Next generation internet protocol -Technical realms

Even as the rate of IPv6 deployment increases, there continues to be a number of key technical, operational and political challenges that have limited the overall adoption rate of IPv6. This paper is intended to explore the IPv6 technical features, advantages, research improvements, potential business benefits. This paper also investigates how some of the challenges have slowed the transition process to date and will also address some of the common myths about IPv6 adoption. A special attention is paid on this paper to highlight the key issues behind the IPv6 co-existence with IPv4 and to accelerate and promote the research directions. The paper will help the companies and enterprises to realize the benefits and move to the immediate deployment of IPv6 enterprise environments globally.

[1]  Joseph Davis,et al.  Understanding IPv6 , 2002 .

[2]  Nitin H. Vaidya,et al.  Weak duplicate address detection in mobile ad hoc networks , 2002, MobiHoc '02.

[3]  Li-Hsing Yen,et al.  Proactive DAD: A Fast Address-Acquisition Strategy for Mobile IPv6 Networks , 2006, IEEE Internet Computing.

[4]  S. Pink,et al.  Performance of QoS agents for provisioning network resources , 1999, 1999 Seventh International Workshop on Quality of Service. IWQoS'99. (Cat. No.98EX354).

[5]  David Green,et al.  Internet Protocol Version 6 , 2008, IEEE Security & Privacy.

[6]  Wen-Kang Jia,et al.  Challenge and solutions of NAT traversal for ubiquitous and pervasive applications on the Internet , 2009, J. Syst. Softw..

[7]  Masayuki Murata,et al.  PIA-SM: multicast based IPv6 anycast routing protocol , 2006, Int. J. Internet Protoc. Technol..

[8]  Jun Murai,et al.  R&D activities and testbed operation in WIDE project , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[9]  Youn-Hee Han,et al.  Design and evaluation of an address configuration and confirmation scheme for IPv6 mobility support , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[10]  Prasad Rao,et al.  Automatic management of network security policy , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[11]  P. Kirstein,et al.  Integrating Voice over IP Services in IPv4 and IPv6 Networks , 2007, 2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07).

[12]  James B. D. Joshi,et al.  IPv6 Security Challenges , 2009, Computer.

[13]  Thierry Ernst,et al.  ANEMONE: A Pan-European Testbed to Validate IPv6 Mobility Technologies , 2007, 2007 International Symposium on Applications and the Internet Workshops.

[14]  Scott O. Bradner,et al.  The Recommendation for the IP Next Generation Protocol , 1995, RFC.

[15]  Jon Postel,et al.  Internet Registry IP Allocation Guidelines , 1996, RFC.

[16]  Damien Galand,et al.  A functional architecture for self-aware routers , 2004, SAC '04.

[17]  Tsan-Pin Wang,et al.  Fast Duplicate Address Detection for Seamless Inter-Domain Handoff in All-IPv6 Mobile Networks , 2007, Wirel. Pers. Commun..

[18]  Stephen E. Deering,et al.  IP Version 6 Addressing Architecture , 1995, RFC.

[19]  Walid Dabbous,et al.  Survey and taxonomy of IP address lookup algorithms , 2001, IEEE Netw..

[20]  Hannes Tschofenig,et al.  A Survey of Protocols to Control Network Address Translators and Firewalls , 2007 .

[21]  William Stallings,et al.  SNMP and SNMPv2: the infrastructure for network management , 1998, IEEE Commun. Mag..

[22]  G. Huston,et al.  Interconnection, Peering and Settlements , 2003 .

[23]  Keecheon Kim,et al.  IPv6 stateless address auto-configuration in mobile ad-hoc network (T-DAD) and performance evaluation , 2005, PE-WASUN '05.

[24]  Christopher Edwards,et al.  A Scenario-Based Review of IPv6 Transition Tools , 2003, IEEE Internet Comput..

[25]  Rune Hylsberg Jacobsen,et al.  Opportunities for IP in Communications Beyond 3G , 2005, Wirel. Pers. Commun..

[26]  Zeashan Hameed Khan,et al.  Hierarchical Wireless Network Architecture for Distributed Applications , 2009, 2009 Fifth International Conference on Wireless and Mobile Communications.

[27]  Pekka Nikander,et al.  Securing IPv6 neighbor and router discovery , 2002, WiSE '02.