ipl-logo

Teredo Tunneling: Annotated Bibliography

868 Words4 Pages

Annotated Bibliography
Sharma, V., & Kumar, R. (2017). Teredo tunneling-based secure transmission between
UAVs and ground ad hoc networks. International Journal Of Communication
Systems, 30(7), n/a. doi:10.1002/dac.3144
Coordinating network formations require highly sensitive and fault-tolerant data transfer over the secure channels. A secure channel is required that can ensure the secure connectivity between nodes of the two networks. This secure channel can be realized using a teredo tunneling approach. Using this approach, a service-oriented security framework is developed.
The proposed framework focuses over security in terms of cognitive and corridor.
This article is introducing the Teredo tunneling technology which helps the migration …show more content…

The article is related, and helped explain how teredo helps the old protocol work with the new, providing full feature IPv6 internet to users.
The article is published on International Journal of Communication Systems, which is authority in this field, and the article is already peer reviewed, so it is reliable.
Claburn, T. (2007). The Internet's Filling Up. Informationweek, (1140), 24.
The article generally reported that the American Registry for Internet Numbers has urged a faster migration to the upcoming Internet Protocol, IPv6, because of the estimate that the
Internet will be full around 2012 or 2013. By that time, only 19 percent of the current IPv4
Internet address space remains. IPv4 permits more than four billion Internet address spaces while IPv6 allows some 16 billion-billion addresses.
This is a journal from a magazine, Information Week. The article is mainly talking about situation back in 2007 and their estimate of the outage of IPv4. Although the information is a little outdated, it helps we introduce the IPv4 problem and helps analyze how this problem developed. It is highly related with the main topic.
The source, is the Informationweek magazine, which started 1979 and ends in 2013. As …show more content…

doi:10.1063/1.4982584
A specific scheme of network transition need to conduct detailed analyses for the basic concepts, the types of address, the necessary technology for transition and the agreement and principle of transition. According to the tunneling technology of IPv6, the IPv4 network and
IPv6 network can communicate with each other, and the network of whole campus can operate well.
The article is about how to convert and migrate properly in a university campus, which is a fitted example of migration of network in big enterprises and other similar situations. The paper would be highly related with our topic, IPv6 migration and integration in current circumstances. This article is published on AIP and cited by 3 other authors, which is a high number for a
2017 published paper. Although it is not peer-reviewed, there is guarantee of reliability.
Chimiak, W. J., Patton, S. T., & Janansky, S. (2014). Enhanced IP: IPv4 with 64-BitAddresses. Computer (00189162), 47(2), 62-69. doi:10.1109/MC.2013.150
Enhanced IP offers a solution to the problem of IPv4 address depletion without replacing
IPv4, as IPv6 does, but by building on top of IPv4, maximizing backward compatibility.

Open Document