A Comparative Analysis Of Ipv4 And Ipv6 Networks Using Finite State Machines Based On Rules
Keywords:
IPV4 address, IPV6 address, finite state machine, rule baseAbstract
Reaching network addresses based on the guidelines established in the rule base is one of the most effective ways to achieve quick results for IP addresses. These guidelines consist of IP addresses, combinations of these addresses, or combinations that include port numbers. This paper evaluates various designs and advantages of rule bases when it comes to accessing network addresses utilizing finite state machines. In a network, whenever new events occur, it is imperative that their detection or evaluation is efficient in terms of time. This can be accomplished by creating effective rules for monitoring network events. One method to achieve this is through the implementation of finite state machines. In this paper, we analyze the search times for IPV4 and IPV6 network addresses. For IPV4 addresses, which involve approximately 232 entries in a table, the mathematically calculated search time for a system based on FSM are around 210, while the time complexity for a linear search system with the same number of entries is approximately 232. For IPV6 addresses, with about 2128 entries in a table, the search time using FSMs is roughly 212, whereas a linear search system would take about 2128. This paper demonstrates that the search time for any IPV6 address using FSMs shows a significant improvement at approximately 29
Downloads
References
Atish Mishra, Arun Kumar Jhapate, Prakash Kumar, “Designing Rule Base for Genetic Feedback Algorithm Based Network Security Policy Framework using State Machine”, 2009 International Conference on Signal Processing Systems.
A.K. Bandara, E.C. Lupu, J. Moffett, and A. Russo, “A Goal-based Approach to Policy Refinement”, Proceedings 5th IEEE Workshopon Policies for Distributed Systems and Networks (Policy 2004), IBM TJ Watson Research Centre, New York, USA, June 2004, PP22-229.
CHEN Xiao-su, WU Jin-hua, NI jun “Genetic-Feedback Algorithm Based Network Security Policy Framework” Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007,pp2278-2281.
Hoi Chan and Thomas Kwok “A Policy Based management System with Automatic Policy Selection and Creation Capabilities by using Singular Value Decomposition Technique”, Proceedings of the Seventh IEEE International Workshop on Policies for Distributed Systems and Networks,2006, pp96-99
J.O. Kephart and W.E. Walsh, “An AI Perspective on Autonomic Computing Policies”, Fifth IEEE International Workshop on Policies for Distributed Systems, Networks, 2004, pp3-12.
L.P. Kaelbling, M. Littman, and A. Moore, “Reinforcement Learning: A Survey”, Journal of Artificial Intelligence Research, May 1996,pp237-285.
RFC 2573, “A Framework for Policy-based Admission Control”, http://www.faqs.org/rfcs/ rfc2753. html.
Xin Yue, Wei Chen, Yantao Wang, “The Research of Firewall Technology in Computer Network Security”, 2009 Second Asia-Pacific Conference on Computational Intelligence and Industrial Applications.
Young-Ho Kim, Jeong-Nyeo Kim, “Design of Firewall in Router using Network Processor”.
Crina Grosan, Ajith Abraham, “Intelligent Systems A Modern Approach”, Springer
Charles M.Kozierok ,”The TCP/IP Guide version 3.0”
Cui, Yong and Chen, Yuchi and Liu, Jiangchuan and Lee, Yiu-leung and Wu, Jianping and Wang, Xingwei, IEEE Network journal, 2015, “State management in IPv4 to IPv6 transition”.
Li, K. H., & Wong, K. Y. (2021). Empirical Analysis of IPv4 and IPv6 Networks through Dual-Stack Sites. Information, 12(6), 246.
Bachilo, V. V., Dravitsa, V. I., & Listopad, N. I. (2023). Comparative Analysis of the Capabilities of IPv6 and IPv4 Protocols to Provide the Designated Quality of Service. Doklady BGUIR, 20(8), 75-83.
Dobrinov, N., Parra, L., Garcia, L., & Romero, O. (2016). Comparative Study of a Router Performance with IPv4 and IPv6 Traffic. Network Protocols and Algorithms, 8(3).
Hanumanthappa, J., Manjaiah, D. H., Aravinda, C. V., & Joshi, V. B. (2010). A Comparison of Performance evaluation metrics and Simulation parameters of a Novel IPv4/IPv6 Transition Mechanism: BD-SIIT vs. DSTM.
Basit, A., & Hussain, R. (2017). Performance evaluation of simultaneous network configuration using dual stack and tunnel transition techniques: An enterprise level analysis. International Journal of Advanced and Applied Sciences, 4(1), 102-109.
Almutlaq, W. M., & Elfadil, N. (2022). A Comparative Performance Evaluation of IPv4/IPv6 Using Network Simulation and Virtualization Tools. International Journal of Computer Science and Mobile Computing, 11(10)
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.