scholarly journals Demonstrating the Impact of 6to4 Tunneling on IPV4 and IPV6 Network Coexistence

Author(s):  
E. Osa ◽  
S. Konyeha ◽  
E. Evbuomwan

In this work the impact of the 6to4 tunnels is considered. In order for traffic to flow from an Internet Protocol version 4(IPv4) website to a native Internet Protocol version 6(IPv6) website, an additional configuration must be added to the network, as this cannot be done by default. The Riverbed Modeler Academic Version 17.5 is used to build and evaluate network efficiency with optimized 6to4 tunnels. The performance of the network is assessed based on the traffic received and sent by Internet Protocol (Version 6), Voice Called Traffic and the Sent and Received Traffic of the configured applications. The flow of traffic from servers to workstations in native IPv6 sites shows the effect of the tunnel configured.

2019 ◽  
Vol 9 (01) ◽  
pp. 47-54
Author(s):  
Rabbai San Arif ◽  
Yuli Fitrisia ◽  
Agus Urip Ari Wibowo

Voice over Internet Protocol (VoIP) is a telecommunications technology that is able to pass the communication service in Internet Protocol networks so as to allow communicating between users in an IP network. However VoIP technology still has weakness in the Quality of Service (QoS). VOPI weaknesses is affected by the selection of the physical servers used. In this research, VoIP is configured on Linux operating system with Asterisk as VoIP application server and integrated on a Raspberry Pi by using wired and wireless network as the transmission medium. Because of depletion of IPv4 capacity that can be used on the network, it needs to be applied to VoIP system using the IPv6 network protocol with supports devices. The test results by using a wired transmission medium that has obtained are the average delay is 117.851 ms, jitter is 5.796 ms, packet loss is 0.38%, throughput is 962.861 kbps, 8.33% of CPU usage and 59.33% of memory usage. The analysis shows that the wired transmission media is better than the wireless transmission media and wireless-wired.


Author(s):  
Chunyu Liu ◽  
Fengrui Mu ◽  
Weilong Zhang

Background: In recent era of technology, the traditional Ant Colony Algorithm (ACO) is insufficient in solving the problem of network congestion and load balance, and network utilization. Methods: This paper proposes an improved ant colony algorithm, which considers the price factor based on the theory of elasticity of demand. The price factor is denominated in the impact on the network load which means indirect control of network load, congestion or auxiliary solution to calculate the idle resources caused by the low network utilization and reduced profits. Results: Experimental results show that the improved algorithm can balance the overall network load, extend the life of path by nearly 3 hours, greatly reduce the risk of network paralysis, and increase the profit of the manufacturer by 300 million Yuan. Conclusion: Furthermore, results shows that the improved method has a great application value in improving the network efficiency, balancing network load, prolonging network life and increasing network operating profit.


2018 ◽  
Vol 150 ◽  
pp. 06005
Author(s):  
Athirah Rosli ◽  
Abidah Mat Taib ◽  
Wan Nor Ashiqin Wan Ali ◽  
Ros Syamsul Hamid

The deployment of Internet Protocol version 6 (IPv6) has raised security concerns among the network administrators. Thus, in strengthening the network security, administrator requires an appropriate method to assess the possible risks that occur in their networks. Aware of the needs to calculate risk in IPv6 network, it is essential to an organization to have an equation that is flexible and consider the requirements of the network. However, the existing risk assessment equations do not consider the requirement of the network. Therefore, this paper presents the adaptation of grounded theory to search for elements that are needed to develop IPv6 risk assessment (IRA6) equation. The attack scenarios’ experiments; UDP Flooding, TCP Flooding and Multicast attacks were carried out in different network environment to show how the IPv6 risk assessment equation being used. The result shows that the IRA6 equation is more flexible to be used regardless the network sizes and easier to calculate the risk value compared to the existing risk assessment equations. Hence, network administrators can have a proper decision making and strategic planning for a robust network security.


Author(s):  
Md. Anwar Hossain ◽  
Mst. Sharmin Akter

Routing is a design way to pass the data packet. User is assigns the path in a routing configuration. A significant role played by the router for providing the dynamic routing in the network. Structure and Configuration are different for each routing protocols. Next generation internet protocol IPv6 which provides large address space, simple header format. It is mainly effective and efficient routing. It is also ensure good quality of service and also provide security. Routing protocol (OSPFv3) in IPv6 network has been studied and implemented using ‘cisco packet tracer’. ‘Ping’ the ping command is used to check the results. The small virtual network created in Cisco platform .It is also used to test the OSPFv3 protocol in the IPv6 network. This paper also contains step by step configuration and explanation in assigning of IPv6 address in routers and end devices. The receiving and sending the packet of data in a network is the responsibility of the internet protocol layer. It also contains the data analysis of packet forwarding through IPv6 on OSPFv3 in simulation mode of cisco packet virtual environment to make the decision eventually secure and faster protocol in IPv6 environment.


Brain ◽  
2019 ◽  
Vol 143 (1) ◽  
pp. 150-160 ◽  
Author(s):  
Kim A Meijer ◽  
Martijn D Steenwijk ◽  
Linda Douw ◽  
Menno M Schoonheim ◽  
Jeroen J G Geurts

Abstract An efficient network such as the human brain features a combination of global integration of information, driven by long-range connections, and local processing involving short-range connections. Whether these connections are equally damaged in multiple sclerosis is unknown, as is their relevance for cognitive impairment and brain function. Therefore, we cross-sectionally investigated the association between damage to short- and long-range connections with structural network efficiency, the functional connectome and cognition. From the Amsterdam multiple sclerosis cohort, 133 patients (age = 54.2 ± 9.6) with long-standing multiple sclerosis and 48 healthy controls (age = 50.8 ± 7.0) with neuropsychological testing and MRI were included. Structural connectivity was estimated from diffusion tensor images using probabilistic tractography (MRtrix 3.0) between pairs of brain regions. Structural connections were divided into short- (length < quartile 1) and long-range (length > quartile 3) connections, based on the mean distribution of tract lengths in healthy controls. To determine the severity of damage within these connections, (i) fractional anisotropy as a measure for integrity; (ii) total number of fibres; and (iii) percentage of tract affected by lesions were computed for each connecting tract and averaged for short- and long-range connections separately. To investigate the impact of damage in these connections for structural network efficiency, global efficiency was computed. Additionally, resting-state functional connectivity was computed between each pair of brain regions, after artefact removal with FMRIB’s ICA-based X-noiseifier. The functional connectivity similarity index was computed by correlating individual functional connectivity matrices with an average healthy control connectivity matrix. Our results showed that the structural network had a reduced efficiency and integrity in multiple sclerosis relative to healthy controls (both P < 0.05). The long-range connections showed the largest reduction in fractional anisotropy (z = −1.03, P < 0.001) and total number of fibres (z = −0.44, P < 0.01), whereas in the short-range connections only fractional anisotropy was affected (z = −0.34, P = 0.03). Long-range connections also demonstrated a higher percentage of tract affected by lesions than short-range connections, independent of tract length (P < 0.001). Damage to long-range connections was more strongly related to structural network efficiency and cognition (fractional anisotropy: r = 0.329 and r = 0.447. number of fibres r = 0.321 and r = 0.278. and percentage of lesions: r = −0.219; r = −0.426, respectively) than damage to short-range connections. Only damage to long-distance connections correlated with a more abnormal functional network (fractional anisotropy: r = 0.226). Our findings indicate that long-range connections are more severely affected by multiple sclerosis-specific damage than short-range connections. Moreover compared to short-range connections, damage to long-range connections better explains network efficiency and cognition.


Author(s):  
Oladunni Abosede Daramola

Voice over Internet Protocol (VoIP) is a significant application of the converged network principle where the voice traffic is routed over Internet Protocol shared traffic networks. VoIP traffic was modelled over wireless network and a simulation of the traffic was transmitted over the network. E-model technique was used to analyze the traffic data and also to rate VoIP QoS parameters.  The result achieved was mapped to the Mean Opinion Scale to determine the Quality of Service of VoIP over wireless networks. The results shows that QoS in the VoIP communications is significantly impacted by these parameters and the impact varies according to the parameters and also the communication aspects selected for the VoIP traffic analysis.Keywords: VoIP, QoS, E-Model and Mean Opinion Scale  


2017 ◽  
Vol 254 (1-2) ◽  
pp. 277-302
Author(s):  
Mehrdokht Pournader ◽  
Andrew Kach ◽  
Seyed Hossein Razavi Hajiagha ◽  
Ali Emrouznejad

2021 ◽  
pp. 1-9
Author(s):  
Shubair Abdullah

IPv6 is the next Internet Protocol version designed to eventually replace IPv4 as the amount of potentially allocated IPv4 addresses is insufficient. The vulnerabilities of IPv6 protocols and the attacks against them demand more attention to be paid. The multicast mechanism is one of the crucial mechanisms that are related to the nature of IPv6 protocol. Despite its usefulness in performing basic tasks in IPv6 environments, the multicast mechanism is considered as a security hole that calls to be understood by the security specialists and IPv6 network administrators. To address the multicast security aspects, this paper presents the attacks that utilize the multicast vulnerability along with the identification of countermeasures for each attack. In particular, this paper analyzes the state-of-the-art attacks and ranks them based on a new severity ranking method to provide significant security guidance for deploying IPv6 networks.


Sign in / Sign up

Export Citation Format

Share Document