Figure 3 - uploaded by Maurizio Patrignani
Content may be subject to copyright.
Packet injection: (1) An IPv4 packet is sent to a tunnel endpoint and is processed as if it had been sent by the tunnel other endpoint (dotted lines). (2) The encapsulated IPv6 packet is forwarded to the destination. 

Packet injection: (1) An IPv4 packet is sent to a tunnel endpoint and is processed as if it had been sent by the tunnel other endpoint (dotted lines). (2) The encapsulated IPv6 packet is forwarded to the destination. 

Source publication
Conference Paper
Full-text available
Tunnels are widely used to improve security and to expand networks without having to deploy native infrastructure, and play an important role in the migration to IPv6. In this paper we introduce a number of techniques to detect, and collect information about IPv6-in-IPv4 tunnels. We also show how a known tunnel can be used as a "vantage point" to l...

Context in source publication

Context 1
... 3 (Packet injection) Given two IPv4 addresses A 4 and B 4 , if there is a tunnel between A and B, it is possible to cause an arbitrary (though limited in size) IPv6 packet to enter the IPv6 network at interface B. This is done by sending, from any routable interface Z, an IPv6 packet encapsulated in an IPv4 packet with source and destination addresses A 4 and B 4 . Because its source address is A 4 , when the packet arrives at B it will be recognized as arriving from the tunnel and will be decapsulated and processed as if it had been sent by A (see Figure 3). Formally, we may write: where the payload of the two IPv6 packets is the same. ...

Similar publications

Conference Paper
Full-text available
Vehicular ad hoc networks (VANETs) consist of an spontaneous association of a group of vehicles that dynamically change their position and exchange data between each other, regarded as autonomous network segments with flat addressing schemes. However, its study has shown the benefits obtained by interconnecting them to fixed network segments and to...
Conference Paper
Full-text available
We present the Aipac protocol, which allows nodes in an ad hoc network to configure their own IP address automatically. Due to the mobility of nodes, different networks can overlap, and nodes with the same address can accidentally get in contact. Our protocol offers an innovative management of such merging of networks. In fact, it makes use of the...
Conference Paper
Full-text available
Routing protocols are the main issue of ad hoc networks. Because flat propositions (reactive, proactive) are not sufficient and suffer from a lack of performance, new solutions should he investigated and proposed. On the other hand, virtual topologies propose to structure the network and to give a hierarchy between the strongest and the weakest nod...
Conference Paper
Full-text available
Multicommodity network flows models are computationally challenging due to the large dimension of real instances, as those from the fields of telecommunications specifically in multiprotocol label switching (MPLS). MPLS extends the IP destination based routing protocols to provide a new and scalable routing capabilities in connectionless networks u...

Citations

... IPv6 paths are monitored in a similar way with traceroute6. A maximum transmission unit (MTU) detection algorithm, written by Colitti et al. [19], is run once per hour. In addition to the traceroute measurements, we use a tunnel discovery tool to identify different tunnels on those IPv6 paths. ...
Article
Although packet delay and loss are two important parameters of the Internet performance, to the best of our knowledge, the evolution of large-scale IPv6 delay and loss performance has previously not been studied. In this paper, we analyze more than 600 end-to-end IPv6 paths between about 26 testboxes of RIPE Network Coordination Centre over two years, and compare the delay and loss performance over time with their IPv4 counterparts. We present and discuss the measurement methodologies and show that IPv6 paths have a higher delay and loss than their IPv4 counterparts. The main reason for the worse performance stems from IPv6-in-IPv4 tunnels rather than from native IPv6 paths and such tunnels are still widely used today.