787 research outputs found

    IPv4 to IPv6 Transition Engine

    Get PDF
    The transition from IPv4 to IPv6 will be a major issue in the next few years, as IPv6 deployment began. In this report, we present the outcome of a study on this subject. It is composed of an initial addressing algorithm, the tool implementing this algorithm, and a routing configuration generator

    Automatic IPv4 to IPv6 Transition D2.2 - Transition Engine Specification and Implementation

    Get PDF
    Over the last decade, IPv6 has established itself as the most mature network protocol for the future Internet. While its acceptance and deployment remained so far often limited to academic networks, its recent deployment in both core networks of operators (often for management purposes) and its availability to end customers of large ISPs demonstrates its deployment from the inside of the network leading to the edges. For many enterprises, the transition is seen as a tedious and error prone task for network administrators. In the context of the Cisco CCRI project, we aim at providing the necessary algorithms and tools to automate the transition. In this report, we present the first outcome of this work, namely an analysis of the transition procedure and a model of target networks on which our automatic approach will be experimented. We also present a first version of a set of transition algorithms that will be refined through the study

    A Monitoring Approach for Safe IPv6 Renumbering

    Get PDF
    Network renumbering is a very interesting feature of IPv6. It is also one of the most risky procedure which needs special attention in the management plane. In this paper we identify the challenges of renumbering and demonstrate how monitoring can improve this process. We also present an implementation of a monitoring framework and share the experience gained in its deployment

    Automatic IPv4 to IPv6 Transition D3.1 - Secured Transition Engine

    Get PDF
    Over the last decade, IPv6 has established itself as the most mature network protocol for the future Internet. While its acceptance and deployment remained so far often limited to academic networks, its recent deployment in both core networks of operators (often for management purposes) and its availability to end customers of large ISPs demonstrates its deployment from the inside of the network leading to the edges. For many enterprises, the transition is seen as a tedious and error prone task for network administrators. In the context of the Cisco CCRI project, we aim at providing the necessary algorithms and tools to automate the transition. In this report, we present the security policy that must be deployed on the site in conjunction with the addressing plan

    Automatic IPv4 to IPv6 Transition D1.2 - Network representation and pre-requisites

    Get PDF
    Over the last decade, IPv6 has established itself as the most mature network protocol for the future Internet. While its acceptance and deployment remained so far often limited to academic networks, its recent deployment in both core networks of operators (often for management purposes) and its availability to end customers of large ISPs demonstrates its deployment from the inside of the network leading to the edges. For many enterprises, the transition remains an issue today. This remains a tedious and error prone task for network administrators. In the context of the Cisco CCRI project, we aim at providing the necessary algorithms and tools to enable this transition to become automatic. In this report, we present the first outcome of this work, namely an analysis of the transition procedure and a model of target networks on which our automatic approach will be experimented. We also present a first version of a set of transition algorithms that will be refined through the study

    Automatic IPv4 to IPv6 Transition - D2.1 Metric and Addressing Algorithm

    Get PDF
    Over the last decade, IPv6 has established itself as the most mature network protocol for the future Internet. While its acceptance and deployment remained so far often limited to academic networks, its recent deployment in both core networks of operators (often for management purposes) and its availability to end customers of large ISPs demonstrates its deployment from the inside of the network leading to the edges. For many enterprises, the transition remains an issue today. This remains a tedious and error prone task for network administrators. In the context of the Cisco CCRI project, we aim at providing the necessary algorithms and tools to enable this transition to become automatic. In this report, we present the first outcome of this work, namely an analysis of the transition procedure and a model of target networks on which our automatic approach will be experimented. We also present a first version of a set of transition algorithms that will be refined through the study

    Autonomic Renumbering in the Future Internet

    Get PDF
    International audienceIPv6 is an essential building block of the evolution towards the future Internet. To take the full benefit of this protocol and exploit all its features, the future Internet needs to gracefully couple it with autonomics. In this paper we demonstrate through our experience with network renumbering how the coupling of both IPv6 core functionality extended with major functions of the autonomic world can lead to fully autonomous activities of main management functions. We instantiate the notions of self-configuration, self-monitoring, self-protection and self-healing in the network renumbering process and show how they can altogether make renumbering a real success. We illustrate the various functions with the tools we implemented to support them over the last three years

    Automated and Secure IPv6 Configuration in Enterprise Networks

    Get PDF
    International audienceOver the last decade, IPv6 has established itself as the most mature network protocol for the future Internet. Its recent deployment in core networks of operators, its availability to end customers of multiple ISPs together with the availability of native access to large services like Google assess the increasing penetration of IPv6. While its deployment from the inside of the network leading to the edges is successful, the transition remains an issue today for many enterprises which see it as a tedious and error prone task for network administrators. To fill this gap, we present the necessary algorithms and provide the supporting tools to enable this transition to become automatic. Based on a model of an IPv4 network, we describe the algorithms to build an optimized IPv6 adressing scheme and to automatically generate the adequate security plan as well as the corresponding configurations for the different devices in the network

    Self-harm in UK armed forces personnel: Descriptive and case-control study of general hospital presentations

    Get PDF
    Background Little is known about self-harm in the armed forces. Aims To investigate the characteristics of armed forces personnel presenting to a general hospital following self-harm and compare these with matched controls who had self-harmed. Method Investigation of armed forces personnel presenting to hospital between 1989 and 2003 following self-harm and case-control comparison with people in the general population who had self-harmed. Results One hundred and sixty-six armed forces personnel presented with self-harm during the study period, of whom 72.3% (120) were male. Nearly two-thirds (62.7%) were aged under 25 years. Relationship problems (62.0%), employment problems (43.9%) and alcohol misuse (40.5%) were common. Fewer armed forces personnel than controls had evidence of current or past psychiatric disorders or treatment or a prior history of self-harm, and their suicidal intent was lower (males only). Of 64 people in the armed forces who presented during the first 9 years of the study period, 1 had died (from natural causes) by the end of 2000, compared with 9 (5.1%) of the controls, 6 by probable suicide. Conclusions Self-harm by armed forces personnel may often be a response to interpersonal and employment problems complicated by alcohol misuse, with relatively low suicide intent
    • …
    corecore