Upload
priyavishnu584
View
220
Download
0
Embed Size (px)
Citation preview
8/8/2019 Abstract Computer Networks
1/20
Liverpool John Moores University
Computer Networks
Abstract:
The main objective of the paper deals with
the description about internet and difficulties
in internet population.
The internet population measurement
techniques are discussed in brief. Also
provides the nature of address crisis and the
time left before exhaustion i.e, nothing but
IP address exhaustion (IPV4).
The transition strategies of deployment path
of IPV6 are also discussed in detailed. The
transition of IPv4 and IPv6 and the different
deployment methods are discussed in this
research paper.
Networks is defined as a group. Computer
networks is defined as a of computers that
will be having connection among them inorder to communicate with one another.
Internet is a global system that is
interconnected among the computer
networks that use the standard internet
protocol suite (TCP/IP) to serve billions of
users world wide.
Population is nothing but a group of
individual persons present in a particular
location are called as population.
Internet Population:
Definition of Internet Population:
Internet population can be defined as the
population or the total number of people
using the internet. The users of internet
include Internet Service Providers, normal
users, industries, organizations,
manufacturers that can be able to use the
internet through different means of
transmitters and transmission medium.
The term internet can also be defined as the
electronic communications network and
organizational computer facilities around
the world.
The total number of users that are using the
internet world wide can be vary from time to
time. From the past few years the internethas brought vast changes in different fields.
But it is very difficult to estimate the total
number of users that are using internet. In
olden days internet was largely unknown to
most consumers. The first service that
provided online services of internet interface
was the prodigy service. At that time the
consumer was not able to use it in a
satisfactory manner because the band width
is very narrow. The variations of internet
through world wide are various statistics.
8/8/2019 Abstract Computer Networks
2/20
Liverpool John Moores University
Computer Networks
Internet is used for exchanging data or
transmission of data. People can transmit the
data from one place to another by using
internet. This can be possible by the protocol
TCP/IP ( Transmission Control
Protocol/Internet Protocol) that is used.
In todays life internet has become the most
important part.
Based on different countries the usage of
internet population can be estimated as
follows.
According to the survey done on the internet
users in september 2009 the regions divided
based on the usage are shown in detailed.
1.73 billion Internet users worldwide.
18% Increase in Internet users.
738,257,230 Internet users in Asia.
418,029,796 Internet users in Europe.
252,908,000 Internet users in North
America.
179,031,479 Internet users in LatinAmerica / Caribbean.
67,371,700 Internet users in Africa.
57,425,046 Internet users in the Middle
East.
20,970,490 Internet users in Oceania /
Australia.
The statistical view of the above details is
shown below in the form of a pie chart.The
percentage of each region is addressed by
various colours.
Fig:1.Internet Users through out the world
One more statistical view of internet
population based on the top ten languages is
as follows. It indicates the number of people
that use the internet through out the world.
The top various languages discussed in the
below graph are English, Chinese, Spanish,
Japanese, Portuguese, German, Arabic,
French, Russia, Korean.
8/8/2019 Abstract Computer Networks
3/20
Liverpool John Moores University
Computer Networks
Fig:2. Top ten languages in internet in the
year 2010
Internet Population Measurement
Techniques:
It is necessary to know that why do internet
wants the measurement.
In 1994 the Internet was a largely unknown
to consumers. Most consumers had an
experience that it was commercial online
services, Computer Serve, Prodigy, and the
rapidly growing American Online. A
smattering of private bulletin board systemswere available to consumers, and few of
them provided consumer-ready access to the
Internet. Internet addressable email was only
just available on these systems.
The Internet was not well suited to
consumer use at the time owing to the very
narrow bandwidth, and the lack of organized
content. The commercial online services
were far better at working within the
bandwidth limits, and provided a great deal
of organization to the content they offered.
Users of the commercial online services far
outnumbered Internet users in the mid
1990's.
The commercial online services was not indemand at the time of external audience
measurement. The online services are
having excellent subscriber counting
mechanism like subscription accounts to
keep track of their performance. Standard
accounting and internal metrics met most of
their measurement needs. A simple periodic
survey was sufficient to relative market
share and none but the curious were
otherwise interested in the size and
composition of each of the firm's audiences
because no third-party significant decisions
were being made based on the estimates.
Technical advances were providing more
people with easier access to the Internet.
Investment began flowing into Internet
companies, particularly in Silicon Valley.
8/8/2019 Abstract Computer Networks
4/20
Liverpool John Moores University
Computer Networks
The convergence of these factors, significant
growth in the audiences and huge interest
and concern in the Internet from media,
created a great demand for a world class
measurement for Internet.
There are many techniques that had been
used for measuring internet measurement by
using various measurement techniques. But
they are having some problems that have
been arised in this process.
However, it is highly impossible to count the
number of users directly. Also we can count
the number of hosts which are connected to
the Internet. There have been two methods
of counting the connected hosts. They are as
follows
DNS Survey
Reverse Pointer
Apart from this, there are many other
techniques in order to measure the internet
population and they are not efficient.
There are three primary methods of Internet
audience measurement in use today, each
measurement having several variations.
Measurement from a sample of users
who are metered (electronic measurement)
Measurement from a sample of users
who are surveyed (recall measurement)
Measurement from analysis of server
log files or their equivalents
Each of these measurement approaches have
some strengths and weaknesses and can
generally be viewed to work in
complementary ways. Although each
measurement approach is more appropriate
in certain situations than the others. That is
each of the measurement is having some
individual approach compared to the other
approaches.
There are five steps for measuring Internet
audience using a sample of individuals.
The first is to define the universe of
individuals and their circumstances, and to
be very clear on which behaviors are to be
measured. This is a very important step, as it
serves as the foundation on which all
measurement follows. Once a universe is
defined, it must be measured in its own
right.
Next, a representative sample of
universe members must be recruited. The
behavior from this sample will be projected
to the previously described measured
universe.
8/8/2019 Abstract Computer Networks
5/20
Liverpool John Moores University
Computer Networks
The recruited sample must be
interviewed to capture personal and
household level demographic characteristics
for subsequent analysis.
The sample must also be installed
with the electronic measurement system,
typically the meter. Once meters are
installed, a series of edit rules must be
developed and applied to the data that is
returned to the central office. These edit
rules determine which respondents arereliably returning usage data.
The last step is to weight the sample
to correct any demographic biases in the
installed, in-tab sample versus the universe
estimates, and then project the weighted
sample to the universe.
DNS Survey: This method had a great
survey on DNS (Domain Name System)
database, and counts the unique names of
computers appearing on it. Also it gathers
DNS records from remote sites, and looks
into them. The DNS structure is below.
Fig.3.Domain Name System Tree
In Fig. 3, each node stands for a domain.
There are sub-domains under a domain. For
example, jp domain has ac, co, ne, hokkaido,
etc. as sub-domains. The primary function of
DNS is to convert a domain name IP
address. To convert a name to its IP address,
a host name is represented. FQDN is a
single-word hostname followed by full
domain names which is used to convert the
name represented. It can identify a unique
host name anywhere in the world. If the
name is properly given to DNS, you can get
the answer.IP address is found in the server,
it asks other servers to look for the address.
The process is repeated recursively. It
gathersall the DNS databases in the world
8/8/2019 Abstract Computer Networks
6/20
Liverpool John Moores University
Computer Networks
and utilizes a function of DNS, called zone
transfer, which gives all the records in a
DNS server to the requester.
Transferring domain database is originally
intended to be used by other name servers.
These name servers work as the secondary,
or backup server for the name server. Thus,
it is safe to limit the access ofdomain data
fromunauthorized
hosts.
The method we tried first is what RIPE
Coordination Centre uses to count hosts in
Europe. Japan Network Information Center
(JPNIC) also uses it to count hosts in Japan.
The program transfers the zone file from the
name server (DNS) of the top domain, jp.
Then, it looks at the name server record (NS
record), to recursively transfer zone files for
the sub domains. In this way, the whole
DNS tree can be traversed. Although this
method is very simple and efficient and also
efficient, there is a limitation. Some of the
name servers refuse to transfer zone files.It
is for security and safety measures.These
servers allow zone transfer only to trusted
networks or hosts, such assecondary servers
which work as backup for that particular
domain.
Disadvantages:
This technique seems to be very simple and
easy to calculate but the major disadvantage
in this is, Recently, some sites refused to
allow DNS records to be transferred. They
refused the transfer, because of some illegal
intruders. Since this security issue is serious,
the zone transfer would be refused by many
sites. Because of security context this
method is sometimes not much affordable.
Because sometimes hackers may hack the
Domain Name Server records to gather the
information for their advantage.
Reverse pointer:
Reverse pointer is another internet
measurement technique.The reverse pointer
is a Domain Name System record stored in
the database which will give a map from an
IP address to host name. It starts counting
hosts with the IP address. There is a DNS
record in the database which gives a
mapping from an IP address to a host name.
The record is called a reverse pointer. This
method sometimes also can be called as
Reverse mapping because of the fact that it
is following an opposite direction ofconversion method which is quite opposite
to the functionality of Domain Name
System. If an IP address is successfully
translated to a name, it is counted as a host.
8/8/2019 Abstract Computer Networks
7/20
Liverpool John Moores University
Computer Networks
Advantage: They dont have to transfer zone
information. When converting an IP address
into hostname this method does not transfer
zone information. That is a safety
measurement for this method.
Disadvantages:
If an IP address is assigned to a user
independently irrespective of their
geographical location, network topology we
cannot be able to determine which addresses
are used in different regions and region
names. If this is the case we need to consult
the IP address database in that specific and
particular region to recognize the range of IP
addresses to be count. A host does not
always have reverse translation back to their
domain especially when a translated name is
outside of the domain we are counting, it
affects the result.
Primitive Method: A primitive method is to
count hosts by sending ICMP ECHO to
every possible hosts.This method counts the
hostnames by sending an ICMP ECHO
command to every possible destination.
ICMP ECHO is a packet which is sent to alldestinations. The command used is ping
command.Target hosts can be a subset of the
target domain. More practical method that
is to count hosts by transferring zone data of
the past 30 days", especially if the most
recent visit occurred within the past 45 days.
At the same time, these large-scale surveys
are very valuable devices for understanding
the composition of audiences at certain
kinds of sites. Good targeting objectives can
be set up (e.g., high-income professionals
contemplating purchasing a new luxury car
in the next 12 months). These surveys are
often the best solutions for inter-media
comparisons as well, helping plannersunderstand how various Internet media
properties fill in a campaign built from
traditional media.
Measurement Methodology:
Measurement or the analysis of peer
behaviour in P2P sharing systems, we set
up a client node. Gnutella protocol is
publicly available, there are a number of
client implementations. To perform the
measurements in the Gnutella network, we
modify the open-source of it. Gnutella client
Mutella [Mut04], to record a trace of all
Gnutella messages routed through the node.
Inter
net Protocol Versio
n4:
IPv4 is the most widely used version of the
Internet Protocol. It defines IP addresses in a
32-bit format, which looks like
123.123.123.123. Each three-digit section
8/8/2019 Abstract Computer Networks
8/20
8/8/2019 Abstract Computer Networks
9/20
Liverpool John Moores University
Computer Networks
for 2,031,616 networks, each with up to 256
hosts), termed the Class Cspace.
The remaining eighth of the space was held
in reserve.
Addressing inIPv4:
However, some are reserved for special
purposes such as private networks or
multicast addresses. This reduces the
number of addresses that can be allocated as
public internet addresses. This limitation has
helped stimulate the push towards IPv6,
which is currently in the early stages of
deployment and is currently the only
contender to replace IPv4.
Fig:4. Web Server during the year 2009
Fig:5. Web Browser during the year 2009
Assessments of crisis of IPv4 in terms of
Time scale:
Some of the recent predictions for the IPv4
exhaustion dates are:
This report is auto-generated by a daily
script.
The graph below is showing the deployment
on the time scale.
8/8/2019 Abstract Computer Networks
10/20
Liverpool John Moores University
Computer Networks
Graph:1
The graph below shows the exhaustion date
of IPv4 on timescale basis by Geoff huston:
Graph:2
The below graph shows the exhaustion date
by Tony hain of Cisco systems.
Graph:3
The current status of the IPv4 space is:
Fig:6. Status of IPv4 Space
Draw Back:
One major drawback with the IPV4 is there
are lots of addresses are being wasted
because of classification of IP address
distribution.
8/8/2019 Abstract Computer Networks
11/20
Liverpool John Moores University
Computer Networks
Use Of Published Eviden
ce An
d Opin
ion
:
There are three stages in address allocation.
The pool of IP addresses is managed by the
Internet Assigned Numbers Authority
(IANA). Blocks of addresses are allocated to
Regional Internet Registries (RIRs), who in
turn allocate smaller blocks to Local Internet
Registries (LIRs) or Internet Service
Providers(ISPs).
Any individual IPv4 address can be in any
one of five states
reserved for special use, or
part of the IANA unallocated address pool,
part of the unassigned pool held by an RIR,
assigned to an end user entity but not
advertised in the routing system, or
assigned and advertised in BGP.The current
totals of IP addresses according to this set of
states is shown below
Graph:4
This status can be further categorized per
RIR, as shown in below
Graph:5
Exhaustion will occur on all continents at
the same time, as all registries follow similar
allocation policies, with for about 12 to 18
months stock allocated at each request. Only
specific organizations that requested
8/8/2019 Abstract Computer Networks
12/20
8/8/2019 Abstract Computer Networks
13/20
Liverpool John Moores University
Computer Networks
These dates lie within a depreciation time of
five to ten years of network equipment that
is currently being acquired.
Less than three years until the first RIR
exhaustion is a short time for the entire
industry to transition to IPv6. This situation
is aggravated by the fact that until
exhaustion there will be no significant
demand. David Conrad, the general manager
of IANA acknowledges, "I suspect we are
actually beyond a reasonable time framewhere there won't be some disruption. Now
it's more a question of how much." Geoff
Huston claims we should have started the
transition to IPv6 much earlier, such that by
the exhaustion date it would be completed,
with all devices IPv6-capable, and IPv4
getting phased out.
IPV6 Deployment:
The IPv6 data gram format is shown in the
following figure.The most important
changes introduced in IPv6 are evident in it.
The 32-bit data gram format consists of the
following options.
y Versiony Traffic classy Flow label
y Payload lengthy Next headery Hop limity Source and destination addressesy Data
Fig:7 IPV6 Datagram Format
The IPv6 is the newer version of the internet
protocol. IPv6 is the longer-term outcome
which has been developed to overcome the
difficulties occurred due to IPv4.
IPv6 Addressing:
The address length has been increased
significantly to expand the available address
space. The IPv6 address is 128 bits (or 16
bytes) long, which is four times as long as
its predecessor.
8/8/2019 Abstract Computer Networks
14/20
Liverpool John Moores University
Computer Networks
Because every single bit of added address
length doubles the number of addresses
available, the size of the IPv6 address space
is really huge. It contains 2^128 which is
about 340 billion billion billion billion
different addresses which definitely should
suffice for a very long time. Addresses are
written using 32 hexadecimal digits. The
digits are arranged into 8 groups of four to
improve the readability. There are different
types of IPv6 addresses Unicast, Anycast
and Multicast. Unicast addresses are the
well known addresses. A packet sent to a
unicast address arrives exactly at the
interface belonging to the address. Anycast
addresses are syntactically indistinguishable
from unicast addresses but they address a
group of interfaces. The packet destined for
an anycast address will arrive at the nearest
interface. Anycast addresses may only be
used by routers. Multicast addresses identify
a group of interfaces. A packet destined for
a multicast address will arrive at all
interfaces belonging to the multicast group.
IPv6 provides the following benefits
Larger address space for global reach
ability.
Simplified header for routing efficiency and
performance.
Deeper hierarchy and policies for network
architecture flexibility.
Efficient support for routing and route
aggregation.
Server less auto configuration, easier
renumbering, multi homing, and improved
plug and play support vi)Security with
mandatory IP Security (IPSec) support for
all IPv6 devices.
Improved support for Mobile IP and mobile
computing devices (direct-path). .
Enhanced multicast support with increased
addresses and efficient mechanism.
IPv6Deployment Strategies:
The key strategies used in deploying IPv6 at
the edge of a network involve carrying IPv6
traffic over the IPv4 network, allowing
isolated IPv6 domains to communicate with
each other before the full transition to a
native IPv6 backbone. It is also possible to
run IPv4 and IPv6 throughout the network,
from all edges through the core, or to
translate between IPv4 and IPv6 to allow
hosts communicating in one protocol to
communicate transparently with hosts
running the other protocol. All techniques
allow networks to be upgraded and IPv6
deployed incrementally with little to no
disruption of IPv4 services.
8/8/2019 Abstract Computer Networks
15/20
Liverpool John Moores University
Computer Networks
The four key strategies for deploying IPv6
are as follows:
Deploying IPv6 over IPv4 tunnels: These
tunnels encapsulate the IPv6 traffic within
the IPv4 packets, and are primarily for
communication between isolated IPv6 sites
or connection to remote IPv6 networks over
an IPv4 backbone. The techniques include
using manually configured tunnels, generic
routing encapsulation (GRE) tunnels,semiautomatic tunnel mechanisms such as
tunnel broker services, and fully automatic
tunnel mechanisms such as IPv4-compatible
and 6to4.
Deploying IPv6 over dedicated data links:
This technique enables isolated IPv6
domains to communicate by using the same
Layer 2 infrastructure as for IPv4, but with
IPv6 using separate Frame Relay or ATM
PVCs, separate optical links, or dense Wave
Division Multiplexing (dWDM).
Deploying IPv6 over MPLS backbones:
This technique allows isolated IPv6 domains
to communicate with each other, but over an
MPLS IPv4 backbone. Multiple techniques
are available at different points in the
network, but each requires little change to
the backbone infrastructure or
reconfiguration of the core routers because
forwarding is based on labels rather than the
IP header itself. .
Deploying IPv6 using dual-stack backbones:
This technique allows IPv4 and IPv6
applications to coexist in a dual IP layer
routing backbone. All routers in the network
need to be upgraded to be dual-stack with
IPv4 communication using the IPv4 protocol
stack and IPv6 communication using the
IPv6 stack.
Comparitive Analysis Of IPV6 Major
Deployment Paths:
The following sections provide further
information on IPv6 deployment strategies
and protocol
translation mechanisms:y Deploying IPv6 over IPv4 Tunnelsy Deploying IPv6 over Dedicated Data
Links
y Deploying IPv6 over MPLSBackbones
y Deploying IPv6 Using Dual-StackBackbones
y Protocol Translation Mechanisms
8/8/2019 Abstract Computer Networks
16/20
Liverpool John Moores University
Computer Networks
Tunneling is the encapsulation of IPv6
traffic within IPv4 packets so that they can
be sent over an IPv4 backbone, allowing
isolated IPv6 end systems and routers to
communicate without the need to upgrade
the IPv4 infrastructure that exists between
them. Tunneling is one of the key
deployment strategies for both service
providers and enterprises during the period
of IPv4 and IPv6 coexistence. Tunneling
allows service providers to offer an end-to-
end IPv6 service without major upgrades to
the infrastructure and without impacting
current IPv4 services.
Fig:8. Tunneling
Assessment Of Deployment Paths
Including Time Scale:
In the beginning of the 1990s, the IETF, the
organisation that develops the Internet
standards, started work on the successor of
the Internet Protocol (IP). IP is the protocol
that makes it possible for data packets to
travel over the Internet from one attached
computer to another. A decade later, the
specifications for the new standard (named
IP version 6, or IPv6) are almost, but still
not quite, complete. the most important
milestones in the IPv6 standardisation
process. In 1992: IETF issues Call for IPng
proposals. The IETF started its effort to
select a successor to IPv4 in late 1990 when
projections indicated that the Internet
address space would become an increasingly
limited resource. This looming lack IP
address space was from the very beginning
the most important driving force behind the
development of IPv6. In July 1992, the IETF
issued a Call for Proposals for a next-
generation Internet Protocol, to solve the
address space problem. Several proposals
sprung up, with a wide range in
revolutionariness. Late 1993, the IETF
formed the IP (IP next generation) Area
(later transformed into the IPng Working
Group to investigate the various proposals
and recommend how to proceed. This IETF
8/8/2019 Abstract Computer Networks
17/20
Liverpool John Moores University
Computer Networks
Area produced an IPng technical criteria
document, RFC 1726 that was used in order
to evaluate the three remaining proposals.
The main criteria named in this process are:
-Architectural simplicity (don't include
functions into IP that are better located
elsewhere)
- Scale
- Performance
- Transition
- Configuration ease
- Security
- Service classes
In RFC 1752 the then remaining IPng
proposals were evaluated. One of the
proposals(SIPP), with a number of
modifications, including the doubling of the
proposed address length from 64 to 128 bits,
was chosen as a basis for IPng.
1995: RFC-1883 -- Internet Protocol,
Version 6 (IPv6) specification
Based on SIPP, RFC 1883 was the first
specification carrying the name IPv6. This
specification has the IETF status of
"Proposed Standard". Accompanying and
following this specification, several other
RFC's were issued, specifying the IPv6
addressing architecture, changes to related
protocols, network autoconfiguration,
security and IPv4-IPv6 transition
mechanisms.
1998: RFC-2460 - Internet Protocol, Version
6 (IPv6) specification
It took until December 1998 for the RFC-
1883 based specifications to evolve into
RFC 2460 (and accompanying RFCs), an
IETF "Draft Standard", one step further on
the way to the status of "Internet Standard".
At the moment, the IPv6 specification is still
incomplete: some parts that need to be
specified in accompanying documents are
not yet finished. There is still considerable
discussion, especially about the IPv6
addressing architecture.
2001: First commercials IPv6 offerings
Only very recently Cisco Systems, the
worlds largest maker of data networking
equipment, announced a range of software
for its routers using IPv6. It will be available
at the end of May. Microsoft only expects
full commercial support for IPv6 in its
Windows operating system in 2002. Japans
NTT was the first service provider to offer
commercial IPv6 services, undoubtedly
pushed by the Japanese government, which
pledged to adopt IPv6 by 2005. Zama
Networks, based in Seattle, was the first
U.S. service provider to offer commercial
IPv6 services, starting operations in the
spring of 2001. The IETF is supposed to be
able to quickly find working solutions to
engineering problems. But the problems are:
8/8/2019 Abstract Computer Networks
18/20
Liverpool John Moores University
Computer Networks
Proliferation of requirements:Some say that
the IPv6 standard has become too
widespread and too complicated. This would
presume that the expectations or
requirements for the next-generation IP
protocol have been extending during the
standardisation process. Obviously, when
extra requirements are constantly added
during the process, the destination will never
be reached.
No time pressure:Seeing that the first
commercials products supporting the IPv6
standard have only come out recently, it
seems reasonable to assume that there has
been little pressure on the IPng working
group to make haste. After all, the IPv4
address space is expected to suffice at least
until 2005. Even though products are
available now, vendors have seen almost no
interest from their enterprise customers.
Academics and other outsiders: Has the
openness of the IETF meetings and
procedures given too much opportunity to
relative outsiders,
especially from academia, to interfere in the
process, nit-pick on details and try to make
the protocol of a universal quality, opposed
to the usual IETF motto of rough consensus
and running code? Have political motives,
so despised by IETF regulars, seeped in with
representatives from hardware vendors. In
other words, have people from other
backgrounds than usual at earlier IETF
processes causes the retardation.
These are the problems and issues that deals
with the deployment of IPv6 on the
timescale.
8/8/2019 Abstract Computer Networks
19/20
Liverpool John Moores University
Computer Networks
References:
Coffey, Steve. 1998. Internet Advertising
Bureau. America : American Academy Of
Advertising, 1998.
Geoff .Huston andTelstra ,the internet
protocol journalvolume-6,number4.
James F. Kurose, Keith W. Ross. 2010.
Computer Nertworks - ATop Down
Approach. s.l. : Pearson Edition, 2010.
http://royal.pingdom.com/2010/01/22/intern
et-2009-in-numbers/
Geoff. Huston IPv4 Address Depletion,
The Internet Protocol Journal - Volume 10,
No. 3, at APNIC meeting in NEWDELHI.
Current status of IPV4
address,http://www.potaroo.net/tools/ipv4/in
dex.html
http://www.internetworldstats.com/stats7.ht
m
IPV4 Exhaustion counter,
http://www.potaroo.net/tools/ipv4/index.htm
l
ARIN Board Advises Internet Community
on Migration to IPv6 Mon, 21 May
2007,http://www.arin.net/announcements/20
070521.html
Asia-Pacific Network Information Centre
(APNIC) (2007-06-26). "JPNIC releases
statement on IPv4 consumption
Internet protocol journal,by tony hain of
cisco systems.
JPNIC releases statement on IPv4
consumption, About IPv4 addressexhaustion in Internet Registries,
http://www.apnic.net/news/2007/0626.html
8/8/2019 Abstract Computer Networks
20/20
Liverpool John Moores University
Computer Networks