an empirical analysis of ipv6 transition mechanisms 指導老師 : 黃培壝 學生 : 曾冠樺
TRANSCRIPT
An Empirical Analysis of IPv6 Transition Mechanisms
指導老師 :黃培壝學生 :曾冠樺
Author and Source
Author: Myung-Ki Shin, Hyoung-Jun Kim, Darrin Santay, Doug Montgomery
Source: Advanced Communication Technology, 2006. ICACT 2006. The 8th International conference Volume 3, 20-22 Feb. 2006 Page(s):1991 - 1996
Outline
Introduction Measurement Target and Procedures Results on End-to-End Application
Performance Conclusion
Introduction
Research Background
1.The transition between IPv4 and IPv6.
2.Several transition mechanisms have been developed.
3.Evaluate before deploy.
Introduction
Performance Degradation Prediction
Introduction
Performance Degradation Prediction
Measurement Target and Procedures Measurement Target
We have classified these mechanism considering the following factors:
1.Architectural Goal
2.Scope
3.Scenarios
Measurement Target and Procedures(a) An IPv6 node connecting to an IPv6 node
through an IPv4 network.
(b) An IPv6 node connecting to an IPv6 node through an IPv4 network supporting NAT.
(c) An IPv4 node connecting to an IPv4 node through an IPv6 network.
(d) An IPv6 node connecting to an IPv4 node.
(e) An IPv4 node connecting to an IPv6 node.
Measurement Target and Procedures
Measurement Target and Procedures Teredo
Teredo is an address assignment and automatic tunneling technology that provides unicast IPv6 connectivity across the IPv4 Internet.
Measurement Target and Procedures ISATAP
Intra-Site Automatic Tunnel Addressing Protocol
Measurement Target and Procedures Testbed Configuration
Measurement Target and Procedures Mechanism Analysis
Measurement Target and Procedures Mechanism Analysis
Measurement Target and Procedures Mechanism Analysis
Measurement Target and Procedures Mechanism Analysis
Measurement Target and Procedures Mechanism Analysis
Measurement Target and Procedures Measurement Procedures
Major measurement subject are CPU utilization, round-trip time, and connect/request/response transaction rate.
Experiments are executed for a period of 60 seconds and data ranging from 64 to 3072 bytes.
Results on End-to-End Application Performance Throughput
Results on End-to-End Application Performance Throughput
Results on End-to-End Application Performance Throughput
Results on End-to-End Application Performance RTT results
Results on End-to-End Application Performance RTT results
Results on End-to-End Application Performance CPU utilization
Results on End-to-End Application Performance connect/request/response transaction rate
Conclusion
Our goal was not to evaluate a specific router or host, but to empirically analyze impacts on transition mechanisms compared with IPv4-only and IPv6-only network performance.
Future work: We intend to investigate mechanisms with security (e.g, IPsec).