SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 03 Pages: 2756-2760 (2015) ISSN: 0975-0290
2756
An Experimental of IPv6 Address Assignment for
Global Unicast Address Using NS-3
Dr. P. Sumathi
Assistant Professor, PG & Research Department of Computer Science, Government Arts College, Coimbatore
Dr. Saroj Patel
Associate Professor, Department of Mathematics, Jodhpur National University, Jodhpur, Rajasthan
Prabhakaran
Ph.d Scholar, Department of Computer Application, Jodhpur National University, Jodhpur, Rajasthan
--------------------------------------------------------------------ABSTRACT-------------------------------------------------------------
Internet Protocol Version 6 (IPv6) is the next generation protocol and in the near future, routers are going to
become more faster and new technologies are going to reduce the Internet delay. IPv6 global unicast address is
similar to IPv4 public address and globally routable. This Global unicast address assignment process provides new
function called Stateless Address Auto Configuration (SLAAC) is a significant feature for host itself generating
and configuring own addresses to enable communication. In this paper aims to describe experimental about IPv6
address assignment for global unicast address and evaluation of a host using various parameters such as Default
router IP address, Throughput, Average End to End Delay and Domain Name Server (DNS) IP address. The study
was carried out using an open source Network Simulator (NS-3) to study and analyses the behavior of IPv6
address assignment.
Keywords - IPv6 Address, Packet Delivery ratio. SLAAC, Unicast Address.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Aug 29, 2015 Date of Acceptance: Oct 30, 2015
--------------------------------------------------------------------------------------------------------------------------------------------------
1. INTRODUCTION
IPv6 is the replacement protocol for Internet Protocol
version 4 (IPv4). IPv6 provides the ultimate solution for
the problem of shortage of existing IPv4 addresses in
the global internet by using a 128-bit address,
approximately 4*109
total addresses in IPv4 [2]. IPv6 is
Internet Layer protocols for packet switched inter
networking and provides end-to-end datagram
transmission across multiple numbers of networks. IPv6
was formally described in Internet standard document
Request for Comment (RFC 2460). The idea of IPv6
deployment proposed by RFC 5211 [1]. During the first
decade of the 21st
century, the Internet has grown
further to billions of addressable devices with the
majority of people having some form of Internet access
with that pervasive access came a wide range of
applications and uses including voice, video,
collaboration and social networking with a generation
that has grown up with this easily accessed global
network [2]. The migration to IPv6 will likely be driven
by the need for plenty of network layer address;
practically every mobile phone supports Internet traffic
requiring the use of an Internet Protocol address. Most
new cars have the capability to acquire and use an
internet address, along with wireless communications,
expected that the Internet would be fully migrated to
IPv6 in these days. Internet Assigned Numbers
Authority (IANA) declared IPv4 address pool is already
depleted more than 10% Autonomous Systems (AS)
announces IPv6 prefix in global Border Gateway
Protocol (BGP) table [3] and most of operating systems
support IPv6. However, IPv6 prefixes can be difficult to
memorize. IPv6 general prefixes are a convenient tool
that allows an administrator to define and reference
prefixes by human-friendly names with possible host
addresses. IPv6 abandons the drawbacks of IPv4, at the
same time inherits many of its advantages, So IPv6
shows a more technical advantages. IPv6 address
management advantages embody three aspects, such as
enlargement of address space, automatic address
assignment configuration and mobility support [5].
Improvements of IPv6 header mainly embody two
aspects. First, simplifying the basic header, eliminating
some fields such as identifier, flag, checksum and offset
in the IPv4 header, this simplifies the processing of the
header second, extending header, which can follow
basic header with optional way and maximum
flexibility. A built-in security mechanism of IPv6
comprises Internet Protocol Security (IPsec),
Authentication Header (AH) and Encapsulated Security
Payload (ESP). The IP4 take a best effort transmission,
Quality of Service (QoS) is difficult to guarantee. IPv6
provides a good support for QoS, especially the
transmission of Voice over Internet Protocol (VoIP) and
other real time data stream by setting priority, label of
the data flow and resource reservation.
2. GLOBAL UNICASTADDRESS
IPv6 unicast global addresses are similar to IPv4 public
addresses also known as aggregatable global unicast
addresses and global addresses are globally routable [4].
Table 1 shows the IPv6 unicast global address structure
and corresponding fields. A modified version of the
addressing hierarchy the first Top Level Aggregation
(TLA) prefix (TLA 0x0001) has been divided into
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 03 Pages: 2756-2760 (2015) ISSN: 0975-0290
2757
further blocks called "sub-TLAs" with a 13-bit sub-
TLA identifier part of the reserved space and the Next
Level Aggregation (NLA) space. The "slow start" of a
sub-TLA, the first allocation to a TLA Registry will be
a /35 block (representing 13 bits of NLA space).
Level 1 Level 2 Level 3
Public Topology
Site
Topology
Interface of a
node on a
specific
subnet
001
TLA
ID
Res
NLA
ID
SLA ID Interface ID
3
bits
13
bits
8
bits
24
bits
16 bits 64 bits
Table 1. Structure of Unicast Global Address
The Regional Internet Registry (IR) making the
allocation will reserve an additional six bits for the
allocated sub-TLA. When the TLA Registry has fully
used the first /35 block, the Regional IR will use the
reserved space to make subsequent allocations. All
router interfaces are required to have at least one link-
local unicast address. It is recommended that link-local
addresses be used for all point-to-point links, loopback
addresses, and so forth. As these are not required to be
visible outside the site's network, they do not require
public address space. Any global unicast address space
assigned must not be used for link-local purposes as
there is address space reserved for these purposes.
Table 2, shows detailed description about fields in
unicast global address.
Field Description
001 Identifies the address as an IPv6 unicast
global address.
Top Level
Aggregation
Identifier
(TLA ID)
Identifies the highest level in the routing
hierarchy. TLA IDs are administered by
IANA, which allocates them to local
Internet registries, which then allocate a
given TLA ID to a global ISP
Res Reserved for future use (to expand either
the TLA ID or the NLA ID).
Next Level
Aggregation
Identifier
(NLA ID)
Identifies a specific customer site.
Site Level
Aggregation
Identifier
(SLA ID)
Enables as many as 65,536 (216) subnets
within an individual organization’s site.
The SLA ID is assigned within the site;
an ISP cannot change this part of the
address.
Interface ID Identifies the interface of a node on a
specific subnet
Table 2. Fields in a Unicast Global Address
3. ASSIGNING GLOBAL UNICAST
ADDRESS
Neighbor Discovery Protocol (NDP) is one of the main
protocols in the IPv6 suite. It is heavily used for several
critical functions, such as discovering other existing
nodes on the same link, determining others link layer
addresses, detecting duplicate addresses, finding routers
and maintaining reachability information about paths to
active neighbors. The hosts to multicast a message that
finds all routers on the link to announce by using two
different type of information, this process uses ICMP
messages called a Router Solicitation (RS) and a Router
Advertisement (RA). Table 3 shows five different
options for IPv6 global address assignment. Each
method can use dynamic processes or static
configuration, and each method can differ in terms of
how a node or router gathers the other parameters such
as DNS IP addresses.
Method Dynamic
or Static
Prefix and
Length
learned
from
Address
Identification
Stateful
DHCP
Dynamic DHCP
Server
DHCP Server
Stateless
DHCP
Dynamic DHCP
Server
DHCP Server
Stateless
Auto
configuration
Dynamic Router,
using NDP
Derived from
MAC
Static
configuration
Static Local Local
configuration
Static
EUI-64
Static Local Derived from
MAC
Table 3. Types of IPv6 Address Assignment for
Global Unicast Addresses
3.1 Stateful DHCP
Clients and servers exchange DHCP messages using
User Datagram Protocol (UDP). The client uses a link-
local address or addresses determined through other
mechanisms for transmitting and receiving DHCP
messages. DHCP servers receive messages from clients
using a reserved, link-scoped multicast address. A
DHCP client transmits most messages to this reserved
multicast address, so that the client need not be
configured with the address or addresses of DHCP
servers. Once the client has determined the address of a
server, it may under some circumstances send messages
directly to the server using unicast. When a DHCP
client does not need to have a DHCP server assign it IP
addresses, the client can obtain configuration
information such as a list of available DNS servers or
NTP servers through a single message and reply
exchanged with a DHCP server. To obtain
configuration information the client first sends an
Information-Request message to the Servers multicast
address. Servers respond with a Reply message
containing the configuration information for the client
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 03 Pages: 2756-2760 (2015) ISSN: 0975-0290
2758
[10]. This message exchange assumes that the client
requires only configuration information and does not
require the assignment of any IPv6 addresses. When a
server has IPv6 addresses and other configuration
information committed to a client. IPv6 node can use
stateful DHCP to learn and lease an IP address and
corresponding prefix, the IP address of the default
router, and the DNS IP address. The idea works
basically like DHCPv4; the node sends a multicast
packet searching for the DHCP server. When a server
replies, the DHCP client sends a message asking for a
lease of an IP address, and the server replies, listing an
IPv6 address, prefix length, and DNS IP addresses. The
Stateful DHCPv6 does not supply the default router
information, instead relying on Neighbor Discovery
Protocol between the client and local routers [2].
3.2 Stateless DHCP
Stateless Dynamic Host Configuration Protocol service
for IPv6 (DHCPv6) is used by nodes to obtain
configuration information, such as the addresses of
DNS recursive name servers, that does not require the
maintenance of any dynamic state for individual clients.
A node that uses stateless DHCP must have obtained its
IPv6 addresses through some other mechanism,
typically stateless address auto configuration [8]. To
obtain configuration parameters through stateless
DHCP, a node uses the DHCP information request
message. DHCP servers respond to the nodes message
with a reply message that carries configuration
parameters for the node. The Reply message from the
server can carry configuration information, such as a
list of DNS recursive name servers. The client indicates
that it is requesting configuration information by
sending an Information-request message that includes
an Option Request option specifying the options that it
wishes to receive from the DHCP server.
3.3 IPv6 Stateless Auto configuration
Auto configuration is performed only on multicast
capable links and begins when a multicast capable
interface is enabled during system startup. Nodes begin
the auto configuration process by generating a link-
local address for the interface. A link-local address is
formed by appending an identifier of the interface to the
well-known link-local prefix. All interfaces on IPv6
nodes must have a link-local address, which is usually
automatically configured from the identifier for an
interface and the link-local prefix FE80::/10. A link-
local address enables a node to communicate with other
nodes on the link and can be used to further configure
the node. Nodes can connect to a network and
automatically generate global IPv6 addresses without
the need for manual configuration or help of a server,
such as a Dynamic Host Configuration Protocol server.
With IPv6, A device on the link advertises any global
prefixes in Router Advertisement (RA) messages, as
well as its willingness to function as a default device for
the link. RA messages are sent periodically and in
response to device solicitation messages, which are sent
by hosts at system startup. A node on the link can
automatically configure global IPv6 addresses by
appending its interface identifier (64 bits) to the
prefixes (64 bits) included in the RA messages. The
resulting 128-bit IPv6 addresses configured by the node
are then subjected to duplicate address detection to
ensure their uniqueness on the link. If the prefixes
advertised in the RA messages are globally unique, then
the IPv6 addresses configured by the node are also
guaranteed to be globally unique. Device solicitation
messages, which have a value of 133 in the Type field
of the ICMP packet header, are sent by hosts at system
startup so that the host can immediately auto configure
without needing to wait for the next scheduled RA
message.
3.4 Static configuration
Host addresses can only be static if subnet prefixes are
also static. Static prefixes are such a long established
practice in enterprise networks that it is hard to discern
the reason for them, before DHCP became available,
there was simply no alternative. Thus it became
accepted practice to assign subnet prefixes manually
and build them into static router configurations [9].
Static configuration is type in the entire 128-bit IPv6
address for the network node to knowing its full address
and prefix length. The node does not need to statically
configure default router and DNS IP addresses. The
node can use the usual NDP process to discover any
default routers and stateless DHCP to discover any
default routers and stateless DHCP to discover the DNS
IPv6 addresses.
3.5 Static configuration with EUI-64
Static configuration with EUI-64 is configuring the 64-
bit prefix and performs the device to use and EUI-64
calculation for the interface ID portion of the addresses.
RFC 3513, Internet Protocol Version 6 (IPv6)
Addressing Architecture requires that the interface
identifier portion of all unicast IPv6 addresses, except
those that start with binary value 000, be 64 bits long
and be constructed in Modified EUI-64 format. The
security appliance can enforce this requirement for
hosts attached to the local link [7]. The Main IPv6
benefits over IPv4 are capability for automatic interface
address configuration. By implementing the IEEE 64-
bit Extended Unique Identifier (EUI-64) format the
node can automatically acquire itself a unique 64-bit
IPv6 interface identifier without the need for manual or
dynamic configuration. This is accomplished on
Ethernet interfaces by referencing the already unique
48-bit Layer 2 address and reformatting that value to
match the EUI-64 specification. RFC 2373 explain the
conversion process. Convert the 48-bit MAC address to
a 64-bit value, separate the MAC address into two
portion of each 24-bit. The 16-bit hex value 0xFFFE is
then inserted between these two values to form a 64-bit
address. Invert the universal/local (U/L) flag bit 7 in the
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 03 Pages: 2756-2760 (2015) ISSN: 0975-0290
2759
OUI portion of the address. Globally unique addresses
assigned by the IEEE originally have this bit set to zero,
indicating global uniqueness. Likewise, locally created
addresses, such as those used for virtual interfaces or a
MAC address manually configured by an administrator,
will have this bit set to one. The U/L bit is inverted
when using an EUI-64 address as an IPv6 interface ID.
4. SIMULATION AND RESULT ANALYSIS
The Network Simulation 3 (NS 3.22) has been used for
the running the simulation of analysis global unicast
addressing. The simulation scenario in this research
analysis uses the internetwork shown in Figure 1. The
figure shows a diagram might see in an implementation
plan, with the four IPv6 subnet numbers shown over the
five links connect to nodes. The configuration process
on router, which uses EUI-64 on four interfaces, and a
complete IPv6 address on another. Also, the
configuration includes the IPv6 unicast routing, which
enables the router to route IPv6 traffic. The IPv6
address commands both enable IPv6 on the associated
interfaces and define either the prefix with the EUI-64
option or the entire address. After the configuration
confirm the IPv6 addresses.
Figure 1. IP address and Device Identification
All the four interfaces now have link local addresses
that begin FE80. The nodes have the configured
prefixes 2001:1: /64, 2001:2:: /64, 2001:3::1 /64 and
2001:4:: /64 respectively, but with EUI-64 derived
interface-IDs. MAC address shown in the table 4.
Multicast Groups Joined by IPv6 Router Interfaces, the
first multicast, FF02::1, represents all IPv6 devices, so
router interfaces must listen for packets sent to this
address. FF02::2 represents all IPv6 routers so again
router must listen for packets sent to this address.
Finally, the FF02::1:FF beginning value is the range for
an address solicited node multicast address, used by
several functions, including the duplicate address
detection (DAD) and neighbor discovery (ND). The
interface ID of each interface is shown in table 4.
ID MAC
Address
Unicast
Address
Link -
Local
Methods
0 0000:00
00:0001
2001:1::2
00:ff:fe00
:1
FE80::200:
ff:fe00:1
Stateful
DHCP
1 0000:00
00:0002
2001:2::2
00:ff:fe00
:4
FE80::200:
ff:fe00:4
Stateless
autoconfi
guration
2 0000:00
00:0003
2001:3::1 FE80::200:
ff:fe00:5
Static
3 0000:00
00:0004
2001:4::2
00:ff:fe00
:7
FE80::200:
ff:fe00:7
Static
EUI-64
Table 4. IP address and Device Identification
After running the simulation events were generated in
the trace file. The trace files were analyzed using the
result analysis. In this study Flow Monitor and PCAP
(Packet Capture) were used for analysis. The
parameters such as the following are used for the
analysis
1. Default router IP address
2. Throughput and Average End to End Delay
3. DNS IP address
4.1 Default router IP address
Figure 1, shows a subset of the internetwork seen in
table 4, with the same IPv6 addresses and subnets used.
Routers interface has already been configured with an
IPv6 address. Node 0, using stateless auto configuration
to sends the RS message as an IPv6 multicast message
destined to all IPv6 routers on the local link. The RS
send query to all routers to respond to the questions and
request of prefix and subnet. The router response with
router response (RS) message, listing the prefix and
with routers own IPv6 address as a potential default
router IP address. Routers interface 2001:5::1/64 has
been assigned as default router IP address.
4.2 Throughput and Average End to End Delay
The Throughput is one of the performance metrics to
evaluate the performance. Generally it is defined as the
amount of data processed in a specified amount of time.
From the trace file generated by running the simulation
the throughput values were captured and plotted graph
with the values of Throughput of receiving bits
Variation with Simulation Time as shown in Figure 2.
Each packet generated by a source is routed to the
destination via a sequence of intermediate nodes.
Throughput is calculated packet flow for node 0 and
node 1 and sending TCP packets node 0 as source and
node 1 as destination.
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 03 Pages: 2756-2760 (2015) ISSN: 0975-0290
2760
Figure 2. Flow vs. Throughput
The End-to-End delay is the sum of the delays
experienced at each hop on the way to the destination of
each packet. If this value is lesser, then the packets will
be delivered faster from source to destination. The
average End-to-End delay is computed as below.
4.3 DNS IP address
The stateless DHCP server supplies the DNS server
IPv6 address to nodes. All hosts typically use the same
small number of DNS servers, the stateless DHCP
server does not need to keep track of any state
information. user simply configures the stateless DHCP
server to know the IPv6 addresses of the DNS servers,
and the servers inform any host or other device that
send request packet to keep no record of the process.
Nodes that use stateless configuration also use stateless
DHCP to learn the DNS server IPv6 addresses.
5. CONCLUSION
The NS-3 is an useful educational tool for simulation of
IPv6 by writing relatively simple simulation scripts and
evaluate the standard protocols also modify existing
protocols or replace them with own solutions. From the
results analysis of IPv6 address assignment shows very
much improved performance and more flexible to
modify the exits modules and perform the analysis. The
goal is to study these protocols and analyze their
performance for Global Unicast address based on
performance metrics like Default router IP address,
Throughput, End to End Delay and DNS IP address.
REFERENCES
[1] J. Curran, “An Internet Transition Plan”, RFC
5211, IETF, Internet Engineering Task Force,
July 2008; http://tools.ietf.org/html/rfc5211
[2] Wendell Odom, CCNP ROUTE 642-902,
Pearson Education, Inc., Publishing as Cisco
Press, 2010.p.529
[3] BGP Routing Table Analysis Reports, [online],
URL:http://bgp. potaroo.net, 2015
[4] “IPv6 Address Types”, [online], URL:
https://technet.microsoft.com/en-
us/library/cc757359%28v= ws.10%29.aspx
[5] R. Hinden et al. RFC 2373. “IP Version 6
Addressing Architecture,” July 1998.
[6] “Preparing An Ipv6 Address Plan”, Surf Net,
http://www.ipv6forum.com/dl/presentations/Ip
v6 addressing-plan-howto.pdf , ver 2,
September 2013
[7] “Cisco Security Appliance Command Line
Configuration Guide”,
http://www.cisco.com/c/en/us/td/docs/
security/asa/asa72
/configuration/guide/conf_gd/ipv6.pdf
[8] R. Droms, “Stateless Dynamic Host
Configuration Protocol (DHCP) Service for
Ipv6” , RFC 3736, IETF, Internet Engineering
Task Force, April 2004,
http://www.ietf.org/rfc/rfc3736.txt
[9] B. Carpenter, S. Jiang, “Problem Statement
for Renumbering IPv6 Hosts with Static
Addresses”, RFC 6866, IETF, July 30, 2012
[10] R. Droms, J. Bound, B. Volz, T. Lemon, C.
Perkins, M. Carney, “Dynamic Host
Configuration Protocol for IPv6”, RFC 3315,
IETF, July 2003

Contenu connexe

Tendances

IPv6 - Neighbour Discovery
IPv6 - Neighbour DiscoveryIPv6 - Neighbour Discovery
IPv6 - Neighbour DiscoveryHeba_a
 
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-ReferatNeighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-ReferatDigicomp Academy AG
 
Design of Digital to Analog Voice Data Packet Conversion from Ethernet Protoc...
Design of Digital to Analog Voice Data Packet Conversion from Ethernet Protoc...Design of Digital to Analog Voice Data Packet Conversion from Ethernet Protoc...
Design of Digital to Analog Voice Data Packet Conversion from Ethernet Protoc...TELKOMNIKA JOURNAL
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterVishal Vasudev
 
Ipv4 packet structure
Ipv4 packet structureIpv4 packet structure
Ipv4 packet structurevlsirajagopal
 
Transport layer
Transport layer   Transport layer
Transport layer AnusuaBasu
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
 
Network layers forwarding.docx
Network layers forwarding.docxNetwork layers forwarding.docx
Network layers forwarding.docxAnusuaBasu
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORTRajat Kumar
 
Paper id 25201418
Paper id 25201418Paper id 25201418
Paper id 25201418IJRAT
 
Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...Adii Shah
 
IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)Juniper Networks
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGMohammad Adil
 

Tendances (20)

IPv6 - Neighbour Discovery
IPv6 - Neighbour DiscoveryIPv6 - Neighbour Discovery
IPv6 - Neighbour Discovery
 
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-ReferatNeighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
 
6low pan
6low pan 6low pan
6low pan
 
I Pv6 Nd
I Pv6 NdI Pv6 Nd
I Pv6 Nd
 
Design of Digital to Analog Voice Data Packet Conversion from Ethernet Protoc...
Design of Digital to Analog Voice Data Packet Conversion from Ethernet Protoc...Design of Digital to Analog Voice Data Packet Conversion from Ethernet Protoc...
Design of Digital to Analog Voice Data Packet Conversion from Ethernet Protoc...
 
internet protocols
internet protocolsinternet protocols
internet protocols
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_Router
 
Ipv4
Ipv4Ipv4
Ipv4
 
Ipv4 packet structure
Ipv4 packet structureIpv4 packet structure
Ipv4 packet structure
 
Transport layer
Transport layer   Transport layer
Transport layer
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
 
Network layers forwarding.docx
Network layers forwarding.docxNetwork layers forwarding.docx
Network layers forwarding.docx
 
What is Network Address Translation (NAT)
What is Network Address Translation (NAT)What is Network Address Translation (NAT)
What is Network Address Translation (NAT)
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORT
 
Paper id 25201418
Paper id 25201418Paper id 25201418
Paper id 25201418
 
Why we need ipv6...
Why we need ipv6...Why we need ipv6...
Why we need ipv6...
 
IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)
 
Ipv4 header
Ipv4 headerIpv4 header
Ipv4 header
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 

En vedette

창업을 준비하는 미래의 나에게 주는 조언
창업을 준비하는 미래의 나에게 주는 조언창업을 준비하는 미래의 나에게 주는 조언
창업을 준비하는 미래의 나에게 주는 조언KyunTae Kim
 
Bunnie Huang at Hardware Innovation Summit 2013
Bunnie Huang at Hardware Innovation Summit 2013Bunnie Huang at Hardware Innovation Summit 2013
Bunnie Huang at Hardware Innovation Summit 2013makezine
 
Platon
PlatonPlaton
Platonerick
 
Digital and cultural organisations: Where are we now?
Digital and cultural organisations: Where are we now?Digital and cultural organisations: Where are we now?
Digital and cultural organisations: Where are we now?John Stack
 
Lopez medina maria_eugenia_fol02_tarea
Lopez medina maria_eugenia_fol02_tareaLopez medina maria_eugenia_fol02_tarea
Lopez medina maria_eugenia_fol02_tareaMaria Medina
 

En vedette (6)

창업을 준비하는 미래의 나에게 주는 조언
창업을 준비하는 미래의 나에게 주는 조언창업을 준비하는 미래의 나에게 주는 조언
창업을 준비하는 미래의 나에게 주는 조언
 
Bunnie Huang at Hardware Innovation Summit 2013
Bunnie Huang at Hardware Innovation Summit 2013Bunnie Huang at Hardware Innovation Summit 2013
Bunnie Huang at Hardware Innovation Summit 2013
 
Platon
PlatonPlaton
Platon
 
наши любимые мамы
наши любимые мамынаши любимые мамы
наши любимые мамы
 
Digital and cultural organisations: Where are we now?
Digital and cultural organisations: Where are we now?Digital and cultural organisations: Where are we now?
Digital and cultural organisations: Where are we now?
 
Lopez medina maria_eugenia_fol02_tarea
Lopez medina maria_eugenia_fol02_tareaLopez medina maria_eugenia_fol02_tarea
Lopez medina maria_eugenia_fol02_tarea
 

Similaire à An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3

Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
 
A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6Amber Ford
 
Review of IPv4 and IPv6 and various implementation methods of IPv6
Review of IPv4 and IPv6 and various implementation methods of IPv6Review of IPv4 and IPv6 and various implementation methods of IPv6
Review of IPv4 and IPv6 and various implementation methods of IPv6IRJET Journal
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002suvobgd
 
Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6Netwax Lab
 
DCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdfDCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdfBilal Munir Mughal
 
Data Communication IPv6, Ethernet, OSI Model, Transmission Impairments
Data Communication IPv6, Ethernet, OSI Model, Transmission ImpairmentsData Communication IPv6, Ethernet, OSI Model, Transmission Impairments
Data Communication IPv6, Ethernet, OSI Model, Transmission ImpairmentsShefa Idrees
 
Networking
NetworkingNetworking
NetworkingRashmi
 
Apnic V6 Tutorial Distribution
Apnic V6 Tutorial DistributionApnic V6 Tutorial Distribution
Apnic V6 Tutorial DistributionAli_Ahmad
 
As robust as the IP protocol is, it does not perform the actual .docx
As robust as the IP protocol is, it does not perform the actual .docxAs robust as the IP protocol is, it does not perform the actual .docx
As robust as the IP protocol is, it does not perform the actual .docxcargillfilberto
 
Da3210751081
Da3210751081Da3210751081
Da3210751081IJMER
 
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...IJCNCJournal
 
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...IJCNCJournal
 

Similaire à An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3 (20)

Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6
 
A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6A Comparative Study On IPv4 And IPv6
A Comparative Study On IPv4 And IPv6
 
CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1
 
Review of IPv4 and IPv6 and various implementation methods of IPv6
Review of IPv4 and IPv6 and various implementation methods of IPv6Review of IPv4 and IPv6 and various implementation methods of IPv6
Review of IPv4 and IPv6 and various implementation methods of IPv6
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
 
Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6
 
RASHMI VT REPORT
RASHMI VT REPORTRASHMI VT REPORT
RASHMI VT REPORT
 
DCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdfDCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdf
 
Data Communication IPv6, Ethernet, OSI Model, Transmission Impairments
Data Communication IPv6, Ethernet, OSI Model, Transmission ImpairmentsData Communication IPv6, Ethernet, OSI Model, Transmission Impairments
Data Communication IPv6, Ethernet, OSI Model, Transmission Impairments
 
Networking
NetworkingNetworking
Networking
 
Apnic V6 Tutorial Distribution
Apnic V6 Tutorial DistributionApnic V6 Tutorial Distribution
Apnic V6 Tutorial Distribution
 
40120140505009 2
40120140505009 240120140505009 2
40120140505009 2
 
Multicast address
Multicast addressMulticast address
Multicast address
 
As robust as the IP protocol is, it does not perform the actual .docx
As robust as the IP protocol is, it does not perform the actual .docxAs robust as the IP protocol is, it does not perform the actual .docx
As robust as the IP protocol is, it does not perform the actual .docx
 
Da3210751081
Da3210751081Da3210751081
Da3210751081
 
I pv6 aag-v3_019-kr
I pv6 aag-v3_019-krI pv6 aag-v3_019-kr
I pv6 aag-v3_019-kr
 
I pv6 aag-v3_019-kr
I pv6 aag-v3_019-krI pv6 aag-v3_019-kr
I pv6 aag-v3_019-kr
 
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
 
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
 
Ccna1 presentation
Ccna1 presentationCcna1 presentation
Ccna1 presentation
 

Plus de Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

Plus de Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Dernier

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Dernier (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3

  • 1. Int. J. Advanced Networking and Applications Volume: 07 Issue: 03 Pages: 2756-2760 (2015) ISSN: 0975-0290 2756 An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3 Dr. P. Sumathi Assistant Professor, PG & Research Department of Computer Science, Government Arts College, Coimbatore Dr. Saroj Patel Associate Professor, Department of Mathematics, Jodhpur National University, Jodhpur, Rajasthan Prabhakaran Ph.d Scholar, Department of Computer Application, Jodhpur National University, Jodhpur, Rajasthan --------------------------------------------------------------------ABSTRACT------------------------------------------------------------- Internet Protocol Version 6 (IPv6) is the next generation protocol and in the near future, routers are going to become more faster and new technologies are going to reduce the Internet delay. IPv6 global unicast address is similar to IPv4 public address and globally routable. This Global unicast address assignment process provides new function called Stateless Address Auto Configuration (SLAAC) is a significant feature for host itself generating and configuring own addresses to enable communication. In this paper aims to describe experimental about IPv6 address assignment for global unicast address and evaluation of a host using various parameters such as Default router IP address, Throughput, Average End to End Delay and Domain Name Server (DNS) IP address. The study was carried out using an open source Network Simulator (NS-3) to study and analyses the behavior of IPv6 address assignment. Keywords - IPv6 Address, Packet Delivery ratio. SLAAC, Unicast Address. -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: Aug 29, 2015 Date of Acceptance: Oct 30, 2015 -------------------------------------------------------------------------------------------------------------------------------------------------- 1. INTRODUCTION IPv6 is the replacement protocol for Internet Protocol version 4 (IPv4). IPv6 provides the ultimate solution for the problem of shortage of existing IPv4 addresses in the global internet by using a 128-bit address, approximately 4*109 total addresses in IPv4 [2]. IPv6 is Internet Layer protocols for packet switched inter networking and provides end-to-end datagram transmission across multiple numbers of networks. IPv6 was formally described in Internet standard document Request for Comment (RFC 2460). The idea of IPv6 deployment proposed by RFC 5211 [1]. During the first decade of the 21st century, the Internet has grown further to billions of addressable devices with the majority of people having some form of Internet access with that pervasive access came a wide range of applications and uses including voice, video, collaboration and social networking with a generation that has grown up with this easily accessed global network [2]. The migration to IPv6 will likely be driven by the need for plenty of network layer address; practically every mobile phone supports Internet traffic requiring the use of an Internet Protocol address. Most new cars have the capability to acquire and use an internet address, along with wireless communications, expected that the Internet would be fully migrated to IPv6 in these days. Internet Assigned Numbers Authority (IANA) declared IPv4 address pool is already depleted more than 10% Autonomous Systems (AS) announces IPv6 prefix in global Border Gateway Protocol (BGP) table [3] and most of operating systems support IPv6. However, IPv6 prefixes can be difficult to memorize. IPv6 general prefixes are a convenient tool that allows an administrator to define and reference prefixes by human-friendly names with possible host addresses. IPv6 abandons the drawbacks of IPv4, at the same time inherits many of its advantages, So IPv6 shows a more technical advantages. IPv6 address management advantages embody three aspects, such as enlargement of address space, automatic address assignment configuration and mobility support [5]. Improvements of IPv6 header mainly embody two aspects. First, simplifying the basic header, eliminating some fields such as identifier, flag, checksum and offset in the IPv4 header, this simplifies the processing of the header second, extending header, which can follow basic header with optional way and maximum flexibility. A built-in security mechanism of IPv6 comprises Internet Protocol Security (IPsec), Authentication Header (AH) and Encapsulated Security Payload (ESP). The IP4 take a best effort transmission, Quality of Service (QoS) is difficult to guarantee. IPv6 provides a good support for QoS, especially the transmission of Voice over Internet Protocol (VoIP) and other real time data stream by setting priority, label of the data flow and resource reservation. 2. GLOBAL UNICASTADDRESS IPv6 unicast global addresses are similar to IPv4 public addresses also known as aggregatable global unicast addresses and global addresses are globally routable [4]. Table 1 shows the IPv6 unicast global address structure and corresponding fields. A modified version of the addressing hierarchy the first Top Level Aggregation (TLA) prefix (TLA 0x0001) has been divided into
  • 2. Int. J. Advanced Networking and Applications Volume: 07 Issue: 03 Pages: 2756-2760 (2015) ISSN: 0975-0290 2757 further blocks called "sub-TLAs" with a 13-bit sub- TLA identifier part of the reserved space and the Next Level Aggregation (NLA) space. The "slow start" of a sub-TLA, the first allocation to a TLA Registry will be a /35 block (representing 13 bits of NLA space). Level 1 Level 2 Level 3 Public Topology Site Topology Interface of a node on a specific subnet 001 TLA ID Res NLA ID SLA ID Interface ID 3 bits 13 bits 8 bits 24 bits 16 bits 64 bits Table 1. Structure of Unicast Global Address The Regional Internet Registry (IR) making the allocation will reserve an additional six bits for the allocated sub-TLA. When the TLA Registry has fully used the first /35 block, the Regional IR will use the reserved space to make subsequent allocations. All router interfaces are required to have at least one link- local unicast address. It is recommended that link-local addresses be used for all point-to-point links, loopback addresses, and so forth. As these are not required to be visible outside the site's network, they do not require public address space. Any global unicast address space assigned must not be used for link-local purposes as there is address space reserved for these purposes. Table 2, shows detailed description about fields in unicast global address. Field Description 001 Identifies the address as an IPv6 unicast global address. Top Level Aggregation Identifier (TLA ID) Identifies the highest level in the routing hierarchy. TLA IDs are administered by IANA, which allocates them to local Internet registries, which then allocate a given TLA ID to a global ISP Res Reserved for future use (to expand either the TLA ID or the NLA ID). Next Level Aggregation Identifier (NLA ID) Identifies a specific customer site. Site Level Aggregation Identifier (SLA ID) Enables as many as 65,536 (216) subnets within an individual organization’s site. The SLA ID is assigned within the site; an ISP cannot change this part of the address. Interface ID Identifies the interface of a node on a specific subnet Table 2. Fields in a Unicast Global Address 3. ASSIGNING GLOBAL UNICAST ADDRESS Neighbor Discovery Protocol (NDP) is one of the main protocols in the IPv6 suite. It is heavily used for several critical functions, such as discovering other existing nodes on the same link, determining others link layer addresses, detecting duplicate addresses, finding routers and maintaining reachability information about paths to active neighbors. The hosts to multicast a message that finds all routers on the link to announce by using two different type of information, this process uses ICMP messages called a Router Solicitation (RS) and a Router Advertisement (RA). Table 3 shows five different options for IPv6 global address assignment. Each method can use dynamic processes or static configuration, and each method can differ in terms of how a node or router gathers the other parameters such as DNS IP addresses. Method Dynamic or Static Prefix and Length learned from Address Identification Stateful DHCP Dynamic DHCP Server DHCP Server Stateless DHCP Dynamic DHCP Server DHCP Server Stateless Auto configuration Dynamic Router, using NDP Derived from MAC Static configuration Static Local Local configuration Static EUI-64 Static Local Derived from MAC Table 3. Types of IPv6 Address Assignment for Global Unicast Addresses 3.1 Stateful DHCP Clients and servers exchange DHCP messages using User Datagram Protocol (UDP). The client uses a link- local address or addresses determined through other mechanisms for transmitting and receiving DHCP messages. DHCP servers receive messages from clients using a reserved, link-scoped multicast address. A DHCP client transmits most messages to this reserved multicast address, so that the client need not be configured with the address or addresses of DHCP servers. Once the client has determined the address of a server, it may under some circumstances send messages directly to the server using unicast. When a DHCP client does not need to have a DHCP server assign it IP addresses, the client can obtain configuration information such as a list of available DNS servers or NTP servers through a single message and reply exchanged with a DHCP server. To obtain configuration information the client first sends an Information-Request message to the Servers multicast address. Servers respond with a Reply message containing the configuration information for the client
  • 3. Int. J. Advanced Networking and Applications Volume: 07 Issue: 03 Pages: 2756-2760 (2015) ISSN: 0975-0290 2758 [10]. This message exchange assumes that the client requires only configuration information and does not require the assignment of any IPv6 addresses. When a server has IPv6 addresses and other configuration information committed to a client. IPv6 node can use stateful DHCP to learn and lease an IP address and corresponding prefix, the IP address of the default router, and the DNS IP address. The idea works basically like DHCPv4; the node sends a multicast packet searching for the DHCP server. When a server replies, the DHCP client sends a message asking for a lease of an IP address, and the server replies, listing an IPv6 address, prefix length, and DNS IP addresses. The Stateful DHCPv6 does not supply the default router information, instead relying on Neighbor Discovery Protocol between the client and local routers [2]. 3.2 Stateless DHCP Stateless Dynamic Host Configuration Protocol service for IPv6 (DHCPv6) is used by nodes to obtain configuration information, such as the addresses of DNS recursive name servers, that does not require the maintenance of any dynamic state for individual clients. A node that uses stateless DHCP must have obtained its IPv6 addresses through some other mechanism, typically stateless address auto configuration [8]. To obtain configuration parameters through stateless DHCP, a node uses the DHCP information request message. DHCP servers respond to the nodes message with a reply message that carries configuration parameters for the node. The Reply message from the server can carry configuration information, such as a list of DNS recursive name servers. The client indicates that it is requesting configuration information by sending an Information-request message that includes an Option Request option specifying the options that it wishes to receive from the DHCP server. 3.3 IPv6 Stateless Auto configuration Auto configuration is performed only on multicast capable links and begins when a multicast capable interface is enabled during system startup. Nodes begin the auto configuration process by generating a link- local address for the interface. A link-local address is formed by appending an identifier of the interface to the well-known link-local prefix. All interfaces on IPv6 nodes must have a link-local address, which is usually automatically configured from the identifier for an interface and the link-local prefix FE80::/10. A link- local address enables a node to communicate with other nodes on the link and can be used to further configure the node. Nodes can connect to a network and automatically generate global IPv6 addresses without the need for manual configuration or help of a server, such as a Dynamic Host Configuration Protocol server. With IPv6, A device on the link advertises any global prefixes in Router Advertisement (RA) messages, as well as its willingness to function as a default device for the link. RA messages are sent periodically and in response to device solicitation messages, which are sent by hosts at system startup. A node on the link can automatically configure global IPv6 addresses by appending its interface identifier (64 bits) to the prefixes (64 bits) included in the RA messages. The resulting 128-bit IPv6 addresses configured by the node are then subjected to duplicate address detection to ensure their uniqueness on the link. If the prefixes advertised in the RA messages are globally unique, then the IPv6 addresses configured by the node are also guaranteed to be globally unique. Device solicitation messages, which have a value of 133 in the Type field of the ICMP packet header, are sent by hosts at system startup so that the host can immediately auto configure without needing to wait for the next scheduled RA message. 3.4 Static configuration Host addresses can only be static if subnet prefixes are also static. Static prefixes are such a long established practice in enterprise networks that it is hard to discern the reason for them, before DHCP became available, there was simply no alternative. Thus it became accepted practice to assign subnet prefixes manually and build them into static router configurations [9]. Static configuration is type in the entire 128-bit IPv6 address for the network node to knowing its full address and prefix length. The node does not need to statically configure default router and DNS IP addresses. The node can use the usual NDP process to discover any default routers and stateless DHCP to discover any default routers and stateless DHCP to discover the DNS IPv6 addresses. 3.5 Static configuration with EUI-64 Static configuration with EUI-64 is configuring the 64- bit prefix and performs the device to use and EUI-64 calculation for the interface ID portion of the addresses. RFC 3513, Internet Protocol Version 6 (IPv6) Addressing Architecture requires that the interface identifier portion of all unicast IPv6 addresses, except those that start with binary value 000, be 64 bits long and be constructed in Modified EUI-64 format. The security appliance can enforce this requirement for hosts attached to the local link [7]. The Main IPv6 benefits over IPv4 are capability for automatic interface address configuration. By implementing the IEEE 64- bit Extended Unique Identifier (EUI-64) format the node can automatically acquire itself a unique 64-bit IPv6 interface identifier without the need for manual or dynamic configuration. This is accomplished on Ethernet interfaces by referencing the already unique 48-bit Layer 2 address and reformatting that value to match the EUI-64 specification. RFC 2373 explain the conversion process. Convert the 48-bit MAC address to a 64-bit value, separate the MAC address into two portion of each 24-bit. The 16-bit hex value 0xFFFE is then inserted between these two values to form a 64-bit address. Invert the universal/local (U/L) flag bit 7 in the
  • 4. Int. J. Advanced Networking and Applications Volume: 07 Issue: 03 Pages: 2756-2760 (2015) ISSN: 0975-0290 2759 OUI portion of the address. Globally unique addresses assigned by the IEEE originally have this bit set to zero, indicating global uniqueness. Likewise, locally created addresses, such as those used for virtual interfaces or a MAC address manually configured by an administrator, will have this bit set to one. The U/L bit is inverted when using an EUI-64 address as an IPv6 interface ID. 4. SIMULATION AND RESULT ANALYSIS The Network Simulation 3 (NS 3.22) has been used for the running the simulation of analysis global unicast addressing. The simulation scenario in this research analysis uses the internetwork shown in Figure 1. The figure shows a diagram might see in an implementation plan, with the four IPv6 subnet numbers shown over the five links connect to nodes. The configuration process on router, which uses EUI-64 on four interfaces, and a complete IPv6 address on another. Also, the configuration includes the IPv6 unicast routing, which enables the router to route IPv6 traffic. The IPv6 address commands both enable IPv6 on the associated interfaces and define either the prefix with the EUI-64 option or the entire address. After the configuration confirm the IPv6 addresses. Figure 1. IP address and Device Identification All the four interfaces now have link local addresses that begin FE80. The nodes have the configured prefixes 2001:1: /64, 2001:2:: /64, 2001:3::1 /64 and 2001:4:: /64 respectively, but with EUI-64 derived interface-IDs. MAC address shown in the table 4. Multicast Groups Joined by IPv6 Router Interfaces, the first multicast, FF02::1, represents all IPv6 devices, so router interfaces must listen for packets sent to this address. FF02::2 represents all IPv6 routers so again router must listen for packets sent to this address. Finally, the FF02::1:FF beginning value is the range for an address solicited node multicast address, used by several functions, including the duplicate address detection (DAD) and neighbor discovery (ND). The interface ID of each interface is shown in table 4. ID MAC Address Unicast Address Link - Local Methods 0 0000:00 00:0001 2001:1::2 00:ff:fe00 :1 FE80::200: ff:fe00:1 Stateful DHCP 1 0000:00 00:0002 2001:2::2 00:ff:fe00 :4 FE80::200: ff:fe00:4 Stateless autoconfi guration 2 0000:00 00:0003 2001:3::1 FE80::200: ff:fe00:5 Static 3 0000:00 00:0004 2001:4::2 00:ff:fe00 :7 FE80::200: ff:fe00:7 Static EUI-64 Table 4. IP address and Device Identification After running the simulation events were generated in the trace file. The trace files were analyzed using the result analysis. In this study Flow Monitor and PCAP (Packet Capture) were used for analysis. The parameters such as the following are used for the analysis 1. Default router IP address 2. Throughput and Average End to End Delay 3. DNS IP address 4.1 Default router IP address Figure 1, shows a subset of the internetwork seen in table 4, with the same IPv6 addresses and subnets used. Routers interface has already been configured with an IPv6 address. Node 0, using stateless auto configuration to sends the RS message as an IPv6 multicast message destined to all IPv6 routers on the local link. The RS send query to all routers to respond to the questions and request of prefix and subnet. The router response with router response (RS) message, listing the prefix and with routers own IPv6 address as a potential default router IP address. Routers interface 2001:5::1/64 has been assigned as default router IP address. 4.2 Throughput and Average End to End Delay The Throughput is one of the performance metrics to evaluate the performance. Generally it is defined as the amount of data processed in a specified amount of time. From the trace file generated by running the simulation the throughput values were captured and plotted graph with the values of Throughput of receiving bits Variation with Simulation Time as shown in Figure 2. Each packet generated by a source is routed to the destination via a sequence of intermediate nodes. Throughput is calculated packet flow for node 0 and node 1 and sending TCP packets node 0 as source and node 1 as destination.
  • 5. Int. J. Advanced Networking and Applications Volume: 07 Issue: 03 Pages: 2756-2760 (2015) ISSN: 0975-0290 2760 Figure 2. Flow vs. Throughput The End-to-End delay is the sum of the delays experienced at each hop on the way to the destination of each packet. If this value is lesser, then the packets will be delivered faster from source to destination. The average End-to-End delay is computed as below. 4.3 DNS IP address The stateless DHCP server supplies the DNS server IPv6 address to nodes. All hosts typically use the same small number of DNS servers, the stateless DHCP server does not need to keep track of any state information. user simply configures the stateless DHCP server to know the IPv6 addresses of the DNS servers, and the servers inform any host or other device that send request packet to keep no record of the process. Nodes that use stateless configuration also use stateless DHCP to learn the DNS server IPv6 addresses. 5. CONCLUSION The NS-3 is an useful educational tool for simulation of IPv6 by writing relatively simple simulation scripts and evaluate the standard protocols also modify existing protocols or replace them with own solutions. From the results analysis of IPv6 address assignment shows very much improved performance and more flexible to modify the exits modules and perform the analysis. The goal is to study these protocols and analyze their performance for Global Unicast address based on performance metrics like Default router IP address, Throughput, End to End Delay and DNS IP address. REFERENCES [1] J. Curran, “An Internet Transition Plan”, RFC 5211, IETF, Internet Engineering Task Force, July 2008; http://tools.ietf.org/html/rfc5211 [2] Wendell Odom, CCNP ROUTE 642-902, Pearson Education, Inc., Publishing as Cisco Press, 2010.p.529 [3] BGP Routing Table Analysis Reports, [online], URL:http://bgp. potaroo.net, 2015 [4] “IPv6 Address Types”, [online], URL: https://technet.microsoft.com/en- us/library/cc757359%28v= ws.10%29.aspx [5] R. Hinden et al. RFC 2373. “IP Version 6 Addressing Architecture,” July 1998. [6] “Preparing An Ipv6 Address Plan”, Surf Net, http://www.ipv6forum.com/dl/presentations/Ip v6 addressing-plan-howto.pdf , ver 2, September 2013 [7] “Cisco Security Appliance Command Line Configuration Guide”, http://www.cisco.com/c/en/us/td/docs/ security/asa/asa72 /configuration/guide/conf_gd/ipv6.pdf [8] R. Droms, “Stateless Dynamic Host Configuration Protocol (DHCP) Service for Ipv6” , RFC 3736, IETF, Internet Engineering Task Force, April 2004, http://www.ietf.org/rfc/rfc3736.txt [9] B. Carpenter, S. Jiang, “Problem Statement for Renumbering IPv6 Hosts with Static Addresses”, RFC 6866, IETF, July 30, 2012 [10] R. Droms, J. Bound, B. Volz, T. Lemon, C. Perkins, M. Carney, “Dynamic Host Configuration Protocol for IPv6”, RFC 3315, IETF, July 2003