Fig 3 - uploaded by Nazrulazhar Bahaman
Content may be subject to copyright.
(a) Entirely IPv4 (b) Entirely IPv6 (c) IPv6 with 6to4 tunneling

(a) Entirely IPv4 (b) Entirely IPv6 (c) IPv6 with 6to4 tunneling

Source publication
Article
Full-text available
Several types of IPv6 transition mechanisms have been developed to facilitate the migration of IPv4 to the new protocol, IPv6. Although all transition mechanisms have the same objective, the process necessitates compliance with their respective capabilities. This paper focuses on the evaluation of the transition mechanisms namely 6to4 tunneling in...

Context in source publication

Context 1
... was to accumulate an accurate result and to be used in comparing the relation between each environment. The description of these environments is depicted in Figure 3. ...

Similar publications

Article
Full-text available
We propose an architecture based on a hybrid E2E-ERN approach allowing ERN protocols to be inter-operable with current IP-based networks. Without introducing complex operations, the resulting E2E-ERN protocol provides inter and intra protocol fairness and benefits from all ERN advantages when possible. We detail the principle of this novel architec...
Article
Full-text available
Since its introduction in 1987, the DNS has become one of the core components of the Internet. While it was designed to work with both TCP and UDP, DNS-over-UDP (DoUDP) has become the default option due to its low overhead. As new Resource Records were introduced, the sizes of DNS responses increased considerably. This expansion of the message body...
Article
Full-text available
Modern cellular networks utilising the Long-Term Evolution (LTE) set of standards face an ever-increasing demand for mobile data from connected devices. Header compression is employed to minimise the overhead for IP-based cellular network traffic. In this paper, we evaluate the three header compression implementations used by such networks with res...
Thesis
Full-text available
Port scans are done by an attacker to discover which services are offered by systems on a network and could be attacked. There are various approaches for port scanning, all providing advantages and disadvantages. One of those approaches is the TCP Idle Scan, in which the attacker spoofs messages of a third computer in order to remain undetected. To...
Article
Full-text available
The paper examined the background evolution of IPv4 and IPv6 and various research works that have done in the area. The study evaluates the performance of IPv4 and IPv6 on Microsoft operating system and Linux operating system using two transition mechanisms. The performance measurement is examined on two types of transmission protocols namely: TCP...

Citations

... Moreover, the throughput is partially limited by the performance of Teredo relay servers. A study by Bahaman et al. [219] discusses the performance of 6to4 with focus on communication over TCP. It states that the TCP transmission ability is reduced by the use of 6to4. ...
Thesis
Full-text available
This thesis contributes to the continuous evolution of cyber situation awareness by the research of novel approaches to the perception and comprehension of a computer network. We concentrate our research efforts on the domain of IP flow network monitoring. We propose improvements to the IP flow monitoring techniques that enable the enhanced perception of a computer network. Further, we conduct detailed analyses of network traffic, which allows for an in-depth understanding of host behavior in a computer network. Last, but not least, we propose a novel approach to IP flow network monitoring, that enables real-time cyber situation awareness.
... There is copious research on IPv6 tunneling protocols related topics and their performance comparisons in different small and medium size of networks. In [7][8][9], the researchers analyzed and measured the most common tunneling protocols (ISATAP, 6to4, 6RD & GRE) on mathematical basis and deployed the same test-bed setup by using GNS3 simulator. They measured the performance of tunneling protocols over parameters like (RTT, jitter, data transmission, throughput, end-to-end delay & tunneling overhead) in terms of TCP and UDP without routing protocols. ...
... The tunneling overhead is the combination of several overheads that participate in tunnel creating, tunnel deleting, encapsulation, decapsulation and tunnel maintaining [9]. The tunneling overhead can be found through subtraction of each protocol's round trip time against the round trip time of native traffic as: ...
Conference Paper
Full-text available
The fast growth of the Internet has resulted in IPv4 addresses depletion. Internet Service Providers (ISPs) are trying to replace their IPv4 networks with IPv6 gradually. IPv6 was launched with new features like simpler header format, larger address space, efficient routing and built-in security. IPv4-IPv6 transition process has been slow therefore both versions of IP are expected to co-exist for some time. As IPv4 and IPv6 are not compatible to each other, therefore packet traversing and routing has to face challenges. Tunneling is a temporary solution which is used to resolve packet traversing. This research presents the behavioral analysis of Open Shortest Path First (OSPFv3) through several IPv6 tunneling protocols (6in4, 6to4, ISATAP & GRE) over large scale IPv4 network. The performance of OSPFv3 is measured through route summarization over hybrid IPv4-IPv6 network on the basis of numerous parameters like convergence & re-convergence time, round trip time, response time, tunnel overhead and protocol traffic statistics.
... Both studies agreed on 6to4 Tunnelling had better performance than IPv4; while, IPv6 had some delay issues due to the fact that IPv6 header has larger frame and field compared to IPv4 field and frame. Authors in [6] have conducted a real test setup to evaluate the network performance of IPv4, IPv6, and 6to4 Tunnelling technique. The parameters used for evaluation were: TCP throughput, UDP throughput, Tunnelling overhead, TCP Round Trip Time (RTT), and UDP Round Trip Time (RTT). ...
Conference Paper
The rapid advancement of technology in the recent years, and the increasing of the devices that use the Internet; led to, the inference of IPv4 addresses. Therefore, IPv6 has emerged with trillions of available addresses. Despite that, a new problem arises, since not all devices support IPv6, and a direct transmission between IPv4 and IPv6 is not a possibility. Different Transmission mechanisms were produced. The three main transmission mechanisms are Dual-Stack, Translation and Tunneling. In this paper, the 6to4 tunnel ling transition technique is studied in an integrated architecture of networks using IPv4 and IPv6, and a comparison is done to study the performance of this tunnel compared to IPv4 and IPv6 networks for different types of applications.
... Tests were performed using a Ping program run on reliable ICMPv6 packets for connection to a remote IPv6 network such as KAME sites [58]. The tunneling approaches are examined and evaluated in terms of their impact on end-to-end user application performance [59, 60], in terms of delay time, and reliability in both inter and intra-communications [36], and also in terms of data transmission [61]. Aazam Mohammad et. ...
Article
Two reasons why IPv6 is the network protocol of the future, the amount of potentially allocated IPv4 addresses is insufficient and IPv4 does not support mobility. Several transition mechanisms have been developed to facilitate secure movement from IPv4 to IPv6. The tunnel scheme is the focus of the recent research efforts. However, the tunnel scheme is fraught with security risks. The vulnerabilities of IPv6 protocols and the attacks against them demand that attention be paid to security aspects related to the deployment of tunnel transition mecha¬nisms. To address these aspects, this survey presents the vulnerabilities and attacks that threat deployment of tunnel transition mechanisms along with the identification of countermeasures for each attack. In particular, this survey analyzes and ranks the state-of-the-art tunnel mechanisms based on a new security index system to provide significant security guidance for deploying tunnel mechanisms. Moreover, the survey provides an overview of the recent tunnel mechanisms and trends in the research with a special focus on the security trends.
... A comparison of the performance of automatic and manual transition strategies in order to show how the transition strategy affects network behavior has been illustrated in [12]. Other research has proved the ease of TCP data transmission using 6to4 tunneling compared to native IPv4 and IPv6 networks [13]. A comparison of recent IPv6 tunneling techniques: Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) and Teredo using UDP audio streams, video streams, and ICMP-ping traffic [14] has been performed through certain parameters, namely: tunneling overhead, tunnel setup delay, query delay, and auxiliary devices required. ...
Conference Paper
Full-text available
During the coexistence period between IPv4 and IPv6 networks, it is important to test the effect of using IPv6 transition techniques on applications' performance. We evaluate the performance of specific user's applications over three transition techniques: dual-stack, automatic 6to4 and manual tunneling. A set of experiments have been carried out using OPNET network simulator to evaluate the performance of five applications: web browsing, file transfer, voice, email and database access over these transition techniques and comparing with applications' performance over pure IPv4 and IPv6 networks. The finding results show varying in the applications' performance between dual-stack, automatic 6to4 tunneling, and manual 6to4 tunneling. For most applications, dual-stack performed better than tunneling regarding the response time. In some cases, tunneling performed better than dual-stack regarding other performance parameters, such as throughput and Jitter.
... The purpose of the transition mechanism is to provide smooth transition from IPv4 address to IPv6 address. The transition mechanism can be categorized into three types which are tunneling mechanism, dual stack, and translation mechanism [2]. In this paper, a review based on the network performance evaluation of 6to4 tunneling is performed. ...
... IPv4 has been in use on network infrastructures of all sizes and the Internet for more than 30 years. It has evolved from a small experimental linkages within the IPv4 network to the world-wide Internet and has shown its performance, capability and led on to occupy a predominant position within the growth of internet usage [2]. However, the use of IPv4 has a limitation which is these usable addresses have been exhausted and nearly extinct. ...
... By using tunneling mechanism, it allows an IPv6 to process as well maintain the IPv4 network infrastructure. This mechanism allows to bring the data to the transmission across the network that is not compatible [2]. In the other word, this mechanism are provide a safe route under insecure network. ...
Research
Full-text available
In the last decade, the number of internet user are growing rapidly. With the high demand of internet users, the use of Internet Protocol (IP) address is nearly overused. From this problem, an alternative to overcome IP address problem is required. IPv6 is one of potential implementation IP address to replace the use of IPv4. Currently, network implementation using IPv4 – IPv6 are used simultaneously. This method known as transition mechanism. In this paper, a critical review analysis is performed for network performance evaluation of 6to4 tunneling. In conclusion, some of suggestion are given as an improvement for further study.
... According to the study made by Abdullah and Othman (2015), most of the IPv6 researchers often use Quality of Service (QoS) parameter like throughput, jitter and end-to-end delay to determine their network performance when implemented with IPv6 transition mechanism. Some of the researcher like Aazam et al. (2011;Bahaman et al., 2012;Hadiya et al., 2013;Narayan and Tauch, 2010) prefer testbed approach to measure network performance compared to simulation approach when implemented with IPv6 transition mechanism. Throughput in network perspective can be elaborate as the number of data that can be transmitted from one location to another. ...
Article
Full-text available
The production of IPv4 has ceased its supply and this has created a global phenomenon that is faced by Internet providers and users around the world. This means that IPv6 implementation phase has begun and IPv4 duties will be taken over by the IPv6 protocol. Technically, IPv4 and IPv6 cannot communicate directly due to the difference of architecture. IPv6 transition mechanism is used as a medium to allow both protocols to communicate and exist together on the same network. This study is performed to examine and investigate the performance of the 6to4 and Dual Stack transition mechanism based on performance metrics like throughput, jitter and end-to-end delay when implemented on UKMNet network. The test infrastructure is built on the UKMNet network and the test was conducted using the testbed approached. The final result found that the 6to4 mechanism is more reliable and easy to implement on UKMNet environment compared to dual stack mechanism.
... The comparison of the TCP and UDP throughput, RTT, and tunneling overhead with native IPv4, native IPv6 and 6to4 tunneling can be found in [45]. The authors concluded that the 6to4 tunneling mechanism is a suitable method in the early part of the transition period. ...
... Narayan and Tauch investigated the 6to4 and configured tunnel performance characteristics on two different Linux and Windows operating system [44][45][46] in a test network. ...
Article
Full-text available
Even though the present form of IPv6 has been existing since 1998, the adoption of the new protocol has been very slow until recently. To help the adoption of the IPv6 protocol, several transition technologies were introduced. The 6to4 protocol is one of them, and it can be used when an IPv6 enabled host resides in an IPv4 only environment and needs to communicate with other hosts in such circumstances or with native IPv6 hosts. Five open source 6to4 relay implementations were investigated: Debian Linux - sit, Debian Linux - v4tunnel, OpenWrt - sit, FreeBSD - stf, NetBSD - stf. The measurement method is fully described including our measurement scripts and the results of the measurements are disclosed in detail. The measurements have shown that there are major differences between the different types of implementations.
... Evaluation of the transition mechanisms namely 6to4 tunneling in terms of data transmission was reported in [8]. A user-to-user network performance software was used to obtain the throughput, round trip time and tunneling overhead for transmission control protocol (TCP) and user datagram protocol (UDP). ...
Conference Paper
Internet protocol version 6 (IPv6) was developed to resolve the IPv4 address exhaustion problem and support new features. However, IPv6 still comprises some defectiveness of IPv4 protocol such as multimedia security. This paper presents IPv6-based tunneling mechanisms for securing Voice over Internet Protocol (VoIP) network traffic using OpenSwan IPSec (site-to-site). IPSec with Triple Data Encryption Algorithm (3DES) is used to create a Virtual Private Network (VPN) on top of existing physical networks. Secure communication mechanisms can therefore be provided for data and control information transmitted between networks. Secure VoIP-oriented mechanisms on VPN IPv6 have been designed, implemented and tested successfully using open source approaches. The performance of the IPv6 VoIP network is assessed experimentally in terms of several performance metrics including jitter, throughput and packet loss rate. The obtained results revealed that the proposed IPv6-based tunneling mechanisms for VoIP have negligible impact on network performance when compared to the previously reported work in literature, with a slight increase in the price of CPU and memory resources.
... In general, there are three techniques for migrating from IPv4 to IPv6 protocol, before a full IPv6 deployment is complete, which are: dual stack (Nguyen Phu Minh Nguyen, Rantapuska, Utriainen, & Matilainen, 2012); tunneling (Bahaman, Hamid, & Prabuwono, 2012); and, translation (Zhai, Bao, & Li, 2011). Unfortunately IPv4 and IPv6 are incompatible protocols, and it is impossible to make the migration from IPv4 to IPv6 in a short time (Al-ani & Haddad, 2012) since making an abrupt replacement from IPv4 to IPv6 platform, is fraught with risk. ...
Article
Full-text available
Background: Internet Protocol (IP) is one of the Internet addressing protocol that allows devices to connect to each other. Now, the existing IPv4 protocol gradually been replaced by a new version of the protocol which is IPv6 to provide a larger scale and to facilitate various improvements of the protocol. In our prior work, we have studied the previous research in order to identify the factor that may influence the organizational readiness to migrate to IPv6. From the previous finding, the factors can be classified into two categories which are physical factors; IPv6 deployment (planning), equipment and cost, while human factors involve of knowledge, training and motivation. Thus, the contribution of this paper is to explore the elements that can clarify all the factors which have been identified before. Same approach which is document review has been used as the methodology for achieving those objectives. The result indicate that the factor of (i) cost will involve infrastructure upgrade and deployment operation, (ii) networking equipment is the element of equipment, and (iii) deployment can be clarify detail by planning and implementation. For the human factor, (i) advantages of IPv6 and IPv4 address exhaustion are the motivation for organization to migrate to IPv6. (ii) Training will involve of technology and staff training, and (iii) knowledge that will be needed for IPv6 migration are implementation and technology. All the elements can be used to develop a readiness model for an organization to migrate to IPv6.