The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to point utilization the key performance metrics for network with address allocation and router configuration supported by Open Shortest Path First (OSPF) routing protocol. In addition it compares dual-stack to the tunneling mechanism of IPv6 transition using OPNET. The results have shown that IPv6 network produces a higher in throughput, response time and Ethernet delay, but little difference in packet dropped, additionally the result in TCP delay, Point to point utilization shows small values compared to dual-stack networks. The worst performance is noted when 6 to 4 tunneling is used, tunneling network produces a higher delay than other scenarios.
After the democratic transformation in 2003 in Iraq, young people waited a lot to take their real opportunity to participate in politics, but most of the laws regulating political and electoral work have been unfair to young people, despite developments in laws and legislation, but opportunities did not allow young people to participate in politics, which was reflected It negatively affected their participation in voting and nomination, and even their assumption of public office and positions, which is why they complained about the ruling class and the political system through protests, or when they refused to vote, and this is reflected in the recent parliamentary elections and low participation rates
The MTS-88. c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembly. It has the problem that long programs cannot be traced and tested efficiently. A simple error may cause all the code to be erased and the system to stop responding. Also, this system lacks the ability to be connected to the PC. The aim of this work is to modify the system to make it possible to be connected to the PC through the parallel port. This gives the capability to download long programs to the system after being developed in the PC. The 8255 Programmable Peripheral Interface available in the teaching system is interfaced to the parallel port and used as
... Show MoreIn the name of of Allah the Merciful
Praise be to God, and blessings and peace be upon the Messenger of God, Muhammad, and upon his family and his family and peace, and after:
The honor of every knowledge of honor is related to it, and since the science of interpretation is related to the Book of God Almighty; it is considered one of the most noble and longest of sciences, and this science began long ago as the early ages of Islam have expanded the Islamic state, and people entered the religion of God in cohorts, and the mixture mixed In tongues, and people did not know much about the meanings of the Qur’an, so the need for authorship in this great knowledge was severe, and pe
Internet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets.
... Show MoreReinforced concrete barriers have been commonly used in protecting the important building because the response of R.C. barriers subjected to blast loading is practically more acceptable than other materials used to build the barriers. In this study, the response of R.C. barriers was detected due to the blast effects caused by two charge weights (50 kg and 400 kg); ANSYS 14 was used to simulate the problem. A horizontal distance of 2 m between the explosive TNT charge and the front face of wall was taken. The pressure on the front face of the concrete barriers was measured at three levels. The R.C. barrier was entirely damaged when subjected to the blast effects caused by 400 kg TNT explosion bomb. However, the 50 kg TNT charge had
... Show MoreAbstract. Froth flotation is a solid-liquid separation technique that uses hydrophobicity as a driving force. Bacteria and other drinking water microorganisms tend to be hydrophobic and can be removed from water using this application. The biggest limitation against using froth flotation in the drinking water industry is the difficulty of producing froth without chemical frothers and holding bacteria in this froth without chemical collectors which deteriorate water taste and odor. Recently, researchers at the University of Sheffield described a method for producing froth using only water and compressed air. This has enabled froth flotation to be studied as an alternative to biocides for the removal of bacteria from drinking water. T
... Show MoreGiven the importance of possessing the digital competence (DC) required by the technological age, whether for teachers or students and even communities and governments, educational institutions in most countries have sought to benefit from modern technologies brought about by the technological revolution in developing learning and teaching and using modern technologies in providing educational services to learners. Since university students will have the doors to work opened in all fields, the research aims to know their level of DC in artificial intelligence (AI) applications and systems utilizing machine learning (ML) techniques. The descriptive approach was used, as the research community consisted of students from the University
... Show MoreBackground: Nanoparticles are clusters of atoms in a size range from (1-100) nm. Nano dentistry creates amazing useful structures from individual atoms or molecules (nanoparticles), which provides a new alternative and a possibly superior strategy in prevention and treatment of dental caries through management of dental plaque biofilms. The aim of the study was to test the sensitivity of Streptococcus mutans to different concentrations of hydroxyapatite and iron oxide nanoparticles suspension solutions, in comparison to chlorhexidine, and de-ionized water, in vitro. Materials and methods: Agar well technique was applied to test the sensitivity of Streptococcus mutans to different concentrations of hydroxyapatite and iron oxide nanoparticle
... Show More