2001
DOI: 10.17487/rfc3056
|View full text |Cite
|
Sign up to set email alerts
|

Connection of IPv6 Domains via IPv4 Clouds

Abstract: Connection of IPv6 Domains via IPv4 Clouds Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
168
0
2

Year Published

2007
2007
2013
2013

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 236 publications
(170 citation statements)
references
References 1 publication
0
168
0
2
Order By: Relevance
“…Specifically the IPv6 address lookup mechanism is a major drawback in the forwarding performance in the today"s v4-v6 enabled routers in BD-TTCS translator. Since 1997,large number of LPM algorithms have been introduced,e.g [6][7][8][9][10][11][12][13].To store the routing entries into the memory it introduces the important concept like bitmap for the first time. The main idea of binary search on prefix length using hash tables, the complexity of hash tables, the complexity which is not relevant to the number of routing entries but it is only related to the number of distinct prefix length in a routing In the first scenario, they connected two identical computers using a point-to-point connection.…”
Section: 1divide and Conquermentioning
confidence: 99%
“…Specifically the IPv6 address lookup mechanism is a major drawback in the forwarding performance in the today"s v4-v6 enabled routers in BD-TTCS translator. Since 1997,large number of LPM algorithms have been introduced,e.g [6][7][8][9][10][11][12][13].To store the routing entries into the memory it introduces the important concept like bitmap for the first time. The main idea of binary search on prefix length using hash tables, the complexity of hash tables, the complexity which is not relevant to the number of routing entries but it is only related to the number of distinct prefix length in a routing In the first scenario, they connected two identical computers using a point-to-point connection.…”
Section: 1divide and Conquermentioning
confidence: 99%
“…"Connection of IPv6 Domains via IPv4 Clouds" [6TO4] can be used to support enterprises that do not have an assigned IPv6 prefix address.…”
Section: Recognizing Incompatible Network Touchpointsmentioning
confidence: 99%
“…Tunnel Brokers can be used to provide tunnel setup for an enterprise using manually configured tunnels and 6TO4 [6TO4]. Tunnel Brokers can automate the use of tunnels across an enterprise deploying IPv6.…”
Section: Recognizing Incompatible Network Touchpointsmentioning
confidence: 99%
“…When IPv6 hosts on different edges of the network are separated by IPv4 capable routers, an encapsulation mechanism is used to setup 6in4 or 6over4 tunneling [2]. Thus tunneling of IPv6 datagrams takes place by encapsulating them within IPv4 packets.…”
Section: Protocol Encapsulationmentioning
confidence: 99%