2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) 2014
DOI: 10.1109/iccicct.2014.6993065
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of applications in manual 6in4 tunneling and native IPv6/IPv4 environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
3
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 11 publications
1
3
0
Order By: Relevance
“…Manual tunneling showed a slight increase in latency across all classes. This was expected due to the operation of the tunnel process and confirms results found in [6]. The reduction in latency for the automatic tunneling suggests more efficient tunnel establishment than for manual tunneling confirming findings from [13].…”
Section: Fig 6 Traffic Class Average Delay Variation (Msec)supporting
confidence: 84%
See 2 more Smart Citations
“…Manual tunneling showed a slight increase in latency across all classes. This was expected due to the operation of the tunnel process and confirms results found in [6]. The reduction in latency for the automatic tunneling suggests more efficient tunnel establishment than for manual tunneling confirming findings from [13].…”
Section: Fig 6 Traffic Class Average Delay Variation (Msec)supporting
confidence: 84%
“…A number of studies have compared the performance of 6in4 tunneling compared to pure IPv4 or IPv6 [6], [7], [8]. Unsurprisingly they determine that throughput is slightly increased due to the additional header and agree that native IPv6 has lower end-to-end delay than IPv4.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The only feasible option is IPSec ESP in Tunnel mode which does not cause incompatibilities. NAT also elevates problems for IKE negotiations if the parameters are modified [9], [10]. For example while using pre-shared key authentication in main mode; the address change can lead to tossing out packets.NAT can also lead to overlapping Security Association Database (SAD) entries when multiple nodes behind the NAT try to make a contact with same host.…”
Section: Issues With Ipsecmentioning
confidence: 99%