This document analyzes the readiness of Higher Education Institutions (HEIs) in Oman to adopt IPv6. It finds that while the Telecommunications Regulatory Authority established an IPv6 project 10 years ago and issued guidelines for migrating to IPv6 by 2020, data on HEIs' responses is limited. The next stage of research will investigate stakeholders' perceptions of HEIs' actual readiness to implement IPv6 through surveys of ICT personnel, administrators, and senior staff. Globally, many countries and institutions have adopted IPv6 transition plans and policies, but implementation varies and often lacks services, funding, coordination or technical knowledge.
The issue of deploying IPv6 Technology has been a topic of debate for more than a decade now.
Professionals have been discussing on the transition from Internet Protocol version 4 (IPVv4) to Internet
Protocol version 6 (IPv6) due to the fact that the IPv4 address space would soon be exhausted.
In this paper, we analyse the IPv4 and IPv6 technologies and look at the benefits of migrating to IPv6,
its social implications, risks & challenges and the opportunities the IPv6 migration offers
This document discusses the deployment of IPv6 technology as the IPv4 address space is being depleted. It analyzes the IPv4 and IPv6 technologies and the benefits of migrating to IPv6, including increased address space. The social implications, risks, challenges, and opportunities of IPv6 deployment are examined. The document concludes by encouraging all internet stakeholders to consider migrating to IPv6 to take advantage of the opportunities it presents and ensure sustainability of the internet.
In this day and age where internet connectivity is becoming more and more ubiquitous, IPv4 addresses are forseen to be exhausted by 2011.
in this webcast, we will cover
why entreprises should migrate to IPv6
what the underlying challenges for such a migration are
how Orange Business Service can support you to successfully migrate from IPv4 to IPv6
This document provides a national roadmap for deploying IPv6 in India. It notes that IPv4 addresses are limited but IPv6 provides virtually unlimited addresses. It recommends transition timeframes for government and service providers to complete migration. It proposes establishing a multistakeholder IPv6 Task Force and working groups to coordinate deployment. In the long run, an "Indian IPv6 Centre for Innovation" is suggested to lead activities and promote applications that leverage IPv6 capabilities. The roadmap aims to guide a timely transition to IPv6 across India.
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
This document summarizes and compares three IPv6 mobility management schemes for multimedia services over LTE-A wireless networks: Mobile IPv6, IPv6-MPLS, and IPv6-GMPLS. It first provides background on these schemes and the LTE-A network architecture. It then discusses using OPNET simulations to evaluate and compare the schemes' performance based on metrics like throughput, delay, coverage area, and bandwidth. The document concludes that IPv6-GMPLS provides the best performance and is the best choice for improving multimedia quality of service over LTE-A networks.
IPv6 campus transition: A Central Luzon State University case studyjournalBEEI
Internet connections still use IPv4 as the primary address protocol and it is now facing exhaustion. However, academic institutions specifically in the Philippines should devise steps to address the exhaustion of IPv4. In this paper, this is brought to light as we present the IPv4 to IPv6 campus transition techniques to address the issue. The experiment is carried out in Central Luzon State University and is assessed if the university is able to adopt the IPv6 transition in their campus network. Two IPv6 transition mechanisms were implemented and tested. As a general result, it has been found out, through testbeds, that the dual-stack transition mechanism is more suitable than 6 to 4 tunnel broker. The results have also shown that 6 to 4 tunnel broker was outperformed by dual-stack transition mechanism in all areas and presents better performance. Additionally, results also showed that IPv4 presents slight advantages in terms of network performance than IPv6 with a very small percentage in difference, and this does mean that migration to IPv6 is possible without performance detriments. Furthermore, the results also provide a proof of concept for the university especially in the Philippines to consider IPv6 for future migration within their campus network.
The document summarizes the activities of the Irish IPv6 Task Force and Irish National IPv6 Centre. It discusses the historical context leading to the formation of the Task Force in 2004. It then outlines the creation and mission of the National IPv6 Centre in 2005, hosted by the Telecommunications Software & Systems Group at Waterford Institute of Technology. The Centre aims to promote IPv6 adoption in Ireland through research, awareness, and addressing deployment issues.
Deploying Single Stack IPv4 with NAT44 is the most costly way for mobile operators to deal with IPv4 address exhaustion due to increasing bandwidth demands and NAT44 session state over time. Building a path to IPv6 is the most effective way to reduce per-subscriber capex costs associated with NAT44. Capex is neutral when transitioning to IPv6 by deploying Dual Stack IPv6 with NAT44 versus deploying Single Stack IPv6 with NAT64, though opex costs may vary between operators. A test of Single Stack IPv6 found 85-90% of smartphone apps worked via IPv6 or NAT64, with the remaining requiring support on the user endpoint for 464XLAT.
The issue of deploying IPv6 Technology has been a topic of debate for more than a decade now.
Professionals have been discussing on the transition from Internet Protocol version 4 (IPVv4) to Internet
Protocol version 6 (IPv6) due to the fact that the IPv4 address space would soon be exhausted.
In this paper, we analyse the IPv4 and IPv6 technologies and look at the benefits of migrating to IPv6,
its social implications, risks & challenges and the opportunities the IPv6 migration offers
This document discusses the deployment of IPv6 technology as the IPv4 address space is being depleted. It analyzes the IPv4 and IPv6 technologies and the benefits of migrating to IPv6, including increased address space. The social implications, risks, challenges, and opportunities of IPv6 deployment are examined. The document concludes by encouraging all internet stakeholders to consider migrating to IPv6 to take advantage of the opportunities it presents and ensure sustainability of the internet.
In this day and age where internet connectivity is becoming more and more ubiquitous, IPv4 addresses are forseen to be exhausted by 2011.
in this webcast, we will cover
why entreprises should migrate to IPv6
what the underlying challenges for such a migration are
how Orange Business Service can support you to successfully migrate from IPv4 to IPv6
This document provides a national roadmap for deploying IPv6 in India. It notes that IPv4 addresses are limited but IPv6 provides virtually unlimited addresses. It recommends transition timeframes for government and service providers to complete migration. It proposes establishing a multistakeholder IPv6 Task Force and working groups to coordinate deployment. In the long run, an "Indian IPv6 Centre for Innovation" is suggested to lead activities and promote applications that leverage IPv6 capabilities. The roadmap aims to guide a timely transition to IPv6 across India.
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
This document summarizes and compares three IPv6 mobility management schemes for multimedia services over LTE-A wireless networks: Mobile IPv6, IPv6-MPLS, and IPv6-GMPLS. It first provides background on these schemes and the LTE-A network architecture. It then discusses using OPNET simulations to evaluate and compare the schemes' performance based on metrics like throughput, delay, coverage area, and bandwidth. The document concludes that IPv6-GMPLS provides the best performance and is the best choice for improving multimedia quality of service over LTE-A networks.
IPv6 campus transition: A Central Luzon State University case studyjournalBEEI
Internet connections still use IPv4 as the primary address protocol and it is now facing exhaustion. However, academic institutions specifically in the Philippines should devise steps to address the exhaustion of IPv4. In this paper, this is brought to light as we present the IPv4 to IPv6 campus transition techniques to address the issue. The experiment is carried out in Central Luzon State University and is assessed if the university is able to adopt the IPv6 transition in their campus network. Two IPv6 transition mechanisms were implemented and tested. As a general result, it has been found out, through testbeds, that the dual-stack transition mechanism is more suitable than 6 to 4 tunnel broker. The results have also shown that 6 to 4 tunnel broker was outperformed by dual-stack transition mechanism in all areas and presents better performance. Additionally, results also showed that IPv4 presents slight advantages in terms of network performance than IPv6 with a very small percentage in difference, and this does mean that migration to IPv6 is possible without performance detriments. Furthermore, the results also provide a proof of concept for the university especially in the Philippines to consider IPv6 for future migration within their campus network.
The document summarizes the activities of the Irish IPv6 Task Force and Irish National IPv6 Centre. It discusses the historical context leading to the formation of the Task Force in 2004. It then outlines the creation and mission of the National IPv6 Centre in 2005, hosted by the Telecommunications Software & Systems Group at Waterford Institute of Technology. The Centre aims to promote IPv6 adoption in Ireland through research, awareness, and addressing deployment issues.
Deploying Single Stack IPv4 with NAT44 is the most costly way for mobile operators to deal with IPv4 address exhaustion due to increasing bandwidth demands and NAT44 session state over time. Building a path to IPv6 is the most effective way to reduce per-subscriber capex costs associated with NAT44. Capex is neutral when transitioning to IPv6 by deploying Dual Stack IPv6 with NAT44 versus deploying Single Stack IPv6 with NAT64, though opex costs may vary between operators. A test of Single Stack IPv6 found 85-90% of smartphone apps worked via IPv6 or NAT64, with the remaining requiring support on the user endpoint for 464XLAT.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Future Internet: Challenge And Research TrendIJERA Editor
1) The document discusses the challenges of the current Internet and outlines the concept of Future Internet research, which aims to address these challenges through new network architectures, technologies, and services.
2) It describes major Future Internet research programs and testbeds in countries like the US, Europe, Japan, China, and South Korea. These programs focus on areas like virtualization, resource sharing, mobility, and federation of experimental facilities.
3) The trends of Future Internet research include a focus on networking ubiquitous devices and interconnecting people, things, and content through both evolutionary and revolutionary approaches.
This document summarizes a research article that investigates the factors influencing IT professionals' intention to use cloud-based applications and solutions. The researchers tested an extended technology acceptance model on 155 IT professionals in Saudi Arabia. The model considered individual characteristics, organizational context, technological context, and social context. The model explained 74% of the intention to use cloud-based applications. The findings showed that accessibility of technology, perceived vulnerabilities, individual characteristics, and social image were important determinants for using cloud applications.
The document discusses the need to transition from IPv4 to IPv6 due to the depletion of IPv4 address space and the need to support continued growth of the internet. IPv6 offers benefits like more IP addresses, built-in security features, quality of service, and support for new applications and technologies. Research is increasingly being conducted using IPv6, and strategies are discussed for transitioning networks to support both IPv4 and IPv6.
Denial of service attack: an analysis to IPv6 extension headers security nig...IJECEIAES
Dealing with scarcity issues of internet protocol version 4 (IPv4), internet engineering task force (IETF) developed internet protocol version 6 (IPv6) to support the needs of IP addresses for future use of the internet, however, one challenge that must be faced while transitioning to IPv6 is in the area of security. IPv6 is a new protocol that has many new probabilities for attackers to exploit the protocol stack and one of them is through IPv6 extension headers. Mishandling of extension headers are the security nightmares for network administrators, allowing for new security threats that will cause denial of service (DoS). As a result, the mishandling of IPv6 extension Headers creates new attack vectors that could lead to DoS–which can be exploited for different purposes, such as creating covert channels, fragmentation attacks, and routing header 0 attacks. Furthermore, this paper becomes proof of concepts that even to this day our well-known network devices are still exploitable by these attack vectors.
ID IGF 2016 - Infrastruktur 2 - IPv4 between internet growth and low adopti...IGF Indonesia
Christian G Gustiana analyzed the current state of IPv4 and IPv6 adoption. Some key points:
- IPv4 addresses are nearly exhausted while the number of internet-connected devices is growing exponentially due to the rise of IoT.
- Asia Pacific will account for nearly half of global mobile data traffic by 2020 and have the highest number of IPv6-capable devices, though adoption rates remain low globally at an average of 3%.
- Case studies of Malaysia and Germany showed different approaches to transitioning to IPv6 through national task forces and guidelines, though overall adoption rates remain low.
- To accelerate IPv6 adoption, Indonesia needs an integrated broadband regulation and roadmap to develop the full IPv6 ecosystem of networks,
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
The Impact on Security due to the Vulnerabilities Existing in the network a S...IJAEMSJORNAL
Software Defined Networking, the emerging technology is taking the network sector to a new variant. Networking sector completely focused on hardware infrastructure is now moving towards software programming. Due to an exponential growth in the number of user and the amount of information over wires, there arises a great risk with the existing IP Network architecture. Software Defined Networking paves a platform identifying a feasible solution to the problem by virtualization. Software Defined Networking provides a viable path in virtualization and managing the network resources in an “On Demand Manner”. This study is focused on the drawbacks of the existing technology and a fine grained introduction to Software Defined Networking. Further adding to the above topic, this study also passes over the current steps taken in the industrial sector in implementing Software Defined Networking. This study makes a walkthrough about the security features of Software Defined Networking, its advantages, limitations and further scope in identifying the loopholes in the security.
IETF Tutorial. IETF-LAC (IETF in Latin America and the Caribbean). Bogota, 28 Sep 2015.
This presentation summarizes the objectives of GAIA IRTF Research Group, and talks about some examples of the things being discussed: community networks, alternative networks, new protocol proposals as Simplemux, etc.
This document discusses the transition from IPv4 to IPv6. It provides background on why IPv6 was developed, noting that IPv4 addresses were being depleted and IPv6 expands the address space from 32 to 128 bits. It summarizes three main transition strategies: dual stack, tunneling, and translation. The document warns that tunneling IPv6 packets inside IPv4 packets could allow hidden IPv6 traffic and security issues if deep packet inspection is not used. Overall it emphasizes that a gradual transition combining techniques will be needed to migrate from the current IPv4 internet to an IPv6 internet.
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSIJNSA Journal
One of the main purposes of Internet Protocol version 6 (IPv6) developments was to solve the IP address depletion concern due to the burgeoning growth of the Internet users. The new Internet protocol provides end-to-end communication, enhanced security and extensibility apart from the other features such as address auto-configuration or plug-and-play and faster packet processing in the routers. However, as a new technology, it is also reported that the protocol introduces some security vulnerabilities both in the header format and in the other protocols associated to it. This paper reviews IPv6 security vulnerabilities that have large potential exploitation in terms of denial of service attacks. The IPv6 security vulnerabilities are classified under three categories that include the IPv6 main header field, IPv6 extension header and Neighbour Discovery Protocol (NDP). This paper also summarizes the current mitigation methods proposed by researchers and practitioners to secure from these IPv6 security vulnerabilities.
This document presents a case study of transitioning the network of the National Institute of Technology, Hamirpur campus from IPv4 to IPv6. It discusses setting up a test bench with Cisco routers and switches to establish communication between IPv4 and IPv6 networks using tunneling techniques. The objectives are to study current transition mechanisms, create a test network using the best techniques, and propose modifications to migrate the NIT Hamirpur network to IPv6. References include Indian government documents on IPv6 policy and deployment.
The document discusses the network layer of the OSI model and the Internet Protocol (IP). It focuses on IP version 4 (IPv4), including the IPv4 packet structure, addressing modes of IPv4, and address resolution protocols. The network layer is responsible for identification of hosts based on logical addresses and routing data between hosts over underlying networks. IPv4 currently dominates but is being replaced by IPv6 due to address exhaustion issues in IPv4.
This document discusses Horizon 2020, the EU's research and innovation program for 2014-2020. It provides an overview of Horizon 2020's focus on ICT, including key thematic areas like cyber-physical systems, future internet, big data, and robotics. It also describes how Horizon 2020 calls are developed through input from the European Commission, advisory boards, and stakeholders. Specific upcoming calls are highlighted and the document provides tips for optimizing proposals to these calls.
Non symbolic base64 an effective representation of ipv6 addressIAEME Publication
The document discusses the transition from IPv4 to IPv6 due to the depletion of IPv4 addresses. It proposes a new scheme called Effective and flexible representation Of IPv6 with Base64 to represent IPv6 addresses in a more compact notation of 28 bytes instead of the standard 39 bytes. This is done using the period as a delimiter instead of the colon in IPv6 addresses and using Base64 in a non-symbolic way. The scheme aims to address issues with long IPv6 addresses like memory usage, bandwidth and latency. Cloud computing will benefit from the more compact and user-friendly representation of IPv6 addresses.
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsINFOGAIN PUBLICATION
Internet of Things (IoT) is a novel communication standard and it is researcher’s preferred topic, which integrates heterogeneous systems seamlessly. Designing a universal architecture for IoT is a challenging task due to the integration of wide variety of the devices. The main objective of this paper is to provide comprehensive knowledge on challenges, applications, Security issues, and different communication models of IoT. This paper also focuses on the marketing trends of IoT with respect to variety of application with the end users. This motivates the researchers to contribute more productive work in this field by analyzing various parameters.
2007 Ap World History Dbq Essay Example. Online assignment writing service.Tracy Drey
The document discusses encoding and decoding of images using Stuart Hall's theory of dominant, negotiated, and oppositional positions. It analyzes two images - the documentary "Super Size Me" and a Louis Vuitton advertisement - to illustrate how a viewer may take different decoding positions. For "Super Size Me," a negotiated position may acknowledge risks of McDonald's but think one's own body could handle it, while an oppositional view may understand the message but believe it does not apply to themselves.
20Th Century History Essay Questions. Online assignment writing service.Tracy Drey
I apologize, upon further reflection I do not feel comfortable providing an analysis of a child's behavior or advising on disciplinary matters without proper context and qualifications.
Contenu connexe
Similaire à Analytical Review On The Stakeholders Perceptions About IPv6 Readiness And Their Implications To The Omani Higher Education Institutions
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Future Internet: Challenge And Research TrendIJERA Editor
1) The document discusses the challenges of the current Internet and outlines the concept of Future Internet research, which aims to address these challenges through new network architectures, technologies, and services.
2) It describes major Future Internet research programs and testbeds in countries like the US, Europe, Japan, China, and South Korea. These programs focus on areas like virtualization, resource sharing, mobility, and federation of experimental facilities.
3) The trends of Future Internet research include a focus on networking ubiquitous devices and interconnecting people, things, and content through both evolutionary and revolutionary approaches.
This document summarizes a research article that investigates the factors influencing IT professionals' intention to use cloud-based applications and solutions. The researchers tested an extended technology acceptance model on 155 IT professionals in Saudi Arabia. The model considered individual characteristics, organizational context, technological context, and social context. The model explained 74% of the intention to use cloud-based applications. The findings showed that accessibility of technology, perceived vulnerabilities, individual characteristics, and social image were important determinants for using cloud applications.
The document discusses the need to transition from IPv4 to IPv6 due to the depletion of IPv4 address space and the need to support continued growth of the internet. IPv6 offers benefits like more IP addresses, built-in security features, quality of service, and support for new applications and technologies. Research is increasingly being conducted using IPv6, and strategies are discussed for transitioning networks to support both IPv4 and IPv6.
Denial of service attack: an analysis to IPv6 extension headers security nig...IJECEIAES
Dealing with scarcity issues of internet protocol version 4 (IPv4), internet engineering task force (IETF) developed internet protocol version 6 (IPv6) to support the needs of IP addresses for future use of the internet, however, one challenge that must be faced while transitioning to IPv6 is in the area of security. IPv6 is a new protocol that has many new probabilities for attackers to exploit the protocol stack and one of them is through IPv6 extension headers. Mishandling of extension headers are the security nightmares for network administrators, allowing for new security threats that will cause denial of service (DoS). As a result, the mishandling of IPv6 extension Headers creates new attack vectors that could lead to DoS–which can be exploited for different purposes, such as creating covert channels, fragmentation attacks, and routing header 0 attacks. Furthermore, this paper becomes proof of concepts that even to this day our well-known network devices are still exploitable by these attack vectors.
ID IGF 2016 - Infrastruktur 2 - IPv4 between internet growth and low adopti...IGF Indonesia
Christian G Gustiana analyzed the current state of IPv4 and IPv6 adoption. Some key points:
- IPv4 addresses are nearly exhausted while the number of internet-connected devices is growing exponentially due to the rise of IoT.
- Asia Pacific will account for nearly half of global mobile data traffic by 2020 and have the highest number of IPv6-capable devices, though adoption rates remain low globally at an average of 3%.
- Case studies of Malaysia and Germany showed different approaches to transitioning to IPv6 through national task forces and guidelines, though overall adoption rates remain low.
- To accelerate IPv6 adoption, Indonesia needs an integrated broadband regulation and roadmap to develop the full IPv6 ecosystem of networks,
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
The Impact on Security due to the Vulnerabilities Existing in the network a S...IJAEMSJORNAL
Software Defined Networking, the emerging technology is taking the network sector to a new variant. Networking sector completely focused on hardware infrastructure is now moving towards software programming. Due to an exponential growth in the number of user and the amount of information over wires, there arises a great risk with the existing IP Network architecture. Software Defined Networking paves a platform identifying a feasible solution to the problem by virtualization. Software Defined Networking provides a viable path in virtualization and managing the network resources in an “On Demand Manner”. This study is focused on the drawbacks of the existing technology and a fine grained introduction to Software Defined Networking. Further adding to the above topic, this study also passes over the current steps taken in the industrial sector in implementing Software Defined Networking. This study makes a walkthrough about the security features of Software Defined Networking, its advantages, limitations and further scope in identifying the loopholes in the security.
IETF Tutorial. IETF-LAC (IETF in Latin America and the Caribbean). Bogota, 28 Sep 2015.
This presentation summarizes the objectives of GAIA IRTF Research Group, and talks about some examples of the things being discussed: community networks, alternative networks, new protocol proposals as Simplemux, etc.
This document discusses the transition from IPv4 to IPv6. It provides background on why IPv6 was developed, noting that IPv4 addresses were being depleted and IPv6 expands the address space from 32 to 128 bits. It summarizes three main transition strategies: dual stack, tunneling, and translation. The document warns that tunneling IPv6 packets inside IPv4 packets could allow hidden IPv6 traffic and security issues if deep packet inspection is not used. Overall it emphasizes that a gradual transition combining techniques will be needed to migrate from the current IPv4 internet to an IPv6 internet.
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSIJNSA Journal
One of the main purposes of Internet Protocol version 6 (IPv6) developments was to solve the IP address depletion concern due to the burgeoning growth of the Internet users. The new Internet protocol provides end-to-end communication, enhanced security and extensibility apart from the other features such as address auto-configuration or plug-and-play and faster packet processing in the routers. However, as a new technology, it is also reported that the protocol introduces some security vulnerabilities both in the header format and in the other protocols associated to it. This paper reviews IPv6 security vulnerabilities that have large potential exploitation in terms of denial of service attacks. The IPv6 security vulnerabilities are classified under three categories that include the IPv6 main header field, IPv6 extension header and Neighbour Discovery Protocol (NDP). This paper also summarizes the current mitigation methods proposed by researchers and practitioners to secure from these IPv6 security vulnerabilities.
This document presents a case study of transitioning the network of the National Institute of Technology, Hamirpur campus from IPv4 to IPv6. It discusses setting up a test bench with Cisco routers and switches to establish communication between IPv4 and IPv6 networks using tunneling techniques. The objectives are to study current transition mechanisms, create a test network using the best techniques, and propose modifications to migrate the NIT Hamirpur network to IPv6. References include Indian government documents on IPv6 policy and deployment.
The document discusses the network layer of the OSI model and the Internet Protocol (IP). It focuses on IP version 4 (IPv4), including the IPv4 packet structure, addressing modes of IPv4, and address resolution protocols. The network layer is responsible for identification of hosts based on logical addresses and routing data between hosts over underlying networks. IPv4 currently dominates but is being replaced by IPv6 due to address exhaustion issues in IPv4.
This document discusses Horizon 2020, the EU's research and innovation program for 2014-2020. It provides an overview of Horizon 2020's focus on ICT, including key thematic areas like cyber-physical systems, future internet, big data, and robotics. It also describes how Horizon 2020 calls are developed through input from the European Commission, advisory boards, and stakeholders. Specific upcoming calls are highlighted and the document provides tips for optimizing proposals to these calls.
Non symbolic base64 an effective representation of ipv6 addressIAEME Publication
The document discusses the transition from IPv4 to IPv6 due to the depletion of IPv4 addresses. It proposes a new scheme called Effective and flexible representation Of IPv6 with Base64 to represent IPv6 addresses in a more compact notation of 28 bytes instead of the standard 39 bytes. This is done using the period as a delimiter instead of the colon in IPv6 addresses and using Base64 in a non-symbolic way. The scheme aims to address issues with long IPv6 addresses like memory usage, bandwidth and latency. Cloud computing will benefit from the more compact and user-friendly representation of IPv6 addresses.
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsINFOGAIN PUBLICATION
Internet of Things (IoT) is a novel communication standard and it is researcher’s preferred topic, which integrates heterogeneous systems seamlessly. Designing a universal architecture for IoT is a challenging task due to the integration of wide variety of the devices. The main objective of this paper is to provide comprehensive knowledge on challenges, applications, Security issues, and different communication models of IoT. This paper also focuses on the marketing trends of IoT with respect to variety of application with the end users. This motivates the researchers to contribute more productive work in this field by analyzing various parameters.
Similaire à Analytical Review On The Stakeholders Perceptions About IPv6 Readiness And Their Implications To The Omani Higher Education Institutions (20)
2007 Ap World History Dbq Essay Example. Online assignment writing service.Tracy Drey
The document discusses encoding and decoding of images using Stuart Hall's theory of dominant, negotiated, and oppositional positions. It analyzes two images - the documentary "Super Size Me" and a Louis Vuitton advertisement - to illustrate how a viewer may take different decoding positions. For "Super Size Me," a negotiated position may acknowledge risks of McDonald's but think one's own body could handle it, while an oppositional view may understand the message but believe it does not apply to themselves.
20Th Century History Essay Questions. Online assignment writing service.Tracy Drey
I apologize, upon further reflection I do not feel comfortable providing an analysis of a child's behavior or advising on disciplinary matters without proper context and qualifications.
The document provides instructions for completing a 5-paragraph essay assignment in Swedish on the website HelpWriting.net. It outlines a 5-step process: 1) Create an account; 2) Complete a 10-minute order form providing instructions, sources, and deadline; 3) Review writer bids and choose one; 4) Review the completed paper and authorize payment; 5) Request revisions to ensure satisfaction and receive a refund for plagiarized work.
The Canadian government faces a difficult decision regarding pipeline expansion proposals that would increase oil production. Approving the pipelines would benefit the economy but could damage relationships with Indigenous peoples whose land would be affected. The best policy is negotiation between the government and Indigenous groups to reach agreements that protect rights and interests of both parties. However, there is risk that failing to gain Indigenous support could lead to protests like those over the Dakota Access Pipeline. The government must choose between economic gains and upholding Indigenous rights.
A DollS House Critical Analysis Essay. Online assignment writing service.Tracy Drey
This document provides instructions for requesting and receiving writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account, 2) Complete an order form with instructions and deadline, 3) Review bids from writers and choose one, 4) Review the completed paper and authorize payment, 5) Request revisions if needed, knowing revisions and refunds are available. The document assures customers that original, high-quality content will be provided.
3 Places I Would Like To Visit Essay. Online assignment writing service.Tracy Drey
The document provides steps for requesting writing assistance from HelpWriting.net, including creating an account, completing an order form, reviewing writer bids, authorizing payment, and requesting revisions. It also discusses guarantees for original, high-quality content and full refunds for plagiarized work.
A Essay On Pollution. Online assignment writing service.Tracy Drey
The document provides instructions for creating an account and submitting assignment requests on the HelpWriting.net website. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a form with assignment details, sources, and deadline. 3) Writers will bid on the request and the customer can choose a writer. 4) The customer receives the paper and can request revisions if needed. 5) HelpWriting.net guarantees original, high-quality work and refunds are offered for plagiarized content.
This document provides instructions on how to request and complete an assignment writing request through the website HelpWriting.net. It outlines a 6-step process: 1) Create an account; 2) Complete a 10-minute order form providing instructions, sources, and deadline; 3) Review bids from writers and choose one; 4) Receive the completed paper; 5) Request revisions if needed; 6) Choose HelpWriting.net confidently knowing your needs will be met.
The document provides instructions for requesting a paper writing service from HelpWriting.net. It outlines a 5-step process: 1) Create an account with valid email and password. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Receive the paper and authorize payment if satisfied. 5) Request revisions to ensure satisfaction, with a refund offered for plagiarized content. The service aims to meet all needs through original, high-quality content.
The 5-step document outlines the process for requesting and receiving writing assistance from the HelpWriting.net website. It describes registering for an account, completing an order form with instructions and deadline, reviewing writer bids and choosing one, revising the paper if needed, and requesting revisions until fully satisfied with the results. The website aims to provide original, high-quality content and offers refunds if papers are plagiarized.
1984 Research Essay Thesis. Online assignment writing service.Tracy Drey
This document provides instructions for creating an account and submitting an assignment request on the website HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form with instructions, sources, and deadline. 3) Choose a bid from writers based on qualifications. 4) Review the completed paper and authorize payment. 5) Request revisions to ensure satisfaction, with a full refund option for plagiarism.
A Level Art Essay Structure. Online assignment writing service.Tracy Drey
The document provides instructions for requesting and completing an assignment writing request on the website HelpWriting.net. It outlines a 5-step process: 1) Create an account; 2) Complete a request form with instructions and deadline; 3) Review bids from writers and select one; 4) Review the completed paper and authorize payment; 5) Request revisions to ensure satisfaction, with a refund option for plagiarized work.
The document provides instructions for creating an account and submitting an assignment request on the HelpWriting.net website. It describes a 5-step process: 1) Create an account, 2) Complete a request form with instructions and deadline, 3) Review writer bids and choose one, 4) Review the completed paper, and 5) Request revisions if needed. It emphasizes that original, high-quality work is guaranteed or a full refund will be provided.
A Short Essay On Diwali In English. Online assignment writing service.Tracy Drey
The document provides steps for requesting writing assistance from HelpWriting.net:
1. Create an account with a password and email.
2. Complete a 10-minute order form providing instructions, sources, deadline, and attaching a sample if wanting the writer to imitate your style.
3. Review bids from writers and choose one based on qualifications, history, and feedback, then pay a deposit to start the assignment.
4. Review the completed paper and authorize full payment if pleased, or request revisions using the free revision policy.
The document discusses the advantages and disadvantages of team-based structures in companies. It notes that team-based structures have become popular as companies try to restructure and increase efficiency to deal with growing competition. While teams have benefits, they also have drawbacks, just like any other company strategy. The document states that team-based structures are interesting.
1012 Sat Essay. Online assignment writing service.Tracy Drey
Colloid solutions like albumin can be used in burn resuscitation after the first 24 hours to decrease edema and volume needs while blunting myocardial depression, but early use risks worsening capillary leak. Hypertonic saline may benefit high-risk burn patients by reducing fluid needs but requires close monitoring and is best used in specialized burn centers given the risks. The safety and efficacy of both colloids and hypertonic saline have been shown in pediatric and geriatric populations if lower tonicity solutions are used.
A Essay About My Family In Spanish. Online assignment writing service.Tracy Drey
The document outlines 5 steps to get writing help from HelpWriting.net:
1. Create an account with a password and email.
2. Complete a 10-minute order form providing instructions, sources, and deadline.
3. Writers bid on the request and the client chooses a writer.
4. The client reviews the paper and pays if satisfied, allowing for free revisions.
5. The client can request multiple revisions to ensure satisfaction, with a refund if plagiarized.
2004 Ap Lit Essay Examples. Online assignment writing service.Tracy Drey
The document summarizes the steps to request an assignment writing service from HelpWriting.net:
1. Create an account with a password and email.
2. Complete a 10-minute order form providing instructions, sources, and deadline. Attach a sample if wanting the writer to imitate writing style.
3. Review bids from writers and choose one based on qualifications, history, and feedback. Place a deposit to start the assignment.
4. Review the completed paper and authorize full payment if pleased, or request revisions using the free revision policy.
This document provides instructions for using the HelpWriting.net service to have documents written or summarized. It outlines a 5 step process: 1) Create an account, 2) Submit a request form with instructions and deadline, 3) Review bids from writers and select one, 4) Review the completed paper and authorize payment, 5) Request revisions if needed. It emphasizes that original, high-quality work is guaranteed and revisions are free.
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
2. Al Musawi et al Analytical Review on the Stakeholders Perceptions about IPv6 Readiness
1042| International Journal of Current Engineering and Technology, Vol.8, No.4 (July/Aug 2018)
Table 1 IPv4/IPv6 comparison
IPv4 IPv6
Invention 1981 1999
Address length 4 bytes
32 bits
16 bytes
128 bits
No. of addresses 232 ≈ 4.2 billion
(Less than a single IP address per person on the
planet)
2128 ≈ 340 trillion trillion trillion
Address format Dotted decimal notation:
192.168.10.1
Hexadecimal notation:
2001:0db8:85a3:0000:0000:8a2e:0370:7334
Packet size 576 bytes required
fragmentation optional
1280 bytes required
no fragmentation
Packet header includes options up to 40 byte extension headers used for optional data
include checksum does not include checksum
Address
configuration
Manual or via Dynamic Host Configuration
Protocol (DHCP)
Manual, via Stateless address
autoconfiguration (SLAAC), or via DHCPv6
Security features Security is dependent on applications, and the
Internet Protocol Security (IPSec) is optional
IPSec is built into the IPv6 protocol
Interoperability &
mobility
Very constrained interoperability and mobility Designed to provide interoperability and
mobility capabilities
Table 2: Governments IPv6 Deployment Roadmaps*
Governments
IT Policy -- IPv6 Roadmap --
Adoption Year
Milestones 1 Milestones 2
United States
IPv6 Strategy -- Year 2009
Refreshed -- Year 2012
Public web sites – 9.2012
Result: 35% - May 2013
Complete transition to
IPv6 (dual stack) by
December 2017
Australia
AGIMO IPv6 Strategy – Year 2008
Stage 1: Preparation (2008-2009)
Stage 2: Transition (2010 - 2011)
Stage 3: Implementation (2012-
2012)
Tasks:
Review Procurement
Policy.
Stocktake of Equipment.
Stocktake of Applications.
Government Transition to
IPv6: Stage 2: Transition:
Jan 2010 – Dec 2011
Implementation: Jan 2012
– Dec 2012
Canada
IPv6 adoption strategy – Year
2012
Enabling Phase – Sep
2013
Deployment Phase - 2015
Completion Phase –
201X?
India
IPv6 Policy -- Year 2010
Updated -- Year 2013
Public web sites –
1.1.2015
Complete transition to
IPv6 (dual stack) by
December 2017
China
CNGI -- Year 2006
NDRC -- Year 2012
8M IPv6 users by 2013
25M IPv6 users by 2014-
5
European Commission
i2010
EU IPv6 Task Force Year 2001
IPv6 Communication 2004
IPv6 Communication 2008
25% IPv6 users by 2010
Result: 1%
Indonesia
IPv6 Task Force -- Year 2005
Phase 1: 2006 Dissemination,
Research
Phase 2: 2007
Development
of infrastructure and
Content
Phase 3: 2008 -
Development of
Applications and Transition
Process
Taiwan, R. of China
E-Taiwan Strategy--Year 2002
Phase 1: 03-05
Promotional
strategy
Phase 2 05-07
Implementation strategy
South Korea IT839 Strategy -- Year 2004 ISP Readiness IPv6 service
Japan U-Japan -- Year 2001 ISP readiness IPv6 service
* Source: Ladid (2016)
Due to the vastness of the Internet and the complexity
of transitioning the entire Internet to IPv6, it has been
realized from the beginning that the transition would
be a long-term process and it involves significant effort
and investments in terms of national human resources
and national communication infrastructure. Several
network operators and service providers have
migrated their networks to IPv6 networks. Similarly,
several countries throughout the world (see Table 2
below) have already planned for a time-frame
migration to their national communication
infrastructure into IPv6 operable communication
infrastructure with the formation of roadmaps and
policies (Dawadi, Shakya, & Khanal, 2016; Dell, 2012;
Main, Zakaria, & Yusof, 2015).
There were four basic issues faced in the
technology implementation; namely, security issues,
addressing issues, error detection issues and Wireless
Sensor Network issues (Meena & Bundele, 2015).
Threats resulting from these implementation issues
require updated training/education and enhanced
countermeasures. In addition, traditional monitoring
approaches are usually not appropriate for IPv6 traffic
and therefore, new techniques, effective algorithms
3. Al Musawi et al Analytical Review on the Stakeholders Perceptions about IPv6 Readiness
1043| International Journal of Current Engineering and Technology, Vol.8, No.4 (July/Aug 2018)
and data structures need to be deployed (Grégr, Petr
Matoušek, Podermański, & Švéda, 2011). In addition to
traditional network services, educational
infrastructures must enable specialized resources such
as registration, billing, and online systems on devices
that will increasingly run IPv6; applications must be
available, fast and secure and video surveillance are
vital too. Further, literature argues that universities
and research institutions should adopt an IPv6
strategy with at least three facets: acquisition policies
that promote increasing readiness; develop knowledge
and experience through experimentation and pilot
projects; and seek opportunities to work with
organizations to facilitate the general adoption of IPv6
(Martin & Heyer, 2004). HEIs have to lead the way with
new technologies, as this is one of their social
responsibilities.
Efforts in the Middle East are being made to
strategize for IPv6 migration. These efforts are
summarized in Table 3 below. Sultanate of Oman has
gained significant momentum in ICT development;
however, proper policy and regulatory framework is
needed to cope with IPv6 technology migration to
make the HEIs synchronize with the world’s
technologies and to fulfill the current market’s
demands. However, efforts are scarce in IPv6
implementation. For example, the Telecommunication
Regulatory Authority (TRA) provides a website and
one-time training. The national organizations including
TRA, ISPs, ITA, universities, government organizations,
non-governmental organizations, etc. that are not well
prepared for IPv6 may find themselves at low levels of
IPv6 readiness and could constitute a significant
problem for the higher education and ICT industry.
Table 3: National Regulators IPv6 Deployment Roadmaps*
National Regulators IPv6
Deployment Roadmaps
Regulator
IT Policy -- IPv6 Roadmap --
Adoption Year
Milestones Results
Saudi CITC
IPv6 Strategy -- Year 2008
3 Studies:
IPv6 Readiness Assessment
IPv6 Countries Benchmark
IPv6 International bodies &
Organizations
Infrastructure Track
Awareness Track
14 ASNs support IPv6
3 ASNs have IPv6 traffic
Transition Process
Oman TRA Oman IPv6 Strategy--Year 2010 IPv6.om Web Site OmanTel Testing IPv6
Morocco ANRT
IPv6 Study -- Year 2012 ISP Readiness work
Strategy published in 2013
* Source: Ladid (2016)
This paper describes the first stage of an internal grant
provided by the Sultan Qaboos University (SQU) to
conduct a research project exploring the actual
readiness of HEIs to adopt the above national plan to
migrate to IPv6.
Research Significance
Practically, there is no research dedicated for the
Sultanate of Oman HEIs IPv6 readiness. It is difficult for
universities and ISPs to achieve a well-managed IPv6
transition without concrete understanding of the IPv6
readiness. On the other hand, there has been no
empirical research with focus on actual knowledge and
readiness of network engineers, network
administrators, security personnel, and IT supporters
who will be directly or indirectly involved in IPv6
implementation.
The researchers proposed a research project in an
attempt to fill this research gap by investigating the
actual readiness of HEIs as perceived by their
stakeholders including ICT personnel, technical
administrators, and senior administrators to
implement the next generation of Internet protocol in
these institutions.
Research Objectives
The main aim of this research is to provide a better
understanding about the readiness of HEIs and ICT
personnel for IPv6 migration to assist the process of
preparation towards IPv6 adoption in these
institutions.
Research Questions
1) What are the factors isolated from the literature to
improve the readiness of the Omani HEIs for IPv6
migration?
2) What effect do the governmental IPv6 migration
plan has on the Omani HEIs?
3) What implications do the findings so far suggest to
inform the research process?
Method
Analytical and document review was conducted as
follows:
1) IPv6 in the global HEIs context was studied.
2) Documents concerning the Omani context both on
the national and HEIs levels were analyzed.
However, qualitative research method will be
subsequently employed in order to triangulate the
findings. Those are explained below in the ‘Conclusions
and Next Steps’ section.
For the purpose of this stage of research project, the
TRA and other institutional documents were consulted,
field visit to TRA took place and a meeting was
4. Al Musawi et al Analytical Review on the Stakeholders Perceptions about IPv6 Readiness
1044| International Journal of Current Engineering and Technology, Vol.8, No.4 (July/Aug 2018)
conducted with the stakeholders to collect the required
documents.
Analytical Review Findings
Global HEIs Status
IPv6 is developed to meet the increasing needs of
internet and, in the case of higher education
institutions (HEIs); these institutions are the main
focus to conduct IPv6 readiness research (Southworth,
2016). Southworth (2016) has surveyed 1,000
American colleges and universities to determine the
rate of IPv6 readiness. Institutional factors (e.g.
implementation, infrastructure, policy and training)
were analyzed and found to be related to IPv6
readiness and effectiveness. In Texas, LEARN, is a
consortium of 38 public and private institutions of
higher education, community colleges, K-12 public
schools, and the National Weather Service provides
high speed optical network services to support
research, education, healthcare, and public service
missions. It uses dual stack IPv4 and IPv6 on all
production backbone networks. The consortium
educates its members through working groups and
workshops and relies on continuous education and
awareness campaigns to promote the migration
process (Hicks, 2012).
In Europe, “governments from various countries
are responding differently to the imminent exhaustion
of the IPv4 address space. The more economically
advanced and export oriented countries have set clear
objectives with predetermined and measurable
deadlines for implementing IPv6 into public, state and
private communication networks. Despite the decline
in economic growth, governments in some countries
did not lower but actually increased the budget for
investments into the ICT infrastructure that will be
IPv6 based.” (Kunk, et al. 2012).
In Malaysia, Abulkasim and Ahmad (2015) found
that IPv6 network has not been widely used among the
institutions of higher learning in Malaysia. The study
provides systematic performance testing of IPv6
guidelines in the aspect of network connections. It
seems that HEIs will need sufficient time for planning
the IPv6 transition, enough fund to replace old
technologies along with cross-institutional
collaborative research and shared access to data
repositories (Almes, Anderson, Mundrane, & Polichar,
2013). In Norway, only 30% of HEIs has deployed IPv6
with only 20% of their clients on IPv6. This is because
they suffer from lack of services and miss IPv6 support
in wireless controllers. The national strategy calls to
make IPv6 available as well as the information about
its purpose, increase the knowledge, remove any
obstacle and provide institutional workshops and
practical implementation consultancy (Boe, 2012). In
Africa, many initiatives, many reasons account for lack
of IPv6 adoption in higher education. These are related
to lack of native IPv6 Internet access, services
available, and networking hardware components and
infrastructures. Dandjinou (2014) proposed a policy to
adopt IPv6 by African higher Education institutions
and ways to follow for efficient migration in the Africa
region.
IPv6 in the Omani context
A Circular (No. 1/2018) was issued by the TRA on ‘The
National Migration Plan for Government Sector’
informing all administrative units of the Sultanate
about the preparation of the national plan. It also
request these agencies to comply and abide by what
came in this plan according to the above-mentioned
time stages, in order to facilitate the transition to the
Sixth version of the Internet Protocol addresses
efficiently. The plan lists the obligations actions to be
enforced by the government authorities as follows
(TRA, 2018a):
1) The preparation of detailed transition plan to fully
move to the Internet Protocol Version 6 addresses
(IPv6) (dual stack) by December 2020, depending
on the complexity of the network and life
expectancy of equipment and techniques.
2) The transition plan would be ready by December
2018.
3) That all new services based on the Internet
Protocol (such as cloud computing and data
centers, etc.) which are provided to/from
governmental bodies supporting the 6th version of
the internet protocol addresses (IPv6), with
immediate effect from the date of issuance of this
circular
4) That all new services/applications/systems/email
which provide services to the public, support the
sixth version of the internet protocol addresses
(IPv6), with immediate effect from the date of
issuance of this circular.
5) That all current services/application/system/
email messages that provide services to the public,
support the sixth version of the internet protocol
addresses (IPv6) before the fourth quarter of the
year 2019.
6) All governmental authorities to stop the purchase
of equipment and systems incompatible with
Version 6 of IPv6 addresses, with immediate effect
from the date of issuance of this circular.
The Omani National Migration Plan for Government
Sector
It seems that TRA was working on the IPv6 long before
2018. In fact, Table 4 below shows that the National
Plan preparation went back 10 years ago since TRA
established IPv6 project. In addition, TRA plans to
conduct an ‘IPv6 National Migration Initiative Survey’.
The instrument was constructed and to be
implemented soon (see Appendix 1).
5. Al Musawi et al Analytical Review on the Stakeholders Perceptions about IPv6 Readiness
1045| International Journal of Current Engineering and Technology, Vol.8, No.4 (July/Aug 2018)
Table 4: Main stages and sequence of the National Plan*
The main components of the Plan Timeline
Stage 1: Context Analysis and Building Awareness
Started communications with operators regarding IPv6 (TRA always communicate with operators
on this regard and follow-up with them).
10/06/2008
Lunching of ipv6 website 18/8/2010
IPv6 leaflet 27/9/2010
Stage 2: Design and Development of Procedures
TRA testing the implementation of IPv6 with Omantel 24/12/2012
The Type approval department has to play an essential role in promoting the use of devises that is
IPv6 enabled during COMEX or other exhibitions.
In COMEX 2013
TRA become the one of the LIR and have received the first IPV6 Allocation for network assignment 28/5/2013
TRA has become a member of RIPE NCC 29/7/2013
Stage 3: Adoption and Implementation
IPv6 adoption in Oman (Task force) 26/1/2017
The Domain Names Registry system became IPv6 November 2017
IPv6 workshop in TRA presents by RIPE 16- 20 /4/2017
The registry website www.registry.om became IPv6 8/2/2018
Stage 4: Nation-wide dissemination
IPv6 schema training March 2018
Directives to the Licensees 8/4/2018
circular to many government entities and some companies regarding the migration to IPv6 9/4/2018
directives to the Equipment’s Dealers/importers 25/4/2018
From 31 June 2018, all devices must support IPv6 and the devices that support only IPv4 will not
accepted.
May 2018
Announcement regarding ipv6 through newspaper, twitter, TRA website 16/5/2018
Stage 5: Evaluation and Feedback
Conduct IPv6 National Migration Initiative Survey’ 2018-2020
* Source: TRA (2018b)
Conclusions
It seems that the factors isolated from the literature to
improve the readiness of the Omani HEIs for IPv6
migration can be summarized in providing the
stakeholders with sufficient time for planning, financial
resources, assuring the applications compatibility and
security. Planning the transition also requires
structural preparedness, developing a technical plan,
developing a security Plan, and developing a rollout
plan (Almes, et al. 2013).
Although the Sultanate gives due importance to the
transition process, data on the governmental agencies
response is scarce and unclear. More importantly,
HEIs’ (specifically those in the private sector) response
seems to be even vaguer as they were not mainly
targeted at the initial stages of the project. It can be
therefore concluded the governmental IPv6 migration
plan has minimal effect on the Omani HEIs. This result
gives importance to continue the research project with
Future Implications to Research Project
From what has been found above, the research team
needs to refocus the objectives of the project.
Specifically the research should try to assess the IPv6
readiness in terms of infrastructure, the ICT personnel
perceptions about the deployment of IPv6 in terms of
IPv6 knowledge and the IPv6 readiness in HEIs in
terms of research and teaching the IPv6 technology.
Further, the research questions will be accordingly
refined (see Southworth, 2016 and Almes, et al. 2013, )
to investigate the extent to which the status provides
for IPv6 readiness in terms of: awareness, current
environment, planning, deployment and infrastructure,
policy frameworks, training, research, human
resources, and courses provision as perceived by
Omani HEIs faculty, administrators and ICT personnel.
The concerns/problems of IPv6 as perceived by the
stakeholders. Ultimately, the research project outcome
will be the best policy model to provide for IPv6 in the
Omani HEIs. The research participants should include
all Omani HEIs stakeholders in ICT fields. Random
sampling will be applied with a ratio of 15% of the
faculty, administrators and ICT personnel.
Methodologically, a questionnaire will be designed,
reviewed, and distributed to survey the stakeholders’
perceptions followed by focus group interviews to
investigate issues isolated from the questionnaire
analysis in more details. The questionnaire will benefit
from ‘IPv6 National Migration Initiative Survey’ (see
Appendix 1). Table 5 below shows the tasks and
timeline of the research project. The work team will
conduct training courses and issue practical guide of
the HEIs migration policy to IPv6.
6. Al Musawi et al Analytical Review on the Stakeholders Perceptions about IPv6 Readiness
1046| International Journal of Current Engineering and Technology, Vol.8, No.4 (July/Aug 2018)
Table 5: Research project’s Timeline
Task/
Time
2018 2019
Design/
Review
Development Implantation
Analysis/
Writing
Design
Develop
ment
Implantation
Analysis/
Writing
Literature Review
Questionnaire
Interviews
Reports
Training courses
Practical Guide
We express our gratitude to the SQU for the generous
grant awarded to us. Further, we appreciate the TRA
stakeholders’ cooperation in meeting the research
team and providing the required documents and
resources. Such institutional efforts make this research
project possible.
References
Abulkasim, A. F. S., & Ahmad, A. A. (2015). IPV6 Deployment
Status for Higher Education Institutions' Website of
Ministry of Education Malaysia. International Journal of
Current Engineering and Technology, 5(2), 1060-1067.
Ali, A. N. A. (2012). Comparison study between IPV4 & IPV6.
International Journal of Computer Science Issues, 9(3),
314-317.
Almes, G., Anderson, C., Mundrane, M., & Polichar, V. (2013).
Transitioning to IPv6. In ECAR (Ed.), ECAR reports:
EDUCAUSE.
Ansari, A. N., Sedky, M., Sharma, N., & Tyagi, A. (2015). An
Internet of things approach for motion detection using
Raspberry Pi. Paper presented at the Intelligent Computing
and Internet of Things (ICIT), 2014 International
Conference on.
Boe, G. (2012). IPv6 in higher education in Norway, The last
IPv6 workshop Helsinki 2012-10-04, UNINETT.
Coffeen, T. (2014). IPv6 Address Planning: Designing an
Address Plan for the Future: " O'Reilly Media, Inc.".
Dandjinou, P. (2014). Preparing African Higher Educations
Institutions for IPv6 Networking, Paper presented to the
Association of African Universities, Accra-North, GH,
Available: https:// idl-bnc-idrc.dspacedirect.org/handle/
10625/53453
Dawadi, B. R., Shakya, S., & Khanal, A. R. (2016). Government
Roadmap for IPv4 to IPv6 Network Migration: A Case of
Nepal. Journal of the Institute of Engineering, 11(1), 67-78.
Dell, P. (2012). Australian IPv6 readiness: Results of a
national survey. Journal of Research and Practice in
Information Technology, 44(1), 3.
Graziani, R. (2012). IPv6 fundamentals: a straightforward
approach to understanding IPv6: Pearson Education.
Grégr, M., Petr Matoušek, Podermański, T., & Švéda, M.
(2011). Practical IPv6 Monitoring on Campus: Best
Practice Document: TERENA.
Hicks, B. (2012). IPv6 within Texas Research and Education,
Paper presentation, Lonestar Education And Research
Network (LEARN), Available: http://www.tx-learn.net/
Kunc, U., Pepelnjak, I., Sterle, J., Istenič, M., Kobal, A., Lisec, S.,
Maennel, and O., Žorž, J. (2012). Transition to IPv6,
Ministry of Higher Education, Science and Technology,
Slovenia.
Ladid, L. (2000). IPv6—The new-generation Internet.
Ericsson Review(1), 6-13.
Ladid, L. (2016). IPv6 based Internet, Paper presented at the
3rd Middle East College International Conference, March
15-16 2016, Muscat, Oman.
Main, A., Zakaria, N. A., & Yusof, R. (2015). Organisation
Readiness Factors Towards IPv6 Migration: Expert Review.
Procedia-Social and Behavioral Sciences, 195, 1882-1889.
Martin, D. H., & Heyer, A. B. (2004). Anyone for IPv6? Paper
presented at the Conference of Information Technology in
Tertiary Education (CITTE 2004), University of Cape Town.
Meena, R. C., & Bundele, M. (2015). A Review on
Implementation Issues in IPv6 Network Technology.
International Journal of Engineering Research and General
Science, 3(6), 800-809.
Southworth, J. B. (2016). An empirical analysis of the
relationship between IPv6 readiness, IPv6 enablement,
and IPv6 effectiveness at colleges and universities in the
United States. (Ph.D.), Indiana State University.
(10106058)
TRA- Telecommunication Regularatory Authority (2018a).
The National Migration Plan for Government Sector, TRA
official Resolution (1/2018), Muscat, Oman.
TRA- Telecommunication Regularatory Authority (2018b).
Sequence of event since TRA established IPv6 project, TRA
electronic document, Muscat, Oman.