Spelling suggestions: "subject:"ipv""
21 |
A Minimum Delay Anycast Routing ProtocolHuang, Wei-Cherng 03 September 2003 (has links)
Anycast is a new communication service defined in IPv6 (Internet Protocol Version 6) [6]. An anycast message is the one that should be delivered to the 'nearest' member in a group of designated recipients. The ¡¥nearest¡¦ is not always the ¡¥best¡¦ member. In this paper, we propose a routing protocol for anycast message. It is composed of two subprotocols: the routing table establishment subprotocol and the packet forwarding subprotocol. In the routing table establishment subprotocol, we propose a mininum delay path method (MDP). We get a minimum delay path from router to destination by MDP. In the packet forwarding protocol, we propose a minimum delay and load balancing method (MDLB). We dispatch traffic load to a server with minimum delay and light load by MDLB. The performance has demonstrated the benefits of MDP and MDLB in reducing end-to-end delay and increasing throughput of network.
|
22 |
Gestion des déplacements de terminaux IPv6 mobiles assistée par géolocalisationMontavont, Julien Noël, Thomas. January 2007 (has links) (PDF)
Thèse doctorat : Informatique : Strasbourg 1 : 2006. / Titre provenant de l'écran-titre. Bibliogr. 9 p.
|
23 |
Κοινόχρηστη εργαστηριακή πλατφόρμα προσομοίωσης δικτύων IP. Βέλτιστες πρακτικές και διαδικασίες μετάβασης σε IPv6 MPLS για παρόχους υπηρεσιών διαδικτύουΤολιάς, Δημήτριος 01 August 2014 (has links)
Η παρούσα διπλωματική εργασία παρουσιάζει το πρόβλημα της εξάντλησης των IPv4 διευθύνσεων καθώς και τη διαδικασία μετάβαση στο IPv6. Πιο συγκεκριμένα, παρουσιάζονται τεχνολογίες και τεχνικές που έχουν προταθεί σε διεθνή forum για την μετάβαση από IPv4 σε IPv6 και αφορούν MPLS δίκτυα telecom provider. Στο 5ο κεφάλαιο δημιουργείται ένα περιβάλλον εξομοίωσης δικτυακών συσκευών και προσομοιώνονται βέλτιστες πρακτικές. Πολλοί providers έχουν επενδύσει τα τελευταία χρόνια στην εγκατάσταση IPv4-MPLS για τα δίκτυα κορμού τους. Από μια τέτοια μακροχρόνια επένδυση είναι λογικό μία επιχείρηση να περιμένει οφέλη. Η υποστήριξη IPv6 πάνω από το ήδη υπάρχον IPv4-MPLS θα απέδιδε τα μέγιστα οφέλη για μια τέτοια επιχείρηση. Έτσι μια τέτοια μετάβαση αποτελεί στρατηγική κίνηση που ουσιαστικά σκοπεύει στην αύξηση των κερδών του καθώς και την προετοιμασία του για το μέλλον. / This thesis aims to present the issue of constantly-decreasing available IPv4 addresses as well as the related transition process to IPv6, before the fully elimination of IPv4. More specifically, in this thesis there will be presented technologies and techniques which have been recommended in several international forums in relation to transition from IPv4 to IPv6 and which concern the MPLS networks for telecom providers. In the fifth chapter, an emulation environment for network devices will be “created”, through which some of the most appropriate transition implementation practices will be simulated. During the last years several providers have invested in installing IPv4-MPLS for their core networks. From such a long-term investment is sensible that one business expects profits. According to Chapter 5, the transition to IPv6 in conjunction with the full utilization of existing IPv4-MPLS equipment would have significant benefits for any business decided to proceed with this option. In particular, such a transition (from IPv4 to IPv6) could be part of a business strategy since not only contributes to the technological upgrading of a company’s systems and the production of more reliable services, but also to create synergies and economies of scale.
|
24 |
Securing IP Mobility Management for Vehicular Ad Hoc NetworksTaha, Sanaa Mohamed Ahmed 08 April 2013 (has links)
The proliferation of Intelligent Transportation Systems (ITSs) applications, such as
Internet access and Infotainment, highlights the requirements for improving the underlying
mobility management protocols for Vehicular Ad Hoc Networks (VANETs). Mobility
management protocols in VANETs are envisioned to support mobile nodes (MNs), i.e.,
vehicles, with seamless communications, in which service continuity is guaranteed while
vehicles are roaming through different RoadSide Units (RSUs) with heterogeneous wireless
technologies.
Due to its standardization and widely deployment, IP mobility (also called Mobile IP
(MIP)) is the most popular mobility management protocol used for mobile networks including
VANETs. In addition, because of the diversity of possible applications, the Internet
Engineering Task Force (IETF) issues many MIP's standardizations, such as MIPv6 and
NEMO for global mobility, and Proxy MIP (PMIPv6) for localized mobility. However,
many challenges have been posed for integrating IP mobility with VANETs, including the
vehicle's high speeds, multi-hop communications, scalability, and ef ficiency. From a security
perspective, we observe three main challenges: 1) each vehicle's anonymity and location
privacy, 2) authenticating vehicles in multi-hop communications, and 3) physical-layer
location privacy.
In transmitting mobile IPv6 binding update signaling messages, the mobile node's Home
Address (HoA) and Care-of Address (CoA) are transmitted as plain-text, hence they can
be revealed by other network entities and attackers. The mobile node's HoA and CoA
represent its identity and its current location, respectively, therefore revealing an MN's HoA
means breaking its anonymity while revealing an MN's CoA means breaking its location
privacy. On one hand, some existing anonymity and location privacy schemes require
intensive computations, which means they cannot be used in such time-restricted seamless
communications. On the other hand, some schemes only achieve seamless communication
through low anonymity and location privacy levels. Therefore, the trade-off between the
network performance, on one side, and the MN's anonymity and location privacy, on the
other side, makes preservation of privacy a challenging issue. In addition, for PMIPv6
to provide IP mobility in an infrastructure-connected multi-hop VANET, an MN uses a
relay node (RN) for communicating with its Mobile Access Gateway (MAG). Therefore,
a mutual authentication between the MN and RN is required to thwart authentication
attacks early in such scenarios. Furthermore, for a NEMO-based VANET infrastructure,
which is used in public hotspots installed inside moving vehicles, protecting physical-layer
location privacy is a prerequisite for achieving privacy in upper-layers such as the IP-layer. Due to the open nature of the wireless environment, a physical-layer attacker can easily
localize users by employing signals transmitted from these users.
In this dissertation, we address those security challenges by proposing three security
schemes to be employed for different mobility management scenarios in VANETs, namely,
the MIPv6, PMIPv6, and Network Mobility (NEMO) protocols.
First, for MIPv6 protocol and based on the onion routing and anonymizer, we propose
an anonymous and location privacy-preserving scheme (ALPP) that involves two complementary
sub-schemes: anonymous home binding update (AHBU) and anonymous return
routability (ARR). In addition, anonymous mutual authentication and key establishment
schemes have been proposed, to authenticate a mobile node to its foreign gateway and
create a shared key between them. Unlike existing schemes, ALPP alleviates the tradeoff
between the networking performance and the achieved privacy level. Combining onion
routing and the anonymizer in the ALPP scheme increases the achieved location privacy
level, in which no entity in the network except the mobile node itself can identify this
node's location. Using the entropy model, we show that ALPP achieves a higher degree of
anonymity than that achieved by the mix-based scheme. Compared to existing schemes,
the AHBU and ARR sub-schemes achieve smaller computation overheads and thwart both
internal and external adversaries. Simulation results demonstrate that our sub-schemes
have low control-packets routing delays, and are suitable for seamless communications.
Second, for the multi-hop authentication problem in PMIPv6-based VANET, we propose
EM3A, a novel mutual authentication scheme that guarantees the authenticity of both
MN and RN. EM3A thwarts authentication attacks, including Denial of service (DoS), collusion,
impersonation, replay, and man-in-the-middle attacks. EM3A works in conjunction
with a proposed scheme for key establishment based on symmetric polynomials, to generate
a shared secret key between an MN and an RN. This scheme achieves lower revocation
overhead than that achieved by existing symmetric polynomial-based schemes. For a PMIP
domain with n points of attachment and a symmetric polynomial of degree t, our scheme
achieves t x 2^n-secrecy, whereas the existing symmetric polynomial-based authentication
schemes achieve only t-secrecy. Computation and communication overhead analysis as well
as simulation results show that EM3A achieves low authentication delay and is suitable
for seamless multi-hop IP communications. Furthermore, we present a case study of a
multi-hop authentication PMIP (MA-PMIP) implemented in vehicular networks. EM3A
represents the multi-hop authentication in MA-PMIP to mutually authenticate the roaming
vehicle and its relay vehicle. Compared to other authentication schemes, we show that our
MA-PMIP protocol with EM3A achieves 99.6% and 96.8% reductions in authentication
delay and communication overhead, respectively.
Finally, we consider the physical-layer location privacy attacks in the NEMO-based
VANETs scenario, such as would be presented by a public hotspot installed inside a moving
vehicle. We modify the obfuscation, i.e., concealment, and power variability ideas and
propose a new physical-layer location privacy scheme, the fake point-cluster based scheme,
to prevent attackers from localizing users inside NEMO-based VANET hotspots. Involving
the fake point and cluster based sub-schemes, the proposed scheme can: 1) confuse
the attackers by increasing the estimation errors of their Received Signal Strength (RSSs)
measurements, and 2) prevent attackers' monitoring devices from detecting the user's transmitted
signals. We show that our scheme not only achieves higher location privacy, but
also increases the overall network performance. Employing correctness, accuracy, and certainty
as three different metrics, we analytically measure the location privacy achieved by
our proposed scheme. In addition, using extensive simulations, we demonstrate that the
fake point-cluster based scheme can be practically implemented in high-speed VANETs'
scenarios.
|
25 |
Securing IP Mobility Management for Vehicular Ad Hoc NetworksTaha, Sanaa Mohamed Ahmed 08 April 2013 (has links)
The proliferation of Intelligent Transportation Systems (ITSs) applications, such as
Internet access and Infotainment, highlights the requirements for improving the underlying
mobility management protocols for Vehicular Ad Hoc Networks (VANETs). Mobility
management protocols in VANETs are envisioned to support mobile nodes (MNs), i.e.,
vehicles, with seamless communications, in which service continuity is guaranteed while
vehicles are roaming through different RoadSide Units (RSUs) with heterogeneous wireless
technologies.
Due to its standardization and widely deployment, IP mobility (also called Mobile IP
(MIP)) is the most popular mobility management protocol used for mobile networks including
VANETs. In addition, because of the diversity of possible applications, the Internet
Engineering Task Force (IETF) issues many MIP's standardizations, such as MIPv6 and
NEMO for global mobility, and Proxy MIP (PMIPv6) for localized mobility. However,
many challenges have been posed for integrating IP mobility with VANETs, including the
vehicle's high speeds, multi-hop communications, scalability, and ef ficiency. From a security
perspective, we observe three main challenges: 1) each vehicle's anonymity and location
privacy, 2) authenticating vehicles in multi-hop communications, and 3) physical-layer
location privacy.
In transmitting mobile IPv6 binding update signaling messages, the mobile node's Home
Address (HoA) and Care-of Address (CoA) are transmitted as plain-text, hence they can
be revealed by other network entities and attackers. The mobile node's HoA and CoA
represent its identity and its current location, respectively, therefore revealing an MN's HoA
means breaking its anonymity while revealing an MN's CoA means breaking its location
privacy. On one hand, some existing anonymity and location privacy schemes require
intensive computations, which means they cannot be used in such time-restricted seamless
communications. On the other hand, some schemes only achieve seamless communication
through low anonymity and location privacy levels. Therefore, the trade-off between the
network performance, on one side, and the MN's anonymity and location privacy, on the
other side, makes preservation of privacy a challenging issue. In addition, for PMIPv6
to provide IP mobility in an infrastructure-connected multi-hop VANET, an MN uses a
relay node (RN) for communicating with its Mobile Access Gateway (MAG). Therefore,
a mutual authentication between the MN and RN is required to thwart authentication
attacks early in such scenarios. Furthermore, for a NEMO-based VANET infrastructure,
which is used in public hotspots installed inside moving vehicles, protecting physical-layer
location privacy is a prerequisite for achieving privacy in upper-layers such as the IP-layer. Due to the open nature of the wireless environment, a physical-layer attacker can easily
localize users by employing signals transmitted from these users.
In this dissertation, we address those security challenges by proposing three security
schemes to be employed for different mobility management scenarios in VANETs, namely,
the MIPv6, PMIPv6, and Network Mobility (NEMO) protocols.
First, for MIPv6 protocol and based on the onion routing and anonymizer, we propose
an anonymous and location privacy-preserving scheme (ALPP) that involves two complementary
sub-schemes: anonymous home binding update (AHBU) and anonymous return
routability (ARR). In addition, anonymous mutual authentication and key establishment
schemes have been proposed, to authenticate a mobile node to its foreign gateway and
create a shared key between them. Unlike existing schemes, ALPP alleviates the tradeoff
between the networking performance and the achieved privacy level. Combining onion
routing and the anonymizer in the ALPP scheme increases the achieved location privacy
level, in which no entity in the network except the mobile node itself can identify this
node's location. Using the entropy model, we show that ALPP achieves a higher degree of
anonymity than that achieved by the mix-based scheme. Compared to existing schemes,
the AHBU and ARR sub-schemes achieve smaller computation overheads and thwart both
internal and external adversaries. Simulation results demonstrate that our sub-schemes
have low control-packets routing delays, and are suitable for seamless communications.
Second, for the multi-hop authentication problem in PMIPv6-based VANET, we propose
EM3A, a novel mutual authentication scheme that guarantees the authenticity of both
MN and RN. EM3A thwarts authentication attacks, including Denial of service (DoS), collusion,
impersonation, replay, and man-in-the-middle attacks. EM3A works in conjunction
with a proposed scheme for key establishment based on symmetric polynomials, to generate
a shared secret key between an MN and an RN. This scheme achieves lower revocation
overhead than that achieved by existing symmetric polynomial-based schemes. For a PMIP
domain with n points of attachment and a symmetric polynomial of degree t, our scheme
achieves t x 2^n-secrecy, whereas the existing symmetric polynomial-based authentication
schemes achieve only t-secrecy. Computation and communication overhead analysis as well
as simulation results show that EM3A achieves low authentication delay and is suitable
for seamless multi-hop IP communications. Furthermore, we present a case study of a
multi-hop authentication PMIP (MA-PMIP) implemented in vehicular networks. EM3A
represents the multi-hop authentication in MA-PMIP to mutually authenticate the roaming
vehicle and its relay vehicle. Compared to other authentication schemes, we show that our
MA-PMIP protocol with EM3A achieves 99.6% and 96.8% reductions in authentication
delay and communication overhead, respectively.
Finally, we consider the physical-layer location privacy attacks in the NEMO-based
VANETs scenario, such as would be presented by a public hotspot installed inside a moving
vehicle. We modify the obfuscation, i.e., concealment, and power variability ideas and
propose a new physical-layer location privacy scheme, the fake point-cluster based scheme,
to prevent attackers from localizing users inside NEMO-based VANET hotspots. Involving
the fake point and cluster based sub-schemes, the proposed scheme can: 1) confuse
the attackers by increasing the estimation errors of their Received Signal Strength (RSSs)
measurements, and 2) prevent attackers' monitoring devices from detecting the user's transmitted
signals. We show that our scheme not only achieves higher location privacy, but
also increases the overall network performance. Employing correctness, accuracy, and certainty
as three different metrics, we analytically measure the location privacy achieved by
our proposed scheme. In addition, using extensive simulations, we demonstrate that the
fake point-cluster based scheme can be practically implemented in high-speed VANETs'
scenarios.
|
26 |
Estrategia de Adopción de IPV6 en la Red Corporativa de Codelco.Valdenegro Méndez, Orlando Ramón January 2008 (has links)
Esta memoria de título corresponde al diseño de una estrategia de adopción del nuevo
protocolo de Internet IPv6 para la Red Corporativa de Codelco-Chile. El trabajo busca
una solución factible para dicho problema y plantea la solución con su correspondiente
programación.
Dada la vertiginosa evolución de las tecnologías de información, en particular de
Internet, nace la necesidad de contar con un protocolo capaz de manejar un mayor
número de dispositivos conectados a la red, permitiendo mejorar el rendimiento de las
comunicaciones, en particular las multimediales. De esta forma se desarrolla IPv6,
destinado a reemplazar IPv4, el protocolo que actualmente rige las comunicaciones en
Internet. Así la migración desde un sistema a otro está cada día más cercana, por lo
que es de suma importancia estar preparados para dicho cambio.
Por ello la importancia de contar con un plan que permita realizar este cambio en forma
estructurada, a costo razonable y habilitando a Codelco-Chile para consolidar su
liderazgo tecnológico. En este marco, se desarrolla una estrategia que consta de cuatro
etapas: la implementación de un laboratorio; la difusión y promoción del proyecto; la
expansión de la conectividad a toda la empresa; y las proyecciones futuras una vez
concluida la etapa de adopción. La estrategia está diseñada de modo que el plazo de
implementación de este cambio tecnológico sea lo más corto posible (aproximadamente
dos años). Además permite realizarlo en forma ordenada, y prepara a la empresa para
enfrentar los desafíos tecnológicos que trae la minería del futuro.
|
27 |
Um modelo de migração de ambiente IPv4 para IPv6 em uma rede acadêmica heterogêneaBarreto, Juvenal dos Santos 23 March 2015 (has links)
Dissertação (mestrado)—Universidade de Brasília, Instituto de Ciências Exatas, Departamento de Ciência da Computação, 2015. / Submitted by Tania Milca Carvalho Malheiros (tania@bce.unb.br) on 2015-10-20T16:00:38Z
No. of bitstreams: 1
2015_JuvenaldosSantosBarreto.pdf: 10141746 bytes, checksum: bb195e9d488fa521161ba0d166675431 (MD5) / Approved for entry into archive by Patrícia Nunes da Silva(patricia@bce.unb.br) on 2016-01-04T14:32:21Z (GMT) No. of bitstreams: 1
2015_JuvenaldosSantosBarreto.pdf: 10141746 bytes, checksum: bb195e9d488fa521161ba0d166675431 (MD5) / Made available in DSpace on 2016-01-04T14:32:21Z (GMT). No. of bitstreams: 1
2015_JuvenaldosSantosBarreto.pdf: 10141746 bytes, checksum: bb195e9d488fa521161ba0d166675431 (MD5) / A crescente demanda por informações e, particularmente, o aumento exponencial de redes conectadas à Internet, faz com que as instituições tenham que modernizar suas infraestruturas frequentemente. A sensível limitação do endereçamento disponível desta rede contribui para que essas instituições estudem a implantação da nova versão do protocolo da Internet, o IPv6. A Universidade de Brasília, como grande provedor de acesso e de informações, e procurando manter-se conectada ao maior número de usuários possível e em alta disponibilidade, vê a necessidade de introdução de novas soluções em seu ambiente, mas por ser um ambiente muito complexo e heterogêneo, precisa ater-se a um modelo de implementação que permita execução de uma transição para o IPv6 de forma segura, gradual e suave.
Neste trabalho de pesquisa é apresentada uma metodologia para criar um ambiente de experimentos dentro da REDUnB (Rede de Dados da UnB) para implementação do IPv6, analisando aspectos relacionados às técnicas de transição com análises de desempenho destas comunicações. Por meio desta metodologia busca-se uma base para um modelo de migração do ambiente de IPv4 para IPv6 em um ambiente de rede acadêmica heterogênea, com perspectivas concretas de implementação no ambiente REDUnB. / The growing demand for information and, particularly, the exponential increase in the number of networks connected to the Internet, makes the institutions have to modernize their infrastructures often. The sensitive limitation of available addressing this network contributes to these institutions to study the implementation of the new version of Internet protocol, IPv6. The University of Brasilia, as leading provider of access and information, and trying to keep connected to the largest number of users as possible and high availability, see the need to introduce new solutions in your environment, but because it is a very complex environment and heterogeneous, need to concentre to a deployment model that allows implementation of a transition to IPv6 in a secure manner, gradually and smoothly. In this research work presents a methodology to create an environment of experiments within the REDUnB (Data Network of UNB) for IPv6 implementation, analyzing aspects related to the techniques of transition with performance analysis of these communications. Through this methodology seeks to a basis for a model of migration from the environment of IPv4 to IPv6 in a heterogeneous academic network environment, with concrete prospects of implementation in REDUnB environment.
|
28 |
Skaraborgs kommuner och IPv6Dahlström, Linus January 2011 (has links)
Det nuvarande Internetprotokollet (IPv4) utvecklades under tidigt 70-tal och har sedandess införande kommit och bli det dominerande protokollet för adresshantering. Vid dess skapelse så fanns det betydligt mindre enheter som behövde kommunicera med varandra. Idag så finns det betydligt fler enheter som behöver kommunicera och IPv4 klarar då inte av att hantera de krav som ställs. IPv4:s uppföljare IPv6 (IPng) står dock redo för att ta över facklan som det dominerande Internetprotokollet. Rapporten fokuserar på Skaraborgs kommuner och hur deras status för Ipv6 implementationen. Resultatet från undersökningen visar att flera utav de kommunerna som deltagit inte har påbörjat en övergång till IPv6. Samtidigt som kommunerna inte har påbörjat sin övergång till Ipv6 saknar även flera kommuner en tidsplan och utsatt deadline för Ipv6. Resultaten visar att kommunerna skiljer sig i avseende mot varandra där t.ex flera kommuner har börjat utbilda personal menads andra inte har gjort det. För sin övergång till ipv6 planerar flera kommuner att använda sig utav konsulter för att lösa de kommande kraven. Andra kommuner planerar att lägga ut hela arbetet på företag eller vänta till Ipv6 blir en del av vardagen.
|
29 |
IPv6 in WeOS : Initial support for IPv6 in WeOSBoqvist, Anders, Gyllhag, Oscar January 2010 (has links)
Westermo is a company that develops industrial standardized network equipment for harsh environments. Our task was to help the company prepare for future demands regarding IP communication. Westermo has customers and branches around the world, in order to meet market demands and competitor development IP version 6 support is of great interest.Next generation of IP communication is IPv6 and to prepare for the future and present market demands IPv6 support is needed in Westermo´s products. This thesis assignment is meant to investigate and give a proof of concept solution for basic IPv6 support in Westermo Operating System (WeOS).The areas of interest this thesis involves are IP settings and routing support. IP settings include ability to activate IPv6, assigning address to interface and related tasks. Routing support imply creation of routes and default-gateway, that gives the switches basic IPv6 routing capabilities. Switches should be capable of sending IPv6 router advertisement messages, and perform static IPv6 routing.Performing changes in IPv6 support means that modifications in the Command Line Interface (CLI)-context are necessary, in order to make configuration user-friendly. Therefore a proposed extension of the CLI-syntax is required. Implementations of the proposed CLI-syntax are done into Westermo´s main operating system WeOS.Our work has fulfilled the general expectations and placed a foundation for IPv6 support. Through proof of concept tests and implementations, WeOS is close to reach and meet the primary functionality with IPv6.Westermo is a company that develops industrial standardized network equipment for harsh environments. Our task was to help the company prepare for future demands regarding IP communication. Westermo has customers and branches around the world, in order to meet market demands and competitor development IP version 6 support is of great interest.Next generation of IP communication is IPv6 and to prepare for the future and present market demands IPv6 support is needed in Westermo´s products. This thesis assignment is meant to investigate and give a proof of concept solution for basic IPv6 support in Westermo Operating System (WeOS).The areas of interest this thesis involves are IP settings and routing support. IP settings include ability to activate IPv6, assigning address to interface and related tasks. Routing support imply creation of routes and default-gateway, that gives the switches basic IPv6 routing capabilities. Switches should be capable of sending IPv6 router advertisement messages, and perform static IPv6 routing.Performing changes in IPv6 support means that modifications in the Command Line Interface (CLI)-context are necessary, in order to make configuration user-friendly. Therefore a proposed extension of the CLI-syntax is required. Implementations of the proposed CLI-syntax are done into Westermo´s main operating system WeOS.Our work has fulfilled the general expectations and placed a foundation for IPv6 support. Through proof of concept tests and implementations, WeOS is close to reach and meet the primary functionality with IPv6.
|
30 |
Ipv6 : En empirisk studie i hur Ipv6 protokollet har utvecklats de senaste åren.Möller, Thomas January 2009 (has links)
Internet grows, so it’s cracking, soon will all IPv4 addresses be allocated and a solution is urgently needed. The new protocol, IPv6 is the solution to this problem. With a size of 128 bits against IPv4s 32 bits gives IPv6 a huge amount of addresses to distribute. The security addition that may be added manually in IPv4 is the standard with the new protocol. To implement IPv6 will not get done over a day, and the various protocols are not talking with each other so the transition will be a problem. A solution for this is dual-stack that allows a node using both protocols. The aim of the thesis is to examine how the reach ability is with IPv6 is on different pages, which claim to use dual-stack. To see if it was an improvement, the results will be compared with results from the survey Empirical Performance of IPv6 vs.. IPv4 under a Dual-Stack Environment. The aim has been achieved through the theoretically learn about IPv6 protocol. After this, a survey which was later compiled, compared and presented in this work. The survey results show that the IPv6 network has increased since the last survey. It also shows that practical with IPv4 is about the same level as in the investigation being compared. This indicates that dual-stack is used and that it will in time be moving in a pure IPv6 Internet. / Internet växer så det knakar, snart är alla IPv4 adresserna tilldelade och en lösningbehövs omgående. Det nya protokollet IPv6 är lösningen på detta problem. Med enstorlek på 128 bitar gentemot IPv4s 32 bitar ger IPv6 en ofantligt mycket störremängd adresser att dela ut. De säkerhetstillägg som får läggas till manuellt i IPv4 ärstandard med det nya protokollet. Att implementera IPv6 kommer inte att gå på endag och de olika protokollen pratar inte med varandra så övergången kommer att bliett problem. En lösning för detta är Dual-stack som gör att en nod använder bådaprotokollen.Syftet med examensarbetet är att undersöka hur nåbarheten med IPv6 är på olika sidorsom påstår att de använder dual-stack. För att se om det blivit en förbättring kommerresultatet att jämföras med resultatet från undersökningen Empirical Performance ofIPv6 vs. IPv4 under a Dual-Stack Environment.Syftet har uppnåtts genom att teoretiskt ta lärdom om IPv6 protokollet. Efter dettagjort en undersökning som senare sammanställts, jämförts och presenterats i dettaarbete.Undersökningens resultat visar att IPv6 nätet har ökat de sedan den förraundersökningen. Det visar även att nåbarheten med IPv4 är ungefär på samma nivåsom vid undersökningen som jämförs med. Detta visar på att dual-stack används ochatt det tids nog kommer att gå över i ett renodlat IPv6 Internet.
|
Page generated in 0.0277 seconds