DW&C:Dollops Wise Curtail IPv4/IPv6 Transition Mechanism using NS2
Citation
Dr.Hanumanthappa .J , Mr.Annaiah .H. "DW&C:Dollops Wise Curtail IPv4/IPv6 Transition Mechanism using NS2", International Journal of Engineering Trends and Technology (IJETT), V14(6),271-279 Aug 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
BD-SIIT and DSTM are widely deployed IPv4/IPv6 Transition mechanism to improve the performance of the computer network in terms of Throughput, End to End Delay(EED) and Packet Drop Rate(PDR).In this journal paper we have Implemented and Compared the Performance Issues of our newly proposed Dollops Wise Curtail(DW&C)IPv4/IPv6 Migration Mechanism with BD-SIIT and DSTM in NS2. Implementation and Comparison Performance Analysis between Dollops Wise Curtail, BD-SIIT and DSTM shows that Dollops Wise Curtail IPv4/IPv6 migration algorithm performance outperforms than BD-SIIT and DSTM. Based on extensive simulations, we show that DW&C algorithm reduces the Packet Drop Rate(PDR),End to End Delay(EED) and achieves better Throughput than BD-SIIT and DSTM. In our research work observation, the performance metrics such as Throughput, EED and PLR for DW&C,BD-SIIT and DSTM are measured using TCP,UDP,FTP and CBR Traffics.
Reference
Proceedings Papers:
[1].AlJa`afreh.R.,Mellor.J.,Awan.I.,Implementation of IPv4/IPv6 BDMS Translation Mechanism Computer Modeling and Simulation,in Proc Second UKSIM European Symposium on Computer Modeling and Simulation,2008,pp.512–517.
[2].Altaher.A.,Ramadass.S.,Ali.A.A Dual Stack IPv4/IPv6 Test bed for Malware Detection in IPv6 Networks,in Proc IEEE International Conference on Control System,Computing and Engineering(ICCSCE),2011,pp.168-170.
[3].Carpenter.B. and Moore.K.Connection of IPv6 Domains via IPv4 Clouds,RFC 3056,2001,pp.1-23.
[4].C.Aoun and E.Davies,Reasons to Move the Network Address Translator-Protocol Translator(NAT-PT) to Historic Status,IETF,2007,RFC 4966.
[5].D.Waddington and F.Chang,Realizing the Transition to IPv6:IEEE Communications Magazine,vol.40,no.6,2002,pp.138–147.
[6].D.Libes,A Debugger for Tcl applications,1993,in Tcl/Tk workshop.
[7].Droms.R.,Bound.J.,Volz.B.,Lemon.T.,Perkins.C.,Carney.M.Dynamic Host Configuration Protocol for IPv6(DHCPv6),RFC 3315,2003,pp.1-101.
[8].Eun-Young Park,Jae-Hwoon Lee and B.Choe,An IPv4-to-IPv6 Dual Stack Transition Mechanism Supporting Transparent Connections between IPv6 hosts and IPv4 hosts in integrated IPv6/IPv4 network,IEEE Communications Society,vol.2.,2004,pp.1024-1027.
[9].Eva.M.Castro,Tomas P.de Miguel,Programming Guidelines on Transition to IPv6,2003.
[10].Fei Ren and Huachun Zhou,Implementation and Test of PMIPv6 Dual Stack Protocol,Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing(IMIS),2012,pp.305-310.
[11].Ganeshan.K.,H.Sathu,M.A.Shah,Performance Comparison of Video Protocols using Dual-stack and Tunneling mechanisms,in Proc ACM International Workshop on Multimedia Streaming(ACC),2011,pp.501-511.
[12].H.Afifi,L.Toutain,Methods for IPv4-IPv6 Transition,IEEE,1999,pp.478–484.
[13].Haidong Xia,Jim Bound,The evaluation of DSTM:An IPv6 Transition Mechanism,pp.1-22.
[14].I-Ping Hsieh,Shang-Juh Kao,Managing the Co-existing Network of IPv6 and IPv4 under Various Transition Mechanisms,in Proc 3rd International Conference on Information Technology and Applications(ICITA),vol.2.,2005,pp.765-771.
[15].Ioan R,Sherali.Z.,Evaluating IPv4 to IPv6 Transition mechanism,in Proc Proceedings of IEEE International Conference on Telecommunications(ICT),Tahiti Papeete,French Polynesia,2003,pp.1091–1098.
[16].Jun-ichiro,Itojun Hagino,IPv6 Network Programming,Elsevier Digital Press,2004,pp.1-355.
[17].John Mellor,Mumtaz Kamala,A Novel IPv4/IPv6 Transition mechanism which support transparent Connections,PGNet-2007,2007,pp.1-6.
[18].John.J.Amoss and Daniel Minoli,Handbook of IPv4 to IPv6 Transition:Methodologies for Institutional and Corporate Networks,Auerbach Publications,2008,pp.1-223.
[19].Jiann-Liang Chen,Yao-Chung Chang,Chen-Hsiu Lin,Performance Investigation of IPv4/IPv6 Transition Mechanisms,in Proc The 6th International Conference on Advanced Communication Technology,2004,vol.2,pp.545-550.
[20].Krishna Chakraborty,Nitul Dutta and S.R Biradar,Simulation of IPv4-to-IPv6 Dual Stack Transition Mechanism(DSTM) between IPv4 hosts in Integrated IPv6/IPv4 network,4th International Conference on Computers and Devices for Communication(CODEC),2009,pp.1-4.,ISBN:978-1-4244-5073-2.
[21].Kevin fall,Kannan Varadhan,The NS Manual(formerly ns notes and documentation),The vint Project,July 2003.
[22].Mujinga.M.,Muyingi.H.and Krishnarao.G.S.V.R,IPSec overhead analysis in Dual Stack IPv4/IPv6 Transition Mechanisms,in Proc The 8th International Conference on Advanced Communication Technology(ICACT),vol.1.,2006,pp.688-691.
[23].N.Oliver and V.Oliver,Computer Networks Principle,Technologies and Protocols for Network Design,John Wiley and Sons,2006.
[24].Ra’Ed AlJa’afreh,John Mellor and Irfan Awan,Evaluating BDMS and DSTM Transition Mechanisms,in Proc Second UKSIM European Symposium on Computer Modeling and Simulation,2008,pp.488-493.
[25].R.AlJa`afreh,J.Mellor,M.Kamala and B.Kasasbeh,Bi-Directional Mapping System as a New IPv4/IPv6 Translation Mechanism,in Proc Tenth International Conference on Computer Modeling and Simulation(UKSim),UK,April,2008,pp.40-45.
[26].Teerawat Issariyakul,Ekram Hossain,Introduction to Network Simulator NS2,2008.
[27].T.Dunn,2002,The IPv6 Transition,IEEE Internet Computing,vol.6,No.3,2002,pp.11-13.
[28].Troy Lancaster,IPv6 & IPv4 Threat Review with Dual-Stack Considerations,Individual Research Project,2006.
[29].Walid Dabbous,Miguel A.Ruiz-Sanchez,Ernst W.Biersack,Survey and Taxonomy of IP Address Lookup Algorithms,IEEE Network,2001,pp.8-23.
[30].Zhenqiang Li,Xiaohong Deng,Hongxiao Ma,Yan Ma,Divide and Conquer:A Scheme for IPv6 Address Longest Prefix Matching,International Workshop on High Performance Switching and Routing,2006,ISBN(Print):0-7803-9569-7.
Theses:
[31]Albert Yuen Tai Chung,Traffic Engineering for Multi-homed Mobile Networks,doctoral diss.,The University of New South Wales,Sydney,Australia,2007.
[32].Matthew Chapman Caesar,Identity Based Routing,doctoral diss,University Of California at Berkeley,2007.
[33].Martin Suchara,Reliable Internet Routing,doctoral diss,Princeton University,September,2011.
[34].Wenchao Zhou,Secure Time Aware Provenance for Distributed Systems,doctoral diss,University of Pennsylvania,2012.
Journal Papers:
[35].Dr.Hanumanthappa.J.,Dr.Manjaiah.D.H.,Implementation and Performance Comparison Analysis of Divide and Conquer based Slice Wise Curtail(SL&C) IPv4/IPv6 Transition Mechanism with BD-SIIT and DSTM in NS2,2014.
[36].Hanumanthappa.J.,Dr.Manjaiah.D.H.,IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model:A Case Study for University of Mysore Network,International Journal of Computer Science and Information(IJCSIS)Vol.3.,No.1,July-2009,ISSN 1947-5500.
[37].Hanumanthappa.J.,Dr.Manjaiah.D.H.,Aravind.C.V.An Innovative Simulation of IPv4 to IPv6 BD-SIIT Transition Mechanism Methodology between IPv4 Hosts in an Integrated IPv6/IPv4 Network,International Journal of Computer and Network Security(IJCNS),Vol.2.,Number-7.
Books:
[38].Behrouz.A.Forouzan.TCP/IP Protocol Suite,Third edition
[39].Andrew S.Tanenbaum,Computer Networks.,Fourth edition,2005
Keywords
BD-SIIT,DSTM,DW&C etc