THE EXTENT OF USAGE OF IPV4 PROTOCOL SUITE IN DATA

ASSESSMENT OF IPV4 PROTOCOL SUITE
USAGE IN DATA COMMUNICATION NETWORKS IN
NIGERIA
BY
OPARA, F. K., and
ETUS CHUKWUEMEKA
Department of Electrical and Electronic Engineering,
Federal University of Technology, Owerri, Nigeria.
ABSTRACT
The most widely used protocol for internetworking today is the current Internet
Protocol Version number four (IPV4). IPV4 forms IP datagrams with upper-layer
data transmittable within multiple networks. Each constituent network in the IPV4
Internet Supports Communication among the devices attached to that network.
These devices are end systems (ESs) – which are the sources and destinations of
data packets; intermediate systems (ISs) – which operates at layer 2 of the OSI
seven-layer architecture and acts as a relay of frames between similar networks; and
Routers – which operates at layer 3 of the OSI architecture and routes packets
between potentially different networks. IPV4 also supports and co-exists with other
upper layer Local Area Network (LAN) protocols to interconnect multiple networks,
permitting communication between end systems attached to them in order to support
end-user applications or services. In the Nigerian context, IPV4 applications and
services are investigated and appraised as a way of assessing its usage, extents of
deployment and effects. These were measured in terms of specific applications or
services, reliability, throughput / efficiency, security level, cost effectiveness, capacity
utilization, ease of implementation, staff expertise, and areas of dense / sparse
applications, amongst other critical factors.
Key words:
Internetworking, IP datagram, End systems (ESs), Intermediate systems (ISs), OSI,
Multiple Networks, Applications.
Acronyms:
IPV4-Internet Protocol Version Four; TCP/IP-Transmission Control Protocol/ Internet
Protocol; UDP-User Datagram Protocol; ICMP-Internet Control Message Protocol;
IGMP-Internal Group Management Protocol; OSPF-Open Shortest Path First; RSVPResource Reservation Protocol; SNMP-Simple Network Management Protocol;
TELNET-Tell Network (Log-on Protocol); SMTP-Simple Mail Transfer Protocol;
MIME-Multipurpose Internet Mail Extension; HTTP-Hypertext Transfer Protocol;
FTP-File Transfer Protocol; BGP-Border Gateway Protocol.
1
1.0
INTRODUCTION
Before the development of the Internet Protocol Version Four (IPV4) – a
layered structure concept of a global addressing standard for data communication
over mixed networks and technologies covering Local Area Networks (LANs),
Metropolitan Area Networks (MANs), and Wide Area Networks (WANs); there
existed dedicated and customized single-work protocols. Examples include
broadcast and switched Ethernet LAN protocols, asynchronous transfer mode (ATM)
protocol, Fibre Channel Protocol, Open Systems Interconnection (OSI) protocol and
so on. However, combining several computer protocols networks each with its own
dedicated purposes together would be a nightmare or disaster if the interactions
between them were not clearly defined. Hence, the development of the layered
structure concept – IPV4 (Stallings, 2000), to help keep each protocol in its place
and to also define the manner of Interactions between the protocols, thus becoming
a global addressing scheme. It is essentially a protocol for communication between
communication protocols; with the first of its kind being the Internet Protocol version
four (IPV4). IPV4, which is an internetworking protocol (Internet protocol for short),
assumes the first of the Internet protocol standards upon which the global Internet
builds and thrives.
IPV4 is a 32-bit address space protocol suite also known as the TCP / IP
(Transmission Control Protocol/Internet Protocol) suite version number four with five
layers:
Application layer – providing communication between processes or
applications or separate hosts; Transport layer – providing end-to-end data transfer;
Internet layer – concerned with routing data from source to destination through one
or more networks connected to routers; Network access layer – concerned with the
logical interface between an end system and a network; and physical layer – which
defines characteristics of transmission medium, signaling rate, and signal encoding
scheme; and that with spaces for about 4.2 billion hosts [Wright and Stevens 1995].
As a protocol version, IPV4 contains the Protocol Data Unit (PDU), Service Data Unit
(SDU), and Protocol Control Information (PCI) with syntax, semantics and timing
elements, all put together to serve the purpose of data transfer and management
controls. Hence, it supports and coexists with other upper-layer protocols (see figure
3) to enable the hosts send and receive data across computer networks to and fro
end systems (hosts), or in the case of hosts on diverse networks, to and fro a router /
routers. IPV4 is implemented in all of the end systems and routers concerned, acts
2
as a relay to move a blocks of data (executable binaries, American Standard for
Information Interchange (ASCII) texts, postscripts and so on), from one host through
one or more routers to another host, and keeps track of the blocks of data to assure
that all are delivered reliably to the appropriate applications.
IPV4, as the first global Internet addressing protocol base / scheme for the
Internet mixed Networks, was originally created for the purpose of serving the
educational and scientific community (Huitema, 1995). However the Internet was
such a good idea that it quickly expanded and has now become far reaching to have
touched almost every facet of the global community – IP telephony, movies, e-mails,
e-commerce and so on. For successful Internet communications, every entity in the
overall system must have unique addresses. Actually, two levels of addressing are
needed. Each host on a network must have a unique global Internet address - this
allows the data to be delivered to the proper host. Each process within a host must
have an address that is unique within the host - this allows the end-to-end protocol
(TCP) to deliver data to the proper process. These latter addresses are known as
ports [Halsall, 1996].
This paper showcased the IPV4 protocol format, addressing format, Datagram
format, Interfacing upper layer protocols and its standard applications – illustrated
using a typical case within the Nigerian Internet industry. Finally, this paper
investigated and appraised IPV4 standard applications deployment extents and
effects, as a way of assessing its usage in Nigeria.
2.0
OVERVIEW OF IPV4 PROTOCOL SUITE
IPV4 as the protocol used by machines to form today’s Internet has 32-bit
address spaces for about 4.2 billion hosts. As the protocol between IP entities IPV4
is best descried with reference to the IP datagram format [Stallings, 2002]; as shown
in figure 1 below. The fields are as follows:

Version (4 bits): Indicates Version number, to allow evolution of the
protocol.

Internet header length (IHL) (4 bits): length of header in 32-bit words. The
minimum value is five, for a minimum header length of 20 octets.

Type of service (8 bits): specifies reliability, precedence, delay, and
throughput parameters.

Total length (bits): Total datagram length, in octets.
3

Identification (16 bits): A sequence number that, together with the source
address, destination address, and user protocol, is intended to identify a
datagram uniquely.
Thus, this number should be unique for the
datagram’s source address, destination address and user protocol for the
time during which the datagram will remain in the Internet.

Flags (3 bits): Only two of the bits are currently defined. The more bit is
used for fragmentation and reassembly, as previously explained.
Don’t fragment bit prohibits fragmentation when set.
The
This bit may be
useful if it is known that the destination does not have the capability to
reassemble fragments. However, if this bit is set, the datagram will be
discarded if it exceeds the maximum size of an en-route network.
Therefore, if the bit is set, it may be advisable to use source routing to
avoid networks with small maximum packet size.

Fragment offset (3 bits): Indicates where in the original datagram this
fragment belongs, measured in 64-bit units. This implies that fragments
other than the last fragment must contain a data field that is a multiple of
64 bits in length.

Time to live (8 bits): specifies how long, in seconds, a datagram is allowed
to remain in the Internet. Every router that processes a datagram must
decrease the TTL by at least one, so that TTL is somewhat similar to a
hop count.

Protocol (8 bits): Indicates the next higher-level protocol that is to receive
the data field at the destination.

Header checksum (16 bits): An error-detecting code applied to the header
only. Because some header fields may change during transit (e.g., time to
live, fragmentation–related fields), this is re-verified and recomputed at
each router. The checksum field is the 16-bit complement addition of all
16-bit words in the header. For purposes of computation, the checksum
field is itself initialized to a value of zero.

Source address (32 bits): Coded to allow a variable allocation of bits to
specify the network and the end system attached to the specified network.

Destination address (32 bits): Same characteristic as source address.

Options (variable): Encodes the options requested by the sending user.
4

Padding (variable): used to ensure that the datagram header is a multiple
of 32 bits in length.

Data (variable): The data field must be an integer multiple of 8 bits in
length. The maximum length of the datagram (data field plus header field)
is 65,535 octets.
0
8
4
Version
IHL
Type of Service
Identification
Time to live
24
16
31
Total Length
Flags
Protocol
Fragment Offset
Header Checksum
Source address
Destination address
Options + Padding
Fig. 1. IPV4 Header
The source and destination address fields in the IP header each contain a 32-bit
global Internet address, generally consisting of a network identifier and a host
identifier. The address is coded to allow a variable allocation of bits to specify
network and host, as depicted in figure 2.
This encoding provides flexibility in
assigning addresses to hosts and allows a mix of network sizes on the Internet. In
particular, the first three network classes are best suited to the attached conditions
[Stevens, 1996]:

Class A: Few networks, each with many hosts

Class B: Medium number of networks, each with a medium number of
hosts.

Class C: Many networks, each with a few hosts.
5
0
Network (7 bits)
10
Host (24 bits)
Network (14 bits)
110
Host (16 bits)
Network (21 bits)
1110
11110
Class A
Class B
Host (8 bits)
Multicast
Class C
Class D
Future Use
Class E
Fig. 2: IPV4 address formats
IPV4 addresses are usually written in what is called dotted decimal notation
[Comer, 1995], with a decimal number representing each of the octets of the 32-bit
address. For example, the IP address 11000000 11100100 00010001 00111001 is
written as 192.228.17.57. Note that all class A network addresses begin with a
binary O. Network addresses with a first octet of O (binary 00000000) and 127
(binary 01111111) are reserved, so there are 126 potential class A network
numbers, which have a first dotted decimal number in the range 1 to 126. Class B
network addresses begin with a binary 10, so that the range of the first decimal
number in a class B address is 128 to 191 (binary 10000000 to 10111111). The
second octet is also part of the class B address, so that there are 2 14 = 16, 384 class
B addresses. For class C addresses, the first decimal number range from 192 to
223 (11000000 to 11011111).
The total number of class addresses is 2 21 =
2,097,152.
As one of the provisions of IPV4, its specification formats are in two parts
[Stevens, 1994]:

The interface with a higher layer e.g. TCP, specifying the services IP
provides.
6

The actual protocol format (as previously described).
The services to be provided across adjacent protocol layers (e.g., between IP
and TCP) as illustrated in figure 3, are expressed in terms of primitives and
parameters [Murhammer, 1998]. A primitive specifies the function to be performedwhether send or deliver primitive, and the parameters are used to pass data and
control information. The actual form of a primitive is implementation-dependent.
MIME
BGP FTP HTTP SMTP TELNET SUMP
TCP
UDP
ICMP ICMP
IP (IPV4)
Fig. 3: IPV4 Internetworking protocols
The highlighted service positions within the IPV4 protocols suite include: (1)
Transport protocols (connection-oriented TCP and connectionless UDP) which
provides an end-to-end data transfer service that shields upper layer protocols for
transport services (TS) such as FTP, SMTP and TELNET (Log-on protocol) from the
7
details of the intervening network or networks; (2) Routing protocols (the exterior
router protocols on the internet e.g. BGP and the interior router protocols on the
internet e.g. OSPF - responsible for receiving and forwarding packets through the
interconnected set of networks and to exchange information about reachability and
traffic delays, allowing each router to construct a next-hop routing table for paths
through the internet; (3) Resource reservation protocol (RSVP) - which enables end
systems to reserve capacity for unicast or multicast / multimedia traffic, and provides
guidance to router vendors on the development of efficient techniques for handling a
varied load; (4) Management agents and admission control protocols – for network
management e.g. SNMP, network control e.g. ICMP and IGMP, remote logon e.g.
TELNET, web access e.g. HTTP, electronic mail e.g. SMTP and MIME, and for file
transfer e.g. FTP. All these higher layer protocols inter-work with IPV4 for service
applications.
3.0
IPV4 PROTOCOL DEPLOYMENT AND STANDARD APPLICATIONS CASE
IN NIGERIA
IPV4 provides a connectionless or datagram service between end systems.
With connectionless network, Internet facility is flexible, services can be made highly
robust and it does not impose unnecessary overhead. As a case study, figure 3
depicts a typical example of IPV4 usage in Nigeria, in which two Local Area
Networks (LANs) namely; Allaise francise IT center (connected to the internet by an
Israeli internet service provider ISP - Arrive Taxcom), and FUTO Computer Centre
(connected to the internet by ISP – Direct on PC Nig. Ltd Port Harcourt) - both with
business activities around Owerri area in Imo State; are interconnected by an X.25
packet-switching Network cloud.
The figure 3 depicts the operation of internet protocol (IPV4) for data
exchange between host A on One LAN (LAN1 on Allaise Francaise network), and
host B on another LAN (LAN2 on FUTO Computer Centre Network); to the Internet.
It also shows the IPV4 protocol architecture and Format of the data unit at each
stage. The end systems and routers share a common Internet protocol – IPV4, and
in addition, must also share similar protocols above IPV4. The intermediate routers
need only implement up through IPV4.
8
LAN 1 (Allaise Francaise IT
Centre Network)
Router (X)
End System
(Server) A
LAN 2 (FUTO Computer
Centre Network)
X.25
Packet-switched
WAN
Router (Y)
From/to other
MAN / WAN
Networks
From/to other
MAN / WAN
Networks
End System
(Server) B
Fig. 3: IPV4 protocol operations in case study.
KEYS:
TCP-H = TCP header, IP-H = IP header, LLC1-H = LLC header, MAC1-H = MAC
header, MAC2-T = MAC trailer, XP-H = X.25 packet header, XL-H = X.25 link header,
XL-T = X.25 Link Trailer, t1 – t18 = Data transfer time period.
Practicably, end system A has a datagram to transmit to end system B; the
datagram includes the Internet address of B. The IPV4 module in A recognizes that
the destination (B) is on another network. So the first step is for IPV4 to send the
data to a router, in this case router X. To do this, IPV4 passes the datagram down to
the next lower layer (in this case lower link control – LLC) with instruction to send it
to router X. LLC in turn passes this information down to the Medium Access ControlMAC layer, which inserts the MAC-level address of router X into the MAC header.
Thus, the block of data transmitted onto LAN1 includes data from a layer or layer
9
above TCP, plus a TCP header, an IP header (appropriate to IPV4), an LLC header,
and a MAC header and trailer.
Next, the packet travels through network 1 (i.e. LAN1) to router X. The router
removes MAC and LLC fields and analyses the IPV4 header to determine the
ultimate destination of the data, in this case B; by taking a routing decision, one of
which includes any of these three:

If the destination station B is connected directly to one of the networks to
which the router is attached; then, the router sends the datagram directly
to the destination.

If one or more additional routers must be traversed to reach the
destination B (as is the case here), then a routing decision must be taken
as to which router should the datagram be sent. Hence, the IPV4 module
in the router sends the datagram down to the next lower layer with the
destination network address.

If the router does not know the destination address; then, the router
returns an error message to the source of the datagram (End system A in
this Case).
Therefore, by taking the second decision, router X constructs a new packet
with or without fragmentations, by appending an X.25 header containing the address
of router Y to the IPV4 data unit. When the packet arrives at router Y, the packet
header is stripped off. The router determines that this IPV4 data unit is destined for
B, which is connected directly to a network (LAN2), to which this router is attached.
The router Y therefore creates a frame with a layer-2 destination address of B and
sends it out onto LAN2 with or without reassembly. The data finally arrive B, where
the LAN and IP headers can be stripped off and data recovered.
With the IPV4 approach, each unit of data is passed from router to router in
an attempt to get from source (A) to destination (B) or Vice-versa, within time.
Because delivery is not hundred percent guaranteed, there is no particular reliability
requirement on any of the networks.
Thus, the protocol IPV4 works with any
combination of networks. Also, because the sequence of delivery is not guaranteed,
successive data units can follow different paths through the Internet. This allows the
protocols to react to both congestion and failure in the Internet by changing routes.
10
The standard operational applications of an IPV4–structured Internet in
Nigeria are therefore outlined as follows:

Routing

Datagram lifetime

Fragmentation and reassembly

Error control

Flow control
(1) Routing – For the purpose of routing, each system maintains a routing table that
lists, for each possible destination network, the next router to which the internet
datagram should be sent. The routing table may be static or dynamic. A static
table, however, could contain alternate routes if a particular router is unavailable.
A dynamic table is more flexible in responding to both error and congestion
conditions. When a router goes down, all of its neighbors will send out a status
report allowing other routers and stations to update their routing tables. Routing
tables may also be used to support other internetworking services such as
security and priority. Another routing technique is source routing. The source
station specifies the route by including a sequential list of routers in the datagram.
This, again, could be useful for security or priority requirements. Route recording
is a service related to IPV4 Internet routing.
To record a route, each router
appends its Internet address to a list of addresses in the datagram. This feature
is useful for testing and debugging purposes.
(2) Datagram Lifetime – It is undesirable for a datagram to loop indefinitely though
the Internet (especially when dynamic or alternate routing is used), for two
reasons. First, an endlessly circulating datagram consumes resources. Second,
a transport protocol may depend on the existence of an upper bound a datagram
lifetime. To avoid these problems, each datagram can be marked with a lifetime
by IPV4. Once the lifetime expires, the datagram is discarded. A simple way to
implement lifetime is to use a hop count. Each time that a datagram passes
through a router, the count is decremented. Alternatively, some global clocking
mechanism can be used which requires that the router must somehow know how
long it has been since the datagram or fragment last crossed a router, to know
11
how much to decrement the lifetime field. The advantage of using a true time
measure is that it can be used in the reassembly algorithm, described next.
(3) Fragmentation and Re-assembly – In the foregoing, individual networks within an
Internet may specify different maximum packet sizes. Thus, routers may need to
fragment incoming datagrams into smaller pieces called segments or fragments,
before transmitting on to the next network. IPV4 fragmentation technique uses
the following information in the IPV4 header:

Data Unit Identifier ID – a means of uniquely identifying an end-systemoriginated datagram. It consists of the source and destination addresses,
a number that corresponds to the protocol layer that generate the data
(e.g., TCP), and an identification supplied by that protocol layer.

Data Length – the length of the user data field in the original datagram, in
multiples of 64 bits.

Offset = O (unchanged)

More flag – set to O (false) when datagram data length equals the entire
length of the data field.
Again, it is remarkable and easier for IPV4 to have reassembly of datagram done
at the destination only.
To reassemble a datagram, there must be sufficient
buffer space at the reassembly point. As fragments with the same ID arrive, their
data fields are inserted in the proper position in the buffer until the entire data
field is reassembled, which is achieved when a contiguous set of data exists
starting with an offset of zero and ending with data from a fragment with a false
more flag.
(4) Error Control – For error to report that a specific datagram has been discarded,
some means of datagram identification is needed, which is supplied by IPV4.
When a router discards a datagram, the router should attempt to return some
information to the source, if possible. The source Internet entity may use this
information to modify its transmission strategy and may notify higher layers.
Datagram may be discarded for a number of reasons, including lifetime
expiration, congestion, and FCS error.
In the latte case, notification is not
possible because the source address field may have been damaged.
12
(5) Flow Control – IPV4 Internet flow control allows routers and/or receiving stations
to limit the rate at which they receive data. For the connectionless type of service
being described, flow control mechanisms are limited. The best approach would
seem to be sending flow control packets, requesting reduced data flow, to other
routers and source stations.
4.0
RESEARCH ANALYSIS AND PRESENTATIONS ON IPV4 PROTOCOL
USAGE ASSESSMENT IN NIGERIA
This assessment research is a product of investigative analysis of interviews,
experiences, observations and inferences drawn from the Nigerian Internet industry
with references made to specific ISP companies doing business around Owerri
municipality. The resultant data as presented were collated and tabulated by use of
code keys and assumed percentages based on chosen code keys conversion as
indicated below, but analyzed proper by use of bar charts and mean calculation.
(a) Codes assigned to visited companies:
i)
Adesemi Nig. Ltd.
X1
ii)
Lomasnet Ltd.
X2
iii)
Asonet Nig. Ltd.
X3
iv)
Citi Communications Ltd.
X4
v)
Direct on PC Nigeria Ltd
X5
(b) Analytical conversion keys used:
i)
(0-19)%
too poor
ii)
(20-39)%
poor
iii) (40-59)%
fair
iv) (60-79)%
good
v)
(80-100)%
Very good
13

Resultant data Presentation on the deployment and usage of IPV4 in
Nigeria:
Specifications
Companies
Data provided and reasons (where
providing
necessary)
Harmonized
data
data
percentages
Sampled
extent and
their
implications
(A) Service
X1
Fully Supported.
Good
Applications
X2
Fully Implemented.
(Service
X3
Operationally complex with some
(B) Reliability
(C) Throughput /
70%
Applications
bottlenecks.
Implemented
X4
Reduced Scalability and Security.
and
X5
Some Applications Disabled
Operational)
X1
Flexible though.
X2
Less reliable generally.
X3
Reduced reliability.
X4
Data handling guaranteed though.
X5
Flexible and reliable though limited.
X1
Efficient directory maintenance
Good
scheme.
(Performance
Efficiency
X2
Diverse network access mechanisms
Fair
50%
(Flexible but
less reliable).
70%
ok).
used.
X3
Successful delivery across networks.
X4
End-to-end error recovery.
X5
Status and performance reporting
efficient.
(D) Security level
X1
Interfere with some applications.
Fair
X2
Relatively poor security level.
(Less security,
X3
Security risks yes, but being
but being
addressed.
40%
X4
Application data exploitable.
X5
IPsec not originally at its core, but
improved).
offered by vendors.
(E) Cost
X1
Cost effective.
Fair
effectiveness
X2
Costly workarounds noticed.
(Cost effective
X3
Equipments procurement costly.
X4
Maintenances cost effective also.
services
X5
Hardware and Software costly vis-à-
provided).
vis the services rendered.
14
50%
vis-à-vis the
(F) Ease of
X1
Client-server scalable.
Fair
implementation and
X2
Address space shrinkage though
(Implementable
capacity utilization
X3
Massive growth and shortage of live
X4
and utilizable
manageable.
regardless of
50%
addresses.
the
constraints).
Limitation on Services, also due to societal
peculiarities.
X5
Capacity utilization more on the receiving
side.
(G) Staff expertise
(H) Areas of dense /
X1
Initial configuration headaches.
Good
X2
Networks mostly handcrafted.
(Staff expertise
X3
More time - saving systems sought.
X4
Automating systems / processes welcomed.
X5
Maintainability guaranteed.
X1
IPV4 addresses unfairly distributed even
Good
globally.
(Relatively wide
Nigeria requires more live IP addresses in the
coverage).
sparse applications
X2
60%
upgradeable).
near future.
X3
Concentrated around urbanized areas.
X4
Services sought more around commercialized
and institutionalized areas.
X5
More dense where human activities and
factors are most prevalent.

Analysis of the deployment and usage of IPV4 in Nigeria:
15
ok and
60%
Estimating the deployment and usage of IPV4 in Nigeria using mean calculation
gave:
Mean
=
67 + 50 + 70 + 40 + 50 + 50 + 60 + 60
8
=
450
8
=
56.25% (i.e. fair)
The result of the analysis on data as presented revealed that Nigeria has
deployed and used IPV4 Internet (up to about 56.25%), though still far from full
capacity utilization. The above-average usage revealed and the quest for
improvements, generally suggest an upward trend in Internet usage in Nigeria.
5.0
DISCUSSIONS AND APPRAISALS ON ANALYSIS OF IPV4 PROTOCOL
USAGE IN NIGERIA
The result of the analysis on observations / revelations made is hereby
discussed as a way of appraising the protocol’s deployment and usage specifications
namely: Service applications, reliability, throughput / efficiency, security level, cost
effectiveness, ease of implementation and capacity utilization, staff expertise, and
Areas of dense / sparse applications; comparable to other countries of the world.
(a)
Service applications – service applications fully supported and implemented
over IPV4 Internet in Nigeria includes web hosting, e-mail services, e-libraries,
web advertisements, e-commerce, Internet or IP telephony, and IPV4 support
for many other softwares and hardwares over the internet. However, IPV4
has been discovered to contain some developmental and operational
complexities which presents some bottlenecks with it, creating some
obstacles to deploying next generation applications and services such as
voice over Internet Protocol (VOIP), teleconferencing, increased address
space, built-in IP security (IP- sec), reduced size of routing tables in routers,
improved support for quality of service (QOS), multicast and mobile IP, and
support for domestic appliances like cameras, tapes, etc. The said operational
complexities include among others – complexities in roaming, reduced speed,
limited scaling and disability in some applications.
16
(b)
Reliability – Due to data fragmentation and reassembly (just to accommodate
smaller maximum packet size limitation on the outgoing network, frame
creation by network wrapping of data, routing mechanisms, and security
levels in the IPV4 internet); the services offered by IPV4 internet in Nigeria are
a little less reliable. That is because, IPV4 does not guarantee that all data
will be delivered or that the data that are delivered will arrive in the proper
order. This provides for a great deal of flexibility but reduced reliability.
(3)
Throughput / efficiency – IPV4 internet is globally efficient (Nigeria inclusive),
somewhat due to: (a) its deployment of different addressing schemes which
use different end point names and addresses and directory maintenance
scheme, (b) different network access mechanisms between stations and
networks, (c) different timeouts for successful delivery across multiple
networks using internetworking timing procedures that allow successful
transmission with avoidance of unnecessary retransmissions, (d) error
recovery which provides anything from no error recovery up to reliable end-toend (within the network) service, (e) status and performance reporting which
enables different networks to report status and performance differently by
providing internetworking information to interested and authorized processes,
(f) user access control where each network has its own user access control
technique (authorization for use of the network). These are invoked by the
Internet work facility as necessary.
(4)
Security level – about security issues, IPV4 is said to interfere with some
applications [Stallings, 2004], and this offers a relatively poor level of security
(IP-sec) at the core level globally (Nigeria inclusive). Computer Emergency
Response Team (CERT) listed over 1300 reported security incidents affecting
nearly 20,000 sites globally. The most serious types of attacks included IP
spoofing; in which intruders create packets with false IP addresses and exploit
applications that use authentication based on IP address, and various other
forms of eavesdropping and packet sniffing - in which hackers read
transmitted information including logon information and data base contents.
Even, some popular press around the world have carried articles containing
dire warnings of the disaster that will result while sending credit card details
over the now (i.e. IPV4) Internet.
17
(5)
Cost effectiveness – IPV4 internet equipments and services are cost effective
in Nigeria, in that they undergo costly workarounds in equipments
procurement and maintenance vis-à-vis its services, which mostly includes
web hosting, e-mails, telephony, and support for a handful of internet
appliances (e.g. routers, servers, etc), which are always on.
(6)
Ease of implementation and capacity utilization – In Nigeria, IPV4 Internet is
mostly deployed in client-sever scalability implementation and utilization
instead of peer-to-peer scalability, due to some of its real-life constraints. One
of the real life constraints is inadequate address space shrinkage, due to
massive Internet growth and consequent shortage or run-out of IPV4
addresses e.g. about 320 million address was used up globally by year 2000
and about 550 million was used up by year 2005. This necessitated the
introduction
of
Network Address
Translation
(NAT), also called
IP
masquerading [Tsirtsis and Srisuresh, 2000], into the system – an approach
where a user address is assigned to one of the user’s machine and several
other machines are hidden behind the one bearing the official, globally unique
address; which breaks the golden rule most times by altering the data
between source and destination. NAT arrangement as used in Nigeria, allows
the hidden machines to access the rest of the Internet whereas themselves
cannot be accessed or detected. Other real life constraints of IPV4 Internet
especially in Nigeria include limitations on services such as web hosting, IPsec, and so on.
All these put together tells much on the ease of
implementation of IPV4, and also places its capacity utilization heavily on the
receiving side with little on the giving side.
(7)
Staff expertise – one of the largest headaches of IPV4 network in Nigeria,
from the administrator’s point of view, is its initial Network configuration.
Despite time saving systems like BOOTP and Dynamic Host Configuration
Protocol (DHCP), huge number of networks are handcrafted, with IP numbers
typed in at individual workstations by support staff whose job is to do this.
Else, anything that automates this process is sought for, which further reechoes the need for Nigeria to keep pace with emerging technologies to
forestall diminishing staff expertise.
18
(8) Areas of dense/sparse applications
- The Internet Assigned Numbers
Authority (IANA), in the USA, was said to have unfairly allocated IPV4 Internet
addresses.
Organizations that applied early (especially USA companies)
were given large number of addresses that were superfluous to their needs.
Imagine that MIT, Xerox and Apple Corporations each have more address
spaces than the whole of China [Feyre, 2001], not to talk of Nigeria.
Consequently, those companies and countries that moved on to the Internet
later, found it difficult to get enough live IP addresses. Hence, even European
companies have fewer addresses; while Africa as a whole, require far more
addresses than they have received. This monopoly, together with some other
human factors have influenced and led to the generally scarce IPV4 Internet
applications in Nigeria. However, the towns hosting the institutions of higher
learning, the urbanized, commercial and industrial towns in Nigeria (with the
State Capitals), have been identified as areas of dense IPV4 Internet
applications and services – due to the increasing research, commercial,
industrial and even administrative activities going on around these areas.
6.0
CONCLUSION
The Internet today has grown with IPV4 as the base protocol and has
experienced routing–traffic pressure and operational complexities due to the large
database of applications, services, technologies and other upper layer protocols it
support. Thus, IPV4 is used to transfer any type of file that it can handle. These
include: executable binaries, graphic images, ASCII texts, postscripts, sound and
video files, and lots more within the limits of its real-life constraints and
developmental limitations.
Nigeria has deployed and used, and has also experienced positive impacts of
IPV4 Internet thus far, though quite limited, comparatively to advanced countries of
the world. However, a big turn-around is being anticipated as the IPV4 real-life
constraints improve for good - either by effecting more upgrades into it, or by going
for and transiting to a better Internet base protocol - of which the Internet protocol for
next generation (IPng), popularly called Internet protocol version six (IPV6), is the
answer.
19
PREFERENCES
1.
Bertsekas, D., and Gallager, R. (1992); “Data Networks”, NJ: Prentice Hall,
Englewood Cliffs, pp 38-40.
2.
Comer, D. (1995); “Internetworking with TCP/IP”, Volume 1: Principles,
Protocols, and Architecture, NJ: Prentice Hall, Englewood Cliffs, p. 14.
3.
Comer, D., and Stevens, D. (2001); “ Internetworking with TCP/IP”, volume III:
Client-Server programming and applications, NJ: Prentice Hall, Upper Saddle
River, pp 17-20.
4.
Feyre, H. (May, 2001); “Introduction to IPV6”, On Camp Magazine, Vol. 140,
pp 1-3.
5.
Halsall, F. (1996); “Data Communications, Computer Networks, and Open
Systems”, MA: Addison-Wesley, Reading, p10.
6.
Huitema, C. (1995); “Routing in the Internet”, NJ: Prentice Hall, Englewood
Cliffs, p 10.
7.
Keshav, S., and Sharma, R. (May 1998); “ Issues and trends in Router
Design”, IEEE Communications magazine, p 21.
8.
Leon-Garcia and Widjaja India. (2000); ”Communication networks;
fundamental concepts and Key Architectures”, McGraw-Hill Series in
computer Services, USA, p 21.
9.
Murhammer, M. et al. (1998); “TCP/IP: Tutorial and Technical Overview”, NJ:
Prentice Hall, Upper Saddle River, pp13-15.
10.
Rodriquez, A., et al. (2002); “ TCP/IP: Tutorial and Technical Overview”, NJ:
Prentice Hall, Upper Saddle River, pp 41-43.
11.
Rose, M. (1993); “The Internet Message: Closing the book with electronic
mail”, NJ: Prentice Hall, Englewood Cliffs, p 18.
12.
Sklar, B. (November, 1993); “Defining, Designing and Evaluating Digital
Communication Systems”, IEEE Communications magazine, p 30.
13.
Stallings, W. (1999); “Cryptography and Network Security: Principles and
Practice”, 2nd Edition, NJ: Prentice Hall, Upper Saddle River, pp25-26.
14.
Stallings, W. (2004); “Data and Computer Communications”, 7 th Edition,
Pearson-Prentice Hall, Upper Saddle River, NJ0758, pp 550-566.
15.
Stevens, W. (1994); “TCP/IP Illustrated: The Protocols”, Volume 1, MA:
Addison-Wesley, Reading, p 20.
20
16.
Stevens, W. (1996); “TCP/IP illustrated, Volume 3: TCP for Transmission,
HTTP, NNTP, and the Unix (R) Domain Protocol”, MA: Addison-wesley,
Reading, p 9.
17.
Tsirtsis, G., and Srisuresh, P. (February, 2000); “Network Address Translation
– Protocol Translation (NAT-PT)”, RFC 2766.
18.
Wright, G. and Stevens, W. (1995); “TCP/IP Illustrated, Volume: The
Implementation”, MA: Addison-Wesley, Reading, p 13.
19.
http://www.shore.net /~ws/DCC6e.html
20
http://www.williamStallings.com/Dcc6e.html
21
Academic Backgrounds of Researchers
1.
F. K. Opara is a lecturer in the department of Electrical
and Electronic Engineering of Federal university of
Technology Owerri (FUTO); and a major in Data
Communication Engineering. He is a researcher on
communication-related subject matters.
e-mail: kefelop@yahoo.com
2.
Etus Chukwuemeka is a graduate of Electrical and
Electronic Engineering from Federal university of
Technology Owerri (FUTO); and a major in Electronics
and and Computer Engineering. He is a researcher on
Electronic and Computer related subject matters.
e-mail: etuscw@yahoo.com
Paper / Manuscript No.: 2007 - 035
22