IPv6 Tunneling Algorithms in 4G Networks
.
J.Hanumanthappa1. Manjaiah.D.H.2, Aravinda.C.V 3.Joshi.Vinayak.B.4 1
Teacher Fellow, Dos in Computer Science,University of Mysore,Manasagangotri,Mysore-570006,India. Ph. (+91821-2419552); Fax :( +91821-2510789)e-.mail:
[email protected] 2 Corresponding Author,Ph. (091-0824 –2287670 (o)/2288973(r) 2287424(fax); Email:
[email protected] 3 M.Tech.,K.S.O.U.,Manasagangotri,Mysore,INDIA;email:
[email protected]. 4 Research Scholar,Dept of CS,Mangalagangothri,Mangalore University,Mangalore,INDIA.
ABSTRACT Tunneling Algorithms are playing a vital role in IPv6.Tunneling is the process of embedding IPv6 packet in IPv4 protocol or IPv4 packet in IPv6 protocol. The Tunneling is one of the vital mechanisms to transport IPv6 packets over IPv4 packets .Tunnels are mainly used to improve security and to expand networks without having to deploy native infrastructure. Tunnels playing important role for the quick access to the IPv6 network which relies on IPv6–in –IPv4 tunnels where native connectivity is not available. Tunneling is a strategy used when two computers using IPv6 want to communicate with each other and the packet must pass through a region that uses IPv4.The term Tunneling is widely used both to enhance networks without having to deploy native infrastructure and to improve security. The tunneling process involves three steps: encapsulation, decapsulation, and tunnel management. It also requires two tunnel end-points, which in general case are dualstack IPv4/IPv6 nodes, to handle the encapsulation and encapsulation. Tunneling strategies are mainly categorized into four types for deploying IPv6, Deploying IPv6 over IPv4 tunnels, Deploying IPv6 over dedicated data links, and Deploying IPv6 over MPLS backbones. Comparison between the different tunneling mechanisms was done, Configuration of various tunneling mechanisms, the different tunneling concepts like transition of IPv4 to IPv6 for 4G networks .Each strategy has its own advantages and disadvantages and also furthermore there are different tunneling scenarios/mechanisms such as IPv6 manually configured tunnel, IPv6 over IPv4 GRE tunnel, Tunnel broker, Automatic IPv4–Compatible Tunnel, and Automatic 6-to-4 Tunnel. Index Terms –Tunnel, Tunneling Algorithms, etc.
1.0. INTRODUCTION Tunnel is a bidirectional point–to-point link between two network endpoints. Tunneling consists of encapsulation of network protocol packets within the packets of a second network protocol, such that the former regards the latter as its data link layer [13].Data is carried through the tunnel using a process called encapsulation in which IPv6 packet is carried inside an IPv4 packet which makes IPv4 as a Data Link layer with respect to IPv6 packet transport. The term “tunneling” refers to a means to encapsulate one version of IP in another so the packets can be sent over a backbone that does not support the encapsulated IP version. For example, when two isolated IPv6 networks need to communicate over an IPv4 network, dual-stack routers at the network edges can be used to set up a tunnel which encapsulates the IPv6 packets within IPv4, allowing the IPv6 systems to communicate without having to upgrade the IPv4 network infrastructure that exists between the networks. The term Tunneling is widely used both to enhance networks without having to deploy native infrastructure and to improve security. Some of the examples of the former include IPX-in-IP encapsulation[14],IPv6-in-IPv4 encapsulation[15],and other examples of the latter include IPSec[16] and Virtual private networks[17].This mechanism can be used when two nodes that use same protocol wants to communicate over a network that uses another network protocol. The tunneling process involves three steps: encapsulation, encapsulation, and tunnel management. It also requires two tunnel end-points, which in general case are dual-stack IPv4/IPv6 nodes, to handle the encapsulation and decapsulation. There will be performance issues associated with tunneling, both for the latency in en/de capsulation and the additional bandwidth used. Tunneling is one of the key deployment strategies for both service providers and enterprises during the period of IPv4 and IPv6 coexistence.Fig-2 shows the deployment of IPv6 over IPv4 tunnels. The IPv6 specifications define several types of IPv6-in-IPv4 tunnels including manually configured tunneling, and Automatic tunneling[15],6to4[19],ISATAP[20],and Teredo[21].Tunneling is a strategy used when two computers using IPv6 want to communicate with each other and the packet must pass through a region that uses IPv4.IPv6 may also use GRE tunnels over IPv4[22].Our results shows that tunnels are very common in the today’s hot topic like Internet and that the transition to IPv6 occurring slowly, smoothly therefore we concluded that tunnels play
a vital role in IPv6 as well as 4G networks like Wireless networks etc.Tunneling is one of the key deployment strategies for both service providers and enterprises during the period of IPv4 and IPv6 coexistence. Troubleshooting is one of the ability to discover tunnels in IPv6 Transition scenario by using a practical approach. When a link in a tunnel’s path fails then one of the diagnostic tools such as trace route6 will not reveal the source of the problem. Tunnels are mainly used to improve security and to expand networks without having to deploy native infrastructure. 1.1. Applications of Tunnels. 1.The ability to determine that the failed link is in a tunnel and possibly perform an IPv4 trace route between the tunnel endpoints would provide great help in such scenario. 2.Secondly often, tunnels are used as an interim solution until the native IPv6 infrastructure is in place. 3.Thirdly Tunnels offer lower performance than native links, and are often used as backup paths in case of problems,the idea of whether a particular route contains a tunnel would allow routing protocols or network operators to prefer native routes. This is useful for Internet service providers and content delivery operators who wish to maximize the quality of service they provide. 4.Over-lay tunnels can be configured between border routers and a Host; however both the tunnel end points must support both the IPv4 and IPv6 protocol stacks. 5.Over-lay tunnels reduce the maximum transmission unit (MTU) of an interface by 20 octets due to the absence of header field in IPv4 packet. 1.2. Problems with implementation of IPv6 tunneling. I. Low Performance 1. Heavy on routers. 2. Encourage inefficient routing. II.Difficult to troubleshoot. III.Pose security problems IPv6 in IPv4 over-lay tunnel. IV.To avoids them we must know they’re there. 1. Transparent to IPv6, “Single-hop”. 2. What can we do, what we can’t do with DNS? V.Restrictions for implementing tunneling on Cisco 12000 series. 1.The limit to use of IPv6 on the Cisco 12000 series support a low level network traffic and require a minimal amount of process-switching. 2.IPv6 manually configured tunnel traffic is processed in software on the CPU of the line card, instead of a route processor in the Cisco 12000 router resulting in enhanced performance. 3.Tunnels degrade the network performance and reliability. There have been plenty of studies on IPv6 Tunneling Scenarios,such as the basic Automatic Tunneling, Manually Configured Tunneling,6-to4 Tunnel broker etc,the security issues for tunneling.However,there are still many problems not resolved yet, calling for great challenges on IPv6 tunneling research for 3G/4G Mobile communications,Anycast,Multicast,Multihoming,DNS,Dual Stack approach etc.The key goals of the migration are IPv6 and IPv4 hosts must interoperate, the use of IPv6 hosts and routers must be distributed over the Internet in a simple and progressive way, with a little interdependence and network administrators and end users must think that the migration is easy to understand and implement. A set of mechanisms has been implemented it includes protocols and management rules to simplify the migration. The main characteristics of these mechanisms are possibility of a progressive and non traumatic transition such that IPv4 hosts and routers can be updated to IPv6,one at a time, without requiring other hosts or routers to be updated simultaneously, minimum requirements for updating such that the only requirement for updating hosts to IPv6 is the availability of a DNS server to manage IPv6 addresses such that no requirements are needed for routers, addressing simplicity that when a router or a host is updated to IPv6,it can also continue to use IPv4 addresses and finally low initial cost such that no preparatory work is necessary to begin the migration to IPv6. 1.3. Definition of link, hop, routable interface in an IPv6 Tunneling. A link is a communication medium,and this link is also called as tunnel or a path that exist between two independent nodes. A link is one which offered by an underlying link layer or in the case of tunnels, networklayer protocol over which the IPv6 protocol may transit packets and an interface is a node’s attachment to a link. Links are again broadly divided into two types like point to point links, and a multipoint links. In a point–topoint link exactly one interface is connected to the link and where as in multipoint link more than one interface is exactly connected to the link. Further loosely define a routable interface is an interface where IPv6 address belongs to a prefix which exists in the global routing table and thus can be reached by any host on either a LAN, MAN, WAN networks, Wireless networks etc.In this paper our definitions of node,link,and interface are consistent with the current internet protocol IPv6 specifications whereas a node is a device implementing IPv6,and this node is also called as workstation or a end system or a client or a server or a hop.
1.4. IPv6 Tunnel operation. An IPv6-in-IPv4 Tunnel T=is a point to point link between two dual stack interfaces A (the tunnel source) and B (the tunnel destination) or routers.We denote respectively with A4 and B4 and with A6 and B6 the IPv4 and IPv6 addresses of A and B and we represent bidirectional tunnels as two tunnels with the same end points in inverted order and thus if a tunnel T= is bidirectional then T1=also exists. A Tunnel operates as follows:When an IPv6 is sent through a tunnel exists from a node A to B then a source node creates an IPv4 packet with source addresses A4 and the destination addresses B4 whose pay load packet is IPv6 packet where as in GRE or Teredo tunnels no extra headers are added and the packet is marked as an encapsulating an IPv6 packet by setting the IPv4 protocol field to 41.The IPv6 packet is then sent to B over the IPv4 network. When the destination workstation receives the packet it checks the IPv4 source address to predict whether it belongs to a known tunnel and if so it decapsulates the packet and processes it smoothly as it had arrived on any other IPv6 workstation. Suppose if the IPv6 packet is forwarded then the hop-limit field header is decremented by 1.IPv6 in IPv4 tunnels are also called as single workstation tunnels i.e.they appear to the IPv6 as a single point to point path which hides the complexity of IPv4 network [15].
2. Brief History of Wireless Network Generations. First Generations (1G):-1G was based on analog technology, and basically intended for analog phones. It was launched in the year 1980’s and it also introduce the first basic frame work mobile communication like basic architecture, Frequency multiplexing, roaming concept etc.The Access technology used was Advanced mobile phone service(AMPS). Second Generation (2G):-It was introduced was 1980’s and it adopted Digital Signal Processing ideas. It was also represented a revolution from switching of mobile communication technology from analog to digital.The main access technologies used were GSM (Global System for Mobile communication), and CDMA (Code division Multiple access). 2.5Generation (2.5G):-It was an enhanced version of 2G with slight replacement of Packet switching.It implemented hybrid communication,which connected the Internet to mobile communications. Third Generation (3G): The basic idea of 3G to deploy new systems with new services instead of providing higher bandwidth, and data rate. It has been supported by Multimedia, Circuit Switching, Packet Switching strategies. The main important access technologies are CDMA, WCDMA, and TS-SDMA etc. Limitations of 3G:-To understand why do we require 4G? The answer for this question depends on understanding and analyzing the major limitations of 3G.Some of the pitfalls of 3G are as follows. 1.Difficulty of CDMA(i.e. it does not support the higher data rates).,2.need for higher continuously increasing data rate and bandwidth to meet multimedia requirements.,3.Limitation of spectrum and its allocation,4.Inability to roam between different services.,4.To provide a seamless transport end-to-end mechanism.5.to introduce a better system with reduces price.
2.1. Introduction to 4G. Due to the increase in demand for speed, multimedia support, and other resources, the whole wireless world is looking forward a new generation technology to substitute the third generation technology(3G).This is where the 4G networks comes into play.4G wireless communication is expected to provide better speed, High capacity, lower cost and IP based services. With the Major wireless service providers planning to start deployment of 4G Wireless networks by mid 2010.Research and Industry communities are racing against the time to find solutions for some of the prominent still open issues in 4G Networks. The Growing interest in 4G networks is driven by the set of new services will be made available for the first time such as accessing Internet, Anytime from Anywhere, Global roaming, and wider support for Multimedia applications. The 4G Systems are expected to offer a speed of 100 Mbps in stationary mode, and an average of 20 Mbps for mobile stations, reducing the download time of Graphics, and Multimedia components by more than ten times compared to the currently available 2Mbps on 3G systems. Currently the 4G system is an Innovative, Research, and a development initiative based upon 3G, which is having trouble meeting its performance goals. The Challenges for the growing development of 4G systems relies on the evolution of different underlying technologies, standards, deployment.Yet there are several challenges that inhibit the progress of 4G and researchers throughout the whole world are contributing their ideas to solve these challenges. 2.1.1. Characteristics of 4G. In short the desirable characteristics of 4G network are as follows. The transition from 3G technologies to 4G technologies is complicated by attempts to standardize on a single 3G protocol. Without a single standard on which to build, designers face significant additional challenges. The desirable characteristics of 4G are –1.High
user-level Customization: In this type of salient feature each user can pick preferred level of Quality of service (Quos), radio environment etc. 2. The second characteristic feature of 4G networks is Carrier frequency-5GHz. 3. The third one is Channel bandwidth/operator-50MHz. 4. The fourth one is High Speed:-target data rate of 100 to 1000 Mbits/sec, 5. The 5th one is high bandwidth efficiency from 2 to 20 bits/Hertz. 6.The 6th one is Ubiquity–The 4G networks is one which supports for seamless communication and next generation internet protocol like IPv6, Mobile IPv6. 7.The 4G networks also supports for various multiplexing options like Single carrier(SC),Multi carrier(MC),and Orthogonal frequency division multiplexing(OFDM),and other multi-access options like TDMA,CDMA. 8.Technically 4G is one integrated,IPv6-based environment for all telecommunication requirements,including voice, video, broadcasting media and that Internet that utilizes both fixed and wireless networks. 2.1.2.Characteristics of IPv6. 1. Larger address Space-IPv6 supports a size of 128 bits or 16-bytes. 2. IPv6 supports for High quality real time applications like Audio, Video transmission short/busty connections of web applications, peer-to-peer applications. 3. IPv6 also supports for Better header format. 4.New options-Changes in the way IP header options are encoded allows for more efficient forwarding, less stringent limits on the length of options, and greater flexibility for allowing new options in future. 5. Support for more security-Encryption and Decryption options supports for conversion of text from plain text to cipher text in cryptography.
III. IPv6 Tunneling Algorithms. 3.1.Types of Tunneling in 4G Networks. Tunneling techniques are broadly divided into two types, first one is an automatic tunneling and second one is configuration tunneling. The tunneling technique we can use the compatible addresses discussed as shown in the below figure-6.A compatible address is an address of 96 bits of zero followed by 32 bits of IPv4 address. It is used when a computer using IPv6 wants to send a message to another computer using IPv6.However suppose the packet passes through a region where the networks are still using IPv4.The sender must use the IPv4compatible address to facilitate the passage of the packet through the IPv4 region. For example the IPv4 address 2.13.17.14 becomes 0: 020D: 110E.The IPv4 is pre pended with 96 zeros to create a 128–bit address (See figure-1) [24].
Fig 1: The IPv6 Compatible Address.
Fig.2: Types of IPv6 Tunneling in 4G networks.
3.2. Configuration Tunneling Scenarios: 3.2.1.The Four possible ways to tunnel the packets. 1.Router –to-Router Tunneling Configuration: During the migration,the tunneling technique can be used in the following ways: 1.Router-to-router:IPv6/IPv4 routers interconnected by an IPv4 infrastructure can tunnel IPv6 packets between themselves. 2.Host–to-Router:IPv6/IPv4 hosts can tunnel IPv6 packets to an intermediary IPv6/IPv4 router that can be reached via an IPv4 Infrastructure.
3.Host-to-Host:IPv4/IPv6 hosts that are interconnected by an IPv4 infrastructure can tunnel IPv6 packets between themselves. 4.Router-to-Host:IPv6/IPv4 routers can use tunnels to reach an IPv4/IPv6 host via an IPv4 infrastructure .
Fig.3: Four possible ways to tunnel the IPv6 packets in 4G networks.
3.3. Tunneling Algorithms. The algorithms that are required to implement the above tunneling techniques are as follows. The IPv6 Tunneling algorithms are broadly divided into three types. 1. 2. 3.
IPv6 Tunneling when the end node address is an IPv4-compatible IPv6 address. IPv6 Tunneling when the end node is IPv6 only address. IPv6 Tunneling when the end node address is an IPv4 address.
Case-1: End node address is an IPv4-compatible IPv6 address IPv6 Tunneling algorithm. Nomenclature. IPv4 Compatible IPv6 address->IPv4cIPv6 Dipv6->Destination IPv6 address. Sipv6->Source IPv6 address. Local IPv6 address->Lipv6. 1. When the end node address is treated as IPv4CIPv6. 2. If the workstation destination address is equal to a local IP address then go to step-9. 3. else 4. If the IP destination address is not equal to a local address then 5. Find out whether IPv4 router is available then go to step-9. 6. If once the IPv4 router is not found then check it for IPv6 router available, if it’s true then go to step-11. 7. else 8. If the IPv6 router un available go to step-10. 9. When the destination IP address is a local address then send direct with destination IP address set to IPv6 format. 10.Send IPv4 encapsulated packet to IPv4 router,IPv6 destination addresses to the end node,IPv4 address set to low-order 32 bits of end-node. 11. If IPv6 router is available forward direct to IPv6 router with destination address set to IPv6 format. 12. Print “Destination un reachable”. 13. End. The above mentioned Algorithm is an IPv6 tunneling algorithm when the end node address acts like an IPv4– compatible IPv6 address. Case-2: When End node address is IPv6 address. Nomenclature: End node address->ea. Dipv6->Destination IPv6 address. Sipv6->Source IPv6 address. Local IPv6 address->Lipv6. 1.If Dipv6 is a Lipv6 then 2. Forward direct with destination address set to IPv6 format. 3. else find out for IPv6 router, If IPv6 router is available then 4. Send direct to IPv6 router with IP destination address set to final destination in IPv6 format 5. else Configured IPv6 tunnel and find out IPv4 router available then 6. Send IPv6 datagram encapsulated in IPv4 packet.IPv6 address is a end node address and 7. IPv4 destination address is the configured IPv4 address of the tunnel end point 8. else Destination unreachable.
Case-3: If the end node address is an IPv4 address. Nomenclature: 1. End node address is IPv4 address then 2. If destination is local then forward with destination address set to IPv4. 3. else if IPv4 router is available then 4. Send IPv4 packet destination address set to the IPv4 address of the end node. 5. else destination unreachable. The above mentioned three algorithms specifies an algorithm for the Case-1: End node address is an IPv4compatible IPv6 address IPv6 Tunneling algorithm, Case-2: When End node address is IPv6 address, and Case3: If the end node address is an IPv4 address. Case-4: If the Tunneling type is of type Automatic. Nomenclature: Receiving Host -> {Rh} IPv6 compatible address-> {IPv6ca} Sender->S, Receiver->R., Da->Destination addresses->Source Address. 1. Suppose If Rh uses IPv6c then 2. Print “Tunneling occurs automatically with reconfiguration” 3. If sender sends the receiver an IPv6 packet with IPv6c as a Da then 4. Suppose if the packet reaches boundary of IPv4 net then 5. Print “Router encapsulated IPv6 packet it in an IPv4 packet format” then 6. When to send an IPv6 packet in the form of IPv4 packet then 7. We need IPv4 address. 8. If Router extracts IPv4 address embedded in the IPv6 then 9. When a packet starts its rest of journey as in the form of IPv4 packet then 10. Dh using dual stack receives IPv4 packet then 11. If it recognizes its IPv4 address then 12. It reads the header and then packet is forwarded (carrying) in the form of IPv4 packet then 13. Finally packet is sent it to IPv6 Software for processing [10]. 14. [End]. Case-5: When the Tunneling type is treated as a Configured tunneling[Explicit tunneling].
Nomenclature: Receiving Host -> {Rh} IPv6 compatible address-> {IPv6ca} Sender->S, Receiver->R., Da->Destination address, SA->Source Address. 1. When the Rh doesn’t support IPv6ca then 2. Sender sends a request to the DNS to receive 3. No compatible IPv6 address from the DNS then 4. Sender sends the IPv6 packet with the receiver’s no compatible address IPv6 address then 5. Print “packet cannot pass through IPv4 region” without being encapsulated Case-6: When Tunneling type is of type of Static Tunneling. Nomenclature: Tunnel Source-> {Ts}, Tunnel destination-> {Td}. Static tunneling-> {St}, Routing Table {Rat}. 1. If St assigned IPv4 addresses are manually configured to the Ts and Td then 2. To identify the packets this has to forward through tunnel via Rt in the tunnel end points then 3. The Rt forwards packets based on their destination using prefix mask and match technique.
Conclusion In this paper we proposed the IPv6 tunneling algorithms for 4G networks. Through Simulation we have proved the IPv6 tunneling algorithms for various case scenarios like when the end node address is IPv4 compatible IPv6 address, if the end node address is IPv4 address, and IPv6 address.
REFERENCES 1. Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,”A Study on IPv6 in IPv4 Static Tunneling threat issues in 4G Networks using OOAD Class and Instance Diagrams”, Proceedings of the International Conference on Emerging Trends in Computer Science, Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA, January 09-11,2010,[Paper code CSCIT-152][CSCITOP113]. 2. Hanumanthappa.J.,Manjaiah.D.H.,Vinayak.B.Joshi.,”An IPv4-to-IPv6 threat reviews with dual stack transition mechanism considerations a transitional threat model in 4G Wireless networks”Proceedings of the International Conference on Emerging Trends in Computer Science,Communication and Information Technology,(CSCIT2010)organized by Dept of CS and Information Technology,Yeshwanth Mahavidyalaya,Nanded,Maharastra,INDIA,January 09-11,2010,[Paper code CSCIT-157] [CSCITOP115]. 3. Hanumanthappa.J. Manjaiah.D.H.,Vinayak.B.Joshi.,”Implementation,Comparative and Performance Analysis of IPv6 over IPv4 QoS metrics in 4G Networks: Single-source-destination paths Delay, Packet Loss Performance and Tunnel Discovery Mechanisms”, Proceedings of the International Conference on Information Science and Applications(ICISA-2010)organized by Dept. of Master of Computer Applications,Panimalar Engineering College,Chennai-600 123,Tamilnadu,India.,February-06-2010,[Paper code ICISA-293(with serial no101)]. 4. Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi,”High Performance evaluation of Multimedia Video Streaming over IP networks”, Proceedings of the National conference on Computing communications and Information systems(NCCCIS-2010)organized by Department of Information Technology Sri Krishna College of Engineering and Technology,Kuniamuthur,Coimbatore-641008,INDIA,February-12-13,2010,[Paper id NCCCISMM-03],pp-88-92. 5. Aravinda.C.V.,Hanumanthappa.J.,Manjaiah.D.H,”IPv6 Tunneling Algorithms in 4G Networks”, Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION
NETWORKING(KKBNET-2010),organized by National Technology(NIT),Karnataka,Surathkal,INDIA,April,8th and 9th 2010.
Institute
of
6. Sridevi.,Hanumanthappa.J.,Manjaiah.D.H,”A Novel IPv4/IPv6 Transition scenarios in 4G Networks”, Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATION NETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8th and 9th 2010. 7. Hanumanthappa.J.,Aravinda.C.V.,Manjaiah.D.H,”A Comparison of Performance evaluation metrics and Simulation parameters”, Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8th and 9th 2010. 8. Hanumanthappa.J. Manjaiah.D.H.,Tippeswamy.K.,“Comparison and Contrast between Bellman ford and Dijkstra’s algorithms”,Proc.of. the National Conference on Wireless Networks-09(NCOWN-2010),organized by RLJIT,Kodigehalli,Doddaballapur,Kerala,INDIA,February ,2010,[Paper code 05]. 9. Hanumanthappa.J.,Manjaiah.D.H,Vinayak.B.Joshi,”Emerging technologies for the 4G Wireless communications”, Proceedings of the National conference on KNOWLEDGE,KNOWLEDGE BANKS AND INFORMATIONNETWORKING(KKBNET-2010),organized by National Institute of Technology(NIT),Karnataka,Surathkal,INDIA,April,8th and 9th 2010. 10. Hanumanthappa.J.,Manjaiah.D.H.,”IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model: A Case Study for University of Mysore Network”, International Journal of Computer Science and Information(IJCSIS)Vol.3.,No.1,July-2009,ISSN 1947-5500,Paper ID: 12060915] 11. Hanumanthappa.J.,Manjaiah.D.H.,”Transition of IPv4 Network Applications to IPv6 Applications”[TIPv4 to TIPv6],Proceedings of IEEE International Conference on emerging trends in computing(ICETiC2009),Virudhunagar,Tamilnadu 8-10,January 2009,INDIA.[Paper ID 234]. 12. Hanumanthappa.J., Manjaiah.D.H. Thippeswamy.K.“IPv6 over Bluetooth: Security Aspects, Issues and its Challenges”, Proceedings of National Conference on, Wireless Communications and Technologies(NCWCT-09)Theme :Mobile and Pervasive Computing,Nitte,Karnataka,Udupi Dist, Karnataka ,INDIA,February-5-6 ,2009,[Paper id -104] 13. Hanumanthappa.J., Manjaiah.D.H. Kumar.B.I.D.“Economical and Technical costs for the Transition of IPv4–toIPv6 Mechanisms[ETCTIPv4 to ETCTIPv6]”,Proceedings of National Conference on Wireless Communications and Technologies(NCWCT-09)-Theme: Mobile and Pervasive Computing,Nitte ,Karnataka,Udupi Dist,Karnataka,INDIA,February-5-6 ,2009,[ Paper id -103] 14. Hanumanthappa.J., Manjaiah.D.H. Kumar.B.I.D.”Implementation of Codec Driver for network embedded devices”, Proceedings of the”IEEE International Advance Computing Conference IACC-2009 on March 6- 8[Paper ID IEEE-ALGO-0205] at Patiala.
15. Hanumanthappa.J.,Tippeswamy.K.,Manjaiah.D.H.,“SOA Approach for information retrieval using web Services” [SOAAFIRUWS],Proceedings of IEEE International Conference on the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at patiala,Punjab[Paper ID IEEE-DATA-2065]. 16. Hanumanthappa.J., Manjaiah.D.H. Tippeswamy.K.“An Overview of Study on Smooth Porting Process Scenario during IPv6 Transition” [TIPv6], Proceedings of IEEE International Conference on the IEEE International Advance Computing Conference IACC-2009 on March 5-8 at Patiala, Punjab [Paper ID IEEE-APPL-1278]. 17. Hanumanthappa.J., Manjaiah.D.H. Tippeswamy.K.“Generic Query information retrieval System for web 2.0”, Proceedings of the Seventh International Convention on Automation of libraries in education and Research
(CALIBER-2009) organized by Inflibnet centre on February 25-27, 2009 at Pondicherry university (A central University), R.Venkat Raman Nagar, Kalapet, Pondicherry-605014, India. [Paper ID C-13]. 18. Hanumanthappa.J., Manjaiah.D.H. Tippeswamy.K.“IPv6 over IPv4 QoS metrics in 4G Networks: Delay, Jitter, Packet Loss Performance, Throughput and Tunnel Discovery Mechanisms”, Proceedings of the National Conference on Wireless Networks-09(NCOWN-2009) organized by RLJIT, Kodigehalli Doddaballapur, Karnataka, INDIA, November 21-22nd ,2009,[Paper code NCOWN-19],pp-123-138. 19.Hanumanthappa.J.,Manjaiah.D.H.,“A Study on Comparison and Contrast between IPv6 and IPv4 Feature Sets” Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 2728th,2008,[Paper code CP 15]. 20.Hanumanthappa.J.,Balachandra.C,“Soft one to One Gateway Protocol”, Proceedings of International Conference on Computer Networks and Security(ICCNS-2008),Pune,Sept 27-28th,2008,[Paper code CP 27]. 21. Hanumanthappa.J., Thippeswamy.K. “Generic Query Retrieval System”[GQRS]”,Proceedings of National Conference on, Recent Trends in Engineering and Technology(RTIET2008),Doddaballapur,Karnataka,INDIA,November 21-22nd ,2008,[Paper code 05] 22. S.Deering and R.Hinden, “Internet Protocol Version 6(IPv6) Specification”, RFC 2460, December 1998. 23. S.Tanenbaum, “Computer Networks”, Third Edition, Prentice Hall Inc., 1996, pp.686, 413-436,437-449. 24. Behrouz A.Forouzan, Third Edition, “TCP/IP Protocol Suite”. 25. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003, pp-8-10. 26. Kurose.J. & Ross.K. (2005)Computer Networking: A top-down approach featuring the Internet.3rd Ed, (Addison Wesley). 27. R.Callon and D.Haskin, “RFC2185: Routing aspects of IPv6 transition”, September 1997. 28. D.Provan,”RFC1234: Tunneling IPX traffic through IP networks”, June 1991. 29. R.Gilligan and E.Nordmark,”Transition mechanisms for IPv6 Hosts and Routers”, RFC 2893, Aug 200014. 30. R.Woodburn and D.Miills,”RFC1241: Scheme for an Internet encapsulation protocol: Version 1”, July 1991. 31. R.Atkinson and S.Kent,”Security architecture for the internet protocol”, RFC 2401, Nov.1998. 32. B.Gleeson, A.Lin, J.Heinanen, G.Armitage, and A.Malis,”A Framework for IP based Virtual Private networks”, RFC 2764, February 2000. 33. B.Carpenter and K.Moore, “Connection of IPv6 Domains via IPv4 Clouds,”RFC 3056, Feb.2001. 34.F.Templin,T.Gleeson,M.Talwar,and D.Thaler,Intra-Site Automatic Tunnel Addressing Protocol(ISATAP),draftietf-ngtrans-isatap-22,May,2004. 35. C.Huitema, Tunneling IPv6 over UDP through NATs (Treed), draft-huitema-v6ops-teredo -05, April 5, 2005. 36. S.Hanks, T.Li, D.Farinacci and P.Traina,”RFC1701: Generic Routing encapsulation (GRE)”, October 1994. Author’s Profile. Mr.Hanumanthappa.J-He received his Bachelor of Engineering Degree in Computer Science and Engineering from University B.D.T College of Engineering,Davanagere,Karnataka(S),India(C),Kuvempu University,Shimoga in the year 1998 and Master of Technology in CS & Engineering from NITK Surathkal,Karnataka(S ),India (C)in the year 2003.He has been associated as a faculty of the Department of Studies in Computer Science since 2004 and currently pursuing Ph.D in Computer Science and Engineering, from Mangalore University under the supervision of Dr.Manjaiah.D.H on entitled “INVESTIGATIONS INTO THE DESIGN,PERFORMANCE AND EVALUATION OF A NOVEL IPv4/IPv6 TRANSITION SCENARIOS IN 4G ADVANCED WIRELESS NETWORKS”.He has worked as lecturer at SIR.M.V.I.T,Y.D.I.T,S.V.I.T,of Bangalore..He has Published about 35 technical articles in International ,and National Peer reviewed conferences and also reviewed some papers.He is a Life member of CSI, ISTE,AMIE,IAENG,Embedded networking group of TIFAC–CORE in Network Engineering,ACM,Computer Science Teachers Association(CSTA),ISOC,IANA,IETF,IAB,IRTG,etc.He is also a BOE Member of all the Universities of Karnataka,INDIA.He has guided about 250 Project thesis for BE,B.Tech,M.Tech,MCA,MSc/MS. His teaching and Research interests include Computer Networks,Wireless and Sensor Networks, Mobile Ad-Hoc Networks,Intrusion detection System,Network Security and Cryptography,Internet Protocols,Mobile and Client Server Computing,Traffic management,Quality of Service,RFID,Bluetooth,Unix internals,Linux internal, Kernel Programming,Object Oriented Analysis and Design etc.Two times he has also visited Republic of China as a Visiting Faculty of HUANG HUAI University of ZHUMADIAN,Central China,to teach Computer Science Subjects like OS and System
Software and Software Engineering,Object Oriented Programming With C++,Multimedia Computing for B.Tech Students in the year 2008.He has also visited Thailand and Hong Kong as a Tourist.He is also a reviewer of peer reviewed journals like 1.IJCNS,2.IJCSIS,3.IACSIT,4.IJCSE ,5.IJCS,6.IAENG etc. Dr.Manjaiah.D.H D.H. is currently Reader and Chairman of BoS in both UG/PG in the Computer Science at Dept.of Computer Science,Mangalore University, and Mangalore.He is also the BoE Member of all Universities of Karnataka and other reputed universities in India.He received Ph.D degree from University of Mangalore, M.Tech.from NITK,Surathkal and B.E.,from Mysore University.Dr.Manjaiah.D.H D.H has an extensive academic,Industry and Research experience.He has worked at many technical bodies like IAENG,WASET,ISOC,CSI,ISTE,and ACS.He has authored more than-25 research papers in international conferences and reputed journals.He is the recipient of the several talks for his area of interest in many public occasions.He is an expert committee member of an AICTE and various technical bodies.He had written Kannada text book,with an entitled,”COMPUTER PARICHAYA”,for the benefits of all teaching and Students Community of Karnataka.Dr.Manjaiah D.H’s areas interest are Computer Networking & Sensor Networks,Mobile Communication,Operations Research,E-commerce,Internet Technology and Web programming.
This document was created with Win2PDF available at http://www.win2pdf.com. The unregistered version of Win2PDF is for evaluation or non-commercial use only. This page will not be added after purchasing Win2PDF.