Results (6)
Search Parameters:
Keyword: IPv6VoIP Codec Performance Evaluation on GRE with IPsec over IPv4 and IPv6
Scientists succeeded in implementing conventional public switch telephone network (PSTN) into internet protocol by launching H.323 IP telephony. The irrelevant and unknown captions in H.323, computer scientists have replaced H.323 by Session Initiation Protocol (SIP) for Voice-over-IP (VoIP). However, the security of voice communication over IP is still a major concern. Besides, security and performance…
Read MoreSecuring IPv6 Neighbor Discovery using Pre-Shared Key
Neighbor Discovery Protocol (NDP) is used to discover the MAC address of the connected hosts in Internet Protocol Version 6 (IPv6) in a networked environment. Neighbor Cache Entry (NCE) table holds the association between a host’s IP address and MAC address. However, according to the protocol, the MAC address could be overwritten by sending a…
Read MoreRecent Impediments in Deploying IPv6
Internet Protocol version 6 is being adopted on slow pace and it is taking a long time. This paper intends to discuss the transition process between IPv4 and IPv6 and the major obstacles that prevent deploying IPv6 worldwide. It presents the IPv4 exhaustion reports results and where are the IPv4 address pool. Then it presents…
Read MoreDevelopment and Performance Analysis of HRPL Using 6LoWPAN CC2538 Module for IoT Ecosystem
The Internet of Things (IoT) application has been experiencing increasingly progressive demand, especially for embedded devices (ED). However, the ED has limited capabilities, low power consumption resources, and low bandwidth in connecting to the Internet by using Wireless Sensor Networks (WSNs). Therefore, the WSNs form creates a necessity for new technologies and protocols for the…
Read MoreA Review of RPL Objective Function based Enhancement Approaches
Since the release of of the IPv6 Routing protocol for Low-Power and Lossy Networks by the IETF ROLL working group, several enhancement schemes were proposed. In fact, They aim to extend the network lifetime, reduce congestion, mitigate end to end delay and moderate energy consumption. In fact, considering the vast area of Low-Power and Lossy…
Read MoreScapy Scripting to Automate Testing of Networking Middleboxes
Middleboxes like load balancers are being used by all the corporations to manage and support their infrastructures. These devices see a large amount of bandwidth every day. This might include a range of protocols which might be varying from network layer to the application layer. This traffic can be corrupt or malicious thus causing these…
Read More
