An Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment

  • Hyung-Jin Lim
  • Dong-Young Lee
  • Tae-Kyung Kim
  • Tai-Myoung Chung
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3981)


Many transition mechanisms and scenarios have studied for the using of IPv6 network efficiently. The VPN in IPv4 network is the main security application. Also it is necessary to use VPN during the transition period to IPv6 network. The VPN service provides the confidentiality and integrity for transmitted packets. But there are some difficulties to connect end-to-end VPN without a conversion between IPv4 and IPv6. Therefore, we analyze the suitability of the various applying model of VPN in conjunction with the transition mechanisms and evaluate the performance cost of this model. In the case of using the transition mechanism and VPN technology simultaneous, we can know the performance factors as follows: whether end points of the VPN tunnel and IP tunnel agree upon or not, the applying place of transition mechanism and VPN model according to network environment. Therefore, it should consider carefully evaluated applying model according to the required security level and connectivity.


Transition Mechanism Internet Service Provider Home Network Tunneling Mechanism IEEE Communication Magazine 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kim, H.-K., Lim, H.-J., Hong, Y.-G., Lee, S.-Y., Chung, T.-M.: A Study on IPSec Possibility of Adaptation in IPv6 Transition Mechanisms. In: Proceedings of the 19th Korea Information Processing Society (KIPS) Spring Conference (May 2003)Google Scholar
  2. 2.
    Doraswany, N.: IPSec. Prentice-Hall, Englewood Cliffs (1999)Google Scholar
  3. 3.
    Chang, F., Waddington, D.G.: Realizing the Transition to IPv6. IEEE Communications Magazine (June 2002)Google Scholar
  4. 4.
    Gilligan, R., Nordmark, E.: Transition Mechanisms for IPv6 Hosts and Routers, RFC 2893 (August 2000)Google Scholar
  5. 5.
    Mackay, M., Edwards, C., Dunmore, M., Chown, T., Carvalho, G.: A Scenario-Based Review of IPv6 Transition Tools. IEEE Internet Computing (June 2003)Google Scholar
  6. 6.
    Wiljakka, J.: Transition to IPv6 in GPRS and WCDMA Mobile Networks. IEEE Communications Magazine (April 2002)Google Scholar
  7. 7.
    Tatipamula, M., Grossetete, P., Esaki, H.: IPv6 Integration and Coexistence Strategies for Next Generation Networks. IEEE Communication Magazine (January 2004)Google Scholar
  8. 8.
    Lind, M., Ksinant, V., Park, S., Baudot, A., Savola, P.: Scenarios and Analysis for Introducting IPv6 into ISP Networks, RFC 4029 (June 2004)Google Scholar
  9. 9.
    Huitema, C., Austein, R., Satapati, S., van der Pol, R.: Unmanaged Networks IPv6 Transition Scenarios, RFC 3750 (June 2003)Google Scholar
  10. 10.
    Bound, J.: IPv6 Enterprise Network Scenarios., Internet draft, draft-ietf-v6ops-ent-scenarios-05.txt (January 2005)Google Scholar
  11. 11.
    Srisuresh, P., Holdrege, M.: IP Network Address Translator (NAT) Terminology and Considerations, RFC 2663 (August 1999)Google Scholar
  12. 12.
    Callon, R., Haskin, D.: Routing Aspects of IPv6 Transition, RFC 2185 (September 1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Hyung-Jin Lim
    • 1
  • Dong-Young Lee
    • 1
  • Tae-Kyung Kim
    • 1
  • Tai-Myoung Chung
    • 1
  1. 1.Internet Management Technology Laboratory and School of Information and Communication EngineeringSungkyunkwan UniversitySuwon, Kyunggi-doRepublic of Korea

Personalised recommendations