Search Results

Results (6)

Search Parameters:

Keyword: IPv6
Order results
Results per page
Open AccessArticle
7 Pages, 546 KB Download PDF

VoIP Codec Performance Evaluation on GRE with IPsec over IPv4 and IPv6

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 260–266, 2021; DOI: 10.25046/aj060528
Abstract:

Scientists succeeded in implementing conventional public switch telephone network (PSTN) into internet protocol by launching H.323 IP telephony. The irrelevant and unknown captions in H.323, computer scientists have replaced H.323 by Session Initiation Protocol (SIP) for Voice-over-IP (VoIP). However, the security of voice communication over IP is still a major concern. Besides, security and performance…

Read More
(This article belongs to Section -)
Open AccessArticle
11 Pages, 818 KB Download PDF

Securing IPv6 Neighbor Discovery using Pre-Shared Key

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 722–732, 2021; DOI: 10.25046/aj060284
Abstract:

Neighbor Discovery Protocol (NDP) is used to discover the MAC address of the connected hosts in Internet Protocol Version 6 (IPv6) in a networked environment. Neighbor Cache Entry (NCE) table holds the association between a host’s IP address and MAC address. However, according to the protocol, the MAC address could be overwritten by sending a…

Read More
(This article belongs to Section Network Engineering (ENW))
Open AccessArticle
6 Pages, 691 KB Download PDF

Recent Impediments in Deploying IPv6

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 336–341, 2021; DOI: 10.25046/aj060138
Abstract:

Internet Protocol version 6 is being adopted on slow pace and it is taking a long time. This paper intends to discuss the transition process between IPv4 and IPv6 and the major obstacles that prevent deploying IPv6 worldwide. It presents the IPv4 exhaustion reports results and where are the IPv4 address pool. Then it presents…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 1,896 KB Download PDF

Development and Performance Analysis of HRPL Using 6LoWPAN CC2538 Module for IoT Ecosystem

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1217–1224, 2020; DOI: 10.25046/aj0506145
Abstract:

The Internet of Things (IoT) application has been experiencing increasingly progressive demand, especially for embedded devices (ED). However, the ED has limited capabilities, low power consumption resources, and low bandwidth in connecting to the Internet by using Wireless Sensor Networks (WSNs). Therefore, the WSNs form creates a necessity for new technologies and protocols for the…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 368 KB Download PDF

A Review of RPL Objective Function based Enhancement Approaches

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 201–211, 2020; DOI: 10.25046/aj050525
Abstract:

Since the release of of the IPv6 Routing protocol for Low-Power and Lossy Networks by the IETF ROLL working group, several enhancement schemes were proposed. In fact, They aim to extend the network lifetime, reduce congestion, mitigate end to end delay and moderate energy consumption. In fact, considering the vast area of Low-Power and Lossy…

Read More
(This article belongs to Section Network Engineering (ENW))
Open AccessArticle
6 Pages, 1,060 KB Download PDF

Scapy Scripting to Automate Testing of Networking Middleboxes

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 293–298, 2020; DOI: 10.25046/aj050238
Abstract:

Middleboxes like load balancers are being used by all the corporations to manage and support their infrastructures. These devices see a large amount of bandwidth every day. This might include a range of protocols which might be varying from network layer to the application layer. This traffic can be corrupt or malicious thus causing these…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026