• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 58
  • 34
  • 31
  • 12
  • 11
  • 5
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 186
  • 58
  • 53
  • 33
  • 32
  • 26
  • 24
  • 24
  • 24
  • 23
  • 22
  • 21
  • 20
  • 19
  • 18
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

A Minimum Delay Anycast Routing Protocol

Huang, Wei-Cherng 03 September 2003 (has links)
Anycast is a new communication service defined in IPv6 (Internet Protocol Version 6) [6]. An anycast message is the one that should be delivered to the 'nearest' member in a group of designated recipients. The ¡¥nearest¡¦ is not always the ¡¥best¡¦ member. In this paper, we propose a routing protocol for anycast message. It is composed of two subprotocols: the routing table establishment subprotocol and the packet forwarding subprotocol. In the routing table establishment subprotocol, we propose a mininum delay path method (MDP). We get a minimum delay path from router to destination by MDP. In the packet forwarding protocol, we propose a minimum delay and load balancing method (MDLB). We dispatch traffic load to a server with minimum delay and light load by MDLB. The performance has demonstrated the benefits of MDP and MDLB in reducing end-to-end delay and increasing throughput of network.
22

Gestion des déplacements de terminaux IPv6 mobiles assistée par géolocalisation

Montavont, Julien Noël, Thomas. January 2007 (has links) (PDF)
Thèse doctorat : Informatique : Strasbourg 1 : 2006. / Titre provenant de l'écran-titre. Bibliogr. 9 p.
23

Κοινόχρηστη εργαστηριακή πλατφόρμα προσομοίωσης δικτύων IP. Βέλτιστες πρακτικές και διαδικασίες μετάβασης σε IPv6 MPLS για παρόχους υπηρεσιών διαδικτύου

Τολιάς, Δημήτριος 01 August 2014 (has links)
Η παρούσα διπλωματική εργασία παρουσιάζει το πρόβλημα της εξάντλησης των IPv4 διευθύνσεων καθώς και τη διαδικασία μετάβαση στο IPv6. Πιο συγκεκριμένα, παρουσιάζονται τεχνολογίες και τεχνικές που έχουν προταθεί σε διεθνή forum για την μετάβαση από IPv4 σε IPv6 και αφορούν MPLS δίκτυα telecom provider. Στο 5ο κεφάλαιο δημιουργείται ένα περιβάλλον εξομοίωσης δικτυακών συσκευών και προσομοιώνονται βέλτιστες πρακτικές. Πολλοί providers έχουν επενδύσει τα τελευταία χρόνια στην εγκατάσταση IPv4-MPLS για τα δίκτυα κορμού τους. Από μια τέτοια μακροχρόνια επένδυση είναι λογικό μία επιχείρηση να περιμένει οφέλη. Η υποστήριξη IPv6 πάνω από το ήδη υπάρχον IPv4-MPLS θα απέδιδε τα μέγιστα οφέλη για μια τέτοια επιχείρηση. Έτσι μια τέτοια μετάβαση αποτελεί στρατηγική κίνηση που ουσιαστικά σκοπεύει στην αύξηση των κερδών του καθώς και την προετοιμασία του για το μέλλον. / This thesis aims to present the issue of constantly-decreasing available IPv4 addresses as well as the related transition process to IPv6, before the fully elimination of IPv4. More specifically, in this thesis there will be presented technologies and techniques which have been recommended in several international forums in relation to transition from IPv4 to IPv6 and which concern the MPLS networks for telecom providers. In the fifth chapter, an emulation environment for network devices will be “created”, through which some of the most appropriate transition implementation practices will be simulated. During the last years several providers have invested in installing IPv4-MPLS for their core networks. From such a long-term investment is sensible that one business expects profits. According to Chapter 5, the transition to IPv6 in conjunction with the full utilization of existing IPv4-MPLS equipment would have significant benefits for any business decided to proceed with this option. In particular, such a transition (from IPv4 to IPv6) could be part of a business strategy since not only contributes to the technological upgrading of a company’s systems and the production of more reliable services, but also to create synergies and economies of scale.
24

Securing IP Mobility Management for Vehicular Ad Hoc Networks

Taha, Sanaa Mohamed Ahmed 08 April 2013 (has links)
The proliferation of Intelligent Transportation Systems (ITSs) applications, such as Internet access and Infotainment, highlights the requirements for improving the underlying mobility management protocols for Vehicular Ad Hoc Networks (VANETs). Mobility management protocols in VANETs are envisioned to support mobile nodes (MNs), i.e., vehicles, with seamless communications, in which service continuity is guaranteed while vehicles are roaming through different RoadSide Units (RSUs) with heterogeneous wireless technologies. Due to its standardization and widely deployment, IP mobility (also called Mobile IP (MIP)) is the most popular mobility management protocol used for mobile networks including VANETs. In addition, because of the diversity of possible applications, the Internet Engineering Task Force (IETF) issues many MIP's standardizations, such as MIPv6 and NEMO for global mobility, and Proxy MIP (PMIPv6) for localized mobility. However, many challenges have been posed for integrating IP mobility with VANETs, including the vehicle's high speeds, multi-hop communications, scalability, and ef ficiency. From a security perspective, we observe three main challenges: 1) each vehicle's anonymity and location privacy, 2) authenticating vehicles in multi-hop communications, and 3) physical-layer location privacy. In transmitting mobile IPv6 binding update signaling messages, the mobile node's Home Address (HoA) and Care-of Address (CoA) are transmitted as plain-text, hence they can be revealed by other network entities and attackers. The mobile node's HoA and CoA represent its identity and its current location, respectively, therefore revealing an MN's HoA means breaking its anonymity while revealing an MN's CoA means breaking its location privacy. On one hand, some existing anonymity and location privacy schemes require intensive computations, which means they cannot be used in such time-restricted seamless communications. On the other hand, some schemes only achieve seamless communication through low anonymity and location privacy levels. Therefore, the trade-off between the network performance, on one side, and the MN's anonymity and location privacy, on the other side, makes preservation of privacy a challenging issue. In addition, for PMIPv6 to provide IP mobility in an infrastructure-connected multi-hop VANET, an MN uses a relay node (RN) for communicating with its Mobile Access Gateway (MAG). Therefore, a mutual authentication between the MN and RN is required to thwart authentication attacks early in such scenarios. Furthermore, for a NEMO-based VANET infrastructure, which is used in public hotspots installed inside moving vehicles, protecting physical-layer location privacy is a prerequisite for achieving privacy in upper-layers such as the IP-layer. Due to the open nature of the wireless environment, a physical-layer attacker can easily localize users by employing signals transmitted from these users. In this dissertation, we address those security challenges by proposing three security schemes to be employed for different mobility management scenarios in VANETs, namely, the MIPv6, PMIPv6, and Network Mobility (NEMO) protocols. First, for MIPv6 protocol and based on the onion routing and anonymizer, we propose an anonymous and location privacy-preserving scheme (ALPP) that involves two complementary sub-schemes: anonymous home binding update (AHBU) and anonymous return routability (ARR). In addition, anonymous mutual authentication and key establishment schemes have been proposed, to authenticate a mobile node to its foreign gateway and create a shared key between them. Unlike existing schemes, ALPP alleviates the tradeoff between the networking performance and the achieved privacy level. Combining onion routing and the anonymizer in the ALPP scheme increases the achieved location privacy level, in which no entity in the network except the mobile node itself can identify this node's location. Using the entropy model, we show that ALPP achieves a higher degree of anonymity than that achieved by the mix-based scheme. Compared to existing schemes, the AHBU and ARR sub-schemes achieve smaller computation overheads and thwart both internal and external adversaries. Simulation results demonstrate that our sub-schemes have low control-packets routing delays, and are suitable for seamless communications. Second, for the multi-hop authentication problem in PMIPv6-based VANET, we propose EM3A, a novel mutual authentication scheme that guarantees the authenticity of both MN and RN. EM3A thwarts authentication attacks, including Denial of service (DoS), collusion, impersonation, replay, and man-in-the-middle attacks. EM3A works in conjunction with a proposed scheme for key establishment based on symmetric polynomials, to generate a shared secret key between an MN and an RN. This scheme achieves lower revocation overhead than that achieved by existing symmetric polynomial-based schemes. For a PMIP domain with n points of attachment and a symmetric polynomial of degree t, our scheme achieves t x 2^n-secrecy, whereas the existing symmetric polynomial-based authentication schemes achieve only t-secrecy. Computation and communication overhead analysis as well as simulation results show that EM3A achieves low authentication delay and is suitable for seamless multi-hop IP communications. Furthermore, we present a case study of a multi-hop authentication PMIP (MA-PMIP) implemented in vehicular networks. EM3A represents the multi-hop authentication in MA-PMIP to mutually authenticate the roaming vehicle and its relay vehicle. Compared to other authentication schemes, we show that our MA-PMIP protocol with EM3A achieves 99.6% and 96.8% reductions in authentication delay and communication overhead, respectively. Finally, we consider the physical-layer location privacy attacks in the NEMO-based VANETs scenario, such as would be presented by a public hotspot installed inside a moving vehicle. We modify the obfuscation, i.e., concealment, and power variability ideas and propose a new physical-layer location privacy scheme, the fake point-cluster based scheme, to prevent attackers from localizing users inside NEMO-based VANET hotspots. Involving the fake point and cluster based sub-schemes, the proposed scheme can: 1) confuse the attackers by increasing the estimation errors of their Received Signal Strength (RSSs) measurements, and 2) prevent attackers' monitoring devices from detecting the user's transmitted signals. We show that our scheme not only achieves higher location privacy, but also increases the overall network performance. Employing correctness, accuracy, and certainty as three different metrics, we analytically measure the location privacy achieved by our proposed scheme. In addition, using extensive simulations, we demonstrate that the fake point-cluster based scheme can be practically implemented in high-speed VANETs' scenarios.
25

Securing IP Mobility Management for Vehicular Ad Hoc Networks

Taha, Sanaa Mohamed Ahmed 08 April 2013 (has links)
The proliferation of Intelligent Transportation Systems (ITSs) applications, such as Internet access and Infotainment, highlights the requirements for improving the underlying mobility management protocols for Vehicular Ad Hoc Networks (VANETs). Mobility management protocols in VANETs are envisioned to support mobile nodes (MNs), i.e., vehicles, with seamless communications, in which service continuity is guaranteed while vehicles are roaming through different RoadSide Units (RSUs) with heterogeneous wireless technologies. Due to its standardization and widely deployment, IP mobility (also called Mobile IP (MIP)) is the most popular mobility management protocol used for mobile networks including VANETs. In addition, because of the diversity of possible applications, the Internet Engineering Task Force (IETF) issues many MIP's standardizations, such as MIPv6 and NEMO for global mobility, and Proxy MIP (PMIPv6) for localized mobility. However, many challenges have been posed for integrating IP mobility with VANETs, including the vehicle's high speeds, multi-hop communications, scalability, and ef ficiency. From a security perspective, we observe three main challenges: 1) each vehicle's anonymity and location privacy, 2) authenticating vehicles in multi-hop communications, and 3) physical-layer location privacy. In transmitting mobile IPv6 binding update signaling messages, the mobile node's Home Address (HoA) and Care-of Address (CoA) are transmitted as plain-text, hence they can be revealed by other network entities and attackers. The mobile node's HoA and CoA represent its identity and its current location, respectively, therefore revealing an MN's HoA means breaking its anonymity while revealing an MN's CoA means breaking its location privacy. On one hand, some existing anonymity and location privacy schemes require intensive computations, which means they cannot be used in such time-restricted seamless communications. On the other hand, some schemes only achieve seamless communication through low anonymity and location privacy levels. Therefore, the trade-off between the network performance, on one side, and the MN's anonymity and location privacy, on the other side, makes preservation of privacy a challenging issue. In addition, for PMIPv6 to provide IP mobility in an infrastructure-connected multi-hop VANET, an MN uses a relay node (RN) for communicating with its Mobile Access Gateway (MAG). Therefore, a mutual authentication between the MN and RN is required to thwart authentication attacks early in such scenarios. Furthermore, for a NEMO-based VANET infrastructure, which is used in public hotspots installed inside moving vehicles, protecting physical-layer location privacy is a prerequisite for achieving privacy in upper-layers such as the IP-layer. Due to the open nature of the wireless environment, a physical-layer attacker can easily localize users by employing signals transmitted from these users. In this dissertation, we address those security challenges by proposing three security schemes to be employed for different mobility management scenarios in VANETs, namely, the MIPv6, PMIPv6, and Network Mobility (NEMO) protocols. First, for MIPv6 protocol and based on the onion routing and anonymizer, we propose an anonymous and location privacy-preserving scheme (ALPP) that involves two complementary sub-schemes: anonymous home binding update (AHBU) and anonymous return routability (ARR). In addition, anonymous mutual authentication and key establishment schemes have been proposed, to authenticate a mobile node to its foreign gateway and create a shared key between them. Unlike existing schemes, ALPP alleviates the tradeoff between the networking performance and the achieved privacy level. Combining onion routing and the anonymizer in the ALPP scheme increases the achieved location privacy level, in which no entity in the network except the mobile node itself can identify this node's location. Using the entropy model, we show that ALPP achieves a higher degree of anonymity than that achieved by the mix-based scheme. Compared to existing schemes, the AHBU and ARR sub-schemes achieve smaller computation overheads and thwart both internal and external adversaries. Simulation results demonstrate that our sub-schemes have low control-packets routing delays, and are suitable for seamless communications. Second, for the multi-hop authentication problem in PMIPv6-based VANET, we propose EM3A, a novel mutual authentication scheme that guarantees the authenticity of both MN and RN. EM3A thwarts authentication attacks, including Denial of service (DoS), collusion, impersonation, replay, and man-in-the-middle attacks. EM3A works in conjunction with a proposed scheme for key establishment based on symmetric polynomials, to generate a shared secret key between an MN and an RN. This scheme achieves lower revocation overhead than that achieved by existing symmetric polynomial-based schemes. For a PMIP domain with n points of attachment and a symmetric polynomial of degree t, our scheme achieves t x 2^n-secrecy, whereas the existing symmetric polynomial-based authentication schemes achieve only t-secrecy. Computation and communication overhead analysis as well as simulation results show that EM3A achieves low authentication delay and is suitable for seamless multi-hop IP communications. Furthermore, we present a case study of a multi-hop authentication PMIP (MA-PMIP) implemented in vehicular networks. EM3A represents the multi-hop authentication in MA-PMIP to mutually authenticate the roaming vehicle and its relay vehicle. Compared to other authentication schemes, we show that our MA-PMIP protocol with EM3A achieves 99.6% and 96.8% reductions in authentication delay and communication overhead, respectively. Finally, we consider the physical-layer location privacy attacks in the NEMO-based VANETs scenario, such as would be presented by a public hotspot installed inside a moving vehicle. We modify the obfuscation, i.e., concealment, and power variability ideas and propose a new physical-layer location privacy scheme, the fake point-cluster based scheme, to prevent attackers from localizing users inside NEMO-based VANET hotspots. Involving the fake point and cluster based sub-schemes, the proposed scheme can: 1) confuse the attackers by increasing the estimation errors of their Received Signal Strength (RSSs) measurements, and 2) prevent attackers' monitoring devices from detecting the user's transmitted signals. We show that our scheme not only achieves higher location privacy, but also increases the overall network performance. Employing correctness, accuracy, and certainty as three different metrics, we analytically measure the location privacy achieved by our proposed scheme. In addition, using extensive simulations, we demonstrate that the fake point-cluster based scheme can be practically implemented in high-speed VANETs' scenarios.
26

Estrategia de Adopción de IPV6 en la Red Corporativa de Codelco.

Valdenegro Méndez, Orlando Ramón January 2008 (has links)
Esta memoria de título corresponde al diseño de una estrategia de adopción del nuevo protocolo de Internet IPv6 para la Red Corporativa de Codelco-Chile. El trabajo busca una solución factible para dicho problema y plantea la solución con su correspondiente programación. Dada la vertiginosa evolución de las tecnologías de información, en particular de Internet, nace la necesidad de contar con un protocolo capaz de manejar un mayor número de dispositivos conectados a la red, permitiendo mejorar el rendimiento de las comunicaciones, en particular las multimediales. De esta forma se desarrolla IPv6, destinado a reemplazar IPv4, el protocolo que actualmente rige las comunicaciones en Internet. Así la migración desde un sistema a otro está cada día más cercana, por lo que es de suma importancia estar preparados para dicho cambio. Por ello la importancia de contar con un plan que permita realizar este cambio en forma estructurada, a costo razonable y habilitando a Codelco-Chile para consolidar su liderazgo tecnológico. En este marco, se desarrolla una estrategia que consta de cuatro etapas: la implementación de un laboratorio; la difusión y promoción del proyecto; la expansión de la conectividad a toda la empresa; y las proyecciones futuras una vez concluida la etapa de adopción. La estrategia está diseñada de modo que el plazo de implementación de este cambio tecnológico sea lo más corto posible (aproximadamente dos años). Además permite realizarlo en forma ordenada, y prepara a la empresa para enfrentar los desafíos tecnológicos que trae la minería del futuro.
27

Um modelo de migração de ambiente IPv4 para IPv6 em uma rede acadêmica heterogênea

Barreto, Juvenal dos Santos 23 March 2015 (has links)
Dissertação (mestrado)—Universidade de Brasília, Instituto de Ciências Exatas, Departamento de Ciência da Computação, 2015. / Submitted by Tania Milca Carvalho Malheiros (tania@bce.unb.br) on 2015-10-20T16:00:38Z No. of bitstreams: 1 2015_JuvenaldosSantosBarreto.pdf: 10141746 bytes, checksum: bb195e9d488fa521161ba0d166675431 (MD5) / Approved for entry into archive by Patrícia Nunes da Silva(patricia@bce.unb.br) on 2016-01-04T14:32:21Z (GMT) No. of bitstreams: 1 2015_JuvenaldosSantosBarreto.pdf: 10141746 bytes, checksum: bb195e9d488fa521161ba0d166675431 (MD5) / Made available in DSpace on 2016-01-04T14:32:21Z (GMT). No. of bitstreams: 1 2015_JuvenaldosSantosBarreto.pdf: 10141746 bytes, checksum: bb195e9d488fa521161ba0d166675431 (MD5) / A crescente demanda por informações e, particularmente, o aumento exponencial de redes conectadas à Internet, faz com que as instituições tenham que modernizar suas infraestruturas frequentemente. A sensível limitação do endereçamento disponível desta rede contribui para que essas instituições estudem a implantação da nova versão do protocolo da Internet, o IPv6. A Universidade de Brasília, como grande provedor de acesso e de informações, e procurando manter-se conectada ao maior número de usuários possível e em alta disponibilidade, vê a necessidade de introdução de novas soluções em seu ambiente, mas por ser um ambiente muito complexo e heterogêneo, precisa ater-se a um modelo de implementação que permita execução de uma transição para o IPv6 de forma segura, gradual e suave. Neste trabalho de pesquisa é apresentada uma metodologia para criar um ambiente de experimentos dentro da REDUnB (Rede de Dados da UnB) para implementação do IPv6, analisando aspectos relacionados às técnicas de transição com análises de desempenho destas comunicações. Por meio desta metodologia busca-se uma base para um modelo de migração do ambiente de IPv4 para IPv6 em um ambiente de rede acadêmica heterogênea, com perspectivas concretas de implementação no ambiente REDUnB. / The growing demand for information and, particularly, the exponential increase in the number of networks connected to the Internet, makes the institutions have to modernize their infrastructures often. The sensitive limitation of available addressing this network contributes to these institutions to study the implementation of the new version of Internet protocol, IPv6. The University of Brasilia, as leading provider of access and information, and trying to keep connected to the largest number of users as possible and high availability, see the need to introduce new solutions in your environment, but because it is a very complex environment and heterogeneous, need to concentre to a deployment model that allows implementation of a transition to IPv6 in a secure manner, gradually and smoothly. In this research work presents a methodology to create an environment of experiments within the REDUnB (Data Network of UNB) for IPv6 implementation, analyzing aspects related to the techniques of transition with performance analysis of these communications. Through this methodology seeks to a basis for a model of migration from the environment of IPv4 to IPv6 in a heterogeneous academic network environment, with concrete prospects of implementation in REDUnB environment.
28

Skaraborgs kommuner och IPv6

Dahlström, Linus January 2011 (has links)
Det nuvarande Internetprotokollet (IPv4) utvecklades under tidigt 70-tal och har sedandess införande kommit och bli det dominerande protokollet för adresshantering. Vid dess skapelse så fanns det betydligt mindre enheter som behövde kommunicera med varandra. Idag så finns det betydligt fler enheter som behöver kommunicera och IPv4 klarar då inte av att hantera de krav som ställs. IPv4:s uppföljare IPv6 (IPng) står dock redo för att ta över facklan som det dominerande Internetprotokollet. Rapporten fokuserar på Skaraborgs kommuner och hur deras status för Ipv6 implementationen. Resultatet från undersökningen visar att flera utav de kommunerna som deltagit inte har påbörjat en övergång till IPv6. Samtidigt som kommunerna inte har påbörjat sin övergång till Ipv6 saknar även flera kommuner en tidsplan och utsatt deadline för Ipv6. Resultaten visar att kommunerna skiljer sig i avseende mot varandra där t.ex flera kommuner har börjat utbilda personal menads andra inte har gjort det. För sin övergång till ipv6 planerar flera kommuner att använda sig utav konsulter för att lösa de kommande kraven. Andra kommuner planerar att lägga ut hela arbetet på företag eller vänta till Ipv6 blir en del av vardagen.
29

IPv6 in WeOS : Initial support for IPv6 in WeOS

Boqvist, Anders, Gyllhag, Oscar January 2010 (has links)
Westermo is a company that develops industrial standardized network equipment for harsh environments. Our task was to help the company prepare for future demands regarding IP communication. Westermo has customers and branches around the world, in order to meet market demands and competitor development IP version 6 support is of great interest.Next generation of IP communication is IPv6 and to prepare for the future and present market demands IPv6 support is needed in Westermo´s products. This thesis assignment is meant to investigate and give a proof of concept solution for basic IPv6 support in Westermo Operating System (WeOS).The areas of interest this thesis involves are IP settings and routing support. IP settings include ability to activate IPv6, assigning address to interface and related tasks. Routing support imply creation of routes and default-gateway, that gives the switches basic IPv6 routing capabilities. Switches should be capable of sending IPv6 router advertisement messages, and perform static IPv6 routing.Performing changes in IPv6 support means that modifications in the Command Line Interface (CLI)-context are necessary, in order to make configuration user-friendly. Therefore a proposed extension of the CLI-syntax is required. Implementations of the proposed CLI-syntax are done into Westermo´s main operating system WeOS.Our work has fulfilled the general expectations and placed a foundation for IPv6 support. Through proof of concept tests and implementations, WeOS is close to reach and meet the primary functionality with IPv6.Westermo is a company that develops industrial standardized network equipment for harsh environments. Our task was to help the company prepare for future demands regarding IP communication. Westermo has customers and branches around the world, in order to meet market demands and competitor development IP version 6 support is of great interest.Next generation of IP communication is IPv6 and to prepare for the future and present market demands IPv6 support is needed in Westermo´s products. This thesis assignment is meant to investigate and give a proof of concept solution for basic IPv6 support in Westermo Operating System (WeOS).The areas of interest this thesis involves are IP settings and routing support. IP settings include ability to activate IPv6, assigning address to interface and related tasks. Routing support imply creation of routes and default-gateway, that gives the switches basic IPv6 routing capabilities. Switches should be capable of sending IPv6 router advertisement messages, and perform static IPv6 routing.Performing changes in IPv6 support means that modifications in the Command Line Interface (CLI)-context are necessary, in order to make configuration user-friendly. Therefore a proposed extension of the CLI-syntax is required. Implementations of the proposed CLI-syntax are done into Westermo´s main operating system WeOS.Our work has fulfilled the general expectations and placed a foundation for IPv6 support. Through proof of concept tests and implementations, WeOS is close to reach and meet the primary functionality with IPv6.
30

Ipv6 : En empirisk studie i hur Ipv6 protokollet har utvecklats de senaste åren.

Möller, Thomas January 2009 (has links)
Internet grows, so it’s cracking, soon will all IPv4 addresses be allocated and a solution is urgently needed. The new protocol, IPv6 is the solution to this problem. With a size of 128 bits against IPv4s 32 bits gives IPv6 a huge amount of addresses to distribute. The security addition that may be added manually in IPv4 is the standard with the new protocol. To implement IPv6 will not get done over a day, and the various protocols are not talking with each other so the transition will be a problem. A solution for this is dual-stack that allows a node using both protocols. The aim of the thesis is to examine how the reach ability is with IPv6 is on different pages, which claim to use dual-stack. To see if it was an improvement, the results will be compared with results from the survey Empirical Performance of IPv6 vs.. IPv4 under a Dual-Stack Environment. The aim has been achieved through the theoretically learn about IPv6 protocol. After this, a survey which was later compiled, compared and presented in this work. The survey results show that the IPv6 network has increased since the last survey. It also shows that practical with IPv4 is about the same level as in the investigation being compared. This indicates that dual-stack is used and that it will in time be moving in a pure IPv6 Internet. / Internet växer så det knakar, snart är alla IPv4 adresserna tilldelade och en lösningbehövs omgående. Det nya protokollet IPv6 är lösningen på detta problem. Med enstorlek på 128 bitar gentemot IPv4s 32 bitar ger IPv6 en ofantligt mycket störremängd adresser att dela ut. De säkerhetstillägg som får läggas till manuellt i IPv4 ärstandard med det nya protokollet. Att implementera IPv6 kommer inte att gå på endag och de olika protokollen pratar inte med varandra så övergången kommer att bliett problem. En lösning för detta är Dual-stack som gör att en nod använder bådaprotokollen.Syftet med examensarbetet är att undersöka hur nåbarheten med IPv6 är på olika sidorsom påstår att de använder dual-stack. För att se om det blivit en förbättring kommerresultatet att jämföras med resultatet från undersökningen Empirical Performance ofIPv6 vs. IPv4 under a Dual-Stack Environment.Syftet har uppnåtts genom att teoretiskt ta lärdom om IPv6 protokollet. Efter dettagjort en undersökning som senare sammanställts, jämförts och presenterats i dettaarbete.Undersökningens resultat visar att IPv6 nätet har ökat de sedan den förraundersökningen. Det visar även att nåbarheten med IPv4 är ungefär på samma nivåsom vid undersökningen som jämförs med. Detta visar på att dual-stack används ochatt det tids nog kommer att gå över i ett renodlat IPv6 Internet.

Page generated in 0.0233 seconds