The hidden standards war: economic factors affecting IPv6 deployment

2020 ◽  
Vol 22 (4) ◽  
pp. 333-361
Author(s):  
Brenden Kuerbis ◽  
Milton Mueller

Purpose The data communications protocol supporting the internet protocol version 4 (IPv4) is almost 40 years old, and its 32-bit address space is too small for the internet. A “next-generation” internet protocol version 6 (IPv6), has a much larger, 128-bit address space. However, IPv6 is not backward compatible with the existing internet. For 20 years, the internet technical community has attempted to migrate the entire internet to the new standard. This study aims to address important but overlooked questions about the internet’s technical evolution: will the world converge on IPv6? Will IPv6 die out? or will we live in a mixed world for the foreseeable future? Design/methodology/approach The research offers an economically-grounded study of IPv6’s progress and prospects. Many promoters of IPv6 sincerely believe that the new standard must succeed if the internet is to grow, and assume that the transition is inevitable because of the presumed depletion of the IPv4 address resources. However, by examining the associated network effects, developing the economic parameters for transition, and modeling the underlying economic forces, which impact network operator decisions, the study paints a more complex, nuanced picture. Findings The report concludes that legacy IPv4 will coexist with IPv6 indefinitely. IPv6 is unlikely to become an orphan. For some network operators that need to grow, particularly mobile networks where the software and hardware ecosystem is mostly converted, IPv6 deployment can make economic sense. However, the lack of backward compatibility with non-deployers eliminates many network effects that would create pressure to convert to IPv6. A variety of conversion technologies, and more efficient use of IPv4 addresses using network address translation, will support a “mixed world” of the two standards for the foreseeable future. Originality/value The authors’ conceptualization and observations provide a clearer understanding of the economic factors affecting the transition to IPv6.

Author(s):  
Md. Anwar Hossain ◽  
Mst. Sharmin Akter

Routing is a design way to pass the data packet. User is assigns the path in a routing configuration. A significant role played by the router for providing the dynamic routing in the network. Structure and Configuration are different for each routing protocols. Next generation internet protocol IPv6 which provides large address space, simple header format. It is mainly effective and efficient routing. It is also ensure good quality of service and also provide security. Routing protocol (OSPFv3) in IPv6 network has been studied and implemented using ‘cisco packet tracer’. ‘Ping’ the ping command is used to check the results. The small virtual network created in Cisco platform .It is also used to test the OSPFv3 protocol in the IPv6 network. This paper also contains step by step configuration and explanation in assigning of IPv6 address in routers and end devices. The receiving and sending the packet of data in a network is the responsibility of the internet protocol layer. It also contains the data analysis of packet forwarding through IPv6 on OSPFv3 in simulation mode of cisco packet virtual environment to make the decision eventually secure and faster protocol in IPv6 environment.


Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1510 ◽  
Author(s):  
Prakash Veeraraghavan ◽  
Dalal Hanna ◽  
Eric Pardede

The Internet Protocol (IP) version 4 (IPv4) has several known vulnerabilities. One of the important vulnerabilities is that the protocol does not validate the correctness of the source address carried in an IP packet. Users with malicious intentions may take advantage of this vulnerability and launch various attacks against a target host or a network. These attacks are popularly known as IP Address Spoofing attacks. One of the classical IP-spoofing attacks that cost several million dollars worldwide is the DNS-amplification attack. Currently, the availability of solutions is limited, proprietary, expensive, and requires expertise. The Internet is subjected to several other forms of amplification attacks happening every day. Even though IP-Spoofing is one of the well-researched areas since 2005, there is no holistic solution available to solve this problem from the gross-root. Also, every solution assumes that the attackers are always from outside networks. In this paper, we provide an efficient and scalable solution to solve the IP-Spoofing problem that arises from malicious or compromised inside hosts. We use a modified form of Network Address Translation (NAT) to build our solution framework. We call our framework as NAT++. The proposed infrastructure is robust, crypto-free, and easy to implement. Our simulation results have shown that the proposed NAT++ infrastructure does not consume more than the resources required by a simple NAT.


2016 ◽  
Vol 34 (2) ◽  
pp. 332-351 ◽  
Author(s):  
Rahma Al-Kharousi ◽  
Naeema H Jabur ◽  
Abdelmajed Bouazza ◽  
Nabhan Al-Harrasi

Purpose – The purpose of this paper is to investigate the different factors that affect using Web 2.0 applications in Omani academic libraries (OALs). Design/methodology/approach – In all, 29 interviews with directors and library staff of five OALs were conducted for the purpose of collecting data for the current research. Findings – The results indicated that there are nine internal factors and four external factors that affect using Web 2.0 applications in OALs. Internal factors include the low motivation of directors and library staff regarding using of Web 2.0 applications, lack of training and constant changes in the management structure. Meanwhile, the external factors are related to lack of policy and regulations and weakness and low speed of the internet. Practical implications – Most academic libraries in Oman have not yet adopted Web 2.0 applications to enhance their services. Therefore, this study intends to open insight into the state of Web 2.0 adoption in academic libraries and will help library managers to understand factors facing the use of Web 2.0 applications in their libraries, and this could signal a basis for policy shift in the internet infrastructure especially in the institutions of the higher education. Originality/value – This research is the first study in the field of Web 2.0 applications in OALs that investigates the factors affecting the use of Web 2.0 applications in academic libraries in general and in OALs specifically.


2020 ◽  
Vol 13 (4) ◽  
pp. 42
Author(s):  
Austin Liu

The information transfer protocol that supports the modern Internet with its hundreds of thousands of petabytes per month to billions of Internet users across the world was designed in 1981, and it lacks the capacity to properly ensure the security and stability of the Internet today. Features such as the prevention of network attacks, a large address space for the increasing number of devices, verification of the source of an Internet request, and so on are all absent from the current architecture. This paper seeks to review, summarize, and compare six proposals submitted to address the issues IP faces: the Accountable Internet Protocol, the Expressive Internet Architecture, MobilityFirst, Passport, StopIt, and the Traffic Validation Architecture. Finally, the paper details a protocol design that not only is feasible to adopt with the present infrastructure/computing power but also addresses some of the pressing issues of IP, with particular focus on the address space, mitigation of network attacks, and source verification.


Author(s):  
Paramesh C. Upadhyay ◽  
Sudarshan Tiwari

Mobility is a natural phenomenon in cellular networks. The worldwide popularity of mobile communications and Internet has necessitated the merger of the two fast growing technologies to get their fullest advantages. The Internet protocol (IP) was designed for static hosts only. Therefore, in order to add mobility in Internet, the Internet protocol needs to be redefined. This paper is intended to present an overview of various mobility management schemes, available in literature, for IP-based mobile networks.


2016 ◽  
Vol 118 (3) ◽  
pp. 572-587 ◽  
Author(s):  
Filipe Quevedo-Silva ◽  
Otavio Freire ◽  
Dario de Oliveira Lima-Filho ◽  
Marcelo Moll Brandão ◽  
Giuliana Isabella ◽  
...  

Purpose – The purpose of this paper is to assess the factors affecting intentions to purchase food through the internet. Based on the available literature – more specifically, on Ajzen’s (1985) theory of planned behaviour and Grunert and Ramus’ model (2004) – this study proposes and tests a model of planned food purchases via the internet. Design/methodology/approach – A quantitative study was conducted among 403 respondents. Data were analyzed using structural equation modelling. Findings – The main results demonstrated that attitude and perceived difficulty are the antecedents of purchase intentions. Perceived risk had a negative relationship with attitude. With respect to lifestyle, novelty was positively related to attitude, and freshness was negatively related. In addition, novelty had only an indirect effect on intention, which was mediated by attitude. A wired lifestyle had a positive relationship with attitude, and a negative relationship with perceived difficulty. Originality/value – This study operationalizes and improves Grunert and Ramus’ (2004) model of intention to buy food over the internet, by developing, testing and presenting a more comprehensive model.


2019 ◽  
Vol 11 (1) ◽  
pp. 60-72 ◽  
Author(s):  
Andi Duqi ◽  
Hussein Al-Tamimi

Purpose The purpose of this study is to examine the perception of UAE investors regarding their investment preference of Sukuk versus conventional bonds. Design/methodology/approach A modified questionnaire was used in this study with the objective of answering the research questions and testing the developed hypothesis. The survey was conducted on a sample of investors of the UAE Dubai Financial Market, which is one of the main exchanges where Sukuk are traded. Findings The results indicate that Sukuk features (characteristics) represent the most important influencing factor in the willingness of UAE investors to invest in Islamic Sukuk, followed by the religious factor, as strongly predicted, followed by the expected return and followed by the availability of information. Finally, the results indicate that there is no significant difference in investment in Sukuk among UAE investors based on investors’ gender. Originality/value The current study is considered the first of its kind conducted on the UAE. As far as the authors know, there are no studies that focus specifically on social and economic factors that affect the propensity of investors to trade in Sukuk.


2019 ◽  
Vol 10 (2) ◽  
pp. 83-96 ◽  
Author(s):  
Junaid Latief Shah ◽  
Heena Farooq Bhat ◽  
Asif Iqbal Khan

The Internet, since its genesis in 1970's, has already become a global broadcasting potential for information dissemination and a channel for information collaboration and an interface between disparate users and their systems, separated by large geographical locations. The rate of growth of interconnected devices has been on exponential scale from the last decade. As of now, more than 5 billion devices are accessing the Internet. The Internet Protocol Version 4 (IPv4) which is a three decade old standard internetworking protocol using 32-bit address, fails to cater such a large number of hosts. In February 2011, the Internet Assigned Numbers Authority (IANA), the nodal agency for IP address allocation exhausted the central pool of IPv4 addresses completely. This rapid depletion of IP addresses was inevitable as a large number of devices are getting connected to internet. Also, inefficient utilization and remiss planning of IP address space acted as catalyst in the process of depletion. NAT, CIDR and Subnetting only serve as short interim solutions provided by IPv4. Moreover, IPv4 fails to scale up and bridge the security enhancements required by the modern Internet today. The only feasible option lies in unabridged transition to IPv6. Internet Protocol Version 6 (IPv6) provides an address space of 2128 i.e. trillions of addresses, making the IP address space potentially inexhaustible. Thus, adopting IPv6 makes a paragon choice of replacement for IPv4. This article reviews the next generation internet protocol IPv6 and explicates the discussion over the need for migrating to IPv6. The article also presents technical as well as non-technical challenges related to migration and presents overall statistics regarding IPv6 adoption around the world.


2019 ◽  
Vol 14 (3) ◽  
pp. 274-291 ◽  
Author(s):  
Petros Lois ◽  
George Drogalas ◽  
Alkiviadis Karagiorgos ◽  
Aikaterini Chlorou

Purpose Governments count on tax revenues in order to finance their fiscal and social activities. The purpose of this paper is to analyse the citizens’ conception of tax compliance and examine the factors affecting tax behaviour. Design/methodology/approach This survey was conducted through a stratified sample and questionnaires consisted of closed-ended questions. A linear regression and a series of reliability tests including an analysis of variance were conducted with IBM Statistical Package for Social Sciences. Findings The majority of the respondents demonstrate a positive perspective towards tax compliance and tax administration employees that inspire it. However, while the fairness of the tax system is evident, findings indicate a deeper issue of social and behavioural influences, including the characteristics of tax administrative employees and tax morality. Research limitations/implications The findings are subject to over- or sub-representation, since the sample derived from groups whose occupations feature strong tax compliance. The study was conducted in Greece, and it is possible that the results can be generalised to developing countries with similar economic environments and fiscal circumstances. Practical implications Non-economic factors affect tax behaviour and the formation of modern tax strategies. This survey enables governments to improve tax compliance rates and increase tax revenues. Fiscal depression tends to decrease state revenues. Tax compliance factors should be taken into account through tax decision-making processes and ensure efficient tax collection. Originality/value This paper furthers the existent literature and deepens in non-economic factors of morality, revealing tax behaviours instigated by reasons beyond tax unfairness.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Khadija Ali Vakeel ◽  
Edward C. Malthouse ◽  
Aimei Yang

PurposeDigital business platforms (DBPs) such as Alibaba and Google Shopping are partnership networks that use the Internet to bring service providers (e.g. retail vendors) and customers together. One of the benefits of DBPs is network effects, in which customers can purchase from multiple providers, giving rise to a unique network. However, few studies have explored which service providers benefit from network effects and which do not.Design/methodology/approachUsing the theories of transaction costs and network analysis, the authors apply network models to DBPs to understand which service providers benefit from network effects.FindingsThe authors identify three segments of service providers: (1) those with high prominence (connection to providers with high network centrality), (2) those with high network constraint (adjacent to isolated providers) and (3) those with low prominence and constraint. The authors find that segments (1) and (3) benefit from reciprocated customer exchanges, and thus benefit from network effects, while high constraint segment (2) providers do not benefit from reciprocated exchanges. Moreover, the authors find that for segments (2) and (3) future sales have a negative association with unreciprocated customer exchanges, while segment (1) has no significant association between unreciprocated exchanges and future sales.Research limitations/implicationsThe authors discuss implications for a multisided platform (MSP), as it decides which service providers to attract, promote and recommend. They can use this study’s results to know which segments of providers will increase network effects to make the platform more valuable.Practical implicationsThis paper provides managers of service platforms with strategies for managing relations with their service providers.Social implicationsService platforms are an important and disruptive business model. The authors need to understand how network effects operate to create efficient platforms.Originality/valueThis paper extends the literature on MSPs by quantifying network effects and showing not all service providers benefit equally on an MSP from network effects. Critical insights into network effects on the MSP are provided, including different ways it can impact provider sales.


Sign in / Sign up

Export Citation Format

Share Document