SlideShare ist ein Scribd-Unternehmen logo
1 von 24
An Innovative Simulation, Comparison Methodology & Framework for evaluating the Performance evaluation of a Novel IPv4 -IPv6 Transition Mechanisms : BD-SIIT vs DSTM. Dr.Manjaiah.D.H. Chairman  and Professor, Dept of CS, Mangalagangotri, Mangalore University, Mangalore-31739   Hanumanthappa.J.,  Aravinda.C.V. B.E., M.Tech.,(Ph.D) ,  M.Sc.,M.Phil.,M.Tech.,(Ph.D).,  Asst.Professor,DOS in CS,UOM,   Research Scholar, Manasagangotri,   Mangalagangotri, Mysore.   Mangalore University, Mangalore.
This paper clearly specifies comparative and behavior analysis carried out on the two major IPv6 interoperation mechanisms:  BD-SIIT  and  DSTM  for the high level compatibility smooth transition, and interoperation between IPv4 and IPv6.  This  paper proposes the  performance analysis of the difference between  the  BD-SIIT and DSTM. We  Implement  the  BD-SIIT and DSTM in order to Study their behavior using  various evaluation metrics such as Throughput,End-to-End delay(EED),RTT.   The Simulation results of  our experiment shows that  DSTM RTT,EED, and Throughput performance metrics are better  than BD-SIIT when we are using Large size IPv6 packet . ABSTRACT ICIIC2010,Aug-5,6,7.
[object Object],Contents ICIIC2010,Aug-5,6,7.
Definition of IP ,[object Object],ICIIC2010,Aug-5,6,7.
[object Object],[object Object],[object Object],[object Object],[object Object],ICIIC2010,Aug-5,6,7.
IPV6: Distinctive features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ICIIC2010,Aug-5,6,7.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ICIIC2010,Aug-5,6,7.
IPv6 Header Format Traffic Class Flow Label Vers Payload Length Next Header Hop Limit Source Address Destination Address 0 4 12 16 24 31
 
Related work . ,[object Object],ICIIC2010,Aug-5,6,7.
Fig.2.Translation of IPv6 to IPv4 Header .
BD-SIIT Translation process . ,[object Object],[object Object],[object Object],[object Object],ICIIC2010,Aug-5,6,7.
ICIIC2010,Aug-5,6,7. IPv4-mapped  -IPv6 Address . 0  79  80  95  ,[object Object],80- bits of zero FFFF(16 bits ) 32 bits (IPv4 address
Operations of BD-SIIT. ,[object Object],ICIIC2010,Aug-5,6,7. ,[object Object],IPv4  Address IPv6 Address Address mapping 195.18.23.17 ABC2::4321 1 210.154.76.91 ABC2:4321 2 IPv6 Address IPv4 Mapping Mapping_value ABC2::4321 195.18.231.17 1 CDEF::5672 223.18.231.17 2
DSTM ICIIC2010,Aug-5,6,7.
Performance evaluation metrics and Simulation parameters of BD-SIIT and DSTM. In this Paper we have calculated three performance evaluation metrics. 1.End to End delay 2.Throughput 3.Round trip time(RTT)  N rec 1.Mean End to End delay=  ∑  i=1  EEDi/Nrec where  EEDi =  Tdi- Tsi where EEDi is the end to end delay of ith packet. Tsi is the  Source packet i created and Tdi is the Destination packet which is created at Destination. Nrec is the total number of packets received at Dest host and Mean EED is the mean value of each communication session . ICIIC2010,Aug-5,6,7.
The mean throughput for a sequence of packets of specific size is calculated by using equations 1 and 2. MeanThr = Σ N  j =1  Thrj   /N  -------------(1) where  Thr=Packetsreceived(Pr)/Packets generated(Pg)*100%.--------------(2) Where  Thrj is the value of the throughput when the packet j is received at intermediate device like DSTM gateway,BD-SIIT Gateway,v4/v6 Router and N is the number of received packets at intermediate device,Pr is the no of packets received at intermediate device and Pg is the number of packets created by  source host. ICIIC2010,Aug-5,6,7.
ICIIC2010,Aug-5,6,7. Simulation Parameters Value 1.Buffer Size 500 Packets 2. Propogation Delay 10ms 3.payload size 200 Bytes 4.Very traffic Load 6~240 Nodes. 5.Queue Management Scheme Drop tail.
Conclusions . ICIIC2010,Aug-5,6,7.
References References   [1].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” A Study on IPv6 in IPv4 Static Tunneling threat issues in 4G Networks using OOAD Class and Instance Diagrams” ,Proceedings of the International  Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA, January 09-11,2010,[Paper code CSCIT-152][CSCITOP113].   [2].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” An IPv4-to-IPv6 threat reviews with dual stack transition mechanism considerations a transitional threat model in 4G Wireless networks ”Proceedings of the International Conference on Emerging Trends in Computer Science, Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA,January 09-11,2010,[Paper code CSCIT-157] [CSCITOP115].   [3].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” Implementation,Comparative and Performance Analysis of IPv6 over IPv4 QoS metrics in 4G Networks: Single-source-destination paths Delay, Packet Loss Performance and Tunnel Discovery Mechanisms", Proceedings  of the International  Conference on Information Science and Applications(ICISA-2010)organized by Dept. of Master of Computer Applications,Panimalar Engineering College,Chennai-600 123,Tamilnadu,India.,February-06-2010,[Paper code ICISA-293(with serial no-101)].   [4].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi ,”High Performance evaluation of Multimedia Video Streaming over IP networks” ,Proceedings of the National conference on Computing communications and Information systems(NCCCIS-2010)organized by Department of Information Technology Sri Krishna College of Engineering and Technology,Kuniamuthur,Coimbatore-641008,INDIA,February-12-13,2010,[Paper id NCCCIS-MM-03],pp-88-92.   ICIIC2010,Aug-5,6,7.
ICIIC2010,Aug-5,6,7.
ICIIC2010,Aug-5,6,7.
ICIIC2010,Aug-5,6,7. July 27-28 ICEMC2-2010,Kuppam,AP,INDIA. Any Questions ?
ICIIC2010,Aug-5,6,7. July 27-28 ICEMC2-2010,Kuppam,AP,INDIA.

Weitere ähnliche Inhalte

Was ist angesagt?

Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...IJCNCJournal
 
FINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCES
FINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCESFINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCES
FINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCESkevig
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE Engr. Md. Jamal Uddin Rayhan
 
Analysis of a hybrid cipher algorithm
Analysis of a hybrid cipher algorithmAnalysis of a hybrid cipher algorithm
Analysis of a hybrid cipher algorithmTharindu Weerasinghe
 
집합모델 확장불린모델
집합모델  확장불린모델집합모델  확장불린모델
집합모델 확장불린모델guesta34d441
 
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...Engr. Md. Jamal Uddin Rayhan
 
Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...
Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...
Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...Kaushik Panta
 
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...IJNSA Journal
 
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AEBank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AEEngr. Md. Jamal Uddin Rayhan
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionEngr. Md. Jamal Uddin Rayhan
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...IJMER
 
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...IJCSIS Research Publications
 
Bhadale group of companies ai neural networks and algorithms catalogue
Bhadale group of companies ai neural networks and algorithms catalogueBhadale group of companies ai neural networks and algorithms catalogue
Bhadale group of companies ai neural networks and algorithms catalogueVijayananda Mohire
 
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)Konstantinos Zagoris
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodIRJET Journal
 
Grouping of Hashtags using Co-relating the Occurrence in Microblogs
Grouping of Hashtags using Co-relating the Occurrence in MicroblogsGrouping of Hashtags using Co-relating the Occurrence in Microblogs
Grouping of Hashtags using Co-relating the Occurrence in Microblogsrahulmonikasharma
 

Was ist angesagt? (17)

Shilpa ppt
Shilpa pptShilpa ppt
Shilpa ppt
 
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and C...
 
FINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCES
FINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCESFINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCES
FINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCES
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
 
Analysis of a hybrid cipher algorithm
Analysis of a hybrid cipher algorithmAnalysis of a hybrid cipher algorithm
Analysis of a hybrid cipher algorithm
 
집합모델 확장불린모델
집합모델  확장불린모델집합모델  확장불린모델
집합모델 확장불린모델
 
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
 
Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...
Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...
Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...
 
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
 
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AEBank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
 
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
A Stream Authentication Method over Lossy Networks using Optimized Butterfly ...
 
Bhadale group of companies ai neural networks and algorithms catalogue
Bhadale group of companies ai neural networks and algorithms catalogueBhadale group of companies ai neural networks and algorithms catalogue
Bhadale group of companies ai neural networks and algorithms catalogue
 
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
 
Grouping of Hashtags using Co-relating the Occurrence in Microblogs
Grouping of Hashtags using Co-relating the Occurrence in MicroblogsGrouping of Hashtags using Co-relating the Occurrence in Microblogs
Grouping of Hashtags using Co-relating the Occurrence in Microblogs
 

Andere mochten auch

Icemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmIcemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmhanums1
 
Kkbnet 2010-a compa
Kkbnet 2010-a  compaKkbnet 2010-a  compa
Kkbnet 2010-a compahanums1
 
Kkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithmsKkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithmshanums1
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6RIPE NCC
 

Andere mochten auch (7)

Icemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmIcemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstm
 
IPv4 vs IPv6
IPv4 vs IPv6IPv4 vs IPv6
IPv4 vs IPv6
 
Kkbnet 2010-a compa
Kkbnet 2010-a  compaKkbnet 2010-a  compa
Kkbnet 2010-a compa
 
Kkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithmsKkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithms
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 

Ähnlich wie Iciic 2010 114

Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2hanums1
 
Icemc22010 ppt 29
Icemc22010 ppt 29Icemc22010 ppt 29
Icemc22010 ppt 29hanums1
 
Icemc2 kuppam
Icemc2 kuppamIcemc2 kuppam
Icemc2 kuppamhanums1
 
Iccci10 bd siit
Iccci10 bd siitIccci10 bd siit
Iccci10 bd siithanums1
 
Major Report on ADIAN
Major Report on ADIANMajor Report on ADIAN
Major Report on ADIANsmittal121
 
Protocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationProtocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationAlexander Decker
 
Respond 3 of your colleagues postings in one or more of the fol.docx
 Respond  3 of your colleagues postings in one or more of the fol.docx Respond  3 of your colleagues postings in one or more of the fol.docx
Respond 3 of your colleagues postings in one or more of the fol.docxaryan532920
 
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
Procedia Computer Science   46  ( 2015 )  1072 – 1078 187.docxProcedia Computer Science   46  ( 2015 )  1072 – 1078 187.docx
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docxAASTHA76
 
Iccci2010 fipv6
Iccci2010 fipv6Iccci2010 fipv6
Iccci2010 fipv6hanums1
 
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSREVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSIJNSA Journal
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE IJERA Editor
 
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a Network
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a NetworkAnalysis of RIP, EIGRP, and OSPF Routing Protocols in a Network
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a Networkijtsrd
 
Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things IJECEIAES
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsIJECEIAES
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Performance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition TechniquesPerformance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition TechniquesAndy Juan Sarango Veliz
 
Algorithms,graph theory and combinatorics
Algorithms,graph theory and combinatoricsAlgorithms,graph theory and combinatorics
Algorithms,graph theory and combinatoricsProf.Dr.Hanumanthappa J
 
IPv6 Implementation challenges
IPv6 Implementation challengesIPv6 Implementation challenges
IPv6 Implementation challengesFarwa Ansari
 

Ähnlich wie Iciic 2010 114 (20)

Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
 
Icemc22010 ppt 29
Icemc22010 ppt 29Icemc22010 ppt 29
Icemc22010 ppt 29
 
Icemc2 kuppam
Icemc2 kuppamIcemc2 kuppam
Icemc2 kuppam
 
Iccci10 bd siit
Iccci10 bd siitIccci10 bd siit
Iccci10 bd siit
 
M017147275
M017147275M017147275
M017147275
 
Major Report on ADIAN
Major Report on ADIANMajor Report on ADIAN
Major Report on ADIAN
 
Protocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationProtocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulation
 
Respond 3 of your colleagues postings in one or more of the fol.docx
 Respond  3 of your colleagues postings in one or more of the fol.docx Respond  3 of your colleagues postings in one or more of the fol.docx
Respond 3 of your colleagues postings in one or more of the fol.docx
 
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
Procedia Computer Science   46  ( 2015 )  1072 – 1078 187.docxProcedia Computer Science   46  ( 2015 )  1072 – 1078 187.docx
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
 
Iccci2010 fipv6
Iccci2010 fipv6Iccci2010 fipv6
Iccci2010 fipv6
 
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSREVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
 
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a Network
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a NetworkAnalysis of RIP, EIGRP, and OSPF Routing Protocols in a Network
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a Network
 
Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Performance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition TechniquesPerformance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition Techniques
 
Algorithms,graph theory and combinatorics
Algorithms,graph theory and combinatoricsAlgorithms,graph theory and combinatorics
Algorithms,graph theory and combinatorics
 
IPv6 Implementation challenges
IPv6 Implementation challengesIPv6 Implementation challenges
IPv6 Implementation challenges
 

Mehr von hanums1

Iccsit 2010 rljit
Iccsit 2010 rljitIccsit 2010 rljit
Iccsit 2010 rljithanums1
 
Iccsit 2010 p_1
Iccsit 2010 p_1Iccsit 2010 p_1
Iccsit 2010 p_1hanums1
 
Iccsit 2010 paper1
Iccsit 2010 paper1Iccsit 2010 paper1
Iccsit 2010 paper1hanums1
 
Iccsit2010 p 1-dummy
Iccsit2010 p 1-dummyIccsit2010 p 1-dummy
Iccsit2010 p 1-dummyhanums1
 
Iccsit2010 p 1
Iccsit2010 p 1Iccsit2010 p 1
Iccsit2010 p 1hanums1
 
Iccci2010
Iccci2010 Iccci2010
Iccci2010 hanums1
 
Iccci2010
Iccci2010Iccci2010
Iccci2010hanums1
 
Iccana 2011 jan8th
Iccana 2011 jan8thIccana 2011 jan8th
Iccana 2011 jan8thhanums1
 
Iccana 2011
Iccana 2011Iccana 2011
Iccana 2011hanums1
 

Mehr von hanums1 (9)

Iccsit 2010 rljit
Iccsit 2010 rljitIccsit 2010 rljit
Iccsit 2010 rljit
 
Iccsit 2010 p_1
Iccsit 2010 p_1Iccsit 2010 p_1
Iccsit 2010 p_1
 
Iccsit 2010 paper1
Iccsit 2010 paper1Iccsit 2010 paper1
Iccsit 2010 paper1
 
Iccsit2010 p 1-dummy
Iccsit2010 p 1-dummyIccsit2010 p 1-dummy
Iccsit2010 p 1-dummy
 
Iccsit2010 p 1
Iccsit2010 p 1Iccsit2010 p 1
Iccsit2010 p 1
 
Iccci2010
Iccci2010 Iccci2010
Iccci2010
 
Iccci2010
Iccci2010Iccci2010
Iccci2010
 
Iccana 2011 jan8th
Iccana 2011 jan8thIccana 2011 jan8th
Iccana 2011 jan8th
 
Iccana 2011
Iccana 2011Iccana 2011
Iccana 2011
 

Kürzlich hochgeladen

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 

Kürzlich hochgeladen (20)

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

Iciic 2010 114

  • 1. An Innovative Simulation, Comparison Methodology & Framework for evaluating the Performance evaluation of a Novel IPv4 -IPv6 Transition Mechanisms : BD-SIIT vs DSTM. Dr.Manjaiah.D.H. Chairman and Professor, Dept of CS, Mangalagangotri, Mangalore University, Mangalore-31739 Hanumanthappa.J., Aravinda.C.V. B.E., M.Tech.,(Ph.D) , M.Sc.,M.Phil.,M.Tech.,(Ph.D)., Asst.Professor,DOS in CS,UOM, Research Scholar, Manasagangotri, Mangalagangotri, Mysore. Mangalore University, Mangalore.
  • 2. This paper clearly specifies comparative and behavior analysis carried out on the two major IPv6 interoperation mechanisms: BD-SIIT and DSTM for the high level compatibility smooth transition, and interoperation between IPv4 and IPv6. This paper proposes the performance analysis of the difference between the BD-SIIT and DSTM. We Implement the BD-SIIT and DSTM in order to Study their behavior using various evaluation metrics such as Throughput,End-to-End delay(EED),RTT. The Simulation results of our experiment shows that DSTM RTT,EED, and Throughput performance metrics are better than BD-SIIT when we are using Large size IPv6 packet . ABSTRACT ICIIC2010,Aug-5,6,7.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. IPv6 Header Format Traffic Class Flow Label Vers Payload Length Next Header Hop Limit Source Address Destination Address 0 4 12 16 24 31
  • 9.  
  • 10.
  • 11. Fig.2.Translation of IPv6 to IPv4 Header .
  • 12.
  • 13.
  • 14.
  • 16. Performance evaluation metrics and Simulation parameters of BD-SIIT and DSTM. In this Paper we have calculated three performance evaluation metrics. 1.End to End delay 2.Throughput 3.Round trip time(RTT) N rec 1.Mean End to End delay= ∑ i=1 EEDi/Nrec where EEDi = Tdi- Tsi where EEDi is the end to end delay of ith packet. Tsi is the Source packet i created and Tdi is the Destination packet which is created at Destination. Nrec is the total number of packets received at Dest host and Mean EED is the mean value of each communication session . ICIIC2010,Aug-5,6,7.
  • 17. The mean throughput for a sequence of packets of specific size is calculated by using equations 1 and 2. MeanThr = Σ N j =1 Thrj /N -------------(1) where Thr=Packetsreceived(Pr)/Packets generated(Pg)*100%.--------------(2) Where Thrj is the value of the throughput when the packet j is received at intermediate device like DSTM gateway,BD-SIIT Gateway,v4/v6 Router and N is the number of received packets at intermediate device,Pr is the no of packets received at intermediate device and Pg is the number of packets created by source host. ICIIC2010,Aug-5,6,7.
  • 18. ICIIC2010,Aug-5,6,7. Simulation Parameters Value 1.Buffer Size 500 Packets 2. Propogation Delay 10ms 3.payload size 200 Bytes 4.Very traffic Load 6~240 Nodes. 5.Queue Management Scheme Drop tail.
  • 20. References References [1].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” A Study on IPv6 in IPv4 Static Tunneling threat issues in 4G Networks using OOAD Class and Instance Diagrams” ,Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA, January 09-11,2010,[Paper code CSCIT-152][CSCITOP113].   [2].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” An IPv4-to-IPv6 threat reviews with dual stack transition mechanism considerations a transitional threat model in 4G Wireless networks ”Proceedings of the International Conference on Emerging Trends in Computer Science, Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA,January 09-11,2010,[Paper code CSCIT-157] [CSCITOP115].   [3].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” Implementation,Comparative and Performance Analysis of IPv6 over IPv4 QoS metrics in 4G Networks: Single-source-destination paths Delay, Packet Loss Performance and Tunnel Discovery Mechanisms", Proceedings of the International Conference on Information Science and Applications(ICISA-2010)organized by Dept. of Master of Computer Applications,Panimalar Engineering College,Chennai-600 123,Tamilnadu,India.,February-06-2010,[Paper code ICISA-293(with serial no-101)].   [4].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi ,”High Performance evaluation of Multimedia Video Streaming over IP networks” ,Proceedings of the National conference on Computing communications and Information systems(NCCCIS-2010)organized by Department of Information Technology Sri Krishna College of Engineering and Technology,Kuniamuthur,Coimbatore-641008,INDIA,February-12-13,2010,[Paper id NCCCIS-MM-03],pp-88-92.   ICIIC2010,Aug-5,6,7.
  • 23. ICIIC2010,Aug-5,6,7. July 27-28 ICEMC2-2010,Kuppam,AP,INDIA. Any Questions ?
  • 24. ICIIC2010,Aug-5,6,7. July 27-28 ICEMC2-2010,Kuppam,AP,INDIA.