The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Content-Centric Networking (CCN) is a candidate next-generation Internet architecture that offers an alternative to the current IP-based model. CCN emphasizes scalable and efficient content distribution by making content explicitly named and addressable. It also offers some appealing privacy features, such as lack of source and destination addresses in packets. However, to be considered a fully viable...
The document contains a comparative analysis of the key technologies to ensure collaboration of telecommunication networks that were built with using different versions of IP protocol: dual stack; tunneling and encapsulation; translation of the protocols. Two groups of factors are proposed: factors that will influence the choice of the technical migration way to the IPv6 stack and the factors that...
Content Delivery Networks (CDNs) are able to improve user-oriented application performance through caching and anycast routing or DNS-based user mapping mechanism. With the fact that BGP is widely used for inter autonomous system (AS) routing for CDNs, there is a middle mile bottleneck problem, which cause by the nature limitation of BGP. To solve this problem, we propose an SDN-based tunnel multi-path...
This paper presents an IPv4/IPv6 communication method in virtual machine environment called Virtual IVI. The purpose is to find an easy way to translate IPv4 service into IPv6 service in datacenter with less hardware change and less applications modification in IPv4 servers. The proposed new mechanism is based on IVI technology which is a stateless IPv4/IPv6 translation technique developed by China...
Logic Selectivity immensely reduces both number of outages and their duration in the distribution network. IEC 61850 can be applied for standard implementing of Logic Selectivity in which Generic Object Oriented Substation Events (GOOSE) messages should be exchanged between intelligent field devices over the Internet. However, information security and automation requirements must be noted in order...
IPv6 has become popular now-a-days among the ISPs, organization and end users because of its magnificent features and due to the limitation of IPv4. The migration from IPv4 to IPv6 is mandatory due to the address scarcity and security vulnerabilities of IPv4. But the deployment of IPv6 is far beyond satisfactory level in Bangladesh. So, a smooth as well as effective transition mechanism is needed...
IPv4 is the historical addressing protocol used for all devices connected worldwide. It has survived for over 30 years and has been an integral part of the Internet revolution. However, due to its limitation, IPv4 is being replacing by IPv6. Today, IPv6 is more and more widely used on the Internet. On the other hand, criminals are also well aware of the introduction of IPv6. They are continuously...
This paper provide an overview of behaviour of transition mechanisms, with and without VPN Protocols. Performance metrics related to networks have been gathered from test-bed implementations. The two transition mechanisms we will be evaluating are 4to6 and 6to4. Both of these mechanism have certain advantages and disadvantages. VPN protocols, PPTP and IPsec were configured on the transition mechanism...
Multi-link failures in the Internet may incur heavy packet loss and degrade the network performance. Existing approaches have been proposed to address this issue by enabling routing protections. However, the effectiveness and efficiency issues of these approaches are not well addressed. In particular, it has not been answered that whether label-free routing can provide full protection against arbitrary...
Internet protocol version 6 defined in 1995 is a successor of the IPv4 protocol. It is being slowly deployed in Internet and so it becomes basis of all Internet communications. Since this process takes a long time IPv6 and IPv4 networks coexist in Internet and some transition mechanisms are needed to ensure their interconnectivity. Several mechanisms came to life based on tunneling or translation...
Content-centric networking (CCN) is a new networking architecture that adopts a receiver-driven transport design with pervasive in-network cache support, which precisely meets the present Internet usage pattern. However, present CCN design lacks support for tunneling, which is proved to be an important feature that simplifies the addition of new network functionality to the network and eases the network...
Virtual Private Networks (VPNs) provide a secure encrypted communication between remote networks worldwide by using Internet Protocol(IP) tunnels and a shared medium like the Internet. End-to-end connectivity is established by tunneling. OpenVPN and OpenSSH are cross-platform, secure, highly configurable VPN solutions. The performance comparison however between OpenVPN and OpenSSH VPN has not yet...
6to4 tunneling enables IPv6 hosts and routers to connect with other IPv6 hosts and routers over the existing IPv4Internet. The main purpose of IPv6 tunneling is to maintain compatibility with large existing base of IPv4 hosts and routers. OpenSSH VPN tunneling is said to have limitations with numerous IPv6 clients and therefore it is advisable to use OpenVPN. To the best knowledge of the authors,...
The transition of the Internet from IPv4 to IPv6 is urgent and inevitable. A series of IPv6 transition solutions have been proposed by the Internet Engineering Task Force; yet most of them have not seen success in real world, and some were even obsoleted. Nowadays IPv6 transition solutions are still continuously being worked out. The major difference among these solutions is the state management,...
The aim of paper to presents the contain problem in automatic tunneling. Automatic tunneling has three main components to encapsulate IPv6 packets into IPv4 packets. The components called Teredo, ISATAP, and 6to4. In some cases, these components related problems such as source routing, neighbor discovery and NAT holes. This paper present key issues related to the Teredo tunneling called "Teredo...
The transition period which should have brought the end of the IPv4 era has no clear end in sight. With about 3% worldwide deployment rate, IPv6 still looks like a promise and the IPv6 transition like an ongoing struggle. Among the many challenges introduced by this transition process to the Internet community, one of the most difficult is to ensure a scalable network design when using IPv6 transition...
IP mobility ensures network reachability and session continuity while IPv6 networks are on the move. In the Network Mobility (NEMO) model, the potential for NEMO Mobile Routers (MRs) to interconnect and extend Internet connectivity allows the formation Nested NEMO networks. With MANEMO, nested MRs can be efficiently interconnected in a tree-based structure with Internet access being maintained via...
The introduction of IPv6 has opened up several questions with reference to its adaption and transition from IPv4 to IPv6 and is one of the crucial issues being frequently discussed in networking community today. IPv6 provides many seamless features that makes it far better protocol as compared to its predecessor IPv4. It is a well-known fact that IPv4 is a defacto standard at present and is currently...
This paper provides an overview of the current LTE architecture and the proposed solutions to integrate Software Defined Network (SDN) technology. The integration of SDN into mobile networks become Software Defined Mobile Network (SDMN), which provides new benefits such as dynamic and efficient caching. Firstly, the paper proposes the integration of SDN in LTE networks on disruptive approach that...
In order to achieve one-to-many data delivery on the internet, native multicast is used and implemented in some parts of the Internet. On the other hand, application layer multicast (ALM), which uses P2P overlays (overlay multicast, OM), can be used to create multicast trees and deliver the data at the application layer. Despite Native Multicast being more efficient than Application Layer Multicast,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.