To see the other types of publications on this topic, follow the link: IP (Computer network protocol).

Journal articles on the topic 'IP (Computer network protocol)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IP (Computer network protocol).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Neeru Kumari and Dr. Tilak Raj. "OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 06 (June 22, 2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.

Full text
Abstract:
Open Shortest Path First networking protocol falls under the category of Interior gateway routing protocols and is multi-vendor supported. The task of OSPF like any other routing protocol is to calculate the best path between source IP address and destination IP address within the organisation computer network. There are various other routing protocols like Routing Information Protocol, Border Gateway Protocol, Intermediate System - Intermediate System (IS-IS), Enhanced Interior Gateway Routing Protocol, etc. which are used in computer network. Routing protocols have different algorithms through which they compute the best path selection criteria. OSPF because of its flexible design is often used with other routing protocol over the large network. This research focuses on the working of OSPF metric value variation and convergence for best path selection using network simulation tool like Cisco Packet Tracer tool for getting similar outcome just like a real networking device like router working in a real production environment. This research would use multiple combinations of OSPF metric calculation for routes learned from other routing protocols like Routing Information Protocol (RIP). Being able to correctly identify metric values obtain by testing with OSPF and other routing protocols and analysis them for best path selection.
APA, Harvard, Vancouver, ISO, and other styles
2

KOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (June 9, 2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.

Full text
Abstract:
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part of the application of various IP protocols is also compared VoIP communication with a video stream on a local basis. The conclusion of the paper is devoted to the graphical evaluation of these observations and to draw conclusions based on them.
APA, Harvard, Vancouver, ISO, and other styles
3

Alfaresa, Yuansa, Bongga Arifwidodo, and Fauza Khair. "Automate IGP and EGP Routing Protocol Configuration using a Network Automation Library." Jurnal Online Informatika 8, no. 2 (December 28, 2023): 222–31. http://dx.doi.org/10.15575/join.v8i2.1157.

Full text
Abstract:
Data communication is sending data from client to client through a computer network. The increasing use of data communication makes computer networks more complex. Complex computer networks make it difficult for network administrators to configure them, especially routing protocol configuration. Network administrators are in charge of configuring routing protocols and managing networks. In addition, the more devices on the network, the greater the chance of human error from the administrator. Therefore, network automation is one solution that helps network administrators overcome this. This study focuses on analyzing the performance of network automation using the Paramiko and Telnetlib libraries. The routing protocol used by OSPF for IGP and BGP for EGP. The scenario in this study involves configuring IP addresses and configuring OSPF and BGP routing. Based on the test results, the Telnetlib library is better than the Paramiko library in terms of script delivery time, convergence time, and delay by 19.237% when applied to the IGP and EGP routing protocols.
APA, Harvard, Vancouver, ISO, and other styles
4

Rafif Abyakto, Naif Baihaqi, M. Aldi Firdaus, Salsabila Aulia, and Didik Aribowo. "Simulasi TCP-IP Menggunakan Topologi Bus." Uranus : Jurnal Ilmiah Teknik Elektro, Sains dan Informatika 2, no. 2 (May 11, 2024): 07–14. http://dx.doi.org/10.61132/uranus.v2i2.97.

Full text
Abstract:
One important technique for understanding and analyzing computer network performance is TCP/IP simulacrum. In this research, we simulate a TCP/IP network using the bus topology as a model. We use the Cisco Packet Tracer simulated network topology builder to create a bus topology and implement the TCP/IP protocol. The simulation results provide more accurate understanding of how the TCP/IP protocol functions within a bus network. We analyze network performance in terms of throughput, latency, and packet loss. The analysis's findings indicate that bus topologies have a certain amount of leeway in network operations, particularly when a collision occurs. However, this simulation offers a valuable tool to improve computer network design and management.
APA, Harvard, Vancouver, ISO, and other styles
5

YIMING, ALIMUJIANG, and TOSHIO EISAKA. "A SWITCHED ETHERNET PROTOCOL FOR HARD REAL-TIME EMBEDDED SYSTEM APPLICATIONS." Journal of Interconnection Networks 06, no. 03 (September 2005): 345–60. http://dx.doi.org/10.1142/s0219265905001460.

Full text
Abstract:
This paper presents a protocol to support hard real-time traffic of end-to-end communication over non real-time LAN technology. The network is set up with nodes and switches, and real-time communication is handled by software (protocol) added between the Ethernet protocols and the TCP/IP suite. The proposed protocol establishes a virtual circuit based on admission control and manages hard real-time traffic to bypass the TCP/IP stack. This makes considerably reduce the dwell time in the nodes, and increase the achievable data frame rate. After the bypassing, traffic schedule is performed according to dynamic-priority EDF algorithm. The work does not need any modifications in the Ethernet hardware and coexists with TCP/IP suites, and then the LAN with the protocol can be connected to any existing Ethernet networks. It can be adopted in industrial hard real-time applications such as embedded systems, distributed control systems, parallel signal processing and robotics. We have performed some experiments to evaluate the protocol. Compared to some conventional hard real-time network protocols, the proposed one has better real-time performances and meets the requirements of reliability for hard real-time systems.
APA, Harvard, Vancouver, ISO, and other styles
6

Bein, Adrian Sean, and Alexander Williams. "Networking IP Restriction filtering and network address." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, no. 2 (April 30, 2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.

Full text
Abstract:
Permissions setting on a computer is necessary. This is an effort that is not easy to change the system configuration or settings changed by the user. With a network of computers, of course, permissions settings do not need to be done one by one manually. Because in a computer network course there are many collections of computers connected together. Permissions setting so that the system can use the client-server applications that access restrictions can be done effectively. As the implementation of client-server applications can be created using Visual Basic 6.0. This language has been able to access the socket on the Windows operating system, named Winsock API that supports TCP / IP. This protocol is widely used because of the reliability of client-server application programming. The application is divided into two main applications, namely the client and server program name with the name of the Receiver Sender program. Receiver function receives instructions restriction of access rights Sender and sends reports to the Sender process execution. While Sender functions to send instructions restrictions permissions via the Registry to the Receiver. And after the test, the application can block important features available in the Windows operating system. So it is expected that these applications can help in permissions setting on a computer network.
APA, Harvard, Vancouver, ISO, and other styles
7

Upadhyay, Paramesh C., and Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks." International Journal of Mobile Computing and Multimedia Communications 2, no. 3 (July 2010): 47–60. http://dx.doi.org/10.4018/jmcmc.2010070104.

Full text
Abstract:
Mobility is a natural phenomenon in cellular networks. The worldwide popularity of mobile communications and Internet has necessitated the merger of the two fast growing technologies to get their fullest advantages. The Internet protocol (IP) was designed for static hosts only. Therefore, in order to add mobility in Internet, the Internet protocol needs to be redefined. This paper is intended to present an overview of various mobility management schemes, available in literature, for IP-based mobile networks.
APA, Harvard, Vancouver, ISO, and other styles
8

Hu, Yao, Ting Peng, and Lianming Zhang. "Software-Defined Congestion Control Algorithm for IP Networks." Scientific Programming 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/3579540.

Full text
Abstract:
The rapid evolution of computer networks, increase in the number of Internet users, and popularity of multimedia applications have exacerbated the congestion control problem. Congestion control is a key factor in ensuring network stability and robustness. When the underlying network and flow information are unknown, the transmission control protocol (TCP) must increase or reduce the size of the congestion window to adjust to the changes of traffic in the Internet Protocol (IP) network. However, it is possible that a software-defined approach can relieve the network congestion problem more efficiently. This approach has the characteristic of centralized control and can obtain a global topology for unified network management. In this paper, we propose a software-defined congestion control (SDCC) algorithm for an IP network. We consider the difference between TCP and the user datagram protocol (UDP) and propose a new method to judge node congestion. We initially apply the congestion control mechanism in the congested nodes and then optimize the link utilization to control network congestion.
APA, Harvard, Vancouver, ISO, and other styles
9

Hammoudi, Modhar A. "Building Model for the University of Mosul Computer Network Using OPNET Simulator." Tikrit Journal of Engineering Sciences 18, no. 2 (June 30, 2011): 34–44. http://dx.doi.org/10.25130/tjes.18.2.04.

Full text
Abstract:
This paper aims at establishing a model in OPNET (Optimized Network Engineering Tool) simulator for the University of Mosul computer network. The proposed network model was made up of two routers (Cisco 2600), core switch (Cisco6509), two servers, ip 32 cloud and 37 VLANs. These VLANs were connected to the core switch using fiber optic cables (1000BaseX). Three applications were added to test the network model. These applications were FTP (File Transfer Protocol), HTTP (Hyper Text Transfer Protocol) and VoIP (Voice over Internet Protocol). The results showed that the proposed model had a positive efficiency on designing and managing the targeted network and can be used to view the data flow in it. Also, the simulation results showed that the maximum number of VoIP service users could be raised up to 5000 users when working under IP Telephony. This means that the ability to utilize VoIP service in this network can be maintained and is better when subjected to IP telephony scheme
APA, Harvard, Vancouver, ISO, and other styles
10

Stepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko, and V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks." Programmnaya Ingeneria 13, no. 5 (May 16, 2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.

Full text
Abstract:
The paper analyzes the network protocols of computer networks to identify potential vulnerabilities at the software level. The conditions for carrying out a man-in-the-middle attack in networks using the Address Resolution Protocol (ARP) are investigated. Such attacks are of a rather dangerous type, since they are based on the shortcomings of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of impact on the attacked node is given. The technology of ARP spoofing (poisoning) and methods that allow one to infiltrate an existing connection and communication process are examined in detail. An implementation of an ARP spoofing attack in the Python and C# programming languages using the Soapy and SharpPcap libraries is presented. Examples of implementation of denial-of-service (DoS) attacks in a peer-to-peer network using the ARP protocol in C# are given. The article also describes examples of man-in-the-middle attacks associated with various protocols and infiltration into the address space of routers, such as DHCP (a protocol that dynamically assigns an IP address to a client computer) spoofing and ICMP (Internet Control Message Protocol) redirection. Methods for hacking a router and substituting a MAC address and examples of scripts that implement: sending a fake ARP packet; a function for performing a DoS attack; changing the Linux MAC address; router hacks, are presented in the article.
APA, Harvard, Vancouver, ISO, and other styles
11

Pratama, I. Putu Agus Eka. "Design and Implementation of SDN IP Based on Open Network Operating System and Border Gateway Protocol." Bulletin of Computer Science and Electrical Engineering 2, no. 2 (December 30, 2021): 56–66. http://dx.doi.org/10.25008/bcsee.v2i2.1145.

Full text
Abstract:
The development of computer network technology in the form of Software Defined Networking (SDN), provides many facilities for users to be able to develop network control applications, which can separate the data plane function from the control plane. The existence of this separation on routers and switches makes it easy for developers to centrally develop software and devices according to what is needed by users. However, there were obstacles to implementing SDN on IP networks in a short time. For this reason, it is necessary to implement SDN in stages by adding SDN to the existing IP network in the form of SDN IP, so that SDN can be connected and exchange routing information autonomously. This study focuses on the design and implementation of SDN IP using the Open Network Operating System (ONOS) on the Border Gateway Protocol (BGP). The results show that the design and implementation of SDN IP based on ONOS and BGP can be done well, where SDN can connect and exchange routing information with the Autonomous System (AS) native BGP-based network. Key word(s): Autonomous System (AS) Border Gateway Protocol (BGP) Open Network Operating System (ONOS) Software-Defined Networking (SDN) SDN IP
APA, Harvard, Vancouver, ISO, and other styles
12

Wu Boqiao, Liu Xuefei, Tan Aiping, and Weniee Evelyn. "Network Management Scheme Based on TCP/IP Protocol." International Journal of Digital Content Technology and its Applications 7, no. 6 (March 31, 2013): 937–45. http://dx.doi.org/10.4156/jdcta.vol7.issue6.106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Al-Fedaghi, Sabah S., and Ghadeer Aldamkhi. "Conceptual Modeling of an IP Phone Communication System." International Journal of Interdisciplinary Telecommunications and Networking 13, no. 3 (July 2021): 83–94. http://dx.doi.org/10.4018/ijitn.2021070106.

Full text
Abstract:
In computing, a network generally denotes devices, often referred to as nodes, connected by links. Networks that are modeled with diagrams consist of hundreds of symbols, images, pictures, and icons, such as a computer, a server rack, or a cloud-based storage system. Network representations provide valuable insights into understanding the systems' underlying structures and mechanisms. Nevertheless, this unusually large number of superficial symbols and icons reflects a need for more systematic representations of the interiority of nodes. To give uniformity to this cascade of notions of basic units of nodes in network diagrams, the authors propose adoption of a new modeling methodology, called a thinging (abstract) machine (TM) (abstract machine of things) that represents all notions as a single diagrammatic machine. Because of the large number of network types, in this paper, they specifically and without loss of generality focus on IP telephone (internet protocol telephone) networks to exemplify communication networks. A real case study of IP telephone networks is modeled using TM.
APA, Harvard, Vancouver, ISO, and other styles
14

Prabadevi, B., and N. Jeyanthi. "Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks." Cybernetics and Information Technologies 17, no. 4 (November 27, 2017): 69–86. http://dx.doi.org/10.1515/cait-2017-0042.

Full text
Abstract:
AbstractThe bridge protocol (Address Resolution Protocol) ARP, integrating Ethernet (Layer 2) and IP protocol (Layer 3) plays a vital role in TCP/IP communication since ARP packet is the first packet generated during any TCP/IP communications and they are the first traffic from the host. In the large data center, as the size of the broadcast domain (i.e., number of hosts on the network) increases consequently the broadcast traffic from the communication protocols like ARP also increases. This paper addresses the problem faced by Layer 2 protocols like insecured communication, scalability issues and VM migration issues. The proposed system addresses these issues by introducing two new types of messaging with traditional ARP and also combat the ARP Cache poisoning attacks like host impersonation, MITM, Distributed DoS by making ARP stateful. The components of the proposed methodology first start the process by decoding the packets, updates the invalid entry made by the user with Timestamp feature and messages being introduced. The system has been implemented and compared with various existing solutions.
APA, Harvard, Vancouver, ISO, and other styles
15

Żal, Mariusz, Marek Michalski, and Piotr Zwierzykowski. "Implementation of a Lossless Moving Target Defense Mechanism." Electronics 13, no. 5 (February 28, 2024): 918. http://dx.doi.org/10.3390/electronics13050918.

Full text
Abstract:
The contemporary world, dominated by information technologt (IT), necessitates sophisticated protection mechanisms against attacks that pose significant threats to individuals, companies, and governments alike. The unpredictability of human behavior, coupled with the scattered development of applications and devices, complicates supply chain maintenance, making it impossible to develop a system entirely immune to cyberattacks. Effective execution of many attack types hinges on prior network reconnaissance. Thus, hindering effective reconnaissance serves as a countermeasure to attacks. This paper introduces a solution within the moving target defense (MTD) strategies, focusing on the mutation of Internet protocol (IP) addresses in both edge and core network switches. The idea of complicating reconnaissance by continually changing IP addresses has been suggested in numerous studies. Nonetheless, previously proposed solutions have adversely impacted the quality of service (QoS) levels. Implementing these mechanisms could interrupt Transmission Control Protocol (TCP) connections and result in data losses. The IP address mutation algorithms presented in this study were designed to be fully transparent to transport layer protocols, thereby preserving the QoS for users without degradation. In this study, we leveraged the benefits of software-defined networking (SDN) and the Programming-Protocol-Ondependent Packet Processors (P4) language, which specifies packet processing methodologies in the data plane. Employing both SDN and P4 enables a dynamic customization of network device functionalities to meet network users’ specific requirements, a feat unachievable with conventional computer networks. This approach not only enhances the adaptability of network configurations but also significantly increases the efficiency and effectiveness of network management and operation.
APA, Harvard, Vancouver, ISO, and other styles
16

Hansson, Andreas, Kees Goossens, and Andrei Rădulescu. "Avoiding Message-Dependent Deadlock in Network-Based Systems on Chip." VLSI Design 2007 (April 30, 2007): 1–10. http://dx.doi.org/10.1155/2007/95859.

Full text
Abstract:
Networks on chip (NoCs) are an essential component of systems on chip (SoCs) and much research is devoted to deadlock avoidance in NoCs. Prior work focuses on the router network while protocol interactions between NoC and intellectual property (IP) modules are not considered. These interactions introduce message dependencies that affect deadlock properties of the SoC as a whole. Even when NoC and IP dependency graphs are cycle-free in isolation, put together they may still create cycles. Traditionally, SoCs rely solely on request-response protocols. However, emerging SoCs adopt higher-level protocols for cache coherency, slave locking, and peer-to-peer streaming, thereby increasing the complexity in the interaction between the NoC and the IPs. In this paper, we analyze message-dependent deadlock, arising due to protocol interactions between the NoC and the IP modules. We compare the possible solutions and show that deadlock avoidance, in the presence of higher-level protocols, poses a serious challenge for many current NoC architectures. We evaluate the solutions qualitatively, and for a number of designs we quantify the area cost for the two most economical solutions, strict ordering and end-to-end flow control. We show that the latter, which avoids deadlock for all protocols, adds an area and power cost of 4% and 6%, respectively, of a typical Æthereal NoC instance.
APA, Harvard, Vancouver, ISO, and other styles
17

Liu, Zeying, Pengshuai Cui, Yongji Dong, Lei Xue, and Yuxiang Hu. "MultiSec: A Multi-Protocol Security Forwarding Mechanism Based on Programmable Data Plane." Electronics 11, no. 15 (July 30, 2022): 2389. http://dx.doi.org/10.3390/electronics11152389.

Full text
Abstract:
With the development of network technology, various network protocols different from TCP/IP have emerged. The heterogeneous integrated network has been proposed to realize the interconnection between heterogeneous networks running different protocols. However, current protocol conversion mechanisms often can only handle a few pre-defined protocols and do not support the flexible expansion of new protocols, which cannot meet the needs of the efficient convergence of different heterogeneous networks. Addirionally, due to the lack of security mechanisms, data in the core network is confronted with the risk of stealing and tampering. Our aim is to provide a protocol-extensible protocol conversion and secure transmission integration mechanism, MultiSec, for heterogeneous converged networks. First, based on the programmable data plane, the parser is reconfigured to realize multi-protocol parsing. Furthermore, the encryption mechanism implemented in the P4 extern is proposed and unified to the data plane together with the protocol conversion mechanism. Finally, the MultiSec prototype is implemented on a programmable software switch and accelerated by a dedicated encryption card. Experiments show that MultiSec successfully realizes multi-protocol conversion and data encryption, and the system performance is significantly improved with the help of an encryption card.
APA, Harvard, Vancouver, ISO, and other styles
18

Amin, Muhammad, Dian Kurnia, and Kevin Mikli. "Design of Three Class Internet Protocol Routing Model Based on Linux Command Line Interface." Journal of Applied Engineering and Technological Science (JAETS) 3, no. 2 (June 24, 2022): 133–38. http://dx.doi.org/10.37385/jaets.v3i2.764.

Full text
Abstract:
The world of information technology is currently experiencing very rapid development, especially in internet technology. The Internet itself is a form of utilization of a computer network system, a computer network system consisting of a group of computer systems and other computing hardware linked together through communication channels to facilitate communication and resource sharing among various users. TCP / IP is a standard protocol that is applied to the internet network. The existence of a router in a TCP/IP network is very important, this is due to the large number of hosts and the differences in the devices used on a TCP/IP network. Router is a computer network device that is used to forward data packets from one network to another, both within the scope of LAN and WAN networks (Yani A., 2008). As a result, a routing mechanism is needed that can integrate many users with a high degree of flexibility. Routing is generally divided into two categories, namely static routing and dynamic routing. Static routing is a routing mechanism that depends on the routing table with manual configuration while dynamic routing is a routing mechanism where the routing table exchange between routers on the network is carried out dynamically. Routing in the world of information technology (IT) is part of how to improve network performance. Routing is a process to choose the path (path) traversed by the packet. Routing itself is very instrumental in building a network, be it LAN or WAN. Currently the use of routing in a network is something that needs to be taken into account in a company. Today's companies that have business processes in the IT sector are very dependent on network availability. Network reliability is the main point in the operation of the system. An adequate and reliable network infrastructure is very much needed by the company, especially regarding the company's electability. Companies that have large-scale networks need several techniques so that the network can work optimally and reliably in overcoming various problems that arise, including network connectivity that is still not stable and link redundancy has not been implemented as a backup path to overcome network failures if interference occurs. alternative network paths that are used to increase network availability, so that if there is a broken link in a network, the data path can still be connected without affecting the connectivity of devices on the network
APA, Harvard, Vancouver, ISO, and other styles
19

Zhuang, Dian Zheng, and Yu Hua Zhu. "Research on Network NC Manufacturing Based on Internet." Applied Mechanics and Materials 441 (December 2013): 947–50. http://dx.doi.org/10.4028/www.scientific.net/amm.441.947.

Full text
Abstract:
The paper introduced the method and technology of how to implement a Integrated Manufacturing, each CNC machining equipment is equipped with a special communication unit, each communication unit are directly connected with the DNC main control computers on the Internet, effect of special communication unit is mainly data buffer and protocol conversion, the TCP/IP protocol is used between communication unit and DNC main control Internet computer, and used serial communication protocol communication between communication unit and NC equipment. Using this technology, all kinds of CNC machining equipment and DNC system can be easily with the CAD/CAM/CAE system, digital profile measurement system, fault diagnosis and error compensation of intelligent system integration, providing good technical conditions for further information of various advanced manufacturing environment integration.
APA, Harvard, Vancouver, ISO, and other styles
20

Ben Jemaa, Maher, Nahla Abid, Maryline Laurent-Maknavicius, and Hakima Chaouchi. "Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks." Journal of Computer Systems, Networks, and Communications 2009 (2009): 1–6. http://dx.doi.org/10.1155/2009/383517.

Full text
Abstract:
The role of Internet Protocol (IP) is becoming more and more problematic especially with the new requirements of mobility and multihoming. Host Identity protocol (HIP) defines a new protocol between the network and transport layers in order to provide a better management to those requirements. The protocol defines a new namespace based on cryptographic identifiers which enable the IP address roles dissociation. Those new identifiers identify hosts rather than IP addresses. Because HIP is a quite recent protocol, we propose to present an experimental evaluation of its basic characteristics.
APA, Harvard, Vancouver, ISO, and other styles
21

Anderson, Daniel K., and W. Michael Reed. "The Effects of Internet Instruction, Prior Computer Experience, and Learning Style on Teachers' Internet Attitudes and Knowledge." Journal of Educational Computing Research 19, no. 3 (October 1998): 227–46. http://dx.doi.org/10.2190/8wx1-5q3j-p3bw-jd61.

Full text
Abstract:
What is now called the Internet started out as a small number of federally funded Department of Defense (Advanced Research Project Agency, or ARPA) supercomputers networked together to share information. In order to guarantee data transmission between these nodes, this network (ARPANET) shared a common set of protocols that was designed to allow for high speed and reliable transfer. This protocol suite is TCP/IP (Transmission Control Protocol/Internet Protocol). Most microcomputers now have a TCP/IP implementation available (e.g., MacTCP) and can, therefore, join the millions of computers that have access to the plethora of resources on the Internet. The Internet is not a static set of nodes, not a limited number of library holdings, not a one-directional paradigm of data transmission. Rather, it is a vibrant and absorbing setting that can foster new learning environments, or enrage educators with its diverse commands, lack of direction, and tenuous consistency.
APA, Harvard, Vancouver, ISO, and other styles
22

Hamarsheh, Ala, Ahmad Alqeerm, Iman Akour, Mohammad Alauthman, Amjad Aldweesh, Ali Mohd Ali, Ammar Almomani, and Someah Alangari. "Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols." International Journal of Cloud Applications and Computing 13, no. 1 (October 25, 2023): 1–26. http://dx.doi.org/10.4018/ijcac.332765.

Full text
Abstract:
The impending exhaustion of internet protocol (IP) version four (IPv4) addresses necessitates a transition to the more expansive IP version six (IPv6) protocol. However, this shift faces challenges due to the widespread legacy of IPv4 infrastructure and resistance among organizations to overhaul networks. Host-based translators offer a critical bridging solution by enabling IPv6-only devices to communicate with IPv4-only devices through software-level protocol translation. This paper comprehensively evaluates four pivotal host-based translator mechanisms—bump-in-the-stack (BIS), bump-in-the-application programming interface (API) (BIA), BIA version 2 (BIAv2), and bump-in-the-host (BIH). Using simulated networks with diverse configurations of IPv4/IPv6 applications, hosts, and routing protocols, the authors assessed performance through metrics including packet loss, convergence time, traffic throughput, and overhead. The results reveal variability in effectiveness across both translators and scenarios. BIAv2 demonstrated advantages in throughput and overhead due to stateless mapping. The research underscores the importance of selecting the optimal translation approach for specific network environments and goals. It guides smoother IPv6 adoption by demonstrating how host-based translators can facilitate coexistence during transition. Further exploration of performance tradeoffs can continue guiding effective deployment strategies.
APA, Harvard, Vancouver, ISO, and other styles
23

Klincewicz, John G., and David F. Lynch. "Designing an IP Link Topology for a Metro Area Backbone Network." International Journal of Interdisciplinary Telecommunications and Networking 5, no. 1 (January 2013): 26–42. http://dx.doi.org/10.4018/jitn.2013010103.

Full text
Abstract:
Massive increases in IP (Internet Protocol) traffic have led to rapid deployment of IP-based networks in metropolitan (metro) areas. In order to facilitate this deployment, computer-based design tools are needed. One of the most difficult decisions that engineers face in designing an IP network is choosing the IP link topology (i.e., the set of router-to-router connections). This is especially complicated when it is also necessary to route these IP links over an underlying physical network of optical fibers. In this paper, the authors describe a new heuristic for simultaneously designing a backbone IP link topology for a metro area network, and routing these IP links over a given physical network. The IP network must be designed for survivability in the event of a network failure (i.e., the loss of a physical link, router or IP link). Initially, they employ a Construction Heuristic that explicitly considers the number of router-to-router connections that would be carried over each physical link. In this way it seeks to minimize the impact of any single physical link failure. An optional Local Search routine then attempts to improve on the solution by a sequence of topology changes. IP link routings are adjusted at each topology change. This heuristic is readily able to be incorporated into an interactive design tool. Some computational experience is described.
APA, Harvard, Vancouver, ISO, and other styles
24

Ashraf, Tabinda, Steven S. W. Lee, Muhammad Iqbal, and Jen-Yi Pan. "Routing Path Assignment for Joint Load Balancing and Fast Failure Recovery in IP Network." Applied Sciences 11, no. 21 (November 8, 2021): 10504. http://dx.doi.org/10.3390/app112110504.

Full text
Abstract:
Distributed link-state routing protocols, including Open Shortest Path First (OSPF) and Intermediate System–Intermediate System (IS-IS), have successfully provided robust shortest path routing for IP networks. However, shortest path routing is inflexible and sometimes results in congestion on some critical links. By separating the control plane and the data plane, the centralized control of Software Defined Networking (SDN)-based approach possesses flexible routing capabilities. Fibbing is an approach that can achieve centralized control over a network running distributed routing protocols. In a Fibbing-controlled IP network, the controller cleverly generates fake protocol messages to manipulate routers to steer the flow of the desired paths. However, introducing fake nodes destroys the structure of the loop-free property of Loop-Free Alternate (LFA) that is used to achieve fast failure recovery in IP networks. This paper addresses this issue and presents a solution to provision routing paths so a Fibbing network can still apply LFA in the network. The proposed network jointly considers load-balanced and fast failure recovery. We formulate the problem as an integer linear programming problem. The numerical results reveal that the proposed method can provide 100% survivability against any single node or single link failure.
APA, Harvard, Vancouver, ISO, and other styles
25

Atmadja, Martono Dwi. "Single Board Computer Applications as Multi-Server VoIP." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 15, 2021): 1023–28. http://dx.doi.org/10.22214/ijraset.2021.36512.

Full text
Abstract:
Telecommunication technology is developing along with information technology and several innovations in several audio and data transmission and reception techniques. Innovation and communication technology are hoped to be able to create efficiencies in regards to time, equipment, and cost. The Public Switched Telephone Network (PSTN) telephone technology has experienced integration towards communication using Internet Protocol (IP) networks, better known as Voice over Internet Protocol (VoIP). VoIP Technology transmits conversations digitally through IP-based networks, such as internet networks, Wide Area Networks (WAN), and Local Area Networks (LAN). However, the VoIP cannot fully replace PSTN due to several weaknesses, such as delay, jitter, packet loss, as well as security and echo. Telephones calls using VoIP technology are executed using terminals in the form of computer devices or existing analogue telephones. The benefit of VoIP is that it can be set in all ethernet and IP addresses. Prefixes can be applied for inter-server placements as inter-building telephone networks without the addition of inefficient new cables on single board computers with Elastix installed. Prefix and non-prefix analysis on servers from single board computers can be tested using QoS for bandwidth, jitter, and packet loss codec. The installation of 6 clients, or 3 simultaneous calls resulted in a packet loss value in the prefix Speex codex of 2.34%. The bandwidth in the prefix PCMU codec has an average value of 82.3Kbps, and a non-prefix value of 79.3Kbps, in accordance to the codec standards in the VoIP. The lowest jitter was found in the non-prefix PCMU codec with an average of 51.05ms, with the highest jitter for the prefix Speex codec being 314.65ms.
APA, Harvard, Vancouver, ISO, and other styles
26

Hosseini, Mojtaba, and Nicolas D. Georganas. "End System Multicast Protocol for Collaborative Virtual Environments." Presence: Teleoperators and Virtual Environments 13, no. 3 (June 2004): 263–78. http://dx.doi.org/10.1162/1054746041422325.

Full text
Abstract:
IP Multicasting has been a crucial requirement of many scalable networked virtual environments by providing an efficient network mechanism through which a sender can transmit its information to a large number of receivers without having to send multiple copies of the same data over a physical link. The widespread deployment of IP Multicast has been slow due to some yet unresolved issues, prompting recent efforts in the development of multicasting protocols at the application layer instead of at the network layer. Most of these protocols address the case of a single source streaming media to a large number of receivers in applications such as video-on-demand or live broadcast. Collaborative and distributed virtual environments exhibit different characteristics that in turn necessitate a different set of requirements for application layer multicast protocols. This paper presents an introduction to application layer multicasting as it relates to distributed and collaborative virtual environments and the development of our own end system multicast protocol for multi-sender virtual teleconference applications.
APA, Harvard, Vancouver, ISO, and other styles
27

Penhoat, J., K. Guillouard, N. Omnès, J. Zhang, T. Lemlouma, and M. Salaun. "Proposal of a Hierarchical and Distributed Method for Selecting a Radio Network and a Transmission Mode." International Journal of Mobile Computing and Multimedia Communications 5, no. 4 (October 2013): 49–81. http://dx.doi.org/10.4018/ijmcmc.2013100104.

Full text
Abstract:
The deployment of heterogeneous radio networks and the deployment of Unicast Internet Protocol (IP)/Multicast IP architectures can impact the quality of services received by the users. The authors think that they will accept these quality variations if they have the possibility to choose the radio network and the transmission mode, multicast versus unicast. But, when choosing a radio network or a transmission mode, the choices of the users can be opposed to the choices of the operators managing the networks. To overcome this drawback, the authors defined a method allowing the users, the operators managing the networks and the service providers to cooperate in the selection process.
APA, Harvard, Vancouver, ISO, and other styles
28

Devi, A. Indira, and N. Arthi. "Alternate Path Selection in IP Networks using Bandwidth Optimization." International Journal of Advance Research and Innovation 3, no. 1 (2015): 43–47. http://dx.doi.org/10.51976/ijari.311507.

Full text
Abstract:
Computer communication has been going through major changes throughout the last decades. Since TCP/IP was a protocol designed for wired networks, wireless transmission poses unique challenges to the well-defined and rigid protocol stack. Routing in ISP environment is challenging the clear path when the IP link was failure. In this paper, a Cross-layer approach is used to minimize routing disruption in IP networks. A model called probabilistically correlated failure (PCF) model was developed to quantify the impact of IP link failure on the reliability of backup paths. In PCF model, an algorithm is used to choose multiple reliable backup paths to protect each IP link. When an IP link fails, its traffic is split onto multiple backup paths to ensure that the rerouted traffic load on each IP link does not exceed the usable bandwidth. To evaluate this issue, the system has to be developed with real ISP service in particular network topology support. Entire path is initially used to select specific path, then backed up path are reused and tested by splitting entire bandwidth based on usage. The probability result will ensure the reliability and dedicated path of data transfer purpose. This kind of approach resolve the issue rose at high end data transaction application like VOIP, Video streaming etc.
APA, Harvard, Vancouver, ISO, and other styles
29

Labinsky, Alexander. "FEATURES OF CRYPTOGRAPHIC PROTOCOLS." NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS) 2024, no. 1 (April 17, 2024): 53–59. http://dx.doi.org/10.61260/2307-7476-2024-1-53-59.

Full text
Abstract:
The article considers the features of cryptographic protocols used to protect data transmitted over a computer network. Due to the increase in the number of network attacks, the urgency of the problem of network security is constantly increasing. The cryptographic protocol contains a description of the structures used and a set of rules governing the use of cryptographic transformations and algorithms in information communication processes between two or more participants. The article provides classification of cryptographic protocols on various features and considers security properties of protocols, characterizing their resistance to various attacks. The SSL data encryption protocol, which uses asymmetric cryptography for key authentication, symmetric encryption to preserve confidentiality and authentication codes to verify message integrity, is discussed in detail. The SSL protocol has been widely used in recent years for instant messaging and IP voice transmission in applications such as e-mail, Internet fax and others. The article deals with encryption and hashing of data (MD5, SHA-1, DES encryption algorithms). Computer models of data encryption (DES algorithm), text data checksum calculation (CRC32 algorithm) and password character matching were developed according to the algorithms considered. The computer models were implemented as computer programs, with the first two models as console programs and the third model as a program with graphical interface.
APA, Harvard, Vancouver, ISO, and other styles
30

Mohd Fuzi, Mohd Faris, Khairunnisa Abdullah, Iman Hazwam Abd Halim, and Rafiza Ruslan. "Network Automation using Ansible for EIGRP Network." Journal of Computing Research and Innovation 6, no. 4 (September 20, 2021): 59–69. http://dx.doi.org/10.24191/jcrinn.v6i4.237.

Full text
Abstract:
Network automation has evolved into a solution that emphasizes efficiency in all areas. Furthermore, communication and computer networks rely on a platform that provides the necessary technological infrastructure for packet transfer through the Internet using routing protocols. The Enhanced Interior Gateway Routing Protocol (EIGRP) is a hybrid routing protocol that combines the properties of both distance-vector and link-state routing methods. The traditional technique to configure EIGRP is inefficient and requires repeated processes compared to the network automation concept. Network automation helps to assist network administrators in automating and verifying the EIGRP configuration using scripting. This paper implemented network automation using Ansible to configure EIGRP routing and advanced configuration in the GNS3 environment. This study is focused on automated scripting to configure IP Addresses to the interfaces, EIGRP routing protocol, a default static route and advanced EIGRP configurations. Ansible ran the scripting on Network Automation Docker and pushed the configurations to the routers. The network automation docker communicated with other routers via SSH. In the testing phase, the running configuration between the traditional approach and automation scripting in the Ansible playbook was compared to verify EIGRP configurations' accuracy. The findings show that Ansible has successfully deployed the configuration to the routers with no errors. Ansible can help network administrators minimized human mistakes, reduce time-consuming and enable device visibility across the network environment. Implementing EIGRP authentication and hardening process can enhance the network security level for future study.
APA, Harvard, Vancouver, ISO, and other styles
31

Berkman, L., S. Otrokh, V. Ruzhynskyi, and K. Olienieva. "The optimization of computer equipment during the modernization of the unified system of centralized control and measurements of the SKS-7 network using the resources of the data processing center." Information and communication technologies, electronic engineering 3, no. 2 (September 2023): 88–94. http://dx.doi.org/10.23939/ictee2023.02.088.

Full text
Abstract:
The architecture of the unified system of centralized control and measurements of the SKS-7 network is outdated, the technologies used to organize its work and implement data storage need to be updated and optimized, because the current state of the system causes a decrease in speed and performance, as well as a critical drop in reliability. Considering the factors, there is also a need to modernize the software and hardware of the IP protocol analysis and monitoring system. The system does not provide the full range of functions necessary for a full-fledged analysis of the VoIP network, at the moment. Updating the system architecture became a necessity to improve efficiency and reliability. The work describes the process of modernization of the SKS-7 network control and measurement system using data center resources by optimizing computer equipment and expanding the capabilities of the systems used to monitor the OKS-7 network. The system of analysis and control and measurements of the SKS-7 network is presented and its main functionalities are defined. The main signaling protocols were analyzed and a system of analysis and monitoring of IP protocols was developed. The modernized control and measurement system of the SKS-7 network allows to identify deficiencies when testing elements of telecommunication networks and analyzing their impact on operation, analyzing the information and signal load of SKS-7 and VoIP networks in real time and in previous periods.
APA, Harvard, Vancouver, ISO, and other styles
32

Jin, Xing, Kan-Leung Cheng, and S. H. Gary Chan. "Scalable Island Multicast for Peer-to-Peer Streaming." Advances in Multimedia 2007 (2007): 1–9. http://dx.doi.org/10.1155/2007/78913.

Full text
Abstract:
Despite the fact that global multicast is still not possible in today's Internet, many local networks are already multicast-capable (the so-called multicast “islands”). However, most application-layer multicast (ALM) protocols for streaming have not taken advantage of the underlying IP multicast capability. As IP multicast is more efficient, it would be beneficial if ALM can take advantage of such capability in building overlay trees. In this paper, we propose a fully distributed protocol called scalable island multicast (SIM), which effectively integrates IP multicast and ALM. Hosts in SIM first form an overlay tree using a scalable protocol. They then detect IP multicast islands and employ IP multicast whenever possible. We study the key issues in the design, including overlay tree construction, island management, and system resilience. Through simulations on Internet-like topologies, we show that SIM achieves lower end-to-end delay, lower link stress, and lower resource usage than traditional ALM protocols.
APA, Harvard, Vancouver, ISO, and other styles
33

Holler, Holger, and Stefan Voß. "Software tools for a multilayer network design." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2005): 57–63. http://dx.doi.org/10.26636/jtit.2005.3.325.

Full text
Abstract:
Today’s long haul and metro high-speed networks are mainly based on synchronous digital hierarchy (SDH) or its American equivalent synchronous optical network (SONET) and wavelength division multiplex (WDM). On the other hand, the large amount of traffic growth during the last years has been caused mainly by Internet protocol (IP) traffic. Traditionally, the IP-router based networks and the cross-connect based synchronous networks are often planned and operated separately. However, in line with new developments such as generalized multiprotocol label switching (GMPLS), network providers begin to realize that the convergence of these two worlds promises significant benefits. A set of software tools to support the network designer has been developed and used on various kinds of real world network planning problems arising in the SDH/WDM context. This includes, among others, 1+1 protection planning, static restoration and dual homing issues. These tools are extended with additional features to handle aspects of the IP/SDH interplay in a GMPLS environment. The two main components are an AMPL based integer model (solved via CPLEX) and a heuristic implemented in C++.
APA, Harvard, Vancouver, ISO, and other styles
34

Baigorria, Luis A., José F. Postigo, Vicente A. Mut, and Ricardo O. Carelli. "Telecontrol system based on the Smith predictor using the TCP/IP protocol." Robotica 21, no. 3 (May 13, 2003): 303–12. http://dx.doi.org/10.1017/s0263574702004812.

Full text
Abstract:
In this paper, development and implementation are presented of a client software package for remote process control. The proposed software is based on a client-server model under an Intranet architecture. The architecture is proposed for a telecontrol system of a real process, which includes the possibility of integrating I/O devices with data networks based on open protocols such as TCP/IP. This protocol allows the implementation of control systems using a low-cost alternative. Also, the Smith predictor is revised for remote control applications over an Ethernet network. Some experiences on a laboratory pasteurization plant are addressed to show both developed controllers and architecture performance.
APA, Harvard, Vancouver, ISO, and other styles
35

Macedonia, Michael R., Michael J. Zyda, David R. Pratt, Paul T. Barham, and Steven Zeswitz. "NPSNET:A Network Software Architecture for LargeScale Virtual Environments." Presence: Teleoperators and Virtual Environments 3, no. 4 (January 1994): 265–87. http://dx.doi.org/10.1162/pres.1994.3.4.265.

Full text
Abstract:
This paper explores the issues involved in designing and developing network software architectures for large-scale virtual environments. We present our ideas in the context of NPSNET-IV, the first 3-D virtual environment that incorporates both the IEEE 1278 distributed interactive simulation (DIS) application protocol and the IP multicast network protocol for multiplayer simulation over the Internet.
APA, Harvard, Vancouver, ISO, and other styles
36

Yakubova, Mubarak, Olga Manankova, Assel Mukasheva, Alimzhan Baikenov, and Tansaule Serikov. "The Development of a Secure Internet Protocol (IP) Network Based on Asterisk Private Branch Exchange (PBX)." Applied Sciences 13, no. 19 (September 26, 2023): 10712. http://dx.doi.org/10.3390/app131910712.

Full text
Abstract:
The research problem described in this article is related to the security of an IP network that is set up between two cities using hosting. The network is used for transmitting telephone traffic between servers located in Germany and the Netherlands. The concern is that with the increasing adoption of IP telephony worldwide, the network might be vulnerable to hacking and unauthorized access, posing a threat to the privacy and security of the transmitted information. This article proposes a solution to address the security concerns of the IP network. After conducting an experiment and establishing a connection between the two servers using the WireShark sniffer, a dump of real traffic between the servers was obtained. Upon analysis, a vulnerability in the network was identified, which could potentially be exploited by malicious actors. To enhance the security of the network, this article suggests the implementation of the Transport Layer Security (TLS) protocol. TLS is a cryptographic protocol that provides secure communication over a computer network, ensuring data confidentiality and integrity during transmission. Integrating TLS into the network infrastructure, will protect the telephone traffic and prevent unauthorized access and eavesdropping.
APA, Harvard, Vancouver, ISO, and other styles
37

ESWARAN, P. K., S. PRAKASH, DAVID D. FERGUSON, and KATHLEEN NAASZ. "LEVERAGING IP FOR BUSINESS SUCCESS." International Journal of Information Technology & Decision Making 02, no. 04 (December 2003): 641–50. http://dx.doi.org/10.1142/s0219622003000884.

Full text
Abstract:
Businesses are faced today with the challenge of leveraging existing network infrastructures while evolving to technologies that will provide a positive impact on their business performance. Internet Protocol (IP) is a technology foundation that many companies have begun to leverage, but IP requires a more integrated strategy for seamless migration and the achievement of its full benefits. In this paper, we examine the creation of an Enterprise IP Strategy from a business impact and a technology point of view and provide factors to consider when developing this strategy. A framework considering business perspective and technology umbrella is presented to guide businesses to make the right choice for networking needs. IP is a common thread that runs through various systems and networks comprising enterprise IT infrastructure. In the last five years, virtually everyone from shipping clerks to CEOs has been touched by IP's influence. Hence, IP provides a strategic vantage point for building a sound enterprise networking strategy.
APA, Harvard, Vancouver, ISO, and other styles
38

Cui, Jian Tao. "Design and Implementation of Computer Network Monitoring Software." Applied Mechanics and Materials 686 (October 2014): 201–4. http://dx.doi.org/10.4028/www.scientific.net/amm.686.201.

Full text
Abstract:
This paper mainly studies the key technologies of network real-time monitoring system based on Client/Server, and implementation of a real-time monitoring system based on CS/ mode. Using the network communication technology, Winsock technology, TCP/IP protocol, image compression and transmission technology, the process of communication technology and object oriented software technology to realize the main frame module, the system include network monitoring data initialization module, data transmission module, image coding and decoding module, its advantage is to make full use of the existing network resources, the highest price, with real-time information control and real-time control as the center, timely delivery and management of information.
APA, Harvard, Vancouver, ISO, and other styles
39

Abood, Amany Mohammad, Maysam Sameer Hussein, Zainab G. Faisal, and Zainab H. Tawfiq. "Design and simulation of video monitoring structure over TCP/IP system using MATLAB." Indonesian Journal of Electrical Engineering and Computer Science 24, no. 3 (December 1, 2021): 1840. http://dx.doi.org/10.11591/ijeecs.v24.i3.pp1840-1845.

Full text
Abstract:
Video monitoring systems are undergoing an evolution from conventional analog to digital clarification to provide better rate and security over internet protocols. In addition, analog surveillance becomes insufficient to face enormous demand of security of system contains more than hundreds of camera often deployed in hotels environments far away from room control. This paper presents the design and simulation of a video monitoring scheme in excess of a transmission control protocol/internet protocol (TCP/IP) system using MATLAB. Sophisticated cameras could record directly high-definition digital videos based on digital technology which simply communicate the control room relaying on ordinary internet protocol infrastructure networks. This technology provides a flexible network interface over a wide variety of heterogeneous technology networks. Though, the acceptance of IP designed for video monitoring pretense severe difficulties in terms of power processing, system dependability, required bandwidth, and security of networks. The advantage of IP based video monitoring system has been investigated over conventional analog systems and the challenges of the method are described. The open research issues are still requiring a final solution to permits complete abandon against conventional technology of analog methods. In conclusion, the method to tackle the purpose of video monitoring in actual operation is proposed and verified properly by means of model simulation.
APA, Harvard, Vancouver, ISO, and other styles
40

Thuneibat, Saed, and Buthayna Al Sharaa. "Dynamic source routing protocol with transmission control and user datagram protocols." Indonesian Journal of Electrical Engineering and Computer Science 30, no. 1 (April 1, 2023): 137. http://dx.doi.org/10.11591/ijeecs.v30.i1.pp137-143.

Full text
Abstract:
Dynamic source routing protocol (DSR) is a common routing protocol in wireless network without infrastructure, called ad-hoc network, DSR used just above internet protocol (IP) at the network layer. The upper transport layer provides reliability by transmission control protocol (TCP) and user datagram protocol (UDP). The choice between DSR/TCP and DSR/UDP is an actual issue for network designers and engineers. The question arises: which one provides better quality of service (QoS) parameters, less delay and jitter, greater throughput, and data rates. This paper focuses on the study and analysis of DSR and comparison of DSR/TCP and DSR/UDP by simulation in network simulator (NS2) environment. Another comparison of DSR and ad hoc on-demand distance vector (AODV) is provided. Design and simulation of the protocols in ad hoc network accurately describe the behavior in real system and QoS parameters are obtained.
APA, Harvard, Vancouver, ISO, and other styles
41

Lee Chee Hang, Lee Chee Hang, Yu-Beng Leau Lee Chee Hang, Yong Jin Park Yu-Beng Leau, Zhiwei Yan Yong Jin Park, and Supriyanto Praptodiyono Zhiwei Yan. "Protocol and Evaluation of Network Mobility with Producer Nodes in Named Data Networking." 網際網路技術學刊 23, no. 3 (May 2022): 459–66. http://dx.doi.org/10.53106/160792642022052303004.

Full text
Abstract:
<p>The drawbacks of the current TCP/IP suits have been pointed out. However, Named Data Networking (NDN) has some limitations, the most notable of which is producer and network mobility. Mainly, producer mobility in moving networks receives scant attention. There are numerous issues that the NDN must address before it can be used by the public, one of which is mobility. In NDN, consumer mobility is naturally supported, but producer mobility is not. The latter is researched a lot, but few results have been reported regarding network mobility with producers. In this paper, two approaches will be focused on: the Hybrid Network Mobility (Hybrid NeMo) approach and the Network Mobility (NeMoI). These two approaches are being compared because they both employed similar techniques for managing network mobility. Furthermore, they will be compared using the same topology to allow more accurate comparisons of their signalling cost and data delivery cost.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
42

Sarkar, Md Mosharrof Hossain, Md Ariful Islam, Md Abid Hasan Roni Bokshi, Sadiha Afrin, and Mehjabin Ashrafy Tinky. "Strategic Network Management for Modern Campuses: A Comprehensive Framework." Feb-Mar 2024, no. 42 (March 4, 2024): 43–53. http://dx.doi.org/10.55529/jecnam.42.43.53.

Full text
Abstract:
Campus handling of networks has become critical in the continuously changing world of higher education. This paper offers a thorough method for managing and safeguarding networks in a campus setting with multiple departments. Our approach focuses on four departments: the administrative, civil, computer science and engineering (CSE), and electrical and electronics engineering (EEE) departments. It combines multiple networking technologies to improve security and maximize speed. Network division using virtual LANs (VLANs), efficient IP address allocation using Variable Length Subnet Masks (VLSM), simplified network configuration using Dynamic Host Configuration Protocol (DHCP), dynamic routing using Routing Information Protocol version 2 (RIPv2), granular access control using Access Control Lists (ACLs), enhanced security using Network Address Translation (NAT), secure remote access using Secure Shell version 2 (SSHv2), and improved network resilience through Link Aggregation are the main components of our system.
APA, Harvard, Vancouver, ISO, and other styles
43

Omumbo, Nicholas J., Titus M. Muhambe, and Cyprian M. Ratemo. "Evaluation of Routing Performance using OSPF and Multi-Controller Based Network Architecture." International Journal of Computer Network and Information Security 13, no. 4 (August 8, 2021): 45–61. http://dx.doi.org/10.5815/ijcnis.2021.04.05.

Full text
Abstract:
Newer mobile applications are increasingly being defined using Internet Protocol, resulting in increased use of Internet Protocol and subsequent upsurge of smartphones. However, many communication service provider core networks continue to use classical routing protocols and single controller-based networks if deployed. Controller-based networks built on the foundation of software-defined networks include centralization and separation of control plane and data plane, which can address the challenges experienced with the classical routing protocols. When single controllers are used, they tend to get overloaded with traffic. The ability to use multi-controller-based network architecture to improve quality of service in the mobile IP core network is still an open issue. This paper presents a performance evaluation of multi-controller-based network architecture, running OpenFlow and Open Shortest Path First protocol. The long-term evolution simulated network architecture is created using well-known network simulator Objective Modular Network Testbed running OpenFlow and simuLTE add-on. We test and analyze data traffic for Packet data ratio and Jitter and their associated effects on a multi-controller-based network running OpenFlow versus OSPF on a mobile core network. The experiment created two topologies; multi controller-based and Open Shortest path first network. Video and ping traffic is tested by the generation of traffic from User Equipment to the network-based server in the data center and back, and traffic metrics recorded on an inbuilt integrated development environment. The simulation setup consisted of an OpenFlow controller, HyperFlow algorithm, OpenFlow switches, and Open Shortest Path First routers. The multi-controller-based network improved Jitter by 10 ms. The Open Shortest Path first showed packet data ratio values of 89% gain while the controller-based network registered a value of 86%. A standard deviation test revealed 0.7%, which shows that the difference is not significant when testing for Packet data ratio. We provided insight into the performance of multi-controller-based architecture and Open Shortest Path First protocol in the communication service provider's core network.
APA, Harvard, Vancouver, ISO, and other styles
44

Fanani, Galih, and Imam Riadi. "Analysis of Digital Evidence on Denial of Service (DoS) Attack Log Based." Buletin Ilmiah Sarjana Teknik Elektro 2, no. 2 (July 21, 2020): 70. http://dx.doi.org/10.12928/biste.v2i2.1065.

Full text
Abstract:
This research is carried out an analysis and investigation of digital log file data retrieval from DoS (Denial of Service) attacks, on internet networks that have been detected by IDS (Intrusion Detection System) and using Wireshark as Tools Analysis Network. The research phase begins with the design of an experimental scenario which is often carried out daily where users access the internet network. The next stage is an attack in the form of ping flood on the target computer connected to the internet network, the final stage of data retrieval which will be analyzed later. Testing research using UAT (User Acceptance Test), to prove that the analysis has been received by the user. The results of research conducted to obtain data in the form of an attacker's IP (Internet Protocol), target IP, protocol type, the port used and the time of the attack. In the UAT test results, the obtained value of 18% of students disagrees, 58% of students agree, and 24% of students strongly agree. This research has conducted an analysis of random data attacks using Wireshark applications received by users.
APA, Harvard, Vancouver, ISO, and other styles
45

Chen, Xinhua, and Ya-ni Sun. "Computer Network Simulation Modeling Based on Object Oriented Petri Net." International Journal of Online Engineering (iJOE) 12, no. 02 (February 29, 2016): 25. http://dx.doi.org/10.3991/ijoe.v12i02.5039.

Full text
Abstract:
This paper first briefly introduces the Petri net, and then studied in detail according to the selected object-oriented Petri net modeling method. This paper improve the object-oriented Petri net modeling method, and study the modeling and operation steps in details. Finally this paper build a computer network TCP/IP protocol model based on the object oriented Petri net. The model prove to be a good simulation to the computer network and the improved modeling method is also a valid method for further object oriented Petri net modeling.
APA, Harvard, Vancouver, ISO, and other styles
46

O Holubnychyi, Dmitro, and Vasily Kotsyuba. "Applying technologies of monitoring and condition analysis of IP-networks based on the use of the SNMP protocol." Bulletin of Kharkov National Automobile and Highway University, no. 96 (May 24, 2022): 14. http://dx.doi.org/10.30977/bul.2219-5548.2022.96.0.14.

Full text
Abstract:
Problem. Monitoring, security, condition analysis and control of telecommunications networks remains the most important part of system and network administration. Monitoring systems controls the network in an automated mode, and complex decisions based on the prepared information of the network monitoring system are made by the network administrator. Goal. The purpose of the work is to analyze the principles of applying technologies, programs and protocols that allow you to manage equipment and maintain reliable operation of the computer network. To consider features of functioning, the systems of monitoring of the network equipment are built on the basis of UDP/TCP architecture on application of the network protocol of control and management of SNMP. Methodology. Analytical methods of studying technologies of principles and approaches to network monitoring and management are used. The structure and components of SNMP are shown, the architecture and scheme of operation of SNMP v3 kernel and the detailed description of its work are resulted. Results. The analysis of modern methods of monitoring and control of network equipment is given, the advantages and disadvantages of the main technologies of monitoring and diagnosing the equipment of IP networks are shown. It is substantiated that the most effective and reliable tool that allows you to perform tasks on the management of IP network devices is the SNMP protocol. Originality. The monitoring system allows you to provide a set of solutions that maintain automatic monitoring of networks implemented on the basis of different technologies (data and speech, video), providing different services and built on equipment from different manufacturers. Practical value. The structure and components of SNMP are shown, the architecture and scheme of operation of SNMP v3 kernel and the detailed description of its work are resulted. Algorithms for practical SNMP configuration in Windows are presented, SNMP agent, trap and security data settings, configuring SNMP on Linux, SNMP settings in CentOS 7 and Debian 10
APA, Harvard, Vancouver, ISO, and other styles
47

Ayu tiara sunja, Sunja, and Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya." International Journal Cister 1, no. 02 (August 1, 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.

Full text
Abstract:
The Internet is a global network of world computers, large and very broad where every computer is connected to each other from country to country around the world and contains various kinds of information [1]. The internet itself comes from the word interconnection networking which means the connection of many computer networks of various types and types, using communication types such as telephone, satellite, and others. In managing computer network integration using TCP or IP protocols. Local Area Network (LAN) consists of several computers connected in a network. In this network, each computer can access data from other computers. computers that are connected in a LAN can run hardware such as other computer printers, send data to other computer owners or play games together. The number of computers connected to the LAN is relatively small, such as home computers, internet cafes, schools and several other computers that are in one building. In this study, the researcher used a quantitative method approach to analyze the use of information and communication technology in the construction of a LAN network in the SMK Negeri 1 BMR school.
APA, Harvard, Vancouver, ISO, and other styles
48

Shiranzaei, Atena, and Farhad Khoshbakht. "A Novel Detection Method for Grey Hole Attack in RPL." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7s (July 13, 2023): 492–97. http://dx.doi.org/10.17762/ijritcc.v11i7s.7027.

Full text
Abstract:
The Internet of Things (IoT) is a type of network that involves the Internet and things. This network consists of constrained devices that are connected through an IP protocol. In the IoT, a network with constrained devices is called 6LowPAN. RPL is a routing protocol to address the constraints and specific properties of these networks; though RPL puts the networks at risk through a large variety of attacks. The urgent need to develop secure routing solutions is required. In this paper, we investigated grey hole attacks and presented a detection method to identify and isolate the malicious node. The experiments show the proposed detection method improves PDR, Throughput and reduces PLR and E2ED in comparison with other scenarios.
APA, Harvard, Vancouver, ISO, and other styles
49

Dorogyy, Yaroslaw, and Vadym Kolisnichenko. "Developing a method for the detection and identification of rootstock blockchain network nodes." Eastern-European Journal of Enterprise Technologies 1, no. 2 (127) (February 28, 2024): 6–15. http://dx.doi.org/10.15587/1729-4061.2024.297903.

Full text
Abstract:
The object of this study is the protocol for detecting nodes in the Rootstock blockchain network and crawling tools. Node discovery protocols are the foundation of any decentralized peer-to-peer network. In blockchain systems, full nodes store and maintain a complete copy of all transactions performed in the network. However, they do not store information about all other nodes, such as their IDs or IP addresses. Each node usually maintains an incomplete list of nodes to which it connects to exchange blockchain data. In decentralized networks, nodes join and leave the network and their IP addresses can change, making it impractical to maintain a complete, up-to-date list of all nodes. Therefore, the only way to get a list of all nodes in the network is to poll each node sequentially. The developed method involves sending specially formed messages to nodes to obtain their neighbors. The graph search algorithm is used to traverse all received neighboring nodes. This allows one to consistently detect all network nodes. Identifying the desired sequence of messages requires a preliminary analysis of the node software RSKj in the part of node discovery protocol. Effectiveness of the proposed method was verified using the developed software and an experiment in the main network. 6 verification nodes were deployed in different physical locations and at different times. All test nodes were detected in less than 10 minutes. The developed method found 222 nodes that have 209 unique IP addresses. Results of this study show how to perform analysis of node discovery protocol. They provide the means to obtain information about the available nodes of the Rootstock blockchain system, enabling the analysis of both the blockchain network in general and individual node
APA, Harvard, Vancouver, ISO, and other styles
50

Жебель, В. А., and А. И. Солдатов. "The Reliability Coefficient for Network Data Transmissions." Успехи кибернетики / Russian Journal of Cybernetics, no. 2(14) (June 30, 2023): 60–67. http://dx.doi.org/10.51790/2712-9942-2023-4-2-09.

Full text
Abstract:
в статье представлены результаты исследования способов защиты информации, передаваемой по вычислительным сетям, которые могут быть перехвачены и прочитаны, а также перехвачены и модифицированы. Показано, что существующие методы защищают информацию в сети с помощью криптографии (шифрования трафика), и только несколько методов проводят анализ поля TTL. В статье проведены исследования стека протоколов TCP/IP, сетевой модели OSI и полей кадра, установлены поля заголовков, которые будут использоваться в работе. Описаны инструменты, при помощи которых проводились исследования, отражается конфигурация пакетов. Предложен комплексный коэффициент достоверности для повышения достоверности передачи данных в сети предприятия за счет использования проверочных пакетов. Данный коэффициент является составным и включается в себя различные флаги и поля из сетевых протоколов стека TCP/IP, которые анализируются после приема. Предлагается гипотеза составления данного коэффициента достоверности и примерная шкала измерения. По результатам анализа делается вывод о достоверности принятых данных согласно данной шкалы измерения. this study considers the protection of information transmitted over computer networks that can be intercepted and decoded, or modified. It is shown that existing data protection methods use cryptography (traffic encryption). Just a few methods analyze the TTL field. We studied the TCP/IP protocol stack, the OSI network model, and the frame fields, and identified the header fields to be used. We presented the research tools and their configuration. We proposed a comprehensive reliability coefficient to assess the reliability of data transmission in corporate network through the use of verification packets. The composite coefficient includes various flags and fields from the TCP/IP network protocols, which are analyzed after reception. A hypothesis for building the reliability coefficient, and an approximate measurement scale are proposed. The analysis shows that the hypothesis and scale are correct.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography