Migration to IPv6 becomes a priority with the draining of IPv4 addresses. But both IPv4 and IPv6 have different structures, and directly bringing IPv6 into the current IPv4 network does not work due ...to their compatibility issues. Therefore, Dual-Stack, Tunneling, and Protocol Translator mechanisms are adopted to smooth the transition between IPv4 and IPv6 networks. The transitions allow us to communicate between both IPv4 and IPv6 networks together despite having their different structures. The proper transition mechanism has to be adopted for a complex network, and the in-depth study and analysis can help find the best transition technique. In this paper, the 6to4 tunneling is configured for a real-time network using real-time applications- FTP and Email, and the performance of the transition between IPv4 and IPv6 addressing networks is evaluated. For analysis, the automatic and manual 6to4 tunneling is configured simultaneously with Routing Information Protocol/Routing Information Protocol next generation and Open Shortest Path First/Open Shortest Path First version 3 routing protocols. The networks are configured and simulated on the Riverbed Modeler Academic Edition 17.5. These cases are analyzed and compared for global performance parameters as traffic dropped, network convergence duration, and traffic sent. The object performance parameters for point-to-point connections are analyzed as queuing delay and throughput for incoming and outgoing traffic. This novel work is helpful for researchers as it gives a detailed study to choose the appropriate tunneling technique with a mixture of proper routing protocols for efficient performance.
Mobile devices are becoming the most popular way of connection, but protocols supporting mobility represent a serious source of concerns because their initial design did not enforce strong security. ...This paper introduces a novel class of stealth network attacks, called mobility-based evasion, where an attacker splits a malicious payload in such a way that no part can be recognized by existing defensive mechanisms including the most modern network intrusion detection systems operating in stateful mode. We propose an original cooperative framework for intrusion detection that can prevent mobility-based evasion. The viability and performance of the proposed solution is shown through a prototype applied to Mobile IPv4, Mobile IPv6 and WiFi protocols.
In this letter, we present flexible traffic engineering (F-TE), a solution to achieve highly efficient traffic engineering in a hybrid network where IPv4 and IPv6 protocols co-exist. By leveraging ...the programmability of OpenFlow (OF), we design the OF system to facilitate IP forwarding interchanging (i.e., switching the packets between IPv4 and IPv6 at each hop according to the network status). The OF system is implemented in a real network testbed. We conduct experiments with video streaming to verify that the proposed F-TE can improve network throughput effectively with adaptive IP interchanging.
The aim of the article is to describe the current status of IPv6 implementation in the Czech Republic and in the world, including the comparison of the different IPv4 and IPv6 transition mechanisms ...and the outlook for the future. The article is based on extensive research of current sources related to this issue, available on the Internet. It also describes the major security risks associated with the new IP protocol version. Attention is also paid to the economic evaluation of the implementation of IPv6. The article should help those interested in moving to IPv6 to better focus on this complex issue.
Traffic optimization in IoT networks Ouahi, Hassan; Mazoul, Abdenbi
E3S Web of Conferences,
01/2021, Letnik:
229
Journal Article, Conference Proceeding
Recenzirano
Odprti dostop
Since the 2000s, the idea that the Internet could be used for machine-to-machine communication and process automation has emerged. Together with the development of electronic objects capable of ...communicating with IP protocols, this idea led to the concept of the Internet of Things (IoT Internet of Things). Nowadays, the evolution of networks is very intense. New networks are appearing, “all-optical” solutions in the heart of networks, “wireless” solutions to facilitate access to users or to implant sensors / actors in places difficult to access, or finally the Internet of communicating objects. In this evolution, new scientific issues and challenges are emerging. Some of the problems are related to the optimization of generated traffic as well as the improvement of the performance of tools and techniques. Often, these optimization problems lead to models using graphs. The analysis of optimization problems in networks is an important activity. IOT networks create more data traffic that is difficult to control within the operator’s network. The method given in this paper will help network operators optimize their networks and assist developers in improving hardware and software interactions to reduce data traffic in the network.
IPv6 is the most recent version of the Internet Protocol (IP), which can solve the problem of IPv4 address exhaustion and allow the growth of the Internet (particularly in the era of the Internet of ...Things). IPv6 networks have been deployed for more than a decade, and the deployment is still growing every year. This empirical study was conducted from the perspective of end users to evaluate IPv6 and IPv4 performance by sending probing traffic to 1792 dual-stack sites around the world. Connectivity, packet loss, hop count, round-trip time (RTT), and throughput were used as performance metrics. The results show that, compared with IPv4, IPv6 has better connectivity, lower packet loss, and similar hop count. However, compared with IPv4, it has higher latency and lower throughput. We compared our results with previous studies conducted in 2004, 2007, and 2014 to investigate the improvement of IPv6 networks. The results of the past 16 years have shown that the connectivity of IPv6 has increased by 1–4%, and the IPv6 RTT (194.85 ms) has been greatly reduced, but it is still longer than IPv4 (163.72 ms). The throughput of IPv6 is still lower than that of IPv4.
It has been about one year since last hearing anything about the Internet Protocol v10 (IPv10) proposal while this week it’s now available in draft form. While IPv6 isn’t widely-adopted around the ...globe yet, IPv10 is already in development and helps to address some of the woes of IPv6. IPv10 is designed to allow IPv6 addresses to communicate to/from IPv4 addresses. IPv10 hopes to speed the adoption to IPv6 addressing by making it more backwards compatible with IPv4 with allowing the two Internet Protocol standards to better coexist.
From the draft specification: “It solves the issue of allowing IPv6 only hosts to communicate to IPv4 only hosts and vice versa in a simple and very efficient way, especially when the communication is done using both direct IP addresses and when using hostnames between IPv10 hosts, as there is no need for protocol translations or getting the DNS involved in the communication process more than its normal address resolution function. IPv10 allows hosts from two IP versions (IPv4 and IPv6) to be able to communicate, and this can be accomplished by having an IPv10 packet containing a mixture of IPv4 and IPv6 addresses in the same IP packet header.”
In recent times, many researchers have directed their research efforts toward increasing the privacy and security requirements in the wireless communication networks area. The reason for this is the ...inappropriateness of using traditional security processes for reliable, efficient, and robust communication over networks that are not secured. Thus, this study contributes to the enhancement of security in wireless communication networks by proposing the use of steganography combined with cryptography so that secret information can be sent using IPv4 as a cover to conceal secret messages, thereby, securing the messages. Steganography is described as the process of concealing secret data in a way that it cannot be traced by an intruder. Here, the intruder is unable to detect any modifications made to the original media. Meanwhile, cryptography is referred to as the process through which plain text can be converted into ciphertext to enable the transmission of data through certain channels of communication in a format that cannot be read by a normal user. Network Steganography is a mechanism that involves the use of protocols for communication that control the path of the channel via the network. Initially, the TCP/IP protocols have been a good candidate for network steganography, due to the many benefits that can be derived from their use. One of such benefits is that allows the creation of a variety of concealed channels that can be used for secret communication. In order to enable communication over the network, the use of Cryptographically Secure Pseudo-Random Number Generator (CSPRNG) is employed in the proposed system so that the encryption/decryption key can be generated. The initial step in our study involves encrypting the secret data that needs to be protected, and this is achieved through the use of the CBC-RC6 cryptographic algorithm. After the encryption has been successfully performed, a covert channel is createdfor the encrypted data through the use of the Overflow field of the Timestamp option of IPv4. With this method, debugging and measurement over networks are carried out using the timestamp option, and the aim of this is to build storage-based network steganography. One of the strategies used in this work to deter the possible detection of covert communication is the deployment of legal overflow data.