eMobile internet protocol version six (IPv6) testbed for interoperability of Nigerian education services and networks

Oluwashola D. Adeniji


The diversity of educational methods, services and protocols promoted disparate educational services in Nigeria. The diversity has not promoted resource sharing and has encouraged duplication of efforts. There is no doubt that the University systems in Nigeria need to complement each other bearing in mind the limited resources available to individual University system. With the introduction of next generation internet protocol version six (IPv6), some of the divergent technologies can be brought to a platform to facilitate resource sharing, capacity development and optimization of resources. In order to solve these diversities of resources affecting Nigerian Education Services and Network, Route Optimization Techniques in IPv6 will provide the best option for scaling these diversities. The Nigeria ecosystem has come of age and attained maturity level to identify the futuristic roles of internet protocol version six (IPv6). Globally, Policy makers and Governments have recognized the enormous opportunities the Internet can create and its impact on economic growth and prosperity. The prime mission of the invention is to develop and provide an eMobile IPv6 testbed that supports optimization of resources for digital services in Nigeria Tertiary Education.


Internet Protocol Version Six (IPv6), interoperability, services

Full Text:



Dutta N, Saha IS Misra, Pokhrel R, & Mrinal K (2014). Performance Analysis of Multilayer MIPv6 Architecture through Experimental Test bed, Journal of Network, Vol 7, pp 1682-1691

Cho S , Na J , K im C , Lee S , Kang H , Koo C ( ‖Neighbor MR Authentication and Registration Mechanism in Multihomed Mobile Networks Networks‖ IETF Internet Draft.

Atiquzzaman M, Shahriar AZM, & Ivancic W (2010). Route optimization in network mobility: Solutions, classification, comparison, and future research directions," IEEE Communications Surveys & Tutorials, Vol.12, No.1, pp.24-38.

Adeniji OD & Olatunji OO 2020. Zero Day Attack Prediction with Parameter Setting Using Bi Direction Recurrent Neural Network in Cyber Security. International Journal of Computer Science and Information Security (IJCSIS), Vol. 18, No. 3, pp 111-118.

Chandavarkar BR. Deployment of a Simple and CostDeployment of a Simple and Cost--Effective Mobile IPv6 Testbed Effective Mobile IPv6 Testbed for the Stfor the Study of Handover Executionudy of Handover Execution (2020).(2020). ICCCE 2020, Proceedings of the 3rd International Conference on Communications and Cyber Physical Engineering.

Adeniji ODAdeniji OD & & Osofisan Osofisan AA (2020). (2020). Route Optimization in MIPv6 Experimental Test Route Optimization in MIPv6 Experimental Test bed for Network bed for Network Mobility: Tradeoff Analysis and Evaluation. International Journal Mobility: Tradeoff Analysis and Evaluation. International Journal of Computer Science and Information Security (IJCSIS), Vol. 18, No. 5,of Computer Science and Information Security (IJCSIS), Vol. 18, No. 5, pp 19pp 19--28.28.

Logunleko KB, Adeniji OD, & Logunleko AM (2020). A Comparative Study of Symmetric Cryptography Mechanism on DES, AES and EB64 for Information Security. International Journal of Scientific Research in Computer Science and Engineering Vol.8, Issue.1, pp.45-51.

Lakshmanan S, Tsao CL, Sivakumar R, & Sundaresan K (2008). Securing wireless data networks against eavesdropping using smart antennas,” in Proceedings of the. International Conference on Distributed Computing Systems ICDCS'08, pp. 19–27, Bandung, Indonesia, 2008.

Raymond DR & Midkiff SF (2008). “Denial-of-service in wireless sensor networks: attacks and defenses,” IEEE Pervasive Computing, vol. 7, no. 1

Kannhavong B (2007). “A survey of routing attacks in mobile ad hoc networks”, IEEE Wireless Communications, vol. 14, no. 5.

Meyer U & Wetzel S (2004). “A man-in-the-middle attack on UMTS,” in Proceedings of the 3rd ACM Workshop on Wireless Security, ACM, New York, NY, USA.

Ohigashi T & Morii M (2009). “A practical message falsification attack on WPA,” JWIS, vol. 14, 2009.

Norton S (2016). “Norton cyber security insights report.

Olabisi AA, Adeniji OD, & Abeng E (2019). A Comparative Analysis of Latency, Jitter and Bandwidth of IPv6 Packets Using Flow Labels in Open Flow Switch in Software Defined Network‖ Afr. J. MIS, Vol.1, Issue 3, pp. 30-36.


  • There are currently no refbacks.