009,INDIA.[Paper ID 234]. emerging trends in computing(ICETiC-2009),Virudhunagar,Tamilnadu 8-10,January 2009,INDIA.[Paper ID 234].

Page 36: Kkbnet2010 i pv6 tunneling algorithms

[12].Hanumanthappa.J.,Manjaiah.D.H.,Thippeswamy.K[12].Hanumanthappa.J.,Manjaiah.D.H.,Thippeswamy.K.“IPv6 over Bluetooth: Security Aspects, Issues and its Challenges”,.“IPv6 over Bluetooth: Security Aspects, Issues and its Challenges”,Proceedings of National Conference on,Wireless Proceedings of National Conference on,Wireless Communications and Technologies(NCWCT-09)-Theme :Mobile and Pervasive ComputingCommunications and Technologies(NCWCT-09)-Theme :Mobile and Pervasive Computing,,Nitte,Karnataka,Udupi Dist, Karnataka ,INDIA,February-5-6Nitte,Karnataka,Udupi Dist, Karnataka ,INDIA,February-5-6 , ,2009,[ Paper id -2009,[ Paper id -104] 104]

[13].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D[13].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D.“Economical and Technical costs for the Transition of IPv4–to-IPv6 Mechanisms[ETCTIPv4 to .“Economical and Technical costs for the Transition of IPv4–to-IPv6 Mechanisms[ETCTIPv4 to ETCTIPv6]”ETCTIPv6]”,Proceedings of National Conference on Wireless Communications and Technologies(NCWCT-09)-Theme:Mobile and Pervasive ,Proceedings of National Conference on Wireless Communications and Technologies(NCWCT-09)-Theme:Mobile and Pervasive ComputingComputing,,NitteNitte ,Karnataka,Udupi Dist,Karnataka,INDIA,February-5-6,Karnataka,Udupi Dist,Karnataka,INDIA,February-5-6 , ,2009,[ Paper id -103] 2009,[ Paper id -103]

  

[14].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D[14].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D.”Implementation of Codec Driver for network embedded devices.”Implementation of Codec Driver for network embedded devices”,”,Proceedings of theProceedings of the””IEEE International Advance IEEE International Advance

Computing Conference IACC-2009 on March 6- 8[Paper ID IEEE-ALGO-0205]at patialaComputing Conference IACC-2009 on March 6- 8[Paper ID IEEE-ALGO-0205]at patiala. . [15].Hanumanthappa.J.,Tippeswamy.K.,Manjaiah.D.H[15].Hanumanthappa.J.,Tippeswamy.K.,Manjaiah.D.H.,.,““SOA Approach for information retrieval using web Services” [SOAAFIRUWSSOA Approach for information retrieval using web Services” [SOAAFIRUWS],Proceedings of IEEE International ],Proceedings of IEEE International Conference onConference on the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-DATA-2065].the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-DATA-2065].

  

6].Hanumanthappa.J.,Manjaiah.D.H6].Hanumanthappa.J.,Manjaiah.D.H.,.,Tippeswamy.K.“Tippeswamy.K.“An Overview of Study on Smooth Porting Process Scenario during IPv6 Transition”[TIPv6]An Overview of Study on Smooth Porting Process Scenario during IPv6 Transition”[TIPv6],Proceedings of IEEE ,Proceedings of IEEE International Conference onInternational Conference on the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-APPL-1278]. the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-APPL-1278].

  

[17].Hanumanthappa.J.,Manjaiah.D.H[17].Hanumanthappa.J.,Manjaiah.D.H.,.,Tippeswamy.KTippeswamy.K.“Generic Query information retrieval System for web 2.0”.“Generic Query information retrieval System for web 2.0”,Proceedings of the Seventh International Convention on ,Proceedings of the Seventh International Convention on Automation of libraries in education and Research(CALIBER-2009) organized by Inflibnet centre on February 25-27,2009 at Pondicherry university(A central Automation of libraries in education and Research(CALIBER-2009) organized by Inflibnet centre on February 25-27,2009 at Pondicherry university(A central University),R.Venkat Raman Nagar,Kalapet,Pondicherry-605014,India.[Paper ID C-13].University),R.Venkat Raman Nagar,Kalapet,Pondicherry-605014,India.[Paper ID C-13].

  

[18].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K.“[18].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K.“IPv6 over IPv4 QoS metrics in 4G Networks:Delay, Jitter,Packet Loss Performance,Throughput and Tunnel Discovery IPv6 over IPv4 QoS metrics in 4G Networks:Delay, Jitter,Packet Loss Performance,Throughput and Tunnel Discovery Mechanisms”,Mechanisms”,Proceedings of the National Conference on Wireless Networks-09(NCOWN-2009) organized by RLJIT,Kodigehalli,Doddaballapur,Karnataka, Proceedings of the National Conference on Wireless Networks-09(NCOWN-2009) organized by RLJIT,Kodigehalli,Doddaballapur,Karnataka, INDIA,November 21-22INDIA,November 21-22nd nd ,2009,[Paper code NCOWN-19].,2009,[Paper code NCOWN-19].

  

Page 37: Kkbnet2010 i pv6 tunneling algorithms

[19].Hanumanthappa.J.,Manjaiah.D.H.,“[19].Hanumanthappa.J.,Manjaiah.D.H.,“A Study on Comparison and Contrast between IPv6 and IPv4 Feature Sets”A Study on Comparison and Contrast between IPv6 and IPv4 Feature Sets” Proceedings of International Conference on Computer Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28Networks and Security(ICCNS-2008),Pune,Sept 27-28thth,2008,[Paper code CP 15]. ,2008,[Paper code CP 15].

  

[20].Hanumanthappa.J.,Balachandra.C[20].Hanumanthappa.J.,Balachandra.C,“Soft one to One Gateway Protocol”,,“Soft one to One Gateway Protocol”,Proceedings of International Conference on Computer Networks and Security(ICCNS-Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-282008),Pune,Sept 27-28thth,2008,[Paper code CP 27].,2008,[Paper code CP 27].

[21].Hanumanthappa.J.,Thippeswamy.K[21].Hanumanthappa.J.,Thippeswamy.K.“Generic Query Retrieval System”[GQRS]”,.“Generic Query Retrieval System”[GQRS]”,Proceedings of National Conference on,Recent Trends in Engineering and Proceedings of National Conference on,Recent Trends in Engineering and Technology(RTIET-2008),Doddaballapur,Karnataka,INDIA,NovemberTechnology(RTIET-2008),Doddaballapur,Karnataka,INDIA,November 21-2221-22ndnd ,2008,[ Paper code 05] ,2008,[ Paper code 05]

  [22].S.Deering and R.Hinden “Internet Protocol Version 6(IPv6) Specification”, RFC 2460,December 1998[22].S.Deering and R.Hinden “Internet Protocol Version 6(IPv6) Specification”, RFC 2460,December 1998.. [23].Behrouz A.Forouzan,Third Edition,“TCP/IP Protocol Suite”.[23].Behrouz A.Forouzan,Third Edition,“TCP/IP Protocol Suite”.

[24].Atul Kahate,“Cryptography and Network Security“,Tata McGraw-Hill,2003,pp-8-10. [24].Atul Kahate,“Cryptography and Network Security“,Tata McGraw-Hill,2003,pp-8-10.

[25].Kurose.J.& Ross.K.(2005)Computer Networking:A top-down approach featuring the Internet.3[25].Kurose.J.& Ross.K.(2005)Computer Networking:A top-down approach featuring the Internet.3 rdrd ed,(Addison Wesley). ed,(Addison Wesley).

[26].R.Callon and D.Haskin,“RFC2185:Routing aspects of IPv6 transition”,September 1997. [26].R.Callon and D.Haskin,“RFC2185:Routing aspects of IPv6 transition”,September 1997.

[27].D.Provan,”RFC1234:Tunneling IPX traffic through IP networks”,June 1991.[27].D.Provan,”RFC1234:Tunneling IPX traffic through IP networks”,June 1991.

[28].R.Gilligan and E.Nordmark,”Transition mechanisms for IPv6 Hosts and Routers”,RFC 2893,Aug 200014. [28].R.Gilligan and E.Nordmark,”Transition mechanisms for IPv6 Hosts and Routers”,RFC 2893,Aug 200014.

[29].R.Woodburn and D.Miills,”RFC1241:Scheme for an Internet encapsulation protocol :Version 1”,July 1991.[29].R.Woodburn and D.Miills,”RFC1241:Scheme for an Internet encapsulation protocol :Version 1”,July 1991.

[30].R.Atkinson and S.Kent,”Security architecture for the internet protocol”,RFC 2401,Nov.1998.[30].R.Atkinson and S.Kent,”Security architecture for the internet protocol”,RFC 2401,Nov.1998.

[31].B.Gleeson,A.Lin,J.Heinanen,G.Armitage,and A.Malis,:”A Framework for IP based Virtual Private networks”,RFC 2764,February 2000.[31].B.Gleeson,A.Lin,J.Heinanen,G.Armitage,and A.Malis,:”A Framework for IP based Virtual Private networks”,RFC 2764,February 2000.

[32].B.Carpenter and K.Moore,“Connection of IPv6 Domains via IPv4 Clouds,”RFC 3056,Feb.2001.[32].B.Carpenter and K.Moore,“Connection of IPv6 Domains via IPv4 Clouds,”RFC 3056,Feb.2001.

[33].F.Templin,T.Gleeson,M.Talwar,and D.Thaler,Intra-Site Automatic Tunnel Addressing Protocol(ISATAP),draft-ietf-ngtrans-isatap-22,May,2004.[33].F.Templin,T.Gleeson,M.Talwar,and D.Thaler,Intra-Site Automatic Tunnel Addressing Protocol(ISATAP),draft-ietf-ngtrans-isatap-22,May,2004.

[34].C.Huitema,Tunneling IPv6 over UDP through NATs(Teredo),draft-huitema-v6ops-teredo -05,April 5,2005.[34].C.Huitema,Tunneling IPv6 over UDP through NATs(Teredo),draft-huitema-v6ops-teredo -05,April 5,2005.

[35].S.Hanks,T.Li,D.Farinacci and P.Traina,”RFC1701:Generic Routing encapsulation(GRE)”,October 1994 [35].S.Hanks,T.Li,D.Farinacci and P.Traina,”RFC1701:Generic Routing encapsulation(GRE)”,October 1994

Page 38: Kkbnet2010 i pv6 tunneling algorithms

Queries and Suggestions.Queries and Suggestions.

Page 39: Kkbnet2010 i pv6 tunneling algorithms

Thank YouThank You

8-9,2010 39KKBNET-2010.,N.I.T.K.,Surathkal.