SlideShare a Scribd company logo
1 of 27
Dr.Manjaiah.D.H. Chairman  and Professor, Dept of CS, Mangalagangotri, Mangalore University, Mangalore-31739   Hanumanthappa.J.,  Aravinda.C.V. B.E., Match.,(Ph.D) ,  M.Sc.,M.Phil.,M.Tech.,(Ph.D).,  Asst.Professor,DOS in CS,UOM,   Research Scholar, Manasagangotri,   Mangalagangotri, Mysore.   Mangalore University, Mangalore.
ABSTRACT
Contents
[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPv6 Header Format Traffic Class Flow Label Vers Payload Length Next Header Hop Limit Source Address Destination Address 0 4 12 16 24 31
 
[object Object]
Fig.2.Translation of IPv6 to IPv4 Header .
[object Object],[object Object],[object Object],[object Object]
ICIIC2010,Aug-5,6,7. BD-SIIT Data Packet Transmission Process Fig.3.BD-SIIT Data packet Transmission Process .
IPv4-mapped  -IPv6 Address . 0  79  80  95  ,[object Object],80- bits of zero FFFF(16 bits ) 32 bits (IPv4 address
[object Object],[object Object],IPv4  Address IPv6 Address Address mapping 195.18.23.17 ABC2::4321 1 210.154.76.91 ABC2:4321 2 IPv6 Address IPv4 Mapping Mapping_value ABC2::4321 195.18.231.17 1 CDEF::5672 223.18.231.17 2
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ICIIC2010,Aug-5,6,7. Comparison and Contrast between BD-SIIT and DSTM Transition Mechanism. BD-SIIT DSTM 1.It does not for tunneling technique . 1. A tunneling technique needs to be configured.   2. Two IPv4 and IPv6 addresses are assumed to be globally unique. 2.Only IPv4 addresses are assumed to be globally unique . 3.It Uses two types of global IP addresses that are assigned by DNS46 server for each communication system. 3. Uses only a pool of IPv4 addresses in order to assign Global IPv4 address for each communication system. 4.Applicable for Bi-Directional commn between IPv6 only nodes and IPv4 nodes. 4.Not applicable to IPv6 only nodes that want to communicate with IPv4 only node. 5.Less cost 5.High Cost 6.Does not require upgrading or extra software to be used at end user nodes. 6.Requires modifications  or extra software to support the dual stack on the end user nodes.  7.Transition from IPv4 to IPv6 and Vice versa is needed. 7.Encapsulation and Decapsulation methods are needed.
In this Paper we have calculated three performance evaluation metrics . 1.End to End delay 2. Throughput 3.Round trip time(RTT)  N rec 1.Mean End to End delay= ∑EEDi/Nrec i=1 EEDi =Tdi-Tsi where EEDi is the end to end delay of ith packet. Tsi is the  Source packet i created and Tdi is the Destination packet which is created at Destination . Nrec is the total number of packets received at Dest host and Mean EED is the mean value of each communication session .
The mean throughput for a sequence of packets of specific size is calculated by using equations 1 and 2. MeanThr = ∑ N   Thrj   /N  -------------(1) j=1  where  Thr=Packets received(Pr)/Packets generated(Pg)*100%.--------------(2) Thrj is the value of the throughput when the packet j is received at intermediate device like DSTM gateway,BD-SIIT Gateway,v4/v6 Router and N is the number of received packets at intermediate device,Pr is the no of packets received at intermediate device and Pg is the number of packets created by  source host .
ICIIC2010,Aug-5,6,7. Simulation Parameters Value 1.Buffer Size 500 Packets 2. Propogation Delay 10ms 3.Payload size 200 Bytes 4.Very traffic Load 6~240 Nodes. 5.Queue  Management  Scheme Drop tail.
References   [1].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” A Study on IPv6 in IPv4 Static Tunneling threat issues in 4G Networks using OOAD Class and Instance Diagrams“, Proceedings  of the International  Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA, January 09-11,2010,[Paper code CSCIT-152][CSCITOP113].   [2].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” An IPv4-to-IPv6 threat reviews with dual stack transition mechanism considerations a transitional threat model in 4G Wireless networks ”Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA,January 09-11,2010,[Paper code CSCIT-157] [CSCITOP115].   [3].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” Implementation,Comparative and Performance Analysis of IPv6 over IPv4 QoS metrics in 4G Networks: Single-source-destination paths Delay, Packet Loss Performance and Tunnel Discovery Mechanisms“,Proceedings  of the International  Conference on Information Science and Applications(ICISA-2010)organized by Dept. of Master of Computer Applications,Panimalar Engineering College,Chennai-600 123,Tamilnadu,India.,February-06-2010,[Paper code ICISA-293(with serial no-101)].   [4].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi ,”High Performance evaluation of Multimedia Video Streaming over IP networks” ,Proceedings of the National conference on Computing communications and Information systems(NCCCIS-2010)organized by Department of Information Technology Sri Krishna College of Engineering and Technology,Kuniamuthur,Coimbatore-641008,INDIA,February-12-13,2010,[Paper id NCCCIS-MM-03],pp-88-92 .  
ICIIC2010,Aug-5,6,7. [5].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” IPv6 Tunneling Algorithms in 4G Networks ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th  and  9 th   2010.    [6].Sridevi.,Hanumanthappa.J.,Manjaiah.D.H,” A Novel IPv4/IPv6 Transition scenarios in 4G Networks ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th  and  9 th  2010.   [7].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” A  Comparison of Performance evaluation metrics and Simulation parameters ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th  and  9 th  2010. [8].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K .,“Comparison and Contrast between Bellman ford and Dijkstra’s algorithms” ,Proc.of. the National Conference on Wireless Networks-09(NCOWN-2010),organized by RLJIT,Kodigehalli,Doddaballapur,Kerala,INDIA,February   ,2010,[Paper code  05].    [9].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi,” Emerging technologies for the 4G Wireless communications ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th  and  9 th  2010.   [10].Hanumanthappa.J.,Manjaiah.D.H .,”IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model: A Case Study for University of Mysore Network”, International Journal of Computer Science and Information(IJCSIS)Vol.3.,No.1,July-2009,ISSN 1947-5500,Paper ID: 12060915]
[11].Hanumanthappa.J.,Manjaiah.D.H .,”Transition of IPv4 Network Applications to IPv6 Applications”[TIPv4 to TIPv6], Proceedings of IEEE International Conference on emerging trends in computing(ICETiC-2009),Virudhunagar,Tamilnadu 8-10,January 2009,INDIA.[Paper ID 234].    [12].Hanumanthappa.J.,Manjaiah.D.H.,Thippeswamy.K .“IPv6 over Bluetooth: Security Aspects, Issues and its Challenges”, Proceedings of National  Conference on,Wireless Communications and Technologies(NCWCT-09)-Theme :Mobile and Pervasive Computing , Nitte,Karnataka,Udupi Dist, Karnataka ,INDIA,February-5-6  , 2009,[ Paper id -104]    [13].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D .“Economical and Technical costs for the Transition of IPv4–to-IPv6 Mechanisms[ETCTIPv4 to ETCTIPv6]” ,Proceedings of National  Conference on Wireless Communications and Technologies(NCWCT-09)-Theme:Mobile and Pervasive Computing , Nitte   ,Karnataka,Udupi Dist,Karnataka,INDIA,February-5-6  , 2009,[ Paper id -103]    [14].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D .”Implementation of Codec Driver for network embedded  devices ”, Proceedings of the ” IEEE International Advance Computing Conference IACC-2009 on March 6- 8[Paper ID IEEE-ALGO-0205]at patiala. [15].Hanumanthappa.J.,Tippeswamy.K.,Manjaiah.D.H ., “ SOA Approach for information retrieval using web Services” [SOAAFIRUWS ],Proceedings of  IEEE International Conference on   the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-DATA-2065].   [16].Hanumanthappa.J.,Manjaiah.D.H ., Tippeswamy.K.“ An Overview of Study on Smooth Porting Process  Scenario during IPv6 Transition”[TIPv6] ,Proceedings of  IEEE International Conference on   the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-APPL-1278].  [17].Hanumanthappa.J.,Manjaiah.D.H ., Tippeswamy.K .“Generic Query information retrieval System for web 2.0” ,Proceedings of the Seventh International Convention on Automation of libraries in education and Research(CALIBER-2009) organized by Inflibnet centre on February 25-27,2009 at Pondicherry university(A central University),R.Venkat Raman Nagar,Kalapet,Pondicherry-605014,India.[Paper ID C-13].   [18].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K.“ IPv6 over IPv4 QoS metrics in 4G Networks:Delay, Jitter,Packet Loss Performance,Throughput and Tunnel Discovery Mechanisms”, Proceedings of the National Conference on Wireless Networks-09(NCOWN-2009) organized by RLJIT,Kodigehalli,Doddaballapur,Karnataka, INDIA,November 21-22 nd  ,2009,[Paper code NCOWN-19 .
[19].Hanumanthappa.J.,Manjaiah.D.H.,“ A Study on Comparison and Contrast  between IPv6  and  IPv4 Feature Sets”  Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28 th ,2008,[Paper code  CP 15].  [20].Hanumanthappa.J.,Balachandra.C ,“Soft one to One Gateway Protocol”, Proceedings  of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28 th ,2008,[Paper code CP 27]. [21].Hanumanthappa.J.,Thippeswamy.K .“Generic Query Retrieval System”[GQRS]”, Proceedings of National  Conference on,Recent Trends in Engineering and Technology(RTIET-2008),Doddaballapur,Karnataka,INDIA,November   21-22 nd  ,2008,[ Paper code  05]  [22].S.Deering and R.Hinden “Internet Protocol Version 6(IPv6) Specification”, RFC 2460,December 1998 . [23].Ra’ed Al Ja’afreh,John Mellor, and Irfan Awan,“Evaluating BDMS and DSTM Transition mechanisms”. [24].S.Tanenbaum,“Computer Networks”,Third Edition,Prentice Hall Inc.,1996,pp.686,413-436,437-449.  [25].Behrouz A.Forouzan,Third Edition,“TCP/IP Protocol Suite” .  [26].Atul Kahate,“Cryptography and Network Security“,Tata McGraw-Hill,2003,pp-8-10.  [26].Kurose.J.& Ross.K.(2005)Computer Networking:A top-down approach featuring the Internet.3 rd  ed,(Addison Wesley).5960-0125-8.  [27].Moby dick project:“Mobility and Differentiated services in a future IP network:”,Final project report,4.4.2004.  [28].J.Wiljakka(ed.,)“Analysis on IPv6 transition in 3GPP networks”,draft-ietf-v6ops-3gpp-analysis-04.txt,Internet  draft, work in progress .
[35].E.Nordmark,Stateless IP/ICMP translation algorithm(SIIT),RFC 2765,February 2000. [36].Ra’ed AlJa’afreh,John mellor,Mumtaz  Kamala,” A Novel IPv4/IPv6 transition mechanism which support transparent connections”. [37].Ra’ed AlJa’afreh,John mellor,Mumtaz  Kamala and R.Kassabeh ,Bi-Directional mapping system as a new IPv4/IPv6 transition mechanism. [38].TimRooney,IPv4/IPv6Transition strategies,Director,Product management,BT Diamond IP. [39].John.J.Amos and Daniel Minoli,Handbook of IPv4 to IPv6 Transition Methodologies for Institutional and Corporate Networks. [40].Jivika Govil   ,Jivesh Govil,Navkeerat Kaur,Harkeerat Kaur,An examination of IPv4 and IPv6 Networks: constraints,and various transition mechanisms. [41].Jivika Govil,Jivesh Govil,”On the Investigation of Transactional and Interoperability Issues between IPv4 and IPv6,2007,IEEE electro/Information technology conference,(EIT 2007),17-20,May 2007,chicago,USA
ICIIC2010,Aug-5,6,7. ICEMC2-2010,Kuppam,AP,INDIA. Any Questions ?
ICIIC2010,Aug-5,6,7. .

More Related Content

What's hot

AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...Editor IJCATR
 
Icemc22010 ppt 29
Icemc22010 ppt 29Icemc22010 ppt 29
Icemc22010 ppt 29hanums1
 
Icemc2 kuppam
Icemc2 kuppamIcemc2 kuppam
Icemc2 kuppamhanums1
 
Major Report on ADIAN
Major Report on ADIANMajor Report on ADIAN
Major Report on ADIANsmittal121
 
Routing in delay tolerant network using
Routing in delay tolerant network usingRouting in delay tolerant network using
Routing in delay tolerant network usingIAEME Publication
 
Shortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksShortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksIJERA Editor
 
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...IOSR Journals
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesiaemedu
 
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...Thesis Scientist Private Limited
 
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...paperpublications3
 
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterArtificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterIOSR Journals
 
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...IDES Editor
 
140320702029 maurya ppt
140320702029 maurya ppt140320702029 maurya ppt
140320702029 maurya pptMaurya Shah
 
Neural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionNeural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionIJERA Editor
 
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...IJNSA Journal
 

What's hot (19)

AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
 
Icemc22010 ppt 29
Icemc22010 ppt 29Icemc22010 ppt 29
Icemc22010 ppt 29
 
Icemc2 kuppam
Icemc2 kuppamIcemc2 kuppam
Icemc2 kuppam
 
Major Report on ADIAN
Major Report on ADIANMajor Report on ADIAN
Major Report on ADIAN
 
Steganography
Steganography Steganography
Steganography
 
Ijetcas14 330
Ijetcas14 330Ijetcas14 330
Ijetcas14 330
 
Routing in delay tolerant network using
Routing in delay tolerant network usingRouting in delay tolerant network using
Routing in delay tolerant network using
 
Shortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksShortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor Networks
 
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
Efficient Sub Area Tree Routing Protocol (Estr) For Collision Avoidance in Mo...
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniques
 
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Networ...
 
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
 
40120140505005 2
40120140505005 240120140505005 2
40120140505005 2
 
40120140505005
4012014050500540120140505005
40120140505005
 
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterArtificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
 
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
 
140320702029 maurya ppt
140320702029 maurya ppt140320702029 maurya ppt
140320702029 maurya ppt
 
Neural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionNeural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal Recognition
 
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
 

Viewers also liked

Iccsit 2010 rljit
Iccsit 2010 rljitIccsit 2010 rljit
Iccsit 2010 rljithanums1
 
Iccana 2011 jan8th
Iccana 2011 jan8thIccana 2011 jan8th
Iccana 2011 jan8thhanums1
 
Kkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithmsKkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithmshanums1
 
Iccsit2010 p 1
Iccsit2010 p 1Iccsit2010 p 1
Iccsit2010 p 1hanums1
 
Iccci2010
Iccci2010Iccci2010
Iccci2010hanums1
 
Kkbnet 2010-a compa
Kkbnet 2010-a  compaKkbnet 2010-a  compa
Kkbnet 2010-a compahanums1
 
Iccsit2010 p 1-dummy
Iccsit2010 p 1-dummyIccsit2010 p 1-dummy
Iccsit2010 p 1-dummyhanums1
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2hanums1
 

Viewers also liked (8)

Iccsit 2010 rljit
Iccsit 2010 rljitIccsit 2010 rljit
Iccsit 2010 rljit
 
Iccana 2011 jan8th
Iccana 2011 jan8thIccana 2011 jan8th
Iccana 2011 jan8th
 
Kkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithmsKkbnet2010 i pv6 tunneling algorithms
Kkbnet2010 i pv6 tunneling algorithms
 
Iccsit2010 p 1
Iccsit2010 p 1Iccsit2010 p 1
Iccsit2010 p 1
 
Iccci2010
Iccci2010Iccci2010
Iccci2010
 
Kkbnet 2010-a compa
Kkbnet 2010-a  compaKkbnet 2010-a  compa
Kkbnet 2010-a compa
 
Iccsit2010 p 1-dummy
Iccsit2010 p 1-dummyIccsit2010 p 1-dummy
Iccsit2010 p 1-dummy
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
 

Similar to Iciic2010 114

Iccci10 bd siit
Iccci10 bd siitIccci10 bd siit
Iccci10 bd siithanums1
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...IOSR Journals
 
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
Procedia Computer Science   46  ( 2015 )  1072 – 1078 187.docxProcedia Computer Science   46  ( 2015 )  1072 – 1078 187.docx
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docxAASTHA76
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE IJERA Editor
 
Protocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationProtocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationAlexander Decker
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues andijfcstjournal
 
Da3210751081
Da3210751081Da3210751081
Da3210751081IJMER
 
Icemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmIcemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmhanums1
 
Design of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial ModulationDesign of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial ModulationSachin Talakeri
 
Respond 3 of your colleagues postings in one or more of the fol.docx
 Respond  3 of your colleagues postings in one or more of the fol.docx Respond  3 of your colleagues postings in one or more of the fol.docx
Respond 3 of your colleagues postings in one or more of the fol.docxaryan532920
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsIJECEIAES
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
 
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...IOSR Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...IJCNCJournal
 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...IJCNCJournal
 
Evaluation of Table Driven Protocols-DSDV & OLSR in MANET
Evaluation of Table Driven Protocols-DSDV & OLSR in MANETEvaluation of Table Driven Protocols-DSDV & OLSR in MANET
Evaluation of Table Driven Protocols-DSDV & OLSR in MANETijsrd.com
 

Similar to Iciic2010 114 (20)

Iccci10 bd siit
Iccci10 bd siitIccci10 bd siit
Iccci10 bd siit
 
M017147275
M017147275M017147275
M017147275
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
 
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
Procedia Computer Science   46  ( 2015 )  1072 – 1078 187.docxProcedia Computer Science   46  ( 2015 )  1072 – 1078 187.docx
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
 
Protocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationProtocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulation
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
 
Da3210751081
Da3210751081Da3210751081
Da3210751081
 
Icemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmIcemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstm
 
Design of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial ModulationDesign of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial Modulation
 
Respond 3 of your colleagues postings in one or more of the fol.docx
 Respond  3 of your colleagues postings in one or more of the fol.docx Respond  3 of your colleagues postings in one or more of the fol.docx
Respond 3 of your colleagues postings in one or more of the fol.docx
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!
 
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
 
Evaluation of Table Driven Protocols-DSDV & OLSR in MANET
Evaluation of Table Driven Protocols-DSDV & OLSR in MANETEvaluation of Table Driven Protocols-DSDV & OLSR in MANET
Evaluation of Table Driven Protocols-DSDV & OLSR in MANET
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
main_phase1 _3.pptx
main_phase1 _3.pptxmain_phase1 _3.pptx
main_phase1 _3.pptx
 

Recently uploaded

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 

Recently uploaded (20)

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

Iciic2010 114

  • 1. Dr.Manjaiah.D.H. Chairman and Professor, Dept of CS, Mangalagangotri, Mangalore University, Mangalore-31739 Hanumanthappa.J., Aravinda.C.V. B.E., Match.,(Ph.D) , M.Sc.,M.Phil.,M.Tech.,(Ph.D)., Asst.Professor,DOS in CS,UOM, Research Scholar, Manasagangotri, Mangalagangotri, Mysore. Mangalore University, Mangalore.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. IPv6 Header Format Traffic Class Flow Label Vers Payload Length Next Header Hop Limit Source Address Destination Address 0 4 12 16 24 31
  • 9.  
  • 10.
  • 11. Fig.2.Translation of IPv6 to IPv4 Header .
  • 12.
  • 13. ICIIC2010,Aug-5,6,7. BD-SIIT Data Packet Transmission Process Fig.3.BD-SIIT Data packet Transmission Process .
  • 14.
  • 15.
  • 16.
  • 17. ICIIC2010,Aug-5,6,7. Comparison and Contrast between BD-SIIT and DSTM Transition Mechanism. BD-SIIT DSTM 1.It does not for tunneling technique . 1. A tunneling technique needs to be configured. 2. Two IPv4 and IPv6 addresses are assumed to be globally unique. 2.Only IPv4 addresses are assumed to be globally unique . 3.It Uses two types of global IP addresses that are assigned by DNS46 server for each communication system. 3. Uses only a pool of IPv4 addresses in order to assign Global IPv4 address for each communication system. 4.Applicable for Bi-Directional commn between IPv6 only nodes and IPv4 nodes. 4.Not applicable to IPv6 only nodes that want to communicate with IPv4 only node. 5.Less cost 5.High Cost 6.Does not require upgrading or extra software to be used at end user nodes. 6.Requires modifications or extra software to support the dual stack on the end user nodes. 7.Transition from IPv4 to IPv6 and Vice versa is needed. 7.Encapsulation and Decapsulation methods are needed.
  • 18. In this Paper we have calculated three performance evaluation metrics . 1.End to End delay 2. Throughput 3.Round trip time(RTT) N rec 1.Mean End to End delay= ∑EEDi/Nrec i=1 EEDi =Tdi-Tsi where EEDi is the end to end delay of ith packet. Tsi is the Source packet i created and Tdi is the Destination packet which is created at Destination . Nrec is the total number of packets received at Dest host and Mean EED is the mean value of each communication session .
  • 19. The mean throughput for a sequence of packets of specific size is calculated by using equations 1 and 2. MeanThr = ∑ N Thrj /N -------------(1) j=1 where Thr=Packets received(Pr)/Packets generated(Pg)*100%.--------------(2) Thrj is the value of the throughput when the packet j is received at intermediate device like DSTM gateway,BD-SIIT Gateway,v4/v6 Router and N is the number of received packets at intermediate device,Pr is the no of packets received at intermediate device and Pg is the number of packets created by source host .
  • 20. ICIIC2010,Aug-5,6,7. Simulation Parameters Value 1.Buffer Size 500 Packets 2. Propogation Delay 10ms 3.Payload size 200 Bytes 4.Very traffic Load 6~240 Nodes. 5.Queue Management Scheme Drop tail.
  • 21. References [1].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” A Study on IPv6 in IPv4 Static Tunneling threat issues in 4G Networks using OOAD Class and Instance Diagrams“, Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA, January 09-11,2010,[Paper code CSCIT-152][CSCITOP113].   [2].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” An IPv4-to-IPv6 threat reviews with dual stack transition mechanism considerations a transitional threat model in 4G Wireless networks ”Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA,January 09-11,2010,[Paper code CSCIT-157] [CSCITOP115].   [3].Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,” Implementation,Comparative and Performance Analysis of IPv6 over IPv4 QoS metrics in 4G Networks: Single-source-destination paths Delay, Packet Loss Performance and Tunnel Discovery Mechanisms“,Proceedings of the International Conference on Information Science and Applications(ICISA-2010)organized by Dept. of Master of Computer Applications,Panimalar Engineering College,Chennai-600 123,Tamilnadu,India.,February-06-2010,[Paper code ICISA-293(with serial no-101)].   [4].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi ,”High Performance evaluation of Multimedia Video Streaming over IP networks” ,Proceedings of the National conference on Computing communications and Information systems(NCCCIS-2010)organized by Department of Information Technology Sri Krishna College of Engineering and Technology,Kuniamuthur,Coimbatore-641008,INDIA,February-12-13,2010,[Paper id NCCCIS-MM-03],pp-88-92 .  
  • 22. ICIIC2010,Aug-5,6,7. [5].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” IPv6 Tunneling Algorithms in 4G Networks ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010.   [6].Sridevi.,Hanumanthappa.J.,Manjaiah.D.H,” A Novel IPv4/IPv6 Transition scenarios in 4G Networks ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010.   [7].Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,” A Comparison of Performance evaluation metrics and Simulation parameters ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010. [8].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K .,“Comparison and Contrast between Bellman ford and Dijkstra’s algorithms” ,Proc.of. the National Conference on Wireless Networks-09(NCOWN-2010),organized by RLJIT,Kodigehalli,Doddaballapur,Kerala,INDIA,February ,2010,[Paper code 05].   [9].Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi,” Emerging technologies for the 4G Wireless communications ”,Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8 th and 9 th 2010.   [10].Hanumanthappa.J.,Manjaiah.D.H .,”IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model: A Case Study for University of Mysore Network”, International Journal of Computer Science and Information(IJCSIS)Vol.3.,No.1,July-2009,ISSN 1947-5500,Paper ID: 12060915]
  • 23. [11].Hanumanthappa.J.,Manjaiah.D.H .,”Transition of IPv4 Network Applications to IPv6 Applications”[TIPv4 to TIPv6], Proceedings of IEEE International Conference on emerging trends in computing(ICETiC-2009),Virudhunagar,Tamilnadu 8-10,January 2009,INDIA.[Paper ID 234].   [12].Hanumanthappa.J.,Manjaiah.D.H.,Thippeswamy.K .“IPv6 over Bluetooth: Security Aspects, Issues and its Challenges”, Proceedings of National Conference on,Wireless Communications and Technologies(NCWCT-09)-Theme :Mobile and Pervasive Computing , Nitte,Karnataka,Udupi Dist, Karnataka ,INDIA,February-5-6 , 2009,[ Paper id -104]   [13].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D .“Economical and Technical costs for the Transition of IPv4–to-IPv6 Mechanisms[ETCTIPv4 to ETCTIPv6]” ,Proceedings of National Conference on Wireless Communications and Technologies(NCWCT-09)-Theme:Mobile and Pervasive Computing , Nitte ,Karnataka,Udupi Dist,Karnataka,INDIA,February-5-6 , 2009,[ Paper id -103]   [14].Hanumanthappa.J.,Manjaiah.D.H.,Kumar.B.I.D .”Implementation of Codec Driver for network embedded devices ”, Proceedings of the ” IEEE International Advance Computing Conference IACC-2009 on March 6- 8[Paper ID IEEE-ALGO-0205]at patiala. [15].Hanumanthappa.J.,Tippeswamy.K.,Manjaiah.D.H ., “ SOA Approach for information retrieval using web Services” [SOAAFIRUWS ],Proceedings of IEEE International Conference on the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-DATA-2065].   [16].Hanumanthappa.J.,Manjaiah.D.H ., Tippeswamy.K.“ An Overview of Study on Smooth Porting Process Scenario during IPv6 Transition”[TIPv6] ,Proceedings of IEEE International Conference on the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-APPL-1278]. [17].Hanumanthappa.J.,Manjaiah.D.H ., Tippeswamy.K .“Generic Query information retrieval System for web 2.0” ,Proceedings of the Seventh International Convention on Automation of libraries in education and Research(CALIBER-2009) organized by Inflibnet centre on February 25-27,2009 at Pondicherry university(A central University),R.Venkat Raman Nagar,Kalapet,Pondicherry-605014,India.[Paper ID C-13].   [18].Hanumanthappa.J.,Manjaiah.D.H.,Tippeswamy.K.“ IPv6 over IPv4 QoS metrics in 4G Networks:Delay, Jitter,Packet Loss Performance,Throughput and Tunnel Discovery Mechanisms”, Proceedings of the National Conference on Wireless Networks-09(NCOWN-2009) organized by RLJIT,Kodigehalli,Doddaballapur,Karnataka, INDIA,November 21-22 nd ,2009,[Paper code NCOWN-19 .
  • 24. [19].Hanumanthappa.J.,Manjaiah.D.H.,“ A Study on Comparison and Contrast between IPv6 and IPv4 Feature Sets” Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28 th ,2008,[Paper code CP 15]. [20].Hanumanthappa.J.,Balachandra.C ,“Soft one to One Gateway Protocol”, Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28 th ,2008,[Paper code CP 27]. [21].Hanumanthappa.J.,Thippeswamy.K .“Generic Query Retrieval System”[GQRS]”, Proceedings of National Conference on,Recent Trends in Engineering and Technology(RTIET-2008),Doddaballapur,Karnataka,INDIA,November 21-22 nd ,2008,[ Paper code 05] [22].S.Deering and R.Hinden “Internet Protocol Version 6(IPv6) Specification”, RFC 2460,December 1998 . [23].Ra’ed Al Ja’afreh,John Mellor, and Irfan Awan,“Evaluating BDMS and DSTM Transition mechanisms”. [24].S.Tanenbaum,“Computer Networks”,Third Edition,Prentice Hall Inc.,1996,pp.686,413-436,437-449. [25].Behrouz A.Forouzan,Third Edition,“TCP/IP Protocol Suite” . [26].Atul Kahate,“Cryptography and Network Security“,Tata McGraw-Hill,2003,pp-8-10. [26].Kurose.J.& Ross.K.(2005)Computer Networking:A top-down approach featuring the Internet.3 rd ed,(Addison Wesley).5960-0125-8. [27].Moby dick project:“Mobility and Differentiated services in a future IP network:”,Final project report,4.4.2004. [28].J.Wiljakka(ed.,)“Analysis on IPv6 transition in 3GPP networks”,draft-ietf-v6ops-3gpp-analysis-04.txt,Internet draft, work in progress .
  • 25. [35].E.Nordmark,Stateless IP/ICMP translation algorithm(SIIT),RFC 2765,February 2000. [36].Ra’ed AlJa’afreh,John mellor,Mumtaz Kamala,” A Novel IPv4/IPv6 transition mechanism which support transparent connections”. [37].Ra’ed AlJa’afreh,John mellor,Mumtaz Kamala and R.Kassabeh ,Bi-Directional mapping system as a new IPv4/IPv6 transition mechanism. [38].TimRooney,IPv4/IPv6Transition strategies,Director,Product management,BT Diamond IP. [39].John.J.Amos and Daniel Minoli,Handbook of IPv4 to IPv6 Transition Methodologies for Institutional and Corporate Networks. [40].Jivika Govil ,Jivesh Govil,Navkeerat Kaur,Harkeerat Kaur,An examination of IPv4 and IPv6 Networks: constraints,and various transition mechanisms. [41].Jivika Govil,Jivesh Govil,”On the Investigation of Transactional and Interoperability Issues between IPv4 and IPv6,2007,IEEE electro/Information technology conference,(EIT 2007),17-20,May 2007,chicago,USA