39 research outputs found

    Introduction to Information Technology

    Get PDF
    Today, the term “information technology” has described to encompass many aspects of computing and technology, and the term is more recognizable than ever before. The information technology area can be quite large, covering many fields. IT professionals perform a variety of duties that range from installing applications to designing complex computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems

    Reconnaissance Attack on IPv6 to IPv4 Tunneling

    Get PDF
    Internet Protocol version 6 (IPv6) is created to occupy the insufficient current Internet addresses. Consequently this significant contribution offers huge number of Internet addresses. Besides, their security also has been improved to challenge today threats in competent on IPv6 network. As alternative, an automatic tunneling was introduced along with other transition mechanisms to ensure smooth implementation on existing network. However, it’s believed that the implementation of automatic tunneling has altered the form of the IPv4 threats. Then the gained information from this mechanism is exploited to attempt the target network. As a concern, this paper thoroughly describes on potential of reconnaissance attack reach through automatic tunneling named 6to4 Tunneling. The preference development tools and networking defense mechanism suite, is setup to conduct proposed attack method under 6to4 tunnel testbed environment. As a result, the attacking method is feasible to attempt and 6to4 tunnel showed their influence on the achievement of DoS attack in current internet

    Network performance evaluation of 6to4 tunneling

    Get PDF
    Several types of IPv6 transition mechanisms have been developed to facilitate the migration of IPv4 to the new protocol, IPv6. Although all transition mechanisms have the same objective, the process necessitates compliance with their respective capabilities. This paper focuses on the evaluation of the transition mechanisms namely 6to4 tunneling in terms of data transmission. The assessment is based upon experimental work that is conducted on a controlled environment. User-to-user network performance software is used to obtain the throughput, round trip time and tunneling overhead for TCP and UDP transmission protocol. The performance of TCP and UDP through 6to4 tunnel is then compared over the native IPv4 and IPv6 environment. As a result, the findings prove the ease of TCP data transmission via the tunnel compared to both native networks. In contrast, the UDP implementations show the slight difference for them. © 2012 IEEE

    Voice Over Internet Protocol Performance Evaluation in 6to4 Tunneling Network

    Get PDF
    Registry reported that their regional already in exhausted state. The IPv6 was proposed to substitute IPv4 network, but the implementation of this version cased many problems such as hardware compatibility. As temporary solution to this problem, 6to4 tunneling transition mechanism is introduced as one of many solutions. This mechanism used IPv4 network as communication media between two IPv6 networks. Thus, this kind of mechanism will affect the performance of Voice over Internet Protocol. VoIP demanded real-time communication by using UDP protocol between nodes. Unlike normal communication mode, real-time mode required data to be sent immediately ignoring the quality of data. This research evaluated the performance of 6to4 tunneling mechanism for Voice over Internet Protocol’s communication between two nodes in native IPv6 networks.

    Network performance evaluation of 6to4 tunneling

    Get PDF
    Several types of IPv6 transition mechanisms have been developed to facilitate the migration of IPv4 to the new protocol, IPv6. Although all transition mechanisms have the same objective, the process necessitates compliance with their respective capabilities. This paper focuses on the evaluation of the transition mechanisms namely 6to4 tunneling in terms of data transmission. The assessment is based upon experimental work that is conducted on a controlled environment. User-to-user network performance software is used to obtain the throughput, round trip time and tunneling overhead for TCP and UDP transmission protocol. The performance of TCP and UDP through 6to4 tunnel is then compared over the native IPv4 and IPv6 environment. As a result, the findings prove the ease of TCP data transmission via the tunnel compared to both native networks. In contrast, the UDP implementations show the slight difference for them. © 2012 IEEE

    Proactive Multi-Copy Routing Protocol For Urban Vehicular Ad Hoc Network

    Get PDF
    A vehicular network topology is very dynamic compared to traditional mobile ad hoc network because of the movement and speed of the vehicles. Thus, a vehicular network is always partitioned due to this reason, especially if the vehicle density is low. In this situation where a direct end-to-end path between source and destination can be considered as non-existent, a regular ad hoc routing protocol with complete path discovery mechanism is not feasible since the routing path is usually disconnected due to the intermittent nature of network links. To overcome this problem, vehicles can be used as carriers to deliver messages using store-and-carry forwarding whenever forwarding option via wireless transmission is not available. It has been ascertained by the majority of researches in VANET that the carry and forward procedure can significantly affect an end-to-end delivery delay. This paper focuses on developing a proactive multi-copy routing protocol with carry and forward mechanism that is able to deliver packets from a source vehicle to a destination vehicle at a small delivery delay. The paper emphases on replicating data packets and distribute them to different relays. The proposed protocol creates enough diversity to reach the destination vehicle with a small end-to-end delivery delay while keeping low routing overhead by routing multiple copies independently. The simulation results in an urban grid model show that the proposed multi-copy forwarding protocol is able to deliver packets at small delivery delay compared to a single-copy forwarding algorithm without having to rely on real time traffic data or flooding mechanis

    Feasible Threats By Manipulating Tunneling Packet On 6to4 Network

    Get PDF
    Tunneling mechanism becomes the most delicate transition mechanism compared to other transition mechanism, Dual Stack and Address Translation because tunneling offers easier way to start migrating from IPv4 to IPv6 and offers a smooth transition. 6to4 tunneling is automatic tunneling to conquer migration issues. In fact, tunnel transition mechanism is believed to be susceptible from several type of attacks. On 6to4 tunneling, Neighbor Discovery Protocol message becomes a potential media to exploit by attacker. It starts with deploying a controlled testbed network environment and running several scenario DoS attack by manipulating NDP message through 6to4 tunneling. The expected result is to prove that attacking methods is feasible and effective
    corecore