Академический Документы
Профессиональный Документы
Культура Документы
by
APPROVED:
Professor Dr. M. Abdus Sobhan,
, Chairperson
, Member
, Member
, Member
Supervisory Committee
ACCEPTED:
___________________________________________
Director
School of Engineering and Computer Science (SECS)
ABSTRACT
In this thesis, a comparative study on the performance analysis of IPv4 and IPv6
protocol stacks under Microsoft Windows 2003 Standard Server and Red Hat Linux
Enterprise version 4 in point-to-point and router-to-router architectures have been
done in terms of bandwidth utilization (throughput) for different data sizes, round trip
time (latency) computation and overhead variation calculation. Real-time experiments
have been carried out for the above-mentioned architectures in the laboratory. For
point-to-point architecture, two PCs were configured at IPv4 and IPv6 under the
Windows and Linux operating platforms respectively. For router-to-router
architecture, two PCs and two IPv4 and IPv6-enabled CISCO 2811 routers were
configured at IPv4 and IPv6 protocols under the same operating platforms
respectively.
From the experimental results, we find that IPv6 incurs around 1 to 5% and 9 to 20%
more overhead in point-to-point and router-to-router architecture respectively under
both Windows and Linux platforms in comparison to those at IPv4. Though
theoretically IPv4 and IPv6 overhead difference benchmarking is 1.44%, but we find
here a little bit more due to its lack of maturity and still IPv6 is in its developing
stage. We also find some performance differences between the Linux and Windows
platforms for both in IPv4 and IPv6 implementations. This may be due to the
differences in the internal architectures of the two operating systems. Linux performs
better than Windows due to its kernel Buffer Allocation Strategies (BAS). The BAS
of Windows platform is perhaps weaker than its Linux counterpart.
iii
We also find that router-to-router tunneling performs always better than the host-tohost tunneling in all cases. Our inference is that host-to-host tunneling incurs more
overhead than the router-to-router tunneling; because routing devices work at layer 3
(network layer) level only, where memory, storage and processor are used by routers
(network layer), whereas for the host-to-host tunneling the operations take place over
all the layers.
iv
ACKNOWLEDGMENTS
Dr. M. Abdus Sobhan, my research advisor, is truly a one of a kind professor and
mentor. I do not even want to think where I might have been if I would not have met
him; I owe him everything for overseeing my research and advising me. Special
thanks go to the two most learned professors in my graduate career, Prof. Mohammed
Anwer and Prof. M. Abdus Sobhan for everything they have taught me about parallel
computing and computer networks respectively and the academic world in general. It
was their patience, expertise, and teaching ability that shaped me into what I am today
and made my thesis possible.
I like to extend my thanks to the faculty members, Dr. Indrani Haque, Dr. M.
Rokonuzzaman, Dr. Feroz Ahmed and Dr. Khosru M. Selim of SECS for their
support to my works.
Special thanks go to Mr. Nazmul Kabir, In-Charge of the SECS office for his wholehearted cooperation during my works.
I would like to thank to my friends, classmates and colleagues for their cooperation to
my thesis works.
I would like to thank Md. Badrudozza Swapan to inspire me to complete this course. I
especially want to thank my friend, Ioan Raicu, for his valuable suggestions. It is
obvious that without my parents, Late Mohammad Syed Ahmed and Monowara
Begum, my brother, Monir, my sister Momota and also my beloved wife Zishan Ara
who sacrificed her valuable time for me to prepare this thesis. None of my current
achievements would have been possible without her silent support. Family is truly the
most important part of my life.
TABLE OF CONTENTS
Page
LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ix
LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
CHAPTER
1
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2
1.3
LITERATURE REVIEW . . . . . . . . . . . . . . . . . . . . .
2.2
A LAYERING APPROACH.
IPv6 ACCOMPLISHMENT..
15
31
2.3
2.4
34
35
35
METHODOLOGY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
41
3.1
vi
41
CHAPTER
3.2
Page
STUDYING LAYERING APPROACHES AND ARCHITECTURES
OF IPv4 AND IPv6
41
3.3
41
3.4
EXPERIMENTAL . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..
42
44
4.1
PERFORMANCE METRICS.............. . . . . . . . . . . . . . . .
44
45
46
54
CONCLUSION..
58
59
60
CONCLUSION.
vii
64
CHAPTER
6
Page
65
6.1
INTRODUCTION.
65
6.2
65
65
66
67
68
69
72
7.1 CONCLUSION....
72
HARDWARE SPECIFICATIONS . . . . . . . . . . . . . . . . . . . . 76
SOFTWARE SPECIFICATIONS . . . . . . . . . . . 76
78
79
LIST OF TABLES
Table
Page
15
ix
33
LIST OF FIGURES
Figure
Page
10
20
22
28
28
29
29
35
36
37
38
39
47
47
48
49
49
50
50
xi
51
4.13 Round Trip Time Results for IPv4/IPv6 under Linux with data
size ranging from 5.12 to 61.44 MB.
52
4.14 Round Trip Time Results for IPv4/IPv6 under Linux and Windows
with data size ranging from 5.12 to 61.44 MB.
52
53
54
54
56
56
57
xii
4.24 Round Trip Time Results for IPv4/IPv6 under Linux and Windows
with data size ranging from 5.12 to 61.44 MB.. 58
5.1 Host-to-Host Tunneling Architecture.... 59
5.2 Router-to-Router Tunneling Architecture.
60
60
5.4 Bandwidth Utilization Results for IPv4(IPv6) Host-to-Host, Routerto-Router Tunneling and IPv6 Router-to-Router infrastructure under
Windows and Cisco with data size ranging from 5.12 to 61.44 MB....
61
62
5.8 Round Trip Time Results for IPv4 (IPv6) Tunneling under Windows
and Cisco with data size ranging from 5.12 to 61.44 MB. 63
5.9 Round Trip Time Results for IPv4 (IPv6) Tunneling under Linux and
Cisco with data size ranging from 5.12 to 61.44 MB..... .. 63
5.10 Round Trip Time Results for IPv4 (IPv6) Tunneling under Linux,
Windows, Cisco platforms with data size ranging from 5.12 to 61.44 MB...64
xiii
PREFACE
In this thesis, we attempt to introduce the reader with some fundamental process of
transition mechanism of the Internet Protocol (IP) version 4 to 6. This paper presents
detailed knowledge of protocols what is actually needed to know whoever wants to be
in Internet related profession like system administrator, network administrator,
network engineer and network manager, especially to look for the design and
implementation of IPv6 enabled application and network.
The Author
xiv
CHAPTER 1
INTRODUCTION
1.1
INTRODUCTION
IP plays a
key role to get popularity of Internet. The huge success of the Internet is pushing IPv4
to its limits [1]. Internet Engineering Task Force (IETF) [2] took initiative to address
the limitations of IPv4 in 1990s. IPv4 uses a 32-bit field to identify host interfaces
known as Internet Protocol Addresses. When IPv4 was designed 32 bits were enough
and the IETF never thought of any limitations of IPv4 for support such a big network
like Internet. This 32-bit field is becoming restrictive nowadays; an Internet Address
is in short supply. The IETF began to design a successor to IPv4: IPv6 ((Internet
Protocol version 6). IPv6 [3] is the new version of the Internet Protocol and it has
several improvements. It has extended addressing capabilities; the address field is
128-bits in length. With IPv6, we a have a far greater address space (3.4238
addresses), we can connect more devices to the Internet without breaking the end-toend principle, create a complex address hierarchy and benefit from simpler
configuration. IPv6 also provides an improved header format and routers are able to
process the IPv6 header in a more efficient way. Options (e.g. mobility and security)
are a patch in the IPv4 header but, in IPv6, such features are part of the protocol
(using the new extension header format).
In summary, the Internet will be even more scalable with IPv6 than with IPv4. The
Internet is still using IPv4, but IPv6 is now being widely deployed in research
networks, and this deployment is a critical issue. In the future it is possible that the
Internet will be IPv6 only but, until that moment, IPv4 and IPv6 must coexist. IPv6
deployment must not disrupt the current Internet and, somehow, IPv4 and IPv6 must
coexist. This is accomplished by special mechanisms, named transition mechanisms,
which allow communication between the IPv4 and the IPv6 world. Transition
mechanisms have been designed and implemented but they provide less forwarding
speed than a native communication (IPv4 to IPv4 or IPv6 to IPv6) and some of them
are difficult to deploy.
The proposed study intend to examine the performance of both the IPv4 and IPv6
protocols in two different platforms, namely Microsoft Windows 2003 Server and
Red Hat Linux Enterprise Version 4 on identical hardware and IPv6 transition
mechanism. Our experiments were conducted over an unloaded network using two
routers and two workstations.
1.2
The broad objective of the study is to compare the two protocol stacks (IPv4 and
IPv6) and transition mechanism to IPv6. Specific objectives are:
i.
ii.
iii.
1.3
Chapter 2 covers some theoretical developments and literature review about IPv4 and
IPv6 in general, and some of the fundamental differences between the two network
protocols stack; it also describes various transition mechanisms that are available
when upgrading from IPv4 to IPv6. Chapter 3 explains the methodology to achieve
the objectives of the study. In chapter 4, explains testing results of IPv4 versus IPv6
under two different platforms with various matrices. Chapter 5 focuses on the
transition mechanisms evaluation. Chapter 6 covers results and discussions of the
performance. Chapter 7 furnishes conclusion and suggestion for further works.
Finally, Appendices A, B, C, D, E, F which includes Hardware, Software, Theoretical
IP packet overhead, Testing Tools specifications, IPv6 configuration (for Cisco,
Windows and Linux platforms), and some testing result logs respectively.
CHAPTER 2
LITERATURE REVIEW AND THEORETICAL DEVELOPMENT
The main objectives of this chapter are to introduce the theoretical concept of IPv4
and IPv6 and its transition mechanism. We discussed some papers on the issue. In
near future, we are going to use IPv6 with IPv4 protocol, but we need to see the
architectural differences and relation among them. For this reason, we are motivated
to find out the gap or advantages and disadvantages of the two protocols.
2.1
LITERATURE REVIEW
Though, there exist several analyses on IPv4 and IPv6 protocol stacks under different
implementation environments like Windows NT, Windows 2000. IPv6 protocol stack
was not that much mature that time, but in recent version under Microsoft Windows
2003 Server, Red Hat Linux Enterprise Version 4 are quite mature and can be used in
the industry. It is difficult to test IPv6 functionalities under Cisco router in real time
Internet use. Some experiments used software router and PC (Personal Computer)
environment which actually do not give the real results. It is often impossible to
arrange such latest equipment in a laboratory because of its high cost.
Moreover, we tested two different platforms, namely Microsoft Windows 2003 Server
and Red Hat Linux Enterprise version 4, side by side, throughout all of our
experiments; we covered both TCP and UDP transport protocols. Our metrics
included bandwidth utilization (throughput), round trip time (latency) parameters. The
following paragraphs cover some of the related work that we are going to do.
Writers (Marc E. Fiuczynski, Vincent K. Lam and Brian N. Bershad) [4] develop a
translator program under Windows NT which maps IPv4 to IPv6. To evaluate the
performance of the translator they used the ttcp tool to measure bandwidth and ping to
measure latency between a pair of IPv6 and IPv4 hosts. They compare the packet
forwarding performance of the IPv6/IPv4 translator with NTs built-in IPv4
forwarding support. They actually evaluate the performance of own develop
translator, not IPv6 implementation in Windows NT.
Ioan Raicu [5] only concentrated on obtaining RTT for as many scenarios as he could,
gathering data from packet transfers from 64 B to 64 KB under TCP, UDP, IPv4,
IPv6, Windows NT 4.0, Windows 2000. He experimented with socket buffers of
various sizes, but came to the conclusion that in todays world of high speed networks
in the Gbits/s bandwidth, larger buffers would be preferred over smaller ones. He
used 60 KB buffers for all the displayed results. It is a similar experiment we are
going to do. But he did not do throughput test what we did in our experiment.
Writers (Yi Wang, Shaozhi Ye and Xing Li) [6] present a measurement study of
current IPv6 performance conducted CERNET (China Education and Research
Network). They study 685,680 packet-level traces with 133,340 million packets
collected from 936 IPv6/IPv4 dual stack Web servers located in 44 countries. Their
measurement results show that IPv6 connections tend to have smaller round trip times
than their IPv4 counterparts, but suffer higher packet loss rate at the same time. They
also notice that tunneled paths do not show a notable degraded performance compared
with native paths. They actually test IPv6 in a loaded network and in different sties
IPv6 enabled web server using wget and tcpdump in FreeBSD platform. This test
may not show real performance difference of IPv6 due to loaded network and some
times some network may not work properly due to various reasons. However, they
optimistic about the IPv6 performance in comparison with IPv4 results. They tested
application performance under IPv6 and Pv4 environments.
IPv6 testing [7] can be divided into four basic categories: conformance, functional,
performance, and application [8]. The author performed only application test on
different applications named web, ftp, email etc. In this test-lab they measured only
application response time. They test under Linux platform only, so we did not get real
scenario for comparison with other platforms.
Authors (Yi Wang, Shaozhi Ye, Xing Li) [9] evaluated the MSR IPv6 BETA protocol
stack for Windows NT 4.0. The author evaluated the performance of MSR IPv6
protocol stack by measuring and analyzing its network latency, throughput, and
processing overheads. Their test-lab consisted of two Pentium machines with
100Mbps fast Ethernet connected via an unloaded switch. The work presented seems
interesting and contains only a small part of our work. First of all, it only evaluated
IPv6 and did not compare it with IPv4. Secondly, they only evaluated the Windows
NT implementation and did not compare it with any other implementations. It is to
notice that there were no routers involved in their experimentation and only connected
the hosts with a switch. Obviously the findings they made are nearly obsolete since
IPv6 and computing hardware evolved so much since 1999. For example the MSR
IPv6 protocol stack has been replaced by the Windows 2000 IPv6 Preview Protocol
Stack. Regardless, their work showed very interesting initial results on IPv6.
Ioan Raicu [10] evaluated the performance of data transmission over IPv4 and IPv6
using various security protocols. The authors choose a particular application, namely
digital video (DV) transmission in order to execute their experiments. They utilized
end hosts with FreeBSD 2.2.8 and KAME IPv6 protocol stack and a router
implemented in a PC platform also running FreeBSD 2.2.8 and KAME IPv6 protocol
stack. The criticism of this work lies in the fact that the routers utilized obviously did
not support most of the router functions in the hardware and therefore the depicted
performance is lower than the performance in a real world scenario in which actual
hardware routers could be utilized. One of the other criticisms is that they only
covered small sample of the test we performed. They utilized two different buffer
sizes (57344 bytes and 32769 bytes), which makes no sense; it is a known fact that
when performing experiments of this nature, the buffer size is kept constant
throughout all the experiments. They claim that the MTU size they used was either
1024 or 4096 bytes; however IP routers do not support MTU sizes above 1514 bytes.
They might have had the functionality to change the MTU size beyond the maximum
due to the software router implementation they were using. Obviously such a large
MTU size might yield falsely higher than usual results. The only place where they
mentioned the data size, they specified 32 KB data, but they called it the socket size.
As an overall evaluation, the depicted results are interesting, but not complete in the
sense of depicting real world performance.
After reading all the literature related to our work performed by a section of the
research community, we are motivated to start a performance analysis with newly
introduced IPv6 protocol in different platforms and transition mechanism with
identical hardware.
2.2
A LAYERING APPROACH
Layering approach [10] is one of the major reasons network architectures have been
so successful. One great success story is the Internet, which shows how robust and
scalable it has been despite the initial design goals which did not foresee the
exponential growth that it inured.
Layering helps break complex problems into smaller and more manageable pieces. It
helps reduce design complexity and simplifies the design and testing protocols Sender
and receiver software can be tested, designed and implemented independently.
Layering prevents changes in software from propagation to other layers. It allows
designers to construct protocol suites and allows ease of change regarding an
implementation of a service. Some of its drawbacks include some performance loss,
time delay, and perhaps having more than 1 copy of data at any given moment.
Obviously, these drawbacks are quickly overshadowed by all the advantages of a
layered approach to designing protocols.
The basic definition of layering is that the layer N software on the receiving machine
should receive the exact message sent by the layer N software at the sender machine.
2.3
IPv6 ACCOMPLISHMENT
IPv6 provides capabilities that go beyond larger address. These include a streamlined
packet format, support for source routing, as well as integrated authentication and
encryption for enhance security. Also of importance is a key difference between the
IPv4 and IPv6 architectures; IPv4 is 32-bits aligned, whereas IPv6 is 64-bits aligned.
As a result, when 64-bit processors are used, IPv6 packets can be processed much
faster than IPv4 packets.
10
0s, making the entire IPv4 header an integral number of 32-bits (4 bytes). With a
maximum value of 0xF, the maximum size of the IPv4 header including options is 60
bytes (154).
Type of Service Indicates the desired service expected by this packet for delivery
through routers across the IPv4 internetwork. The size of this field is 8 bits, which
contain bits for precedence, delay, throughput, and reliability characteristics.
Total Length Indicates the total length of the IPv4 packet (IPv4 header + IPv4
payload) and does not include link layer framing. The size of this field is 16 bits,
which can indicate an IPv4 packet that is up to 65,535 bytes long.
Identification Identifies this specific IPv4 packet. The size of this field is 16 bits.
The Identification field is selected by the originating source of the IPv4 packet. If the
IPv4 packet is fragmented, all of the fragments retain the Identification field value so
that the destination node can group the fragments for reassembly.
Flags Identifies flags for the fragmentation process. The size of this field is 3 bits;
however, only 2 bits are defined for current use. There are two flagsone to indicate
whether the IPv4 packet might be fragmented and another to indicate whether more
fragments follow the current fragment.
Fragment Offset Indicates the position of the fragment relative to the original IPv4
payload. The size of this field is 13 bits.
Time to Live Indicate the maximum number of links on which an IPv4 packet can
travel before being discarded. The size of this field is 8 bits. The Time-to-Live field
(TTL) was originally used as a time count with which an IPv4 router determined the
length of time required (in seconds) to forward the IPv4 packet, decrementing the
TTL accordingly. Modern routers almost always forward an IPv4 packet in less than a
11
second and are required by RFC 791 to decrement the TTL by at least one. Therefore,
the TTL becomes a maximum link count with the value set by the sending node.
When the TTL equals 0, an ICMP Time Expired-TTL Expired in Transit message is
sent to the source IPv4 address and the packet is discarded.
Protocol Identifies the upper layer protocol. The size of this field is 8 bits. For
example, TCP uses a Protocol of 6, UDP uses a Protocol of 17, and ICMP uses a
Protocol of 1. The Protocol field is used to demultiplex an IPv4 packet to the upper
layer protocol.
Header Checksum Provides a checksum on the IPv4 header only. The size of this
field is 16 bits. The IPv4 payload is not included in the checksum calculation as the
IPv4 payload and usually contains its own checksum. Each IPv4 node that receives
IPv4 packets verifies the IPv4 header checksum and silently discards the IPv4 packet
if checksum verification fails. When a router forwards an IPv4 packet, it must
decrement the TTL. Therefore, the Header Checksum is recomputed at each hop
between source and destination.
Source Address Stores the IPv4 address of the originating host. The size of this field
is 32 bits.
Destination Address Stores the IPv4 address of the destination host. The size of this
field is 32 bits.
Options Stores one or more IPv4 options. The size of this field is a multiple of 32
bits. If the IPv4 option or options do not use all 32 bits, padding options must be
added so that the IPv4 header is an integral number of 4-byte blocks that can be
indicated by the Internet Header Length field.
12
The IPv6 specification is defined in RFC 2460 [3]. RFC 2460 summarizes the
following changes from IPv4 to IPv6:
13
bits. The Payload Length field includes the extension headers and the upper layer
PDU. With 16 bits, an IPv6 payload of up to 65,535 bytes can be indicated. For
payload lengths greater than 65,535 bytes, the Payload Length field is set to 0 and the
Jumbo Payload option is used in the Hop-by-Hop Options extension header.
Next Header Indicates either the first extension header (if present) or the protocol in
the upper layer PDU (such as TCP, UDP, or ICMPv6). The size of this field is 8 bits.
When indicating an upper layer protocol above the Internet layer, the same values
used in the IPv4 Protocol field are used here.
Hop Limit Indicates the maximum number of links over which the IPv6 packet can
travel before being discarded. The size of this field is 8 bits. The Hop Limit is similar
to the IPv4 TTL field except that there is no historical relation to the amount of time
(in seconds) that the packet is queued at the router. When the Hop Limit equals 0, an
ICMPv6 Time Exceeded message is sent to the source address and the packet is
discarded.
Source Address Stores the IPv6 address of the originating host. The size of this field
is 128 bits.
Destination Address Stores the IPv6 address of the current destination host. The size
of this field is 128 bits. In most cases the Destination Address is set to the final
destination address. However, if a Routing extension header is present, the
Destination Address might be set to the next router interface in the source route list.
Values of the Next Header Field
14
Table 2.1 shows the typical values of the Next Header field for an IPv6 header or an
IPv6 extension header.
Table 2.1 Values of the Next Header Field of IPv6
Value (in decimal) Header
0
TCP
17
UDP
41
43
Routing Header
44
Fragment Header
46
50
51
Authentication Header
58
ICMPv6
59
No next header
60
15
remaining 8 bits identify the Host. A total of 2,097,152 Class C addresses are
possible, with addresses 0 and 2,097,151 reserved. Class D addresses begin with a
binary 1110 and are intended for multicasting purpose. Class E addresses begin with a
binary 1111 and are reserved for future use. It also supports subnetting and Classless
Interdoamin Routing.
The IPv6 Address Space
The most obvious distinguishing feature of IPv6 is its use of much larger addresses.
The size of an address in IPv6 is 128 bits, which is four times the larger than an IPv4
address. A 32-bit address space allows for 232 or 4,294,967,296 possible addresses.
A 128-bit address space allows for 2128 or 340,282,366,920,938,463,463,374,
607,431,768,211,456 (or 3.41038) possible addresses.
In the late 1970s when the IPv4 address space was designed, it was unimaginable that
it could be exhausted. However, due to changes in technology and an allocation
practice that did not anticipate the recent explosion of hosts on the Internet, the IPv4
address space was consumed to the point that by 1992 it was clear that a replacement
would be necessary.
With IPv6, it is even harder to conceive that the IPv6 address space will be consumed.
To help put this number in perspective, a 128-bit address space provides
655,570,793,348,866,943,898,599 (6.51023) addresses for every square meter of the
Earths surface.
It is important to remember that the decision to make the IPv6 address 128 bits in
length was not so that every square meter of the Earth could have 6.51023 addresses.
Rather, the relatively large size of the IPv6 address is designed to be subdivided into
hierarchical routing domains that reflect the topology of the modern-day Internet. The
16
use of 128 bits allows for multiple levels of hierarchy and flexibility in designing
hierarchical addressing and routing that is currently lacking on the IPv4-based
Internet.
The IPv6 addressing architecture is described in RFC 3513.
IPv6 Address Syntax
IPv4 addresses are represented in dotted-decimal format. This 32-bit address is
divided along 8-bit boundaries. Each set of 8 bits is converted to its decimal
equivalent and separated by periods. For IPv6, the 128-bit address is divided along
16-bit boundaries, and each 16-bit block is converted to a 4-digit hexadecimal number
and separated by colons. The resulting representation is called colon-hexadecimal.
The following is an IPv6 address in binary form:
0010000111011010000000001101001100000000000000000010111100111011
0000001010101010000000001111111111111110001010001001110001011010
The 128-bit address is divided along 16-bit boundaries:
0010000111011010 0000000011010011 0000000000000000 0010111100111011
0000001010101010 0000000011111111 1111111000101000 1001110001011010
Each 16-bit block is converted to hexadecimal and delimited with colons. The result
is:
21DA:00D3:0000:2F3B:02AA:00FF:FE28:9C5A
IPv6 representation can be further simplified by removing the leading zeros within
each 16-bit block. However, each block must have at least a single digit. With leading
zero suppression, the address representation becomes:
21DA:D3:0:2F3B:2AA:FF:FE28:9C5A
17
IPv6 Prefixes
The prefix is the part of the address that indicates the bits that have fixed values or are
the bits of the subnet prefix. Prefixes for IPv6 subnets, routes, and address ranges are
expressed in the same way as Classless Inter-Domain Routing (CIDR) notation for
IPv4. An IPv6 prefix is written in address/prefix-length notation. For example,
21DA:D3::/48 is a route prefix and 21DA:D3:0:2F3B::/64 is a subnet prefix.
Types of IPv6 Addresses
There are three types of IPv6 addresses:
Unicast
A unicast address identifies a single interface within the scope of the type of unicast
address. With the appropriate unicast routing topology, packets addressed to a unicast
address are delivered to a single interface.
Multicast
A multicast address identifies multiple interfaces. With the appropriate multicast
routing topology, packets addressed to a multicast address are delivered to all
interfaces that are identified by the address. A multicast address is used for one-tomany communication, with delivery to multiple interfaces.
Anycast
An anycast address identifies multiple interfaces. With the appropriate routing
topology, packets addressed to an anycast address are delivered to a single interface,
the nearest interface that is identified by the address. The nearest interface is
defined as being closest in terms of routing distance. An anycast address is used for
one-to-one-of-many communication, with delivery to a single interface.
18
In all cases, IPv6 addresses identify interfaces, not nodes. A node is identified by any
unicast address assigned to one of its interfaces.
Links and Subnets
Similar to IPv4, an IPv6 subnet prefix is assigned to a single link. Multiple subnet
prefixes can be assigned to the same link. This technique is called multinetting.
Unicast IPv6 Addresses
The following types of addresses are unicast IPv6 addresses:
Global unicast addresses
Link-local addresses
Site-local addresses
Unique local IPv6 unicast addresses
Special addresses
Global Unicast Addresses
Global unicast addresses are equivalent to public IPv4 addresses. They are globally
routable and reachable on the IPv6 portion of the Internet.
Figure 2.4 shows the structure of global unicast addresses currently being allocated by
IANA, as defined in RFC 3587.
19
Figure 2.5
The public topology is the collection of larger and smaller ISPs that provide access to
the IPv6 Internet. The site topology is the collection of subnets within an
organizations site. The interface identifier identifies a specific interface on a subnet
within an organizations site. For more information about global unicast addresses,
see RFC 3587.
20
21
22
Loopback address
The loopback address (0:0:0:0:0:0:0:1 or ::1) is used to identify a loopback interface,
enabling a node to send packets to itself. It is equivalent to the IPv4 loopback address
of 127.0.0.1.
Compatibility Addresses
To aid in the migration from IPv4 to IPv6 and the coexistence of both types of hosts,
the following addresses are defined:
IPv4-compatible address
The IPv4-compatible address, 0:0:0:0:0:0:w.x.y.z or ::w.x.y.z (where w.x.y.z is the
dotted decimal representation of an IPv4 address), is used by IPv6/IPv4 nodes that are
communicating using IPv6.
IPv4-mapped address
The IPv4-mapped address, 0:0:0:0:0:FFFF:w.x.y.z or ::FFFF:w.x.y.z, is used to
represent an IPv4-only node to an IPv6 node.
6to4 address
The 6to4 address is used for communicating between two nodes running both IPv4
and IPv6 over an IPv4 routing infrastructure.
Multicast IPv6 Addresses
In IPv6, multicast traffic operates in the same way that it does in IPv4. Arbitrarily
located IPv6 nodes can listen for multicast traffic on an arbitrary IPv6 multicast
address. IPv6 nodes can listen to multiple multicast addresses at the same time. Nodes
can join or leave a multicast group at any time.
23
24
25
27
28
Figure 2.14 The conversion of a universally administered, unicast IEEE 802 address
to an IPv6 interface identifier
29
30
C.1.A.2.F.3.E.F.F.F.0.0.A.A.2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.C.E.F.IP6.ARPA.
The DNS support described in RFC 1886 represents a simple way to both map host
names to IPv6 addresses and provide reverse name resolution.
Following table 2.2 shows the key differences between IPv4 and IPv6 protocol.
Introduction to IP Version 6 published by Microsoft Corporation dated February
2006 [12] where a detail description presented on IPv6 and its features and address
format etc. All this key issues are defined in the various Requests for Comments RFC lead by Internet Engineering Task Force IETF. The left side of the table
represents IPv4s features and the right side represents IPv6s features.
Table 2.2 Differences between IPv4 and IPv6 [12]
IPv4
IPv6
31
From the above table we understood the difference of both IPv4 and IPv6 protocol
and now we look in to the IPv4 addresses and IPv6 equivalents as under:
Table 2.3 IPv4 Addresses and IPv6 Equivalents [12]
IPv4 Address
IPv6 Address
Broadcast addresses
Unspecified address is ::
Public IP addresses
Autoconfigured addresses
(169.254.0.0/16)
32
From the above tables we understood the difference of both IPv4 and IPv6 protocol
and IP addresses and now we look in to the differences of header fields of both
protocols as under:
Table 2.4 Comparing the IPv4 and IPv6 Headers [13]
IPv4 Header Field
Version
Type of Service
Total Length
Identification
Fragmentation Flags
Fragment Offset
Time to Live
33
Header Checksum
Source Address
Destination Address
Options
The one new field in the IPv6 header that is not included in the IPv4 header is the
Flow Label field.
2.4
The designers of IPv6 recognize that the transition from IPv4 to IPv6 will take years
and that there might be organizations or hosts within organizations that will continue
to use IPv4 indefinitely. Therefore, while migration is the long-term goal, equal
consideration must be given to the interim coexistence of IPv4 and IPv6 nodes. There
are different types of node exist in the network such as [14] IPv4-only, IPv6-only,
IPv6/IPv4 node, IPv4 node and IPv6 node. There are different types of compatibility
addresses such as IPv4-compatible addresses, IPv4-mapped addresses, 6over4
addresses, 6to4 addresses, ISATAP addresses, Teredo addresses. To coexist with an
IPv4 infrastructure and to provide an eventual transition to an IPv6-only
infrastructure, the following mechanisms are used.
34
The dual IP layer [15] is an implementation of the TCP/IP suite of protocols that
includes both an IPv4 Internet layer and an IPv6 Internet layer. This is the mechanism
used by IPv6/IPv4 nodes so that communication with both IPv4 and IPv6 nodes can
occur. A dual IP layer contains a single implementation of Host-to-Host layer
protocols such as TCP and UDP. All upper layer protocols in a dual IP layer
implementation can communicate over IPv4, IPv6, or IPv6 tunneled in IPv4.
IPv6 over IPv4 tunneling is the encapsulation of IPv6 packets with an IPv4 header so
that IPv6 packets can be sent over an IPv4 infrastructure. Within the IPv4 header:
The Source and Destination fields are set to IPv4 addresses of the tunnel
endpoints. The tunnel endpoints are either manually configured as part of the
tunnel interface or are automatically derived from the sending interface, the
next-hop address of the matching route, or the source and destination IPv6
addresses in the IPv6 header.
35
In [14], defines the following tunneling configuration with which to tunnel IPv6
traffic between IPv6/IPv4 nodes over an IPv4 infrastructure:
Router-to-Router
Host-to-Router or Router-to-Host
Host-to-Host
Router-to-Router
In the router-to-router tunneling configuration, two IPv6/IPv4 routers connect two
IPv4 or IPv6 infrastructures over an IPv4 infrastructure. The tunnel endpoints span a
logical link in the path between the source and destination. The IPv6 over IPv4 tunnel
between the two routers acts as a single hop. Routes within each IPv4 or IPv6
36
infrastructure point to the IPv6/IPv4 router on the edge. For each IPv6/IPv4 router,
there is a tunnel interface representing the IPv6 over IPv4 tunnel and routes that use
the tunnel interface.
Two IPv6-only routing domains that tunnel across the IPv4 Internet.
A 6to4 router that tunnels across the IPv4 Internet to reach another 6to4 router or
a 6to4 relay router.
On the IPv6/IPv4 node, a tunnel interface representing the IPv6 over IPv4 tunnel is
created and a route (typically a default route) is added using the tunnel interface. The
37
IPv6/IPv4 node tunnels the IPv6 packet based on the matching route, the tunnel
interface, and the next-hop address of the IPv6/IPv4 router.
On the IPv6/IPv4 router, a tunnel interface representing the IPv6 over IPv4 tunnel is
created and a route (typically a subnet route) is added using the tunnel interface. The
IPv6/IPv4 router tunnels the IPv6 packet based on the matching subnet route, the
tunnel interface, and the destination address of the IPv6/IPv4 node.
Figure 2.18 shows host-to-router (for traffic traveling from Node A to Node B) and
router-to-host (for traffic traveling from Node B to Node A) tunneling.
38
An ISATAP router that tunnels across an IPv4 network to reach an ISATAP host.
Host-to-Host
In the host-to-host tunneling configuration, an IPv6/IPv4 node that resides within an
IPv4 infrastructure creates an IPv6 over IPv4 tunnel to reach another IPv6/IPv4 node
that resides within the same IPv4 infrastructure. The tunnel endpoints span the entire
path between the source and destination nodes. The IPv6 over IPv4 tunnel between
the IPv6/IPv4 nodes acts as a single hop.
On each IPv6/IPv4 node, an interface representing the IPv6 over IPv4 tunnel is
created. Routes might be present to indicate that the destination node is on the same
logical subnet defined by the IPv4 infrastructure. Based on the sending interface, the
optional route, and the destination address, the sending host tunnels the IPv6 traffic to
the destination.
39
Configured
Automatic
Configured Tunnels
A configured tunnel requires manual configuration of tunnel endpoints. In a
configured tunnel, the IPv4 addresses of tunnel endpoints are not derived from
addresses that are encoded in the IPv6 source or destination addresses or the next-hop
address of the matching route.
40
CHAPTER 3
METHODOLOGY
3.1
The basic study is done to understand the Internet protocol version 4 and 6 and also its
features, functions, architecture and configuration in chapter 2. The OSI model and
architecture of IPv4 and IPv6 are compared to find out the differences, advantages
and disadvantages also in chapter 2. Transition mechanism techniques have been
studied in chapter 2.
3.3
In our test-lab, we arranged a set of hardware and software. Our test setup consists
two dual stack (IPv4/IPv6) routers: two Cisco routers model 2811. Dual stack
EXPERIMENTAL
Network system configurations for our experiment are provided in chapter 4 and 5
during the presentation and discussion of the experimental result found. Detailed of
the configurations are furnished in Appendix E. In our experiment, initially we
loaded required software configured the network system comprising of two PCs
connected to two separate Cisco 2811 routers with other necessaries accessories. We
carried out experiment, first to compute the bandwidth utilization performance. Data
were transmitted from one machine to another using the IPerf 1.7.0 tools for both
Windows and Linux platforms at various data sizes ranging from 128 KB to 61.44
MB.
The experiment was repeated for the computation of the round trip time
(latency) computation. The experiment was carried for both point-to-point and routerto-router architecture for the computation of BW utilization and round trip time
42
computation under both Windows and Linux platforms for variable data sizes as
mentioned above. Results obtained from the experiment are furnished in the next two
chapters 4 and 5 along with discussion and comments in chapter 6.
Presenting performance analysis through graph using log generated by the testing
tools and some logs are presented in Appendix F.
43
CHAPTER 4
IPv4 AND IPv6 PERFORMANCE ANALYSIS
In chapter 4, we explain two most key performance metrics. Then we present our testlab architectures and show results in numerical and graphical forms.
We have two different test-lab architectures. One is point-to-pint test-lab and the other
is router-to-router test-lab. In point-to-point test-lab, we used two workstations
connected through a cross UTP cat 5 cables and used Fast Ethernet LAN card in both
machines. In router-to-router test-lab, we used two workstations and each workstation
connected through cross UTP cat 5 cables with each router and router-to-router
connection is done through the same cross UTP cat 5 cable. Then we apply
performance testing under two different architectures over two Operating systems,
namely Windows and Linux.
4.1
PERFORMANCE METRICS
We use bandwidth utilization (throughput) and round trip time (latency) performance
metrics for measuring performance of IPv4 and IPv6 protocols. IPerf 1.7.0 and PING
tools are used to measure performance. The measurement interval was selected to be
60 seconds and the data sizes were about 128 KB to 61.44 MB. Each test was
repeated several times to obtain consistent results. Metrics parameters are in the
subsequent sections.
L = ( Q / K ) i d
i =1
where qL is the realized channel throughput at protocol layer, L, Q is the gross data
rate based on the transmission technology, K is the number of channels or traffic
flows, i is the channel protocol overhead at layer i, and d is the duplex factor. i is
the accumulated protocol loss over layer L and subtending layers.
45
Server processing, application processing, and data transfer from storage should also
be included.
4.2
The tests with minimum point-to-point architecture where two computers are directly
connected through Unshielded Twisted Pair cross Ethernet cable; its hardware
configuration was mentioned in chapter 3. We install operating systems and both
protocols stack IPv4 and IPv6 in both machines and we configure IP addresses from
the same subnet 192.168.20/24 and 11:11:11:11/64 for both computers depicted in
Figure 4.1.
(Mbits/s)
Bandwidth Utilization
256
384
512
640
768
896
1024
1152
1280
1408
TCP/IPv6 W2K3
Figure 4.2 Bandwidth Utilization Results for IPv4/IPv6 under Windows; data sizes
ranging from 128KB to 1.408MB
46
Figure 4.3 shows that IPv4 performs slightly better than IPv6 protocols under
Windows. IPv6 incurs around 3% more overhead in the bigger data sizes.
Bandwidth Utilization
(Mbits/s)
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
TCP/IPv6 W2K3
Figure 4.3 Bandwidth Utilization Results for IPv4/IPv6 under Windows; data sizes
ranging from 5.12 to 61.44 MB
Figure 4.4 shows that IPv4 performs slightly better than IPv6 protocols under Linux.
IPv6 incurs around 2% more overhead in the smaller data sizes.
Bandwidth Utilization
(Mbits/s)
256
384
512
640
768
896
1024
1152
1280
1408
TCP/IPv6 Linux
Figure 4.4 Bandwidth Utilization Results for IPv4/IPv6 under Linux; data sizes
ranging from 128KB to 1.408MB
47
Figure 4.5 shows that IPv4 performs slightly better than IPv6 protocols under Linux.
IPv6 incurs around 2 to 5% more overhead in the bigger data sizes.
Bandwidth Utilization
(Mbits/s)
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
TCP/IPv6 Linux
Figure 4.5 Bandwidth Utilization Results for IPv4/IPv6 under Linux; data sizes
ranging from 5.12 to 61.44MB
Figure 4.6 shows that IPv4 under Linux performs better than IPv4 under Windows
initially, but when data sizes grow bigger the performance became closer. Here, we
find slight differences between Windows and Linux with the same IPv4 protocol. It is
most probably due to the algorithmic differences and/or time acknowledgement
differences in Windows and Linux.
Bandwidth Utilization
(Mbits/s)
256
384
512
640
768
896
1024
1152
1280
1408
TCP/IPv4 Linux
Figure 4.6 Bandwidth Utilization Results for IPv4 under Linux and Windows; data
sizes ranging from 128 KB to 1.408 MB
48
Figure 4.7 shows that again IPv6 under Linux performs better than IPv6 under
Windows initially, but when data sizes grow bigger the performance became closer.
Here, we find slight differences between Windows and Linux with the same IPv6
protocol as shown in Fig. 4.6 (chapter 4). It is most probably due to the algorithmic
differences and/or time acknowledgement differences in Windows and Linux.
Bandwidth Utilization
(Mbits/s)
256
384
512
640
768
896
1024
1152
1280
1408
TCP/IPv6 Linux
Figure 4.7 Bandwidth Utilization Results for IPv6 under Linux and Windows; data
sizes ranging from 128KB to 1.408MB
Figure 4.8 shows that initially IPv4 under Linux performs better than IPv4 under
Windows and in the middle portion of the data sizes, it becomes quite close. Finally,
Linux gains around 2% more bandwidth. Here, we find slight performance differences
between Windows and Linux with the same IPv4 protocol as shown in Fig. 4.6 and
4.7.
Bandwidth Utilization
(Mbits/s)
10240
15360
20480 25600
30720 35840
40960 46080
51200
56320 61440
TCP/IPv4 Linux
Figure 4.8 Bandwidth Utilization Results for IPv4 under Linux and Windows; data
sizes ranging from 5.12 to 61.144 MB
49
Figure 4.9 shows that initially again IPv6 under Linux performs better than IPv6
under Windows, but when data sizes grow bigger the performance became closer.
Here, we find slight differences between Windows and Linux with the same IPv6
protocol as shown in Figs. 4.6, 4.7 and 4.8. Now, it is clear that there are some
architectural differences in Windows and Linux.
Bandwidth Utilization
(Mbits/s)
10240
15360 20480
25600
30720
35840
40960
46080 51200
56320
61440
TCP/IPv6 Linux
Figure 4.9 Bandwidth Utilization Results for IPv6 under Linux and Windows; data
sizes ranging from 5.12 to 61.44 MB
Figure 4.10 gives a picture of overall performance of IPv4 and IPv6 under Linux and
Windows. Though, IPv6 performs poorer than IPv4 in both platforms due to overhead
factor, IPv4 have slight performance differences in the both platforms due to
architectural factors of OS manufacturer.
Bandwidth Utilization
(Mbits/s)
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
TCP/IPv4Linux
TCP/IPv6 W2K3
TCP/IPv6 Linux
Figure 4.10 Bandwidth Utilization Results for IPv4/IPv6 under Linux and Windows;
data sizes ranging from 5.12 to 61.44 MB
50
Figure 4.11 shows that both IPv4 and IPv6 protocols under Windows perform quite
closely. IPv6 incurs 1 to 2% more overhead in smaller data size. It can transfer data at
a faster rate due to connectionless protocol and it does not acknowledge.
Bandwidth Utilization
(Mbits/s)
256
384
512
640
768
896
1024
1152
1280
1408
UDP/IPv6 W2K3
Figure 4.11 Bandwidth Utilization Results for IPv4/IPv6 under Windows; data sizes
ranging from 128KB to 1.408MB
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
TCP/IPv6 W2K3
Figure 4.12 Round Trip Time Results for IPv4/IPv6 under Windows; data sizes
ranging from 5.12 to 61.44 MB
51
Figure 4.13 shows that both IPv4 and IPv6 protocols perform quite closely under
Linux. IPv6 incurs 1.8 to 2.9% more overhead over all data sizes.
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
TCP/IPv6 Linux
Figure 4.13 Round Trip Time Results for IPv4/IPv6 under Linux; data sizes ranging
from 5.12 to 61.44 MB
Figure 4.14 gives a picture of overall round trip time performance of both IPv4 and
IPv6 protocols under Linux and Windows. If we look closely, we can see that IPv4
under Linux performs the best and worst for IPv6 under Windows.
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
TCP/IPv6 W2K3
TCP/IPv4 Linux
TCP/IPv6 Linux
Figure 4.14 Round Trip Time Results for IPv4/IPv6 under Linux and Windows; data
sizes ranging from 5.12 to 61.44MB
52
4.3
53
Bandwidth Utilization
(Mbits/s)
256
384
512
640
768
896
1024
1152
1280
1408
TCP/IPv6 W2K3
Figure 4.16 Bandwidth Utilization Results for IPv4/IPv6 under Windows; data sizes
ranging from 128KB to 1.408MB
Figure 4.17 shows that IPv4 performs better than IPv6 under Windows. IPv6 incurs
around 19% more overhead in all data sizes and it was 3% in Fig. 4.3 for Point-toPoint architecture.
Bandwidth Utilization
(Mbits/s)
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
TCP/IPv6 W2K3
Figure 4.17 Bandwidth Utilization Results for IPv4/IPv6 under Windows; data sizes
ranging from 5.12 to 61.44MB
54
Figure 4.18 shows that IPv4 performs better than IPv6 under Linux. IPv6 incurs
around 9% more overhead in all data sizes and it was around 2% in Fig. 4.4 for Pointto-Point architecture.
Bandwidth Utilization
(Mbits/s)
256
384
512
640
768
896
1024
1152
1280
1408
TCP/IPv6 Linux
Figure 4.18 Bandwidth Utilization Results for IPv4/IPv6 under Linux; data sizes
ranging from 128KB to 1.408MB
Figure 4.19 shows that IPv4 performs better than IPv6 under Linux. IPv6 incurs
around 12% more overhead in the bigger data sizes and it was 2 to 5% in Fig. 4.5 for
Point-to-Point architecture.
Bandwidth Utilization
(Mbits/s)
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
TCP/IPv6 Linux
Figure 4.19 Bandwidth Utilization Results for IPv4/IPv6 under Linux; data sizes
ranging from 5.120 to 61.44MB
55
Figure 4.20 gives a picture of overall performance of IPv4 and IPv6 under Linux and
Windows. Though, IPv6 performs poorer in comparison to IPv4 in both platforms due
to overhead constraint, IPv4 also have slight performance differences in both the
platforms due to OS manufacturer architectural philosophy. Linux performs better
than Windows in all cases.
Bandwidth Utilization
(Mbits/s)
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
TCP/IPv4 Linux
TCP/IPv6 W2K3
TCP/IPv6 Linux
Figure 4.20 Bandwidth Utilization Results for IPv4/IPv6 under Linux and Windows;
data sizes ranging from 5.12 to 61.44MB
Figure 4.21 shows that both IPv4 and IPv6 under Windows performs quiet close. IPv6
incurs around 7% more overhead in smaller data sizes. It can transfer data faster due
to connection less protocol and it doesnt acknowledge. It was 1 to 2% in Fig. 4.11
Point-to-Point architecture.
Bandwidth Utilization
(Mbits/s)
256
384
512
640
768
896
1024
1152
1280
1408
UDP/IPv6 W2K3
Figure 4.21 Bandwidth Utilization Results for IPv4/IPv6 under Windows; data sizes
ranging from 128KB to 1.408MB
56
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
TCP/IPv6 W2K3
Figure 4.22 Round Trip Time Results for IPv4/IPv6 under Windows; data sizes
ranging from 5.12 to 61.44 MB
Figure 4.23 shows that both IPv4 and IPv6 protocols quite closely under Linux. IPv6
incurs around 13% more overhead in small data sizes and around 4% in bigger data
sizes. It was 1.8 to 2.9% as shown in Figure 4.13 for Point-to-Point architecture.
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
TCP/IPv6 Linux
Figure 4.23 Round Trip Time Results for IPv4/IPv6 under Linux; data sizes ranging
from 5.12 to 61.44MB
57
Figure 4.24 gives a picture of overall round trip time performance of both IPv4 and
IPv6 protocols under Linux and Windows. If we look closely we can see that IPv4
under Linux performs the best and worst for the IPv6 under Windows.
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
TCP/IPv6 Linux
TCP/IPv4 W2K3
TCP/IPv6 W2K3
Figure 4.24 Round trip Time Results for IPv4/IPv6 under Linux and Windows; data
sizes ranging from 5.12 to 61.44MB
4.4
CONCLUSION
After analyzing all the results for above cases, we find that IPv6 incurs around 1 to
5% and 9 to 20% more overhead in point-to-point and router-to-router architecture
respectively under both Windows and Linux platforms. Though, theoretically IPv4
and IPv6 overhead difference benchmarking is 1.44%, but we find slightly more due
to its lack of maturity and still it is in developing stage. We also find that, there is a
performance difference between Linux and Windows in both IPv4 and IPv6
implementations due to technical and architectural philosophy of the OS
manufacturer. It is clear to us that in all cases, Linux performs better than Windows
due to the fact that kernel buffer allocation strategies for Windows are less efficient
compared to Linux counterpart [19].
58
CHAPTER 5
IPv4 TO IPv6 MIGRATION MECHANISMS AND
PERFORMANCE ANALYSIS
5.1
Figure 5.1 shows the architecture of host-to-host tunneling under both Windows and
Linux platforms. In host-to-host tunneling, encapsulation occurs at the source end and
de-capsulation occurs at the destination end and in between a virtual tunnel circuit is
created in the sea of IPv4 to exchange data between two IPv6 enabled ends.
Figure 5.2 shows the architecture of router-to-router Tunneling under Cisco platform.
In router-to-router tunneling, encapsulation occurs at the senders router end and decapsulation occurs at the recipients router end and in between the two routers, a
virtual tunnel circuit is created in the sea of IPv4 infrastructure to exchange data
between two IPv6 enabled ends.
Bandwidth Utilization
(Mbits/s)
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
Figure 5.3 Bandwidth Utilization Results for IPv4 (IPv6) Host-to-Host and Router-toRouter Tunneling under Windows and Cisco; data sizes ranging from 5.12 to
61.44MB
60
Figure 5.4 depicts that IPv4 (IPv6) router-to-router Tunneling performs better than
host-to-host Tunneling, and even than the IPv6 routing architecture. IPv4 (IPv6) hostto-host Tunneling incurs around 5% more overhead than IPv6 routing infrastructure
and router-to-router Tunneling getting around 12% more advantages from IPv6
routing infrastructure.
Bandwidth Utilization
(Mbits/s)
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
Figure 5.4 Bandwidth Utilization Results for IPv4 (IPv6) host-to-host, router-to-router
Tunneling and IPv6 router-to-router infrastructure under Windows and Cisco; data
sizes ranging from 5.12 to 61.44MB
Figure 5.5 again shows that IPv4 (IPv6) router-to-router Tunneling performs better
than host-to-host Tunneling in Linux. It is clear that IPv4 (IPv6) host-to-host
Tunneling incurs more overhead than router-to-router Tunneling and the tunneling
rate is 18%.
Bandwidth
Utilization (Mbits/s)
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
Figure 5.5 Bandwidth Utilization Results for IPv4(IPv6) host-to-host and router-torouter Tunneling under Linux and Cisco; data sizes ranging from 5.12 to 61.44MB
61
Figure 5.6 depicts that IPv4 (IPv6) router-to-router Tunneling performs better than the
host-to-host Tunneling and even IPv6 routing architecture. IPv4 (IPv6) host-to-host
Tunneling incurs around 4% more overhead from IPv6 routing infrastructure and
router-to-router Tunneling getting around 15% more advantage over IPv6 routing
infrastructure.
Bandwidth Utilization
(Mbits/s)
10240 15360
Figure 5.6 Bandwidth Utilization Results for IPv4 (IPv6) host-to-host, router-to-router
Tunneling and IPv6 router-to-router infrastructure under Linux and Cisco; data sizes
ranging from 5.12 to 61.44MB
Figure 5.7 gives a picture of overall performance of IPv4 (IPv6) tunneling under
Linux, Windows with Cisco. Here, we find that Linux with router-to-router Tunneling
performs better than Windows tunneling. We also find that router-to-router Tunneling
performs better than the host-to-host tunneling, because of OS incurs more overhead
than IOS (Internetworking Operating System) in router.
Bandwidth Utilization
(Mbits/s)
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
62
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
Figure 5.8 Round trip Time Results for IPv4 (IPv6) Tunneling under Windows and
Cisco; data sizes ranging from 5.12 to 61.44MB
Figure 5.9 again show that IPv4 (IPv6) router-to-router Tunneling performs better
than the host-to-host Tunneling under Linux like Windows. The performance is quite
close for smaller size data but bigger size data it incurs more overhead. host-to-host
tunneling incurs around 33% more overhead.
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
Figure 5.9 Round trip Time Results for IPv4 (IPv6) Tunneling under Linux and Cisco;
data sizes ranging from 5.12 to 61.44MB
63
Figure 5.10 gives a picture of IPv4 (IPv6) router-to-router and host-to-host Tunneling
performances. Here, Linux shows better round trip time than Windows. We find that
Linux incurs lower delay time to exchange data over the net due to the fact that its
kernel performs more efficiently than that of Windows [19].
Latency - RTT
(ms)
10240
15360
20480
25600
30720
35840
40960
46080
51200
56320
61440
Figure 5.10 Round trip Time Results for IPv4 (IPv6) Tunneling under Linux,
Windows and Cisco platforms; data sizes ranging from 5.12 to 6144MB
5.2
CONCLUSION
64
CHAPTER 6
RESULTS AND DISCUSSIONS
6.1
INTRODUCTION
6.2
Under Windows, bandwidth utilization results for IPv4 and IPv6 with data size
ranging from 128 KB to 1.408 MB as shown in Fig. 4.2 (Chapter 4) shows that the
performance indicators are quite close. In comparison to IPv4, the IPv6 incurs 1 to 2%
more overhead in this type of data sizes. It incurs around 3% more overhead for
bigger data sizes ranging from 5.12 to 61.44 MB as shown in Fig. 4.3 (Chapter 4).
As the header size of IPv6 is bigger than that of IPv4, probably IPv6 incurs more
overhead than IPv4. More overhead results for bigger message of bigger data size
happens due to bigger number of data packets and its corresponding
acknowledgement time used up by the protocol in comparison to smaller message of
smaller data sizes.
Under Linux, bandwidth utilization results of IPv6 incurs around 2% more overhead
in the smaller data sizes ranging from 128 KB to 1.408 MB as shown in Fig. 4.4
(Chapter 4). For 5.12 to 61.44 MB data sizes Fig. 4.5 (Chapter 4), we see that IPv4
performs slightly better than IPv6 protocols. IPv6 incurs 2 to 5% more overhead for
the bigger data sizes.
As IPv6 has bigger header than IPv4 header, in Linux also, IPv6 incurs more
overhead than IPv4.
We see that IPv6 under Linux performs better than under Windows (see Fig. 4.7,
Chapter 4) for all kinds of data sizes, but at smaller data size level, performance of
Windows is poorer. As the data size grows bigger and bigger, the difference becomes
lesser and lesser as shown in Fig. 4.7 (Chapter 4). The reason may be perhaps due to
the use of different algorithms and time acknowledgement differences in Windows
and Linux platforms.
It is surprising to see in Fig. 4.9 (Chapter 4) that for data sizes between 25 to 45 MB,
Windows performs better. It is difficult to make comments on these results at this
moment, because our experimental results are confined within point-to-point level
only. Further study is required in bigger networking environment to see whether
similar results repeat.
66
smaller sizes data. But for bigger size data transmission, the fractions of millisecond
level time are manifested in the total count. Thus for latency computation, we used the
indirect way of time counting. The results for round trip time to figure out actual IPv6
overhead appear in Fig. 4.12 (Chapter 4).
As shown in Fig. 4.13 (Chapter 4), we see that IPv4 and IPv6 perform quite closely
under Windows. IPv6 incurs 1.8 to 2.9% more overhead for all ranges of data sizes
(see Fig. 4.13, Chapter 4), which matches with theoretical speculations also. IPv6
header is 20 bytes bigger than that of IPv4 and the difference happens to be bigger for
bigger overhead.
Under Windows, bandwidth utilization results for data size ranges from 1.28 to 1.408
MB, which is shown in Fig. 4.16 (Chapter 4). It appears that IPv6 incurs a 14% more
overhead in this type of data size, which is 1 to 2% only for point-to-point architecture
as shown Fig. in 4.2 (Chapter 4). It is seen in Fig. 4.17 (Chapter 4) that IPv4 performs
better than IPv6 for data sizes ranging from 5.12 to 61.44 MB. For all ranges of data
size used in our experiment router-to-router case, IPv6 incurs around 19% overhead,
which is only 3% for point-to-point architecture as shown in Fig. 4.3 (Chapter 4).
Perhaps more routers contribute to additional overhead which incurs more overhead
than point-to-point architecture.
Under Linux, bandwidth utilization results for data sizes of 128 KB to 1.408 MB are
shown in Fig. 4.18 (Chapter 4). It is seen that IPv4 performs better than IPv6 and it
67
incurs around 9% overhead for all data sizes used in our experiments. It is to compare
that the overhead is only 2% for point-to-point architecture as appears in Fig. 4.4
(Chapter 4). For larger data sizes ranging from 5.12 to 61.440 MB, Fig. 4.19 (Chapter
4) shows that IPv4 performs better than IPv6. IPv6 incurs 12% overhead for larger
data sizes, which is lies between 2 to 5% point-to-point architecture as shown in
Figure 4.5 (Chapter 4).
Perhaps more routers contribute to additional overhead which incurs more overhead
than point-to-point architecture.
Under Linux, for data sizes between 5.120 to 61.440 MB, Fig. 4.23 (Chapter 4) shows
that both IPv4 and IPv6 perform quite closely. At the starting end of the data size in
router-to-router architecture, IPv6 incurs around 13% more overhead, which falls to
4% around the finishing end of the data size. This overhead is 1.8 to 2.9% only for
point-to-point architecture as shown in Fig. 4.13 (Chapter 4). Here also, the reason is
the same for the increase of overhead incurred by IPv6 as in the previous case. Here
only platform is different.
68
Under Windows, bandwidth utilization results for IPv6 data transmission through
IPv4 environment for host-to-host in Windows and router-to-router with Cisco router
tunneling at data sizes, between 5.12 and 61.44 MB are shown in Fig. 5.3 (Chapter 5).
It is seen that router-to-router tunneling performs better than the host-to-host
tunneling. The host-to-host tunneling incurs 16% more overhead.
Packet encapsulation occurred under operating system in host-to-host tunneling
architecture and it uses double encapsulation (IPv6 header in IPv4 header) from
transport layer whereas router-to-router architecture encapsulates from network layer.
So, router-to-router tunneling incurs less overhead than the host-to-host tunneling.
Under Windows, bandwidth utilization results for IPv4/IPv6 are computed in 3 ways.
First one is the host-to-host tunneling, second one is the router-to-router tunneling and
third one is the IPv6 router-to-router direct transmission under Windows with Cisco
router at data sizes, from 5.12 to 61.44 MB, which are shown in Fig. 5.4 (Chapter 5).
It is seen that for the first case of IPv4/IPv6, the performance is the best for router-torouter tunneling, having bandwidth utilization value of 69.9 Mbps out of 100 Mbps.
For the second one, host-to-host tunneling bandwidth utilization is 58.79 Mbps, which
incurs 15.9% more overhead than the first case. For the third case, the performance
has been found to be the worst, counting to 12% more overhead than the first case.
69
Under Linux, bandwidth utilization results for IPv6 data transmission through IPv4
environment for host-to-host in Linux and router-to-router tunneling with Cisco router
at data sizes, between 5.12 and 61.44 MB are shown in Fig. 5.5 (Chapter 5). It is also
seen router-to-router tunneling performs better than the host-to-host tunneling like
Windows platform. The host-to-host tunneling incurs 18% more overhead.
The router-to-router tunneling is even better than direct IPv6 router-to-router
transmission. Router-to-router tunneling encapsulation overhead is less than IPv6
router-to-router direct transmission overhead.
Under Linux, bandwidth utilization results for IPv4/IPv6 are computed in 3 ways.
First one is the host-to-host tunneling, second one is the router-to-router tunneling and
the third one is the IPv6 router-to-router direct transmission under Linux with Cisco
router at data sizes, from 5.12 to 61.44 MB as shown in Fig. 5.6 (Chapter 5). It is
seen that for the first case of IPv4/IPv6 router-to-router tunneling, the performance is
the best, having bandwidth utilization value of 83.52 Mbps. For the second one, hostto-host tunneling incurs 17% more overhead than the first case. For the third case, the
performance has been found to be the worst, counting to 15% more than the first case.
70
Under Windows with Cisco router, round trip time results for IPv4/IPv6 tunneling for
data sizes, from 5.12 to 61.44 MB are shown in Fig. 5.8 (Chapter 5). It is seen that
IPv4/IPv6 router-to-router tunneling performs better. The host-to-host tunneling under
Windows incurs 35% more overhead than the router-to-router tunneling case.
Here, perhaps host-to-host tunneling adds extra encapsulation overhead than routerto-router tunneling.
Under Linux with Cisco router, latency results for IPv4/IPv6 tunneling for data sizes,
from 5.12 to 61.44 MB are shown in Fig. 5.9 (Chapter 5). It is seen that IPv4/IPv6
router-to-router tunneling performs better. The host-to-host tunneling under Linux
incurs 33% more overhead than the router-to-router tunneling case.
Here, perhaps host-to-host tunneling adds extra encapsulation overhead than routerto-router tunneling.
71
CHAPTER 7
CONCLUSION AND SCOPE FOR FUTURE WORKS
7.1
CONCLUSION
Performance analysis for point-to-point architecture was carried out to see only the
normal operational characteristics of both the protocols. But our experiments are
mostly focused on the router-to-router bandwidth utilization and RTT (latency)
performance measurements only.
Another observation is that under Linux platform, bandwidth utilization is better than
that under Windows.
Interestingly, we find from our experimental results that the bandwidth utilization and
RTT (latency) parameters of IPv4 are superior to those of IPv6 protocols. For this
case, we infer that IPv6 results are poorer in comparison to IPv4 due to the bigger
overhead constraints of IPv6.
7.2
Also, we were confined within bandwidth utilization and RTT (latency) parameters
measurements in our experiments only.
More research on the following aspects will be useful for further study in this area:
1. Study can be extended to comparative evaluation with IPv6 implementation on
other platforms, such as Sun Solaris 10 operating platform;
2. Study can be extended to different router platforms, such as Nortel, Juniper
etc.
3. Study can also be extended to using IPSec in IPv6 implementation to observe
the overhead enhancement due to encryption and decryption processes;
4. Quality of Service (QoS) testing in IPv6 implementation;
5. Study can be extended to application test in IPv6-enabled applications
services, such as email, web, ftp, video conferencing etc.
73
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
The IP specification was published as RFC 791 in September 1981 and was
later ratified as Internet Standard 5
[22]
[23]
[24]
75
APPENDICES
A: HARDWARE SPECIFICATIONS
Hardware Information
Sl No
Descriptions
Workstation
Laptop
Computer
2
Router
Cabling
Processor
Speed
Motherboard
RAM
Hard Disk
Ethernet Card
Processor
Speed
Motherboard
RAM
Hard Disk
Ethernet Card
Brand/Model
Processor
RAM
Ethernet Card
Brand/Model
Category
Type
Configuration
Specifications
: Intel Pentium III
: 800 MHz
: Intel
: 256 MB
: 40 GB
: 3Com Ether-Link 10/100
: Intel Pentium III
: 550 MHz
: Intel
: 128 MB
: 40 GB
: Intel (R) PRO/100MiniPCI
: CISCO 2811XM
: 433 MHz
: 256 MB
: TWO 10/100
: D-link
: CAT 5 copper
: UTP
: Cross cabling
Quantity
2
2
3
B: SOFTWARE SPECIFICATIONS
Software Information
Sl No
Operating System
Quantity
IPv6
(TCP)
IPv4
(UDP)
IPv6
(UDP)
1460
1440
1472
1452
20
20
1480
1460
1480
1460
IP Header (NLH)
20
40
20
40
14
14
14
14
1514
1514
1514
1514
Overhead in %
3.7%
Payload (Data)
IPv4
(TCP)
Differences
1.44%
1.42%
MTU=Payload+TLH+NLH+DLLH
Notes: MTU = Maximum Transfer Unit
Payload = Data
TLH = Transport Layer Header
NLH = Network Layer Header
DLLH = Data Link Layer Header
77
Tools Name
IPerf 1.7.0
Description
Quantity
delay
jitter,
packet
loss,
PING
Native
78
IPv4 configuration is easier and its materials are available, so our concentration would
be in IPv6 configuration under Cisco 2811 router.
Implementing basic IPv6 connectivity in the Cisco IOS software consists of assigning
IPv6 addresses to individual router interfaces. The forwarding of IPv6 traffic can be
enabled globally, and Cisco Express Forwarding (CEF) switching for IPv6 can also be
enabled.
a. Prerequisites for Implementing Basic Connectivity for IPv6:
To forward IPv6 traffic using CEFv6, you must configure forwarding of
IPv6 unicast datagrams globally on the router by using the ipv6 unicastrouting global configuration command, and you must configure an IPv6
address on an interface by using the ipv6 address interface configuration
command.
You must enable CEF for IPv4 (CEFv4) globally on the router by using
the ip cef global configuration command before enabling CEFv6 globally
on the router by using the ipv6 cef global configuration command.
Minimum Required Cisco IOS Release 12.4
79
80
ifconfig a
ipconfig/all
show ipv6 interface
ping6 I if
ping
ping ipv6
ip f inet6 neigh
netsh interface ipv6 show neighbors
show ipv6 neighbors
ip f inet6 route
netsh interface ipv6 show routes
show ipv6 route
81
83
[ ID] Interval
Transfer Bandwidth
[1948] 0.0- 0.1 sec 1.25 MBytes 95.2 Mbits/sec
C:\test>iperf.exe -c 192.168.20.11 -n 1408K
-----------------------------------------------------------Client connecting to 192.168.20.11, TCP port 5001
TCP window size: 8.00 KByte (default)
-----------------------------------------------------------[1948] local 192.168.20.22 port 1220 connected with 192.168.20.11 port 5001
[ ID] Interval
Transfer Bandwidth
[1948] 0.0- 0.1 sec 1.38 MBytes 96.0 Mbits/sec
C:\test>iperf.exe -c 192.168.20.11 -n 5M
-----------------------------------------------------------Client connecting to 192.168.20.11, TCP port 5001
TCP window size: 8.00 KByte (default)
-----------------------------------------------------------[1948] local 192.168.20.22 port 1222 connected with 192.168.20.11 port 5001
[ ID] Interval
Transfer Bandwidth
[1948] 0.0- 0.5 sec 5.00 MBytes 93.1 Mbits/sec
C:\test>iperf.exe -c 192.168.20.11 -n 10M
-----------------------------------------------------------Client connecting to 192.168.20.11, TCP port 5001
TCP window size: 8.00 KByte (default)
-----------------------------------------------------------[1948] local 192.168.20.22 port 1228 connected with 192.168.20.11 port 5001
[ ID] Interval
Transfer Bandwidth
[1948] 0.0- 0.9 sec 10.0 MBytes 93.3 Mbits/sec
C:\test>iperf.exe -c 192.168.20.11 -n 15M
-----------------------------------------------------------Client connecting to 192.168.20.11, TCP port 5001
TCP window size: 8.00 KByte (default)
-----------------------------------------------------------[1948] local 192.168.20.22 port 1230 connected with 192.168.20.11 port 5001
[ ID] Interval
Transfer Bandwidth
[1948] 0.0- 1.3 sec 15.0 MBytes 93.3 Mbits/sec
C:\test>iperf.exe -c 192.168.20.11 -n 20M
-----------------------------------------------------------Client connecting to 192.168.20.11, TCP port 5001
TCP window size: 8.00 KByte (default)
-----------------------------------------------------------[1948] local 192.168.20.22 port 1231 connected with 192.168.20.11 port 5001
[ ID] Interval
Transfer Bandwidth
[1948] 0.0- 1.8 sec 20.0 MBytes 93.5 Mbits/sec
84
85
[1948] local 192.168.20.22 port 1192 connected with 192.168.20.11 port 5001
[ ID] Interval
Transfer Bandwidth
[1948] 0.0- 4.5 sec 50.0 MBytes 93.9 Mbits/sec
C:\test>iperf.exe -c 192.168.20.11 -n 55M
-----------------------------------------------------------Client connecting to 192.168.20.11, TCP port 5001
TCP window size: 8.00 KByte (default)
-----------------------------------------------------------[1948] local 192.168.20.22 port 1194 connected with 192.168.20.11 port 5001
[ ID] Interval
Transfer Bandwidth
[1948] 0.0- 4.9 sec 55.0 MBytes 94.0 Mbits/sec
C:\test>iperf.exe -c 192.168.20.11 -n 60M
-----------------------------------------------------------Client connecting to 192.168.20.11, TCP port 5001
TCP window size: 8.00 KByte (default)
-----------------------------------------------------------[1948] local 192.168.20.22 port 1197 connected with 192.168.20.11 port 5001
[ ID] Interval
Transfer Bandwidth
[1948] 0.0- 5.4 sec 60.0 MBytes 94.1 Mbits/sec
C:\test>
87
88
89
90
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 614 KBytes 50.3 Mbits/sec 0.235 ms 18/ 446 (4%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1139
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 629 KBytes 51.4 Mbits/sec 0.235 ms 8/ 446 (1.8%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1140
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 640 KBytes 52.4 Mbits/sec 0.250 ms 0/ 446 (0%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1141
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 768 KBytes 52.4 Mbits/sec 0.206 ms 0/ 535 (0%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1142
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 897 KBytes 52.4 Mbits/sec 0.170 ms 0/ 625 (0%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1143
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 1.00 MBytes 64.5 Mbits/sec 0.142 ms 0/ 714 (0%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1144
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 1.13 MBytes 67.4 Mbits/sec 0.196 ms 0/ 803 (0%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1145
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 1.13 MBytes 67.4 Mbits/sec 0.174 ms 0/ 803 (0%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1146
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 1.13 MBytes 67.4 Mbits/sec 0.184 ms 0/ 803 (0%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1147
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 1.11 MBytes 71.6 Mbits/sec 0.184 ms 10/ 803 (1.2%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1148
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.25 MBytes 65.5 Mbits/sec 0.118 ms 0/ 892 (0%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1149
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.24 MBytes 69.1 Mbits/sec 0.111 ms 9/ 892 (1%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1150
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.25 MBytes 69.8 Mbits/sec 0.111 ms 0/ 892 (0%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1151
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.25 MBytes 65.5 Mbits/sec 0.112 ms 0/ 892 (0%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1152
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.25 MBytes 69.8 Mbits/sec 0.112 ms 0/ 892 (0%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1153
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.25 MBytes 69.8 Mbits/sec 0.112 ms 0/ 892 (0%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1154
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.25 MBytes 69.8 Mbits/sec 0.112 ms 0/ 892 (0%)
92
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1155
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.25 MBytes 65.5 Mbits/sec 0.112 ms 0/ 892 (0%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1156
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.36 MBytes 71.3 Mbits/sec 0.154 ms 10/ 981 (1%)
[1964] local 192.168.20.11 port 5001 connected with 192.168.20.22 port 1157
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.38 MBytes 72.0 Mbits/sec 0.136 ms 0/ 981 (0%)
[1964] 0.0- 0.1 sec 511 KBytes 52.3 Mbits/sec 0.238 ms 1/ 357 (0.28%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1158
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 640 KBytes 52.4 Mbits/sec 0.210 ms 0/ 446 (0%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1159
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 768 KBytes 48.3 Mbits/sec 0.176 ms 0/ 535 (0%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1160
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 768 KBytes 52.4 Mbits/sec 0.176 ms 0/ 535 (0%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1161
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 887 KBytes 51.8 Mbits/sec 0.148 ms 7/ 625 (1.1%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1162
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 897 KBytes 52.4 Mbits/sec 0.148 ms 0/ 625 (0%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1163
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1018 KBytes 49.0 Mbits/sec 0.130 ms 5/ 714 (0.7%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1164
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 999 KBytes 51.1 Mbits/sec 0.133 ms 18/ 714 (2.5%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1165
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.00 MBytes 52.4 Mbits/sec 0.132 ms 0/ 714 (0%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1166
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1021 KBytes 52.2 Mbits/sec 0.124 ms 3/ 714 (0.42%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1167
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.00 MBytes 49.3 Mbits/sec 0.141 ms 0/ 714 (0%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1168
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1009 KBytes 48.6 Mbits/sec 0.132 ms 11/ 714 (1.5%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1169
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.0 sec 172 KBytes 47.0 Mbits/sec 0.132 ms 594/ 714 (83%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1170
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.00 MBytes 52.4 Mbits/sec 0.132 ms 0/ 714 (0%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1171
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.13 MBytes 49.6 Mbits/sec 0.109 ms 0/ 803 (0%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1172
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.13 MBytes 49.6 Mbits/sec 0.109 ms 0/ 803 (0%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1173
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.11 MBytes 51.5 Mbits/sec 0.109 ms 13/ 803 (1.6%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1174
94
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.13 MBytes 49.6 Mbits/sec 0.109 ms 0/ 803 (0%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1175
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.12 MBytes 51.9 Mbits/sec 0.111 ms 7/ 803 (0.87%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1176
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.13 MBytes 49.6 Mbits/sec 0.116 ms 0/ 803 (0%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1177
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.13 MBytes 49.6 Mbits/sec 0.111 ms 0/ 803 (0%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1213
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 1.00 MBytes 64.5 Mbits/sec 0.785 ms 0/ 714 (0%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1214
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.1 sec 1.13 MBytes 67.4 Mbits/sec 0.284 ms 0/ 803 (0%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1215
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.25 MBytes 65.5 Mbits/sec 0.674 ms 0/ 892 (0%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1216
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.25 MBytes 65.5 Mbits/sec 0.719 ms 0/ 892 (0%)
[1964] local :: port 5001 connected with 11:11:11:11:11:11:11:22 port 1217
[ ID] Interval
Transfer Bandwidth
Jitter Lost/Total Datagrams
[1964] 0.0- 0.2 sec 1.38 MBytes 67.8 Mbits/sec 0.244 ms 0/ 981 (0%)
-----------------------------------------------------------[ 3] local 192.168.20.22 port 32810 connected with 192.168.20.11 port 5001
[ 3] 0.0- 0.0 sec 512 KBytes 95.3 Mbits/sec
-----------------------------------------------------------Client connecting to 192.168.20.11, TCP port 5001
TCP window size: 16.0 KByte (WARNING: requested 8.00 KByte)
-----------------------------------------------------------[ 3] local 192.168.20.22 port 32815 connected with 192.168.20.11 port 5001
[ 3] 0.0- 0.1 sec 640 KBytes 94.8 Mbits/sec
-----------------------------------------------------------Client connecting to 192.168.20.11, TCP port 5001
TCP window size: 16.0 KByte (WARNING: requested 8.00 KByte)
-----------------------------------------------------------[ 3] local 192.168.20.22 port 32820 connected with 192.168.20.11 port 5001
[ 3] 0.0- 0.1 sec 768 KBytes 94.7 Mbits/sec
-----------------------------------------------------------Client connecting to 192.168.20.11, TCP port 5001
TCP window size: 16.0 KByte (WARNING: requested 8.00 KByte)
-----------------------------------------------------------[ 3] local 192.168.20.22 port 32825 connected with 192.168.20.11 port 5001
[ 3] 0.0- 0.1 sec 896 KBytes 94.6 Mbits/sec
-----------------------------------------------------------Client connecting to 192.168.20.11, TCP port 5001
TCP window size: 16.0 KByte (WARNING: requested 8.00 KByte)
-----------------------------------------------------------[ 3] local 192.168.20.22 port 32830 connected with 192.168.20.11 port 5001
[ 3] 0.0- 0.1 sec 1.00 MBytes 94.7 Mbits/sec
-----------------------------------------------------------Client connecting to 192.168.20.11, TCP port 5001
TCP window size: 16.0 KByte (WARNING: requested 8.00 KByte)
-----------------------------------------------------------[ 3] local 192.168.20.22 port 32831 connected with 192.168.20.11 port 5001
[ 3] 0.0- 0.1 sec 1.12 MBytes 94.3 Mbits/sec
-----------------------------------------------------------Client connecting to 192.168.20.11, TCP port 5001
TCP window size: 16.0 KByte (WARNING: requested 8.00 KByte)
-----------------------------------------------------------[ 3] local 192.168.20.22 port 32840 connected with 192.168.20.11 port 5001
[ 3] 0.0- 0.1 sec 1.25 MBytes 94.2 Mbits/sec
-----------------------------------------------------------Client connecting to 192.168.20.11, TCP port 5001
TCP window size: 16.0 KByte (WARNING: requested 8.00 KByte)
-----------------------------------------------------------[ 3] local 192.168.20.22 port 32845 connected with 192.168.20.11 port 5001
[ 3] 0.0- 0.1 sec 1.38 MBytes 94.3 Mbits/sec
-----------------------------------------------------------Client connecting to 192.168.20.11, TCP port 5001
TCP window size: 16.0 KByte (WARNING: requested 8.00 KByte)
-----------------------------------------------------------[ 3] local 192.168.20.22 port 32846 connected with 192.168.20.11 port 5001
96
97
99
100
101
102
103
104
105
106
108
109
110
--- 11:11:11:11:11:11:11:11 ping statistics --10 packets transmitted, 10 received, 0% packet loss, time 9008ms
rtt min/avg/max/mdev = 10.028/10.132/10.210/0.089 ms, pipe 2
PING 11:11:11:11:11:11:11:11(11:11:11:11:11:11:11:11) 60000 data bytes
60008 bytes from 11:11:11:11:11:11:11:11: icmp_seq=0 ttl=64 time=11.0 ms
60008 bytes from 11:11:11:11:11:11:11:11: icmp_seq=1 ttl=64 time=11.0 ms
60008 bytes from 11:11:11:11:11:11:11:11: icmp_seq=2 ttl=64 time=10.9 ms
60008 bytes from 11:11:11:11:11:11:11:11: icmp_seq=3 ttl=64 time=11.0 ms
60008 bytes from 11:11:11:11:11:11:11:11: icmp_seq=4 ttl=64 time=11.0 ms
60008 bytes from 11:11:11:11:11:11:11:11: icmp_seq=5 ttl=64 time=11.0 ms
60008 bytes from 11:11:11:11:11:11:11:11: icmp_seq=6 ttl=64 time=11.0 ms
60008 bytes from 11:11:11:11:11:11:11:11: icmp_seq=7 ttl=64 time=10.9 ms
60008 bytes from 11:11:11:11:11:11:11:11: icmp_seq=8 ttl=64 time=10.9 ms
60008 bytes from 11:11:11:11:11:11:11:11: icmp_seq=9 ttl=64 time=11.0 ms
--- 11:11:11:11:11:11:11:11 ping statistics --10 packets transmitted, 10 received, 0% packet loss, time 9008ms
rtt min/avg/max/mdev = 10.938/11.033/11.094/0.048 ms, pipe 2
111
112
113
114