Statistical Traffic Modeling for Network Intrusion Detection
MASCOTS '00 Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
Web of Things as a Framework for Ubiquitous Intelligence and Computing
UIC '09 Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing
A detailed analysis of the KDD CUP 99 data set
CISDA'09 Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications
Research on Campus Network IPV6 Transition Technology
ISIE '11 Proceedings of the 2011 International Conference on Intelligence Science and Information Engineering
International Journal of Business Data Communications and Networking
Hi-index | 0.00 |
The Network performance optimization, configuration depends on proper design of complete network. The network layer is primarily concerned with routing. The packets may cross many networks to reach the destination during this process. To achieve its goals, the network layer must know about the topology, communication subnets and the version of the IP addresses used. The present version of IP is version 4 which must communicate with the next generation of IP addresses which is version 6. As both the versions of Internet Protocol must co-exist, we need some mechanisms that can help the transition process run smoothly. The old applications which are still using IP v4 should work smoothly with IP v6. We discuss IPv6 secure tunneling mechanism that has some advantages over the other models. The model discussed here can be used to establish hybrid communications between the two different versions of Internet protocol in both ways.