Comparative study of Internet Protocol

In today's generation, most of today's Internet is using IPv4, Now twenty years old. IPv4 is now uploading with the Problem of meeting growing Internet requirements and it is a shortage of IPv4 addresses, which are necessary for all new the machines added to the Internet.IPv6, fixes a series of problems In IPv4 addresses. It also adds many improvements to IPv4 and provides a better network. IPv6 is expected to gradually replace IPv4, with the two coexisting for several years during a transition period. As the population is increasing day by day, similarly the Internet isAlso growing and expanding more and more and more and more,Government, scientists and universities are looking for new waysTo send information quickly and powerfully The two new InternetsDevelop new and faster technologies to improve research andCommunication, and both projects are expected toEventually improve the current commercial Internet. A big advantage of IPv6 is that it simplifies and solves the problem. The scarcity of IP addresses. In today's Internet technology, Controls in the United States 74% of the 4 million IP addresses, while the amount that China has is equal only to the University California, but its share of 80 million users. This is the main reason Asian countries, especially China, Japan and South Korea, Show interest in IPv6 version technology.

[1]  Jun-ichiro itojun Hagino,et al.  An IPv6-to-IPv4 Transport Relay Translator , 2001, RFC.

[2]  Fazlullah Khan,et al.  Secure communication and routing architecture in wireless sensor networks , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).

[3]  Syed Roohullah Jan,et al.  Applications of Wireless Sensor Networks in Food and Agriculture Sectors , 2016 .

[4]  Jonathan Rodriguez,et al.  CANDi: context‐aware node discovery for short‐range cooperation , 2015, Trans. Emerg. Telecommun. Technol..

[5]  Kenji Nakagawa,et al.  Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[6]  Xiangjian He,et al.  Frame Interpolation for Cloud-Based Mobile Video Streaming , 2016, IEEE Transactions on Multimedia.

[7]  F. Han,et al.  APPLICATIONS , LIMITATIONS , AND IMPROVEMENTS IN VISIBLE LIGHT COMMUNICATION SYSTEMS , 2016 .

[8]  Firooz B. Saghezchi,et al.  Energy and Throughput Analysis of Reservation Protocols of Wi Media MAC , 2013 .

[9]  Muhammad Qayyum,et al.  Education and Socio Economic Factors Impact on Earning for Pakistan - A Bigdata Analysis , 2016 .

[10]  Fazlullah Khan Fairness and throughput improvement in multihop wireless ad hoc networks , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).

[11]  Farman Ullah,et al.  A Survey: Embedded Systems Supporting By Different Operating Systems , 2016, ArXiv.

[12]  Muhammad Noman Hayat,et al.  Review of Cluster-based Energy Routing Protocols for WSNs , 2016 .

[13]  Stephen J. Nadas,et al.  Virtual Router Redundancy Protocol (VRRP) Version 3 for IPv4 and IPv6 , 2010, RFC.

[14]  Muhammad Alam,et al.  CoAP-Based Request-Response Interaction Model for the Internet of Things , 2016 .

[15]  Fahim Arif,et al.  Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[16]  YED,et al.  SURVEY: DEALING NON-FUNCTIONAL REQUIREMENTS AT ARCHITECTURE LEVEL , 2016 .

[17]  Fazlullah Khan,et al.  Congestion Detection and Mitigation Protocols for Wireless Sensor Networks , 2016 .

[18]  F. Khan,et al.  Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.

[19]  Zafar Iqbal,et al.  Secure and Safe Surveillance System Using Sensors Networks - Internet of Things , 2016 .

[20]  Jonathan Rodriguez,et al.  Context-aware cooperative testbed for energy analysis in beyond 4G networks , 2017, Telecommun. Syst..

[21]  Pekka Nikander,et al.  Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks , 2010, IEEE Communications Surveys & Tutorials.

[22]  Jyoteesh Malhotra,et al.  Security Issues and Attacks in Wireless Sensor Networks , 2015 .

[23]  Xiangjian He,et al.  Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..

[24]  Shahzad Khan,et al.  Performance improvement in wireless sensor and actor networks based on actor repositioning , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).

[25]  Xiangjian He,et al.  Survey of Error Concealment techniques: Research directions and open issues , 2015, 2015 Picture Coding Symposium (PCS).

[26]  Brian E. Carpenter,et al.  Transmission of IPv6 over IPv4 Domains without Explicit Tunnels , 1999, RFC.

[27]  David L. Black,et al.  Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers , 1998, RFC.

[28]  Zahid Khan,et al.  Performance Analysis of Vehicular Adhoc Network Using Different Highway Traffic Scenarios in Cloud Computing , 2016 .

[29]  Firooz B. Saghezchi,et al.  Towards 5G: Context Aware Resource Allocation for Energy Saving , 2015, Journal of Signal Processing Systems.

[30]  Hiroshi Kitamura,et al.  A SOCKS-based IPv6/IPv4 Gateway Mechanism , 2001, RFC.