SlideShare a Scribd company logo
1 of 27
Dr.Manjaiah.D.H. Chairman  and Professor, Dept of CS, Mangalagangotri, Mangalore University, Mangalore-31739   Hanumanthappa.J.,  Aravinda.C.V. B.E., Match.,(Ph.D) ,  M.Sc.,M.Phil.,M.Tech.,(Ph.D).,  Asst.Professor,DOS in CS,UOM,   Research Scholar, Manasagangotri,   Mangalagangotri, Mysore.   Mangalore University, Mangalore.
ABSTRACT
Contents
[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPv6 Header Format Traffic Class Flow Label Vers Payload Length Next Header Hop Limit Source Address Destination Address 0 4 12 16 24 31
 
[object Object]
Fig.2.Translation of IPv6 to IPv4 Header .
[object Object],[object Object],[object Object],[object Object]
ICIIC2010,Aug-5,6,7. BD-SIIT Data Packet Transmission Process Fig.3.BD-SIIT Data packet Transmission Process .
IPv4-mapped  -IPv6 Address . 0  79  80  95  ,[object Object],80- bits of zero FFFF(16 bits ) 32 bits (IPv4 address
[object Object],[object Object],IPv4  Address IPv6 Address Address mapping 195.18.23.17 ABC2::4321 1 210.154.76.91 ABC2:4321 2 IPv6 Address IPv4 Mapping Mapping_value ABC2::4321 195.18.231.17 1 CDEF::5672 223.18.231.17 2
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ICIIC2010,Aug-5,6,7. Comparison and Contrast between BD-SIIT and DSTM Transition Mechanism. BD-SIIT DSTM 1.It does not for tunneling technique . 1. A tunneling technique needs to be configured.   2. Two IPv4 and IPv6 addresses are assumed to be globally unique. 2.Only IPv4 addresses are assumed to be globally unique . 3.It Uses two types of global IP addresses that are assigned by DNS46 server for each communication system. 3. Uses only a pool of IPv4 addresses in order to assign Global IPv4 address for each communication system. 4.Applicable for Bi-Directional commn between IPv6 only nodes and IPv4 nodes. 4.Not applicable to IPv6 only nodes that want to communicate with IPv4 only node. 5.Less cost 5.High Cost 6.Does not require upgrading or extra software to be used at end user nodes. 6.Requires modifications  or extra software to support the dual stack on the end user nodes.  7.Transition from IPv4 to IPv6 and Vice versa is needed. 7.Encapsulation and Decapsulation methods are needed.
In this Paper we have calculated three performance evaluation metrics . 1.End to End delay 2. Throughput 3.Round trip time(RTT)  N rec 1.Mean End to End delay= ∑EEDi/Nrec i=1 EEDi =Tdi-Tsi where EEDi is the end to end delay of ith packet. Tsi is the  Source packet i created and Tdi is the Destination packet which is created at Destination . Nrec is the total number of packets received at Dest host and Mean EED is the mean value of each communication session .
The mean throughput for a sequence of packets of specific size is calculated by using equations 1 and 2. MeanThr = ∑ N   Thrj   /N  -------------(1) j=1  where  Thr=Packets received(Pr)/Packets generated(Pg)*100%.--------------(2) Thrj is the value of the throughput when the packet j is received at intermediate device like DSTM gateway,BD-SIIT Gateway,v4/v6 Router and N is the number of received packets at intermediate device,Pr is the no of packets received at intermediate device and Pg is the number of packets created by  source host .
ICIIC2010,Aug-5,6,7. Simulation Parameters Value 1.Buffer Size 500 Packets 2. Propogation Delay 10ms 3.Payload size 200 Bytes 4.Very traffic Load 6~240 Nodes. 5.Queue  Management  Scheme Drop tail.
References   [1].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” A Study on IPv6 in IPv4 Static Tunneling threat issues in 4G Networks using OOAD Class and Instance Diagrams“, Proceedings  of the International  Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA, January 09-11,2010,[Paper code CSCIT-152][CSCITOP113].   [2].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” An IPv4-to-IPv6 threat reviews with dual stack transition mechanism considerations a transitional threat model in 4G Wireless networks ”Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA,January 09-11,2010,[Paper code CSCIT-157] [CSCITOP115].   [3].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” Implementation,Comparative and Performance Analysis of IPv6 over IPv4 QoS metrics in 4G Networks: Single-source-destination paths Delay, Packet Loss Performance and Tunnel Discovery Mechanisms“,Proceedings  of the International  Conference on Information Science and Applications(ICISA-2010)organized by Dept. of Master of Computer Applications,Panimalar Engineering College,Chennai-600 123,Tamilnadu,India.,February-06-2010,[Paper code ICISA-293(with serial no-101)].   [4].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi ,”High Performance evaluation of Multimedia Video Streaming over IP networks” ,Proceedings of the National conference on Computing communications and Information systems(NCCCIS-2010)organized by Department of Information Technology Sri Krishna College of Engineering and Technology,Kuniamuthur,Coimbatore-641008,INDIA,February-12-13,2010,[Paper id NCCCIS-MM-03],pp-88-92 .  
ICIIC2010,Aug-5,6,7. [5].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” IPv6 Tunneling Algorithms in 4G Networks ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th  and  9 th   2010.    [6].Sridevi.,Hanumanthappa.J.,Manjaiah.D.H,” A Novel IPv4/IPv6 Transition scenarios in 4G Networks ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th  and  9 th  2010.   [7].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” A  Comparison of Performance evaluation metrics and Simulation parameters ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th  and  9 th  2010. [8].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K .,“Comparison and Contrast between Bellman ford and Dijkstra’s algorithms” ,Proc.of. the National Conference on Wireless Networks-09(NCOWN-2010),organized by RLJIT,Kodigehalli,Doddaballapur,Kerala,INDIA,February   ,2010,[Paper code  05].    [9].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi,” Emerging technologies for the 4G Wireless communications ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th  and  9 th  2010.   [10].Hanumanthappa.J.,Manjaiah.D.H .,”IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model: A Case Study for University of Mysore Network”, International Journal of Computer Science and Information(IJCSIS)Vol.3.,No.1,July-2009,ISSN 1947-5500,Paper ID: 12060915]
[11].Hanumanthappa.J.,Manjaiah.D.H .,”Transition of IPv4 Network Applications to IPv6 Applications”[TIPv4 to TIPv6], Proceedings of IEEE International Conference on emerging trends in computing(ICETiC-2009),Virudhunagar,Tamilnadu 8-10,January 2009,INDIA.[Paper ID 234].    [12].Hanumanthappa.J.,Manjaiah.D.H.,Thippeswamy.K .“IPv6 over Bluetooth: Security Aspects, Issues and its Challenges”, Proceedings of National  Conference on,Wireless Communications and Technologies(NCWCT-09)-Theme :Mobile and Pervasive Computing , Nitte,Karnataka,Udupi Dist, Karnataka ,INDIA,February-5-6  , 2009,[ Paper id -104]    [13].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D .“Economical and Technical costs for the Transition of IPv4–to-IPv6 Mechanisms[ETCTIPv4 to ETCTIPv6]” ,Proceedings of National  Conference on Wireless Communications and Technologies(NCWCT-09)-Theme:Mobile and Pervasive Computing , Nitte   ,Karnataka,Udupi Dist,Karnataka,INDIA,February-5-6  , 2009,[ Paper id -103]    [14].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D .”Implementation of Codec Driver for network embedded  devices ”, Proceedings of the ” IEEE International Advance Computing Conference IACC-2009 on March 6- 8[Paper ID IEEE-ALGO-0205]at patiala. [15].Hanumanthappa.J.,Tippeswamy.K.,Manjaiah.D.H ., “ SOA Approach for information retrieval using web Services” [SOAAFIRUWS ],Proceedings of  IEEE International Conference on   the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-DATA-2065].   [16].Hanumanthappa.J.,Manjaiah.D.H ., Tippeswamy.K.“ An Overview of Study on Smooth Porting Process  Scenario during IPv6 Transition”[TIPv6] ,Proceedings of  IEEE International Conference on   the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-APPL-1278].  [17].Hanumanthappa.J.,Manjaiah.D.H ., Tippeswamy.K .“Generic Query information retrieval System for web 2.0” ,Proceedings of the Seventh International Convention on Automation of libraries in education and Research(CALIBER-2009) organized by Inflibnet centre on February 25-27,2009 at Pondicherry university(A central University),R.Venkat Raman Nagar,Kalapet,Pondicherry-605014,India.[Paper ID C-13].   [18].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K.“ IPv6 over IPv4 QoS metrics in 4G Networks:Delay, Jitter,Packet Loss Performance,Throughput and Tunnel Discovery Mechanisms”, Proceedings of the National Conference on Wireless Networks-09(NCOWN-2009) organized by RLJIT,Kodigehalli,Doddaballapur,Karnataka, INDIA,November 21-22 nd  ,2009,[Paper code NCOWN-19 .
[19].Hanumanthappa.J.,Manjaiah.D.H.,“ A Study on Comparison and Contrast  between IPv6  and  IPv4 Feature Sets”  Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28 th ,2008,[Paper code  CP 15].  [20].Hanumanthappa.J.,Balachandra.C ,“Soft one to One Gateway Protocol”, Proceedings  of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28 th ,2008,[Paper code CP 27]. [21].Hanumanthappa.J.,Thippeswamy.K .“Generic Query Retrieval System”[GQRS]”, Proceedings of National  Conference on,Recent Trends in Engineering and Technology(RTIET-2008),Doddaballapur,Karnataka,INDIA,November   21-22 nd  ,2008,[ Paper code  05]  [22].S.Deering and R.Hinden “Internet Protocol Version 6(IPv6) Specification”, RFC 2460,December 1998 . [23].Ra’ed Al Ja’afreh,John Mellor, and Irfan Awan,“Evaluating BDMS and DSTM Transition mechanisms”. [24].S.Tanenbaum,“Computer Networks”,Third Edition,Prentice Hall Inc.,1996,pp.686,413-436,437-449.  [25].Behrouz A.Forouzan,Third Edition,“TCP/IP Protocol Suite” .  [26].Atul Kahate,“Cryptography and Network Security“,Tata McGraw-Hill,2003,pp-8-10.  [26].Kurose.J.& Ross.K.(2005)Computer Networking:A top-down approach featuring the Internet.3 rd  ed,(Addison Wesley).5960-0125-8.  [27].Moby dick project:“Mobility and Differentiated services in a future IP network:”,Final project report,4.4.2004.  [28].J.Wiljakka(ed.,)“Analysis on IPv6 transition in 3GPP networks”,draft-ietf-v6ops-3gpp-analysis-04.txt,Internet  draft, work in progress .
[35].E.Nordmark,Stateless IP/ICMP translation algorithm(SIIT),RFC 2765,February 2000. [36].Ra’ed AlJa’afreh,John mellor,Mumtaz  Kamala,” A Novel IPv4/IPv6 transition mechanism which support transparent connections”. [37].Ra’ed AlJa’afreh,John mellor,Mumtaz  Kamala and R.Kassabeh ,Bi-Directional mapping system as a new IPv4/IPv6 transition mechanism. [38].TimRooney,IPv4/IPv6Transition strategies,Director,Product management,BT Diamond IP. [39].John.J.Amos and Daniel Minoli,Handbook of IPv4 to IPv6 Transition Methodologies for Institutional and Corporate Networks. [40].Jivika Govil   ,Jivesh Govil,Navkeerat Kaur,Harkeerat Kaur,An examination of IPv4 and IPv6 Networks: constraints,and various transition mechanisms. [41].Jivika Govil,Jivesh Govil,”On the Investigation of Transactional and Interoperability Issues between IPv4 and IPv6,2007,IEEE electro/Information technology conference,(EIT 2007),17-20,May 2007,chicago,USA
ICIIC2010,Aug-5,6,7. ICEMC2-2010,Kuppam,AP,INDIA. Any Questions ?
ICIIC2010,Aug-5,6,7. .

More Related Content

What's hot

Icemc22010 ppt 29
Icemc22010 ppt 29Icemc22010 ppt 29
Icemc22010 ppt 29
hanums1
 
Icemc2 kuppam
Icemc2 kuppamIcemc2 kuppam
Icemc2 kuppam
hanums1
 
Routing in delay tolerant network using
Routing in delay tolerant network usingRouting in delay tolerant network using
Routing in delay tolerant network using
IAEME Publication
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniques
iaemedu
 
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
IJNSA Journal
 

What's hot (19)

AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
 
Icemc22010 ppt 29
Icemc22010 ppt 29Icemc22010 ppt 29
Icemc22010 ppt 29
 
Icemc2 kuppam
Icemc2 kuppamIcemc2 kuppam
Icemc2 kuppam
 
Major Report on ADIAN
Major Report on ADIANMajor Report on ADIAN
Major Report on ADIAN
 
Steganography
Steganography Steganography
Steganography
 
Ijetcas14 330
Ijetcas14 330Ijetcas14 330
Ijetcas14 330
 
Routing in delay tolerant network using
Routing in delay tolerant network usingRouting in delay tolerant network using
Routing in delay tolerant network using
 
Shortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksShortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor Networks
 
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniques
 
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
 
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
 
40120140505005 2
40120140505005 240120140505005 2
40120140505005 2
 
40120140505005
4012014050500540120140505005
40120140505005
 
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterArtificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
 
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
 
140320702029 maurya ppt
140320702029 maurya ppt140320702029 maurya ppt
140320702029 maurya ppt
 
Neural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionNeural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal Recognition
 
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
 

Viewers also liked

Iccsit 2010 rljit
Iccsit 2010 rljitIccsit 2010 rljit
Iccsit 2010 rljit
hanums1
 
Iccana 2011 jan8th
Iccana 2011 jan8thIccana 2011 jan8th
Iccana 2011 jan8th
hanums1
 
Kkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithmsKkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithms
hanums1
 
Iccsit2010 p 1
Iccsit2010 p 1Iccsit2010 p 1
Iccsit2010 p 1
hanums1
 
Iccci2010
Iccci2010Iccci2010
Iccci2010
hanums1
 
Kkbnet 2010-a compa
Kkbnet 2010-a  compaKkbnet 2010-a  compa
Kkbnet 2010-a compa
hanums1
 
Iccsit2010 p 1-dummy
Iccsit2010 p 1-dummyIccsit2010 p 1-dummy
Iccsit2010 p 1-dummy
hanums1
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
hanums1
 

Viewers also liked (8)

Iccsit 2010 rljit
Iccsit 2010 rljitIccsit 2010 rljit
Iccsit 2010 rljit
 
Iccana 2011 jan8th
Iccana 2011 jan8thIccana 2011 jan8th
Iccana 2011 jan8th
 
Kkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithmsKkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithms
 
Iccsit2010 p 1
Iccsit2010 p 1Iccsit2010 p 1
Iccsit2010 p 1
 
Iccci2010
Iccci2010Iccci2010
Iccci2010
 
Kkbnet 2010-a compa
Kkbnet 2010-a  compaKkbnet 2010-a  compa
Kkbnet 2010-a compa
 
Iccsit2010 p 1-dummy
Iccsit2010 p 1-dummyIccsit2010 p 1-dummy
Iccsit2010 p 1-dummy
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
 

Similar to Iciic2010 114

Iccci10 bd siit
Iccci10 bd siitIccci10 bd siit
Iccci10 bd siit
hanums1
 
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
Procedia Computer Science   46  ( 2015 )  1072 – 1078 187.docxProcedia Computer Science   46  ( 2015 )  1072 – 1078 187.docx
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
AASTHA76
 
Da3210751081
Da3210751081Da3210751081
Da3210751081
IJMER
 
Icemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmIcemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstm
hanums1
 
Respond 3 of your colleagues postings in one or more of the fol.docx
 Respond  3 of your colleagues postings in one or more of the fol.docx Respond  3 of your colleagues postings in one or more of the fol.docx
Respond 3 of your colleagues postings in one or more of the fol.docx
aryan532920
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
IJECEIAES
 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
IJCNCJournal
 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
IJCNCJournal
 

Similar to Iciic2010 114 (20)

Iccci10 bd siit
Iccci10 bd siitIccci10 bd siit
Iccci10 bd siit
 
M017147275
M017147275M017147275
M017147275
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
 
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
Procedia Computer Science   46  ( 2015 )  1072 – 1078 187.docxProcedia Computer Science   46  ( 2015 )  1072 – 1078 187.docx
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
 
Protocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationProtocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulation
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
 
Da3210751081
Da3210751081Da3210751081
Da3210751081
 
Icemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmIcemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstm
 
Design of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial ModulationDesign of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial Modulation
 
Respond 3 of your colleagues postings in one or more of the fol.docx
 Respond  3 of your colleagues postings in one or more of the fol.docx Respond  3 of your colleagues postings in one or more of the fol.docx
Respond 3 of your colleagues postings in one or more of the fol.docx
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
 
Evaluation of Table Driven Protocols-DSDV & OLSR in MANET
Evaluation of Table Driven Protocols-DSDV & OLSR in MANETEvaluation of Table Driven Protocols-DSDV & OLSR in MANET
Evaluation of Table Driven Protocols-DSDV & OLSR in MANET
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

Iciic2010 114

  • 1. Dr.Manjaiah.D.H. Chairman and Professor, Dept of CS, Mangalagangotri, Mangalore University, Mangalore-31739 Hanumanthappa.J., Aravinda.C.V. B.E., Match.,(Ph.D) , M.Sc.,M.Phil.,M.Tech.,(Ph.D)., Asst.Professor,DOS in CS,UOM, Research Scholar, Manasagangotri, Mangalagangotri, Mysore. Mangalore University, Mangalore.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. IPv6 Header Format Traffic Class Flow Label Vers Payload Length Next Header Hop Limit Source Address Destination Address 0 4 12 16 24 31
  • 9.  
  • 10.
  • 11. Fig.2.Translation of IPv6 to IPv4 Header .
  • 12.
  • 13. ICIIC2010,Aug-5,6,7. BD-SIIT Data Packet Transmission Process Fig.3.BD-SIIT Data packet Transmission Process .
  • 14.
  • 15.
  • 16.
  • 17. ICIIC2010,Aug-5,6,7. Comparison and Contrast between BD-SIIT and DSTM Transition Mechanism. BD-SIIT DSTM 1.It does not for tunneling technique . 1. A tunneling technique needs to be configured. 2. Two IPv4 and IPv6 addresses are assumed to be globally unique. 2.Only IPv4 addresses are assumed to be globally unique . 3.It Uses two types of global IP addresses that are assigned by DNS46 server for each communication system. 3. Uses only a pool of IPv4 addresses in order to assign Global IPv4 address for each communication system. 4.Applicable for Bi-Directional commn between IPv6 only nodes and IPv4 nodes. 4.Not applicable to IPv6 only nodes that want to communicate with IPv4 only node. 5.Less cost 5.High Cost 6.Does not require upgrading or extra software to be used at end user nodes. 6.Requires modifications or extra software to support the dual stack on the end user nodes. 7.Transition from IPv4 to IPv6 and Vice versa is needed. 7.Encapsulation and Decapsulation methods are needed.
  • 18. In this Paper we have calculated three performance evaluation metrics . 1.End to End delay 2. Throughput 3.Round trip time(RTT) N rec 1.Mean End to End delay= ∑EEDi/Nrec i=1 EEDi =Tdi-Tsi where EEDi is the end to end delay of ith packet. Tsi is the Source packet i created and Tdi is the Destination packet which is created at Destination . Nrec is the total number of packets received at Dest host and Mean EED is the mean value of each communication session .
  • 19. The mean throughput for a sequence of packets of specific size is calculated by using equations 1 and 2. MeanThr = ∑ N Thrj /N -------------(1) j=1 where Thr=Packets received(Pr)/Packets generated(Pg)*100%.--------------(2) Thrj is the value of the throughput when the packet j is received at intermediate device like DSTM gateway,BD-SIIT Gateway,v4/v6 Router and N is the number of received packets at intermediate device,Pr is the no of packets received at intermediate device and Pg is the number of packets created by source host .
  • 20. ICIIC2010,Aug-5,6,7. Simulation Parameters Value 1.Buffer Size 500 Packets 2. Propogation Delay 10ms 3.Payload size 200 Bytes 4.Very traffic Load 6~240 Nodes. 5.Queue Management Scheme Drop tail.
  • 21. References [1].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” A Study on IPv6 in IPv4 Static Tunneling threat issues in 4G Networks using OOAD Class and Instance Diagrams“, Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA, January 09-11,2010,[Paper code CSCIT-152][CSCITOP113].   [2].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” An IPv4-to-IPv6 threat reviews with dual stack transition mechanism considerations a transitional threat model in 4G Wireless networks ”Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA,January 09-11,2010,[Paper code CSCIT-157] [CSCITOP115].   [3].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” Implementation,Comparative and Performance Analysis of IPv6 over IPv4 QoS metrics in 4G Networks: Single-source-destination paths Delay, Packet Loss Performance and Tunnel Discovery Mechanisms“,Proceedings of the International Conference on Information Science and Applications(ICISA-2010)organized by Dept. of Master of Computer Applications,Panimalar Engineering College,Chennai-600 123,Tamilnadu,India.,February-06-2010,[Paper code ICISA-293(with serial no-101)].   [4].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi ,”High Performance evaluation of Multimedia Video Streaming over IP networks” ,Proceedings of the National conference on Computing communications and Information systems(NCCCIS-2010)organized by Department of Information Technology Sri Krishna College of Engineering and Technology,Kuniamuthur,Coimbatore-641008,INDIA,February-12-13,2010,[Paper id NCCCIS-MM-03],pp-88-92 .  
  • 22. ICIIC2010,Aug-5,6,7. [5].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” IPv6 Tunneling Algorithms in 4G Networks ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010.   [6].Sridevi.,Hanumanthappa.J.,Manjaiah.D.H,” A Novel IPv4/IPv6 Transition scenarios in 4G Networks ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010.   [7].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” A Comparison of Performance evaluation metrics and Simulation parameters ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010. [8].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K .,“Comparison and Contrast between Bellman ford and Dijkstra’s algorithms” ,Proc.of. the National Conference on Wireless Networks-09(NCOWN-2010),organized by RLJIT,Kodigehalli,Doddaballapur,Kerala,INDIA,February ,2010,[Paper code 05].   [9].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi,” Emerging technologies for the 4G Wireless communications ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010.   [10].Hanumanthappa.J.,Manjaiah.D.H .,”IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model: A Case Study for University of Mysore Network”, International Journal of Computer Science and Information(IJCSIS)Vol.3.,No.1,July-2009,ISSN 1947-5500,Paper ID: 12060915]
  • 23. [11].Hanumanthappa.J.,Manjaiah.D.H .,”Transition of IPv4 Network Applications to IPv6 Applications”[TIPv4 to TIPv6], Proceedings of IEEE International Conference on emerging trends in computing(ICETiC-2009),Virudhunagar,Tamilnadu 8-10,January 2009,INDIA.[Paper ID 234].   [12].Hanumanthappa.J.,Manjaiah.D.H.,Thippeswamy.K .“IPv6 over Bluetooth: Security Aspects, Issues and its Challenges”, Proceedings of National Conference on,Wireless Communications and Technologies(NCWCT-09)-Theme :Mobile and Pervasive Computing , Nitte,Karnataka,Udupi Dist, Karnataka ,INDIA,February-5-6 , 2009,[ Paper id -104]   [13].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D .“Economical and Technical costs for the Transition of IPv4–to-IPv6 Mechanisms[ETCTIPv4 to ETCTIPv6]” ,Proceedings of National Conference on Wireless Communications and Technologies(NCWCT-09)-Theme:Mobile and Pervasive Computing , Nitte ,Karnataka,Udupi Dist,Karnataka,INDIA,February-5-6 , 2009,[ Paper id -103]   [14].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D .”Implementation of Codec Driver for network embedded devices ”, Proceedings of the ” IEEE International Advance Computing Conference IACC-2009 on March 6- 8[Paper ID IEEE-ALGO-0205]at patiala. [15].Hanumanthappa.J.,Tippeswamy.K.,Manjaiah.D.H ., “ SOA Approach for information retrieval using web Services” [SOAAFIRUWS ],Proceedings of IEEE International Conference on the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-DATA-2065].   [16].Hanumanthappa.J.,Manjaiah.D.H ., Tippeswamy.K.“ An Overview of Study on Smooth Porting Process Scenario during IPv6 Transition”[TIPv6] ,Proceedings of IEEE International Conference on the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-APPL-1278]. [17].Hanumanthappa.J.,Manjaiah.D.H ., Tippeswamy.K .“Generic Query information retrieval System for web 2.0” ,Proceedings of the Seventh International Convention on Automation of libraries in education and Research(CALIBER-2009) organized by Inflibnet centre on February 25-27,2009 at Pondicherry university(A central University),R.Venkat Raman Nagar,Kalapet,Pondicherry-605014,India.[Paper ID C-13].   [18].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K.“ IPv6 over IPv4 QoS metrics in 4G Networks:Delay, Jitter,Packet Loss Performance,Throughput and Tunnel Discovery Mechanisms”, Proceedings of the National Conference on Wireless Networks-09(NCOWN-2009) organized by RLJIT,Kodigehalli,Doddaballapur,Karnataka, INDIA,November 21-22 nd ,2009,[Paper code NCOWN-19 .
  • 24. [19].Hanumanthappa.J.,Manjaiah.D.H.,“ A Study on Comparison and Contrast between IPv6 and IPv4 Feature Sets” Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28 th ,2008,[Paper code CP 15]. [20].Hanumanthappa.J.,Balachandra.C ,“Soft one to One Gateway Protocol”, Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28 th ,2008,[Paper code CP 27]. [21].Hanumanthappa.J.,Thippeswamy.K .“Generic Query Retrieval System”[GQRS]”, Proceedings of National Conference on,Recent Trends in Engineering and Technology(RTIET-2008),Doddaballapur,Karnataka,INDIA,November 21-22 nd ,2008,[ Paper code 05] [22].S.Deering and R.Hinden “Internet Protocol Version 6(IPv6) Specification”, RFC 2460,December 1998 . [23].Ra’ed Al Ja’afreh,John Mellor, and Irfan Awan,“Evaluating BDMS and DSTM Transition mechanisms”. [24].S.Tanenbaum,“Computer Networks”,Third Edition,Prentice Hall Inc.,1996,pp.686,413-436,437-449. [25].Behrouz A.Forouzan,Third Edition,“TCP/IP Protocol Suite” . [26].Atul Kahate,“Cryptography and Network Security“,Tata McGraw-Hill,2003,pp-8-10. [26].Kurose.J.& Ross.K.(2005)Computer Networking:A top-down approach featuring the Internet.3 rd ed,(Addison Wesley).5960-0125-8. [27].Moby dick project:“Mobility and Differentiated services in a future IP network:”,Final project report,4.4.2004. [28].J.Wiljakka(ed.,)“Analysis on IPv6 transition in 3GPP networks”,draft-ietf-v6ops-3gpp-analysis-04.txt,Internet draft, work in progress .
  • 25. [35].E.Nordmark,Stateless IP/ICMP translation algorithm(SIIT),RFC 2765,February 2000. [36].Ra’ed AlJa’afreh,John mellor,Mumtaz Kamala,” A Novel IPv4/IPv6 transition mechanism which support transparent connections”. [37].Ra’ed AlJa’afreh,John mellor,Mumtaz Kamala and R.Kassabeh ,Bi-Directional mapping system as a new IPv4/IPv6 transition mechanism. [38].TimRooney,IPv4/IPv6Transition strategies,Director,Product management,BT Diamond IP. [39].John.J.Amos and Daniel Minoli,Handbook of IPv4 to IPv6 Transition Methodologies for Institutional and Corporate Networks. [40].Jivika Govil ,Jivesh Govil,Navkeerat Kaur,Harkeerat Kaur,An examination of IPv4 and IPv6 Networks: constraints,and various transition mechanisms. [41].Jivika Govil,Jivesh Govil,”On the Investigation of Transactional and Interoperability Issues between IPv4 and IPv6,2007,IEEE electro/Information technology conference,(EIT 2007),17-20,May 2007,chicago,USA