Abstract
Many transition mechanisms and scenarios have studied for the using of IPv6 network efficiently. The VPN in IPv4 network is the main security application. Also it is necessary to use VPN during the transition period to IPv6 network. The VPN service provides the confidentiality and integrity for transmitted packets. But there are some difficulties to connect end-to-end VPN without a conversion between IPv4 and IPv6. Therefore, we analyze the suitability of the various applying model of VPN in conjunction with the transition mechanisms and evaluate the performance cost of this model. In the case of using the transition mechanism and VPN technology simultaneous, we can know the performance factors as follows: whether end points of the VPN tunnel and IP tunnel agree upon or not, the applying place of transition mechanism and VPN model according to network environment. Therefore, it should consider carefully evaluated applying model according to the required security level and connectivity.
This research was supported by the MIC (Ministry of Information and Communication), Korea, under the ITRC (Information Technology Research Center) support program sup- ervised by the IITA (Institute of Information Technology Assessment).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kim, H.-K., Lim, H.-J., Hong, Y.-G., Lee, S.-Y., Chung, T.-M.: A Study on IPSec Possibility of Adaptation in IPv6 Transition Mechanisms. In: Proceedings of the 19th Korea Information Processing Society (KIPS) Spring Conference (May 2003)
Doraswany, N.: IPSec. Prentice-Hall, Englewood Cliffs (1999)
Chang, F., Waddington, D.G.: Realizing the Transition to IPv6. IEEE Communications Magazine (June 2002)
Gilligan, R., Nordmark, E.: Transition Mechanisms for IPv6 Hosts and Routers, RFC 2893 (August 2000)
Mackay, M., Edwards, C., Dunmore, M., Chown, T., Carvalho, G.: A Scenario-Based Review of IPv6 Transition Tools. IEEE Internet Computing (June 2003)
Wiljakka, J.: Transition to IPv6 in GPRS and WCDMA Mobile Networks. IEEE Communications Magazine (April 2002)
Tatipamula, M., Grossetete, P., Esaki, H.: IPv6 Integration and Coexistence Strategies for Next Generation Networks. IEEE Communication Magazine (January 2004)
Lind, M., Ksinant, V., Park, S., Baudot, A., Savola, P.: Scenarios and Analysis for Introducting IPv6 into ISP Networks, RFC 4029 (June 2004)
Huitema, C., Austein, R., Satapati, S., van der Pol, R.: Unmanaged Networks IPv6 Transition Scenarios, RFC 3750 (June 2003)
Bound, J.: IPv6 Enterprise Network Scenarios., Internet draft, draft-ietf-v6ops-ent-scenarios-05.txt (January 2005)
Srisuresh, P., Holdrege, M.: IP Network Address Translator (NAT) Terminology and Considerations, RFC 2663 (August 1999)
Callon, R., Haskin, D.: Routing Aspects of IPv6 Transition, RFC 2185 (September 1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lim, HJ., Lee, DY., Kim, TK., Chung, TM. (2006). An Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3981. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751588_15
Download citation
DOI: https://doi.org/10.1007/11751588_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34072-0
Online ISBN: 978-3-540-34074-4
eBook Packages: Computer ScienceComputer Science (R0)