Comparative Analysis of IPv6 VPN Transition in NEMO Environments
IPv6 deployments use different NGtrans mechanisms, depending on the network situation. Therefore, a mobile network should be able to initiate secure connectivity with the corresponding home network. The correlation between transition mechanisms used in existing network and transition mechanisms supported by the mobile network, is an important factor in secure connectivity with a corresponding home network. In this paper, VPN scenarios applicable to mobile networks during the transition to IPv6, have been analyzed. In addition, performance costs have also been evaluated, in order to establish connectivity according to VPN models with each transition phase. In addition, this paper analyzes factors affecting performance, through numeric analysis for NEMO VPN model, under an IPv6 transition environment. As shown in our study, a NEMO VPN creating hierarchical or sequential tunnels should be proposed after careful evaluation of not only security vulnerabilities but also performance requirements.
KeywordsTransmission Packet Transition Mechanism Home Network Network Device Tunneling Mechanism
Unable to display preview. Download preview PDF.
- 1.Gilligan, R., Nordmark, E.: Transition Mechanisms for IPv6 Hosts and Routers. RFC 2893 (August 2000)Google Scholar
- 2.Ernst, T.: Nework Mobility Support Requirement. work in progress, Available at draft-ietf-nemo-requirements.txt (February 2003)Google Scholar
- 3.Ernst, T.: Network mobility in IPv6., Phd Thesis, University Joseph Fourier Grenoble, Francee (October 2001), Available at http://www.inria.fr/rrrt/tu-0714.html
- 4.Ernst, T.: Network Mobility Support Terminology. work in progress, available at draft-ernst-nemo-terminology.txt (November 2002)Google Scholar
- 5.Thubert, P., Molteni, M., Wetterwald, P.: IPv4 traversal for MIPv6 based Mobile Routers. work in progress, Available at draft-thubert-nemo-ipv4-traversal-01.txt (May 2003)Google Scholar
- 6.Zeadally, S., Wasseem, R., Raicu, I.: Comparison of End-System IPv6 Protocol Stacks. In: IEE Proceedings Communications, Special issue on Internet Protocols, Technology and Applications (VoIP), vol. 151(3) (June 2004)Google Scholar
- 7.Raicu, I., Zeadally, S.: Impact of IPV6 on End-user Applications. In: IEE/IEEE International Conference on Telecommunications (ICT 2003), Tahiti, Papeete, French Polynesia (February 2003)Google Scholar
- 8.Kandasamy, E., Kurup, G., Yamazaki, T.: Application Performance Analysis in Transition Mechanism from IPv4 to IPv6. In: APAN Conference, Tsukuba (February 2000)Google Scholar
- 9.Raicu, I., Zeadally, S.: Evaluating IPv4 to IPv6 Transition Mechanisms. In: IEE/IEEE International Conference on Telecommunications (ICT 2003), Tahiti, Papeete, French Polynesia (February 2003)Google Scholar
- 10.Ariga, S., Nagahashi, K., Minami, M., Esaki, H., Murai, J.: Performance Evaluation of Data Transmission using IPSec over IPv6 Networks. In: INET 2000, Yokohama (2000)Google Scholar
- 11.Lim, H.-J., Kwon, Y.-J., Chung, T.-M.: Secure VPN Performance in IP Layers. The Journal of The Korean Institute of Communication Sciences 26(11) (2001)Google Scholar
- 12.Jeffery, M., Deering, S.: Path MTU Discovery. RFC 1191 (November 1990)Google Scholar