Conference Paper

A Study on Comparison and Contrast between IPv6 and IPv4 Feature Sets.

Conference: International Conference on Computer Networks and Security (ICCNS-2008)


This document provides an analysis and comparison
of IPv4 and IPv6 under various circumstances. It is well
understood that IPv6 has been designed to replace IPv4. We have
done a feature-by-feature comparison and contrast of IPv6 versus
IPv4 and found that IPv6 offers many unique opportunities for
increasing a network architectures efficiency and agility. In some
sense, there is a competition going on between these protocols, as
they are not directly compatible, and network providers and users
are being forced to determine whether to support one or both
protocols for various network services. The new version of IP,(i.e.
IPv6), constitutes an effort to overcome the inborn limitations of
IPv4, in order for the new protocol be able to respond to the new
needs as they shape today in the Internet. This paper is aimed to
discuss about various comparison issues when porting an IPv4
application to IPv6 with focus on issues that an application
developer would face rather than a complete API reference.IPv4 is
the incumbent and currently has the most widespread usage for
conventional Internet applications.IPv6 is a large-scale re-design
and re-engineering of IPv4, based on many lessons learned as the
IPv4-based Internet grew and was used in unforeseen ways

  • Source
    • "the tunnels are widely used in nowadays networks , this mechanism can transport IPv6 packets through IPv4 networks .Tunneling technology only requires both ends of the tunnel equipment to support both protocols , and each tunnel should be established between two endpoints manually or automatically. This mechanism will be used when two hosts that are using ipv6 want to communicate with each other and they intend to pass their packets through IPv4 zone ,so IPv6 packet will be as a data in IPv4 packet[1][3]. The advantages of this method that it enables the island IPv6 end systems and routers to communicate through an existing IPv4 infrastructure , and the IPv6 packets will be putted and transported over IPv4 network without being modified. "
    [Show abstract] [Hide abstract]
    ABSTRACT: The new Internet Protocol (IPv6) has been developed to replace the current Internet Protocol (IPv4) and the transition from IPv4 to IPv6 is a necessary process in the realization of global Internet. The development of IPv6 technology and continuous increases in application, but this process will take long time so a transition methods will be needed. There are many IPv4/IPv6 transition methods already exist today, some of them applied in practice, the others still as proposed solutions. Tunneling and encapsulation methods are the most techniques that used until now, but all encapsulation mechanisms suffer from the increasing of the overhead traffic network as a result for either encapsulating IPv4 packet in the IPv6 packet or encapsulating IPv6 packet in the IPv4 packet. In this paper we proposed a system that make incompatible nodes; the first based IP4 the other based IPv6, communicate together without increasing packets size, this system is called Bi-Directional Transition System (BDTS). This system depends on understanding of the two environment of transmission , that is , received the source packet then converting the information header to be adaptable to the destination end. Our system has been implemented then we made a test by simulation tool called VMware ,during this simulation our system was studied in one scenario and the results shown that BDTS make two incomputable protocol hosts communicate together.
    Full-text · Article · Dec 2012
  • Source
    • "The OSI model is composed of seven ordered layers physical(layer1),Data link(layer2),Network(layer3), Transport(layer4), Session(layer5), Presentation(layer6), Application layer(7), To reduce the design complexity, computer networks follow a layered architecture[1].Each layer clearly defines based on the previous layers and has a set of well defined functions with clear cut boundaries. Also with layered architecture the implementation details of each layer is independent of other layers.Fig.2.shows the layers involved when a message is sent from device A to device B.As a message travels from A to B it may pass through many intermediate nodes. "
    [Show abstract] [Hide abstract]
    ABSTRACT: The Internet protocol was started in early 1980.In the earlys1990’s the Internet was growing some temporary solutions were offered in order to cover the fast growth in number of Internet user’s such as Network address translation (NAT), CIDR (Classless Inter domain Routing).At the Same time IETF began working to develop a new Internet Protocol namely IPv6 which was designed to be a Successor to the IPv4 Protocol. This paper proposes the new concept of error handling at network layer (layer-3) instead of data link layer (layer-2) in ISO/OSI reference model by adopting new capabilities and by using IPv6 over Fiber. This paper also shows how to reduce the over head In terms of header processing at data link layer by eliminating cyclic redundancy check (CRC) field by using IPv6 over Fiber. Therefore we can also prove that ISO/OSI model contains 6 layers instead of 7 layers.
    Full-text · Conference Paper · Jan 2010
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Bluetooth is a recently proposed standard communications protocol for wireless personal area networks and it has become a defacto standard for short range ad-hoc radio connections. Security concern is one of the important problems delaying the mass adoption of Bluetooth and IPv6.This paper focuses study on security issues, security aspects of IPv6 over Bluetooth security mechanisms. It presents the security issues in various circumstances and challenges arising from the integration of Internet IPv6 over the short range wireless communicating protocol called Bluetooth. Its explains briefly an overview of Bluetooth and describes some of the major issues that need to be addressed, if it is to be successful as a wireless networking technology. After an overview of general Bluetooth protocol a security frame work is introduced for the description of Bluetooth security paradigm, then both link level and service level schemes are discussed in detail on the basis of paradigms. It also explains how to analyze what are the various drawbacks of Bluetooth security issues over IPv6 security issues
    Full-text · Conference Paper · Jan 2009
Show more