28Apr 2018

A COMPARATIVE STUDY ON IPV4 AND IPV6.

  • Department of Computer Engineering Yildiz Technical University Istanbul, Turkey.
  • Air Force Academy, National Defense University, Istanbul, Turkey.
  • Abstract
  • References
  • Cite This Article as
  • Corresponding Author

The addresses of Internet protocol (IP) are avital resource for the Internet. In the network, IP address is assigned to every interface which connects to the Internet. The addresses are still assigned by using Internet Protocol version 4 (IPv4). IPv4 has demonstrated robust, compatibility with vast range of protocols, applications and easy implementation. IPv4 had been supposed to cover all the network interfaces, however with huge increase of the number of devices (computer, mobile, tablet, routers, server, etc) the reserve of assigned addresses is exhausted. IPv6 has been deployed for providing new services and for supporting the internet growth. This study compares the key specifications of IPv4 and IPv6, contrasts IPv4 and IPv6 header?s fields, the structure of headers, explains advantages of IPv6 and disadvantages of IPv4, and why.


  1. Abdullahi, G. A. and Mahadevan, V. 2010. Why is IPv4 still in Existence?. School of Information Science, Computer and Electrical Engineering
  2. Halmstad University,????????????? retrieved???????????? from, http://www.diva-se/smash/get/diva2:380776/FULLTEXT0 pdf
  3. AbuAli, A.N., Shayeb, I.G., Batiha, K. and Aliudos, H.Y., 2010. The Benefits of Using Internet Protocol Version 6(IPV 6). International Review on Computers and Software, 5(6), pp.583-587.
  4. Ahmed, M.M., 2006. A Comperative Study on the Performance of IPv4 and IPv6. Independent University, Bangladesh.Akamai. ???? IPv6???? Adoption?????? Visualisation. Akamai. retrieved from, https://www.akamai.com/uk/en/about/our-thinking/state-of-the-internet-report/state-of-the-internet-ipv6-adoption-visualization.jsp
  5. Ali, A.N.A., 2012. Comparison study between IPV4 & IPV6. International Journal of Computer Science Issues, 9(3), pp.314-317.
  6. Aluko, T.S., Olusanya, O.J., Oloyede, O.E. and Ebisin, A.F., 2014. Comparative Analysis between Internet Protocol Version 4 & 6 (IPv4 and IPv6). International Journal of Scientific & Engineering Research. 5(8).
  7. Aluko, T.S., Olusanya, O.J., Oloyede, O.E. and Ebisin, A.F., 2014. Comparative Analysis between Internet Protocol Version 4 & 6 (IPv4 and IPv6). International Journal of Scientific & Engineering Research, Volume 5, Issue 8.
  8. Babatunde, O. and Al-Debagy, O., 2014. A comparative review of internet protocol version 4 (ipv4) and internet protocol version 6 (ipv6). arXiv preprint arXiv:1407.2717.
  9. Bernard, H.R. and Bernard, H.R., 2012. Social research methods: Qualitative and quantitative approaches. Sage.
  10. Bi, J., Wu, J. and Leng, X., 2007. IPv4/IPv6 transition technologies and univer6 architecture. International Journal of Computer Science and Network Security, 7(1), pp.232-243.
  11. Bilski, T., 2011. From IPv4 to IPv6?data security in the transition phase. In Proc. 7th Int. Conf. Netw. Serv. ICNS 2011 (pp. 66-72).
  12. Bons, E. and Weigand, H., 2011. IPv6: Drivers and Barriers for Adopting. Department of Information Management, Tilburg University.
  13. Caicedo, C.E., Joshi, J.B. and Tuladhar, S.R., 2009. IPv6 security challenges. Computer, 42(2), pp.36-42.
  14. ?alışkan, E., 2014. IPv6 transition and security threat report. NATO CCD COE, Tallinn.
  15. Che, X. and Lewis, D., 2010. Ipv6: current deployment and migration status. International Journal of Research and Reviews in Computer Science (IJRRCS), 1(2), pp.22-29.
  16. Choudhary, A.R., 2009, November. In-depth analysis of IPv6 security posture. In Collaborative Computing: Networking, Applications and Worksharing, 2009. CollaborateCom 2009. 5th International Conference on (pp. 1-7). IEEE.
  17. Dawood, H., 2012. IPv6 security vulnerabilities. International Journal of Information Security Science, 1(4), pp.100-105.
  18. Dell, P., 2010. Two economic perspectives on the IPv6 transition. info, 12(4), pp.3-14.
  19. Dell, P., Kwong, C. and Liu, Y., 2008. Some reflections on IPv6 adoption in Australia. info, 10(3), pp.3-9.
  20. Dey, S. and Shilpa, N. 2011. Issues in IPv4 to IPv6 Migration. International Journal of Computer Applications in Engineering Sciences (IJCAES). 1 (1).
  21. Doshi, J., Chaoua, R., Kumar, S. and Mallya, S., 2012. A Comparative Study of IPv4/IPv6 Co-existence Technologies. University of Colorado, Boulder.
  22. Durdağı, E. and Buldu, A., 2010. IPV4/IPV6 security and threat comparisons. Procedia-Social and Behavioral Sciences, 2(2), pp.5285-5291.
  23. Gallaher, M.P. and Rowe, B.R., 2006. The costs and benefits of transferring technology
 
  1. infrastructures underlying complex standards: the case of IPv6. The Journal of Technology Transfer, 31(5), pp.519-544.
  2. Grossetete, P., Popoviciu, C.P. and Wettling, F., 2004. Global IPv6 strategies: from business analysis to operational planning. Cisco Press.
  3. Hanumanthappa, J. and Manjaiah, D.H., 2008. A Study on Comparison and Contrast between IPv6 and IPv4 Feature Sets.
  4. Hanumanthappa, J., 2009. IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model: A Case Study for University of Mysore Network. arXiv preprint arXiv:0908.0548.
  5. Hovav, A. and Popoviciu, C., 2009. Adoption leadership and early planners: Comcast's IP upgrade strategy. Communications of the ACM, 52(7), pp.143-146.
  6. Hovav, A. and Schuff, D., 2005. Global Diffusion of the Internet V-The Changing Dynamic of the Internet: Early and Late Adopters of the IPv6 Standard. Communications of the Association for Information Systems, 15(1), p.14.
  7. IPv6-test. ?? IPv6??????????? in?? Iraq.?????? Ipv6-test.com, retrievde from, http://ipv6-test.com/stats/country/IQ Johansson, E., 2016. Evaluation of prerequisites for an IPv4 to IPv6 transition.
  8. Kaur, A., 2015. How is digital infrastructure adopted and assimilated? The IPv6 story (Doctoral dissertation, Auckland University of Technology).
  9. Khudhair, H. E. and Mohammed, J. I. 2017. A Prototype and Roadmap for Transition to IPv6 with Performance Evaluation. Research Journal of Applied Sciences, Engineering and Technology. 14(8): 299-309.
  10. Kozierok, C.M., 2005. The TCP/IP guide: a comprehensive, illustrated Internet protocols reference. No Starch Press.
  11. Luntovskyy, A. and Spillner, J., 2017. Security in Distributed ??????????????? In??????????? Architectural
  12. Transformations in????? Network???????? Services??????? and Distributed??? Systems (pp.???????? 247-308).????????????? Springer Fachmedien Wiesbaden.
  13. Mason, A. and Mahindra, T., 2011. Report for IDA: IPv6 Adoption Guide for Singapore.
  14. Minoli, D. and Kouns, J., 2016. Security in an IPv6 environment. CRC Press.
  15. Oki, E., Rojas-Cessa, R. and Vogt, C., 2012. Advanced internet protocols, services, and applications. John Wiley & Sons.
  16. Sabir, M.R., Fahiem, M.A. and Mian, M.S., 2009, January. An overview of IPv4 to IPv6
  17. transition and security issues. In Communications and Mobile Computing, 2009. CMC'09. WRI International Conference on (Vol. 3, pp. 636-639). IEEE.
  18. Shah, H., 2013. Comparing TCP-IPv4/TCP-IPv6
  19. Network Performance. University of Missouri- Columbia.
  20. Shah, J. and Parvez, J., 2015. Security Issues in Next Generation IP and Migration Networks. IOSR Journal of Computer Engineering, 17(1), pp.13-18.
  21. Sharma, P. and Singla, R. M. 2016. A Detail Comparative Review on IPv4/IPv6 Dual Stack Co-existence Techniques. International Journal of Innovative Research in Computer and Communication Engineering. 4(4).
  22. Sotillo, S., 2006. Ipv6 security issues. Scanning.
  23. Tavakoli Momtaz, M. and Swanson, M., 2015. IPv4 to IPv6 Transition and Security.
  24. Ullrich, J., Krombholz, K., Hobel, H., Dabrowski, A. and Weippl, E.R., 2014, August. IPv6 Security: Attacks and Countermeasures in a Nutshell. In WOOT.
  25. White, G.L., Shah, J.R. and Cook, J.R., 2005. Internet Technology in 2010: The Issue of IPv6 Adoption in the USA. Journal of International Technology and Information Management, 14(3), p.5.
  26. Wieringa, F., de Laat, C. and Visser, M.R., 2012. IPV6 risks and vulnerabilities Project Report.
  27. Wu, P., Cui, Y., Wu, J., Liu, J. and Metz, C., 2013. Transition from IPv4 to IPv6: A state-of-the-art survey. IEEE Communications Surveys & Tutorials, 15(3), pp.1407-1424.
  28. Yadav, A., Abad, P., Shah, H. and Kaul, A., 2012. IPv6 protocol adoption in the US: Why is it so slow?. Capstone paper, University of Colorado, May, 4.
  29. B?ckstr?m, I., 2009. Performance measurement of IP networks using the two-way active measurement protocol. Skolan f?r datavetenskap och kommunikation, Kungliga Tekniska h?gskolan.
  30. Clark, A. and Claise, B., 2011. Guidelines for Considering New Performance Metric Development
  31. Dawood, H., 2012. IPv6 security vulnerabilities. International Journal of Information Security Science, 1(4), pp.100-105.
  32. Dhall, H., Dhall, D., Batra, S. and Rani, P., 2012, January. Implementation of IPSec protocol. In Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on (pp. 176-178). IEEE.
  33. Gilad, Y. and Herzberg, A., 2013, September. Plug-and-play IP security. In European Symposium on Research in Computer Security (p. 257). Springer, Berlin, Heidelberg.
  34. 2012. IPv6 Introduction and Configuration. International Technical Support Organization, pp. 15-17
  35. Kocak, C. and Zaim, K., 2017, May. Performance measurement of IP networks using Two-Way Active Measurement Protocol. In Information Technology (ICIT), 2017 8th International Conference on p. 249. IEEE.
  36. Malik, R. and Syal, R., 2010. Performance analysis of IP security VPN. International Journal of Computer Applications, 8(4), p.6
  37. Sameeha, M.A.A., 2012. Look at IPV6 Security advantages over IPV4. Network and Complex Systems, ISSN, pp. 34-35
  38. Sharma, G., 2014. Implementation of IPv6. Rovaniemi University Of Applied Sciences School Of Technology. pp. 19, 31-32
  39. Sotillo, S., 2006. Ipv6 security issues. Scanning, p.4
  40. Soumyalatha, N., Ambhati, R.K. and Kounte, M.R., 2013, August. Performance evaluation of ip wireless networks using two-way active measurement protocol. In Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on p. 1896 IEEE.
  41. Stallings, W., 2011. Cryptography and network security: principles and practices. Pearson Education India.

[Ahmed A. Radif Al-khafaji and Hasan H. Balik (2018); A COMPARATIVE STUDY ON IPV4 AND IPV6. Int. J. of Adv. Res. 6 (Apr). 1073-1083] (ISSN 2320-5407). www.journalijar.com


Ahmed A. Radif Al-khafaji
Yildiz Technical University Istanbul, Turkey

DOI:


Article DOI: 10.21474/IJAR01/6953      
DOI URL: https://dx.doi.org/10.21474/IJAR01/6953