Science topic

IPv6 - Science topic

Explore the latest questions and answers in IPv6, and find IPv6 experts.
Questions related to IPv6
  • asked a question related to IPv6
Question
1 answer
Basically I want to configure different classes in RPL.
How to configure IPv6 header field "traffic class" in cooja simulator?
any source code or example?
Relevant answer
Answer
hi,
refer this link:
best wishes..
  • asked a question related to IPv6
Question
2 answers
I am looking for doing multicast IPv6 ping to nodes connected to a border router, the border router is connected in serial to a local host (Ubuntu), so how to do multicast ping from local host to the nodes?
Relevant answer
Answer
use centikos simulator
  • asked a question related to IPv6
Question
3 answers
I am interested in pushing ipv6 implementations in SMEs, and reflecting all consequences that has on smooth operations, devops and IT security.
Relevant answer
Answer
Dear Andreas Johannsen,
the idea of SRv6 (IPv6 segment routing) will be of great importance for SMEs in the future. I just want to mention two broad use cases of SRv6 here - namely:
SRv6 Network Programming and Network Slicing with SRv6,
See for example:
Figure 009239: Basic idea of SRv6 Network Programming
Figure 9549: Significance of the symbiosis of SDN with NFV and SRv6-NP (IPv6 Segment Routing – Network Programming)
Figure 9551: Illustration of the importance of SRv6-NP for setting up network slices in vSDN
Best regards
Anatol Badach
  • asked a question related to IPv6
Question
3 answers
Due to the depletion of the global IPv4 address pool, some new Internet clients will not be able to get IPv4 adresses, but only IPv6 addresses. However the majority of the internet still uses IPv4 addresses. The IPv6 only clients should be able to communicate with the IPv4 only servers. For this problem, the combination of the DNS64 (RFC 6147) and NAT64 (RFC 6146) is a good solution.
We test different free software (also called open source) DNS64 and NAT implementations. As for DNS64, we tested BIND and TOTD.
(For our results, see: Gabor Lencse, Sandor Repas, "Performance Analysis and Comparison of Different DNS64 Implementations for Linux, OpenBSD and FreeBSD," aina, pp.877-884, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), 2013)
Besides these, we know also the PowerDNS and Unbound.
Can someone suggest other free software for DNS64 implementations?
Had anyone tested their performance and/or stability?
Relevant answer
Answer
Dear Colleagues:
Below is the up to date feasibility demonstration that you may like to have a look at.
Abe (2020-08-29 12:13 EDT)
  • asked a question related to IPv6
Question
2 answers
As im researching about the comparative study of Ipv4 and Ipv6 i need the important areas on which i study guide map.
.looking forward a positive response
Relevant answer
Answer
I think the most important area are Mobile IPv6 and security
  • asked a question related to IPv6
Question
22 answers
Dear all,
This forum has been created to provide a scientific environment in Researchgate for all of those who are interested in doing research on the context of RPL in Internet of Things (IoT) networks. Through this forum, the members could discuss about their previous RPL related studies and introduce them to others, and also to share their latest discoveries, papers, and probable ideas and more importantly to provide their experience to the newly students who want to spend time on studying the existing challenges in RPL. The students who have decided to work on this topic can join this forum and ask their questions and also to get others' opinion on their current work. There exist different types of challenges for publishing a paper from getting the raw idea, and its implementation via off-the-shelf simulation tools, to submitting the final manuscript. Here in this forum, the members will try to solve these challenges as much as possible and also try to answer the questions and help each other to enhance the observability of the existing studies. Further more, members can inform others about the up coming conferences, events, and journal special issues to further provide a comfort zone for those who are attracted to this field of study.
I hope this forum will make the research on this field more interesting and easily.
Relevant answer
Answer
Dear Sadeer,
We usually use Cooja simulator as part of the Contiki operating system, which has been specifically created for resource constrained IoT plarforms, and of course, its free to use.
  • asked a question related to IPv6
Question
11 answers
  1. Infrastructure (ex: 6LowPAN, IPv4/IPv6, RPL)
  2. Identification (ex: EPC, uCode, IPv6, URIs)
  3. Comms / Transport (ex: Wifi, Bluetooth, LPWAN)
  4. Discovery (ex: Physical Web, mDNS, DNS-SD)
  5. Data Protocols (ex: MQTT, CoAP, AMQP, Websocket, Node)
  6. Device Management (ex: TR-069, OMA-DM)
  7. Semantic (ex: JSON-LD, Web Thing Model)
  8. Multi-layer Frameworks (ex: Alljoyn, IoTivity, Weave, Homekit)
Relevant answer
Answer
Can consider Netsim and MATLAB, Contiki based Cooja Simulator.
  • asked a question related to IPv6
Question
7 answers
Can IoT networking drive adoption of IPv6?
Relevant answer
Answer
I have to agree with Jacek, the acceptance of IPv6 is no where near were we need to be. Most companies are using a dual stack ( IPv4 and IPv6) configuration until the push to fully IPv6, as a starting point. Especially IoT as Anatol has pointed out, but I am afraid that the current adoption rate is slow and like everything else in IT it will be an hurry up, we needed it yesterday, until we are all using IPv6. Just my two cents... Best Regards.
  • asked a question related to IPv6
Question
2 answers
IPv6, In security purpose, We change the client MAC address bit value number 7, but is it possible to change the multiple bit value number from client MAC address?
Relevant answer
Answer
The EUI method for forming an IPv6 address is essentially discouraged, these days, because of privacy concerns. Having a MAC address embedded in the IP address can uniquely identify each device in use, the brand, even possibly the owner.
So sure, you can vary any of the 48 bits, all of them, and you can even make the Interface ID (IID) bits short-lived, so they change frequently. The only important requirement being that the IID must be unique, within any given subnet. Or said another way, the IID bits of any host interface must be unique for any given prefix, where the prefix bits are 128 - number of IID bits.
One RFC that applies to your question is RFC 7217. It describes how to create secure IID bits for stateless address auto-configuration (SLAAC).
This document specifies a method for generating IPv6 Interface Identifiers to be used with IPv6 Stateless Address Autoconfiguration (SLAAC), such that an IPv6 address configured using this method is stable within each subnet, but the corresponding Interface Identifier changes when the host moves from one network to another. This method is meant to be an alternative to generating Interface Identifiers based on hardware addresses (e.g., IEEE LAN Media Access Control (MAC) addresses), such that the benefits of stable addresses can be achieved without sacrificing the security and privacy of users. The method specified in this document applies to all prefixes a host may be employing, including link-local, global, and unique-local prefixes (and their corresponding addresses).
  • asked a question related to IPv6
Question
4 answers
I got limited resources about IPv6 only network & hosts creation and testing over MININET. i want to test routing operation over IPv6 only network with Openflow.
Relevant answer
Answer
You can't use NS-3 since it doesnt support SDN
  • asked a question related to IPv6
Question
12 answers
I am trying to find out and propose features that can be used to detect IPv6 attacks. 
I have seen a few researchers used IP address as a feature, but I see that it can be a feature because it will cheat the classifiers which will consider that the given IPs in the training dataset are indicators for the attacks or the normal record. on another work. the classifiers will consider that the IPs that appear with attack records in the training dataset as an indicator for any recodes in the testing datasert. therefore if this model is applied online it will consider any record with one of these IPs as an attack and ignore any attack from other IPs
please give me your opinion or any resources that discussed this issue 
Thanks 
Relevant answer
Answer
Hi Omar,
I think you can use the IP Addresses as a feature for DDoS attack detection. IP Addresses represent hosts and each host has its own specific normal behaviour. As a consequence, requests from unexpected IP Addresses could be indicators for malicious activities.
However, IP Addresses are categorical attributes and you need a meaningful similarity measure. For example, you could use IP2Vec (https://ieeexplore.ieee.org/document/8215725/) to transfer IP Addresses to meaningful continuous vector representations based on their typical network connections.
Best Regards
Markus
  • asked a question related to IPv6
Question
3 answers
I am working as a research intern. My task is to prepare IPv6 datasets. I am not getting from where I should start and what is the procedure? kindly help me.
Relevant answer
Answer
Hi,
You can use cooja simulator to generate ipv6 traffic.
  • asked a question related to IPv6
Question
3 answers
IPv6 is usually seen as a key enabler technology for the internet of things, since it can easily accommodate the increasing number of smart sensors connecting to the internet. However, the possible security interactions between IPv6 and IoT devices are generally overlooked, as well as the possible inadvertent shift in the paradigm associated with the security of IoT devices. 
Relevant answer
Answer
I'm not sure if you are asking about security with respect to IPv6 specifically, or more generally, secuirty in IoT. I don't think you can make the case that IPv6 has some inherent security benefits, although in some small ways, this may be partially the case.
In the earlier days of IPv6, until not too many years ago, the thinking was that IPv6 would always be deployed along with the layer 3 IP Security protocols (IPsec, see RFC 4301 and other related RFCs). But many people opposed this mandate, because many organizations were using equally good security protocols, at other protocol layers, already, with IPv4. Besides, IPsec is just as applicable to IPv4 as it is to IPv6. So the IPsec mandate no longer applies to IPv6, and there is no reason to think that IPv6 has any significant security benefits over IPv4.
Well, to be more exact, the much greater address space does offer some benefits. As of now, most IPv6 subnets use 64-bit Interface IDs (IIDs). Makes it much more difficult to attack individual hosts, if you have 64-bits to run through, than if you only have 8 bits or fewer, as in IPv4.
So the security issues with IoT are real, but not so much unique to IPv6. There are secuity protocols available at any of the protocol layers, which can be adopted in IoT environments. Certainly MACsec (layer 2), IPsec (layer 3), and Transport Layer Security (TLS, at layer 4), would be candidates. TLS is used quite a bit on the Internet, because it only involves the applications at both ends. I would expect that TLS would also be a good candidate for IoT.
  • asked a question related to IPv6
Question
4 answers
Question related to IPV6
Relevant answer
Answer
Dear All,
Thank you very much for response and answers..
  • asked a question related to IPv6
Question
5 answers
I'm working on SDN but I have difficulties in understanding the whole SDN concepts regarding simulations and tools to use.
Relevant answer
Answer
You are welcome @Lanka Sejaphala
  • asked a question related to IPv6
Question
8 answers
In RPL (Routing Protocol for Low Power and Lossy Networks), to maintain a DAG (Directed Acyclic Graphs), each node periodically generates DIO messages triggered by the trickle timer.
If the rank value of a node has changed after recalculation (due to update of ETX after data transmission), does the node issue a DIO message to broadcast the updated rank immediately or waiting for the trickle timer?
Relevant answer
Answer
RPL topology formation:
The DODAG(destination-oriented directed acyclic graph)  is built based on the information of DODAG information object (DIO) messages (ICMPv6 messages defined in RPL). These messages contain a DODAGID, rank information, and objective function.
DIO packets are first sent by the root and then periodically by each node of the DODAG after calculation of its own rank. The rate at which the DIO messages are being sent is dynamically tuned, using the Trickle algorithm[16]. In the absence of changes in the DODAG structure, the algorithm doubles the period of the DIO messages after each transmission of a DIO messages; otherwise, the trickle timer is reset to send the DIO messages more frequently in order to propagate the updated DODAG quickly.
  • asked a question related to IPv6
Question
4 answers
RPL protocol is an IPv6 routing protocol for low power and lossy networks which its nodes may suffer from severe unreliability problems mainly because RPL measures the quality of a link only when data traffic is sent through that link.
The question is that: How the quality of a link can be measured before sending data through it in order to prevent to select a sub-optimal path?
Is there any routing protocol measures the quality of a link before sending data through it?
Relevant answer
Answer
Some Link metrics are computed by sending broadcast probe packets at an average period as the case of ETX.
  • asked a question related to IPv6
Question
4 answers
I want to make a file transfer and streaming from a IPv4 node to and IPv6 network??
I want to do a measure of delay and jitter with wireshark...
How can I do this?
Relevant answer
Answer
I will try in real netwrok environment...Tunnel broker resolve my problem? Or I should use a manual tunnel?
  • asked a question related to IPv6
Question
12 answers
I need to do a transition from Ipv4 to Ipv6, i konw how to do it, but also I want to analise/evaluate the network performance, latency, packet loss/loss rate, throughput, CPU Utilization, jitter , TTL, etc.. Anyone know how to do it?? Anyone know a software to do this analyse??
Relevant answer
Answer
Dear
As I know the latency, packet loss/loss rate, throughput was occurred by the transfer data through the link and the root of the network.
So I prefer to do deference project using OPNET simulation with two scenario for each project once with IPv4 and the other with IPv6. You should use same configuration and load in each scenario of that project. Tray to do 3-6 projects with different traffic, nodes, link then you can analyze the result.
Thanks and Good luck .
  • asked a question related to IPv6
Question
4 answers
out of Tunneling ,dual stack,Ntp-pt
Relevant answer
Answer
In my paper, I explain the vantages and not of dual stack, tunneling and translation.
But is in Portuguese...
  • asked a question related to IPv6
Question
13 answers
In RPL (Routing Protocol for Low Power and Lossy Networks) we can use ETX (Expected Transmission Count) as an OF (Objective Function) for rank computation.
Can anyone explain the relation between ETX and Path cost in RPL?
Relevant answer
Answer
hi my friend . you can see calculate about etx in this file in contiki operation system . rpl-mrhof.c. 
if you want know about etx as on of i think this file help you .
 best regard.
  • asked a question related to IPv6
Question
7 answers
I want to focus on IPv6 but don't know really how can I found a gap in cloud relates to IPv6 :(
  • asked a question related to IPv6
Question
12 answers
I have tried to do it by disabling accept_ra and autoconf feature. But, it is not working. Is there any way. Actually, I want to assign static link-local IPv6 address. But when I assign it and go for "ifconfig", it displays "TWO" IPv6 addresses. How can I stop that auto-generation of link-local IPv6?
Relevant answer
Answer
My device may be anywhere in any network setup. So I can not rely on cisco router for this.
  • asked a question related to IPv6
Question
4 answers
Does anybody have a good opinion to study in ipv6 area in term of security?
I did my reading.. and some says that main the purpose of ipv6 is to extend the use of ip for devices exist nowadays. Not much contribution in security especially in term of intrusion detection system. Anybody can give suggestion is it worthy to explore in this area?
Relevant answer
Answer
thanks for your guys awesome ideas.. im looking on them. still hope more members give respond to this. Really appreciate it very much indeed.
  • asked a question related to IPv6
Question
5 answers
Hi anybody can suggest me where can i get the standard ipv6 dataset to study intrusion? Since most of the researchers create their own dataset so very hard to find standardization in dataset used (for now)
Relevant answer
Answer
You are right, standard v6 dataset with malware traces may not exist as of yet.
I think CAIDA's dataset does not have traces of intrusion attempts.
We actually used THC-IPv6 tool to carry out attacks and intrusion attempts and captured the traffic to be used as dataset.
  • asked a question related to IPv6
Question
3 answers
The question arises from preview of mobility mechanisms for VoIP.
Relevant answer
Answer
Thank you for explanation. But "why" is it more flexible and autonomous?
The semantic of IPv6 and IPv4 address is the same - it names the interface, not the host. Thus in IPv6 there are the same problems as in IPv4 when we have multi-interface hosts. The problem most important for me is that the host cannot have single record in DNS but MUST have multiple DNS names for each IPv4/v6 interface.
In my view, IPv6 did not resolved multihoming (and mobility) problems, but added a great interoperability problem. Which explains the "high" level of IPv6' implementation in Internet.
  • asked a question related to IPv6
Question
4 answers
How IPv6 has impacted on the growth of the internet?
Relevant answer
Answer
To understand how IPv6 deployment is progressing at national and international scale, you can follow this monitoring tool :
Other useful tools and articles are published by the Center for Applied Internet Data Analysis : http://www.caida.org/home/
Hope it answers your question.
  • asked a question related to IPv6
Question
9 answers
A lot of research is going on in the field of interfacing Internet of Things(IoT) and other small ad-hoc networks such as Wireless Sensor Networks. As far as MANETs are concerned, they are already IPv6 enabled and can be integrated with IoT environment. What will be the research issues in interfacing IoT with MANETs?
Relevant answer
Answer
Hi.
There are challenges for an eventual convergence of IoT into the Radio Access Network (RAN) as part of LTE (5G or whatever comes next).
IoT main requirement is energy efficiency, as end nodes are typically energy constrained. While RAN is typically optimised for throughput and mobility. There is no trivial solution for this but several attempts instead. Weightless (from Neul, see: http://goo.gl/Tp24IT) is one road. There are others, e.g. SigFox's ultra-narrow band proposal (see: http://goo.gl/yAVBt8) and LoRa (from Semtech, see: http://goo.gl/OnKmDN).
I'd say main challenges are not in routing. Instead, security and privacy, virtualisation and cloud computing are active research areas related to IoT.
Moreover, the novelty in those existing solutions include: (i) new business models, (ii) operation in unlicensed spectrum, which is free (big savings compared to spectrum leasing) but requires special attention to interference and coexistence in the design of the PHY and DATA LINK layers, and (iii) large radio range and low-bandwidth provides for a relatively much smaller number of base stations to cover a given area, compared to "traditional" LTE RAN.
Hope it helps.
  • asked a question related to IPv6
Question
6 answers
TCP Segment Delay
Ethernet delay
Relevant answer
Answer
I am not actually sure that the assertion of a performance "penalty" in IPv6 is entirely justified, at least not as presented in the above: in some non-trivial cases, an "IPv6 performance bonus" has indeed been observed.
Eric Vyncke and Marcel Eneguehard have tried to make some 
  • asked a question related to IPv6
Question
4 answers
I require help for my research work in the telecom / networking domain. My research is on assigning/distribution of address space for devices in the telecom domain...
Relevant answer
Answer
You can also see Open h323 project ... actually meant for video conferencing over the net it contains source code and lot of information in the domain you want to work. Three is also a vibrant user group where questions/answers in this topic is exchanged. You may get good information on VoIP.
  • asked a question related to IPv6
Question
13 answers
Based on the difference between IPv4 and IPv6, should a company upgrade its networks to IPv6? Moreover, suppose you have 3 routers in a network design. Would you use static or dynamic routing to connect the routers? I would suppose IPv6 would be the way to go, and with only 3 routers, I am guessing Static would be the best option. However, I could be wrong, and this is why I am asking for some opinions on the matter.
Relevant answer
Answer
IPv6 is future of all networks and internet. To switch to the new IPv6 first you need clear plan for current and future . Be in mind that all IPv6 compatible with leayer two device. The problem and different in layer three. So ,to configure your devices base in network plan for the current and future. For example in your case it is better to use static configuration to configure your router. However in your last answer to coexistence plan by use dual stack ,for my experience all ipv6 scenario support ipv4. To do this also need clear plan .you can use native ipv6 between the router and uses tunnel ipv4 in ipv6 . Or you can you coexistence plan for the end devices. Besides, all today version of operating system support dual stack ipv6-ipv4.
  • asked a question related to IPv6
Question
3 answers
I need to know the configurations for ipv6
Relevant answer
Answer
Well you may also want to add some routing. For example a default route might look like this
ipv6 route ::/0 2001:db8:01A5:C900::1