To see the other types of publications on this topic, follow the link: Network layer (OSI).

Journal articles on the topic 'Network layer (OSI)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Network layer (OSI).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ivanov, Valeriy, and Maxim Tereshonok. "Cross-Layer Methods for Ad Hoc Networks—Review and Classification." Future Internet 16, no. 1 (January 16, 2024): 29. http://dx.doi.org/10.3390/fi16010029.

Full text
Abstract:
The OSI model used to be a common network model for years. In the case of ad hoc networks with dynamic topology and difficult radio communications conditions, gradual departure is happening from the classical kind of OSI network model with a clear delineation of layers (physical, channel, network, transport, application) to the cross-layer approach. The layers of the network model in ad hoc networks strongly influence each other. Thus, the cross-layer approach can improve the performance of an ad hoc network by jointly developing protocols using interaction and collaborative optimization of multiple layers. The existing cross-layer methods classification is too complicated because it is based on the whole manifold of network model layer combinations, regardless of their importance. In this work, we review ad hoc network cross-layer methods, propose a new useful classification of cross-layer methods, and show future research directions in the development of ad hoc network cross-layer methods. The proposed classification can help to simplify the goal-oriented cross-layer protocol development.
APA, Harvard, Vancouver, ISO, and other styles
2

Tsuchiya, P. F. "An architecture for network-layer routing in OSI." ACM SIGCOMM Computer Communication Review 17, no. 5 (October 1987): 185–90. http://dx.doi.org/10.1145/55483.55501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Susilawati Susilawati, Marcel Ade Satria, Khaila Mardina, Juniwan Juniwan, and Didik Aribowo. "Implementasi Teknologi Komunikasi Data Menggunakan Open System Interconnection (OSI) Untuk Berkirim Pesan Antar Perangkat." Venus: Jurnal Publikasi Rumpun Ilmu Teknik 2, no. 3 (May 17, 2024): 124–29. http://dx.doi.org/10.61132/venus.v2i3.307.

Full text
Abstract:
Currently, the development of communication networks has influenced how humans communicate and exchange information. Data communications technology reflects the rapid evolution in the way humans communicate and exchange information. Data communication is the process of exchanging information between two or more devices via a transmission medium, such as cables, radio waves, or other network infrastructure. The goal of data communications is to transfer data from one location to another quickly, efficiently, and accurately. The method used is to look for references from several internet sources such as Google. The OSI model has 7 layers, namely Application Layer, Presentation layer, Session Layer, Transport layer, Network layer, data link layer, physical layer
APA, Harvard, Vancouver, ISO, and other styles
4

Sudaryanto, Sudaryanto. "THE EFFECT OF MULTI LAYER SWITCHING FOR DATA TRANSFER SPEEDS ON COMPUTER NETWORK." Compiler 7, no. 2 (October 29, 2018): 85. http://dx.doi.org/10.28989/compiler.v7i2.372.

Full text
Abstract:
The need for efficient, stable, fast and reliable network access is influenced by network quality, one of the factors influencing network quality is the management of network devices, while the network devices that are enforced are the Lancard, cable, Switch, Router, Wifi Access Point and Compuitary System . In this study researchers will focus on the influence of Multilayer Switch network devices for data transfer speeds on computer networks. Data transfer speed at layer 2 text data, image data, video data faster 0,85 % than for speed tranfers on layer 3 text data, image data, video data.Keyword: Network, Switch Multilayer, Data Tranfer, Osi Layer
APA, Harvard, Vancouver, ISO, and other styles
5

Agrawal, Nitin Kumar, Shaamshad Alam, and Harshit Raghav. "Osi Model: The Basics Structure of Network Communication." International Journal of Recent Technology and Engineering 9, no. 5 (January 30, 2021): 66–69. http://dx.doi.org/10.35940/ijrte.d4991.019521.

Full text
Abstract:
In the present time, if we see around the world we can realize that information transfer through one place to another is very easy. A person lives in America easy do business with the person live far away from it. All this can be achieved by the phenomenon known as Networking. And the device through which the information are transferred are called interconnected device. As we know, in present time our need is not only transfer or sharing of information but in a secure way. So with the help of this we are not just transferring the information but in a secure manner To understand the whole phenomenon of this networking, the basic requirement is OSI LAYER Model. This is not just a model but a complete frame which gives us whole information of its working as well as link between them. So through this paper we give some basics concept building of OSI LAYER which help in understanding the Networking
APA, Harvard, Vancouver, ISO, and other styles
6

Karbowski, Andrzej. "Distributed asynchronous algorithms in the Internet – new routing and traffic control methods." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2005): 29–36. http://dx.doi.org/10.26636/jtit.2005.3.328.

Full text
Abstract:
The paper presents several new algorithms concerning the third (network) and the fourth (transport) layer of ISO/OSI network model. For the third layer two classes of the shortest paths algorithms – label correcting and auction algorithms – are proposed. For the fourth layer an application of price decomposition to network optimization and Internet congestion control is suggested.
APA, Harvard, Vancouver, ISO, and other styles
7

Mohammed Abdul, Azeem, and Syed Umar. "Attacks of Denial-of-Service on Networks Layer of OSI Model and Maintaining of Security." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (January 1, 2017): 181. http://dx.doi.org/10.11591/ijeecs.v5.i1.pp181-186.

Full text
Abstract:
<p>The emergence of wireless sensor networks as one of the technology trends in the coming years, and some special tests of safety. The event will be thousands of tiny sensors that cheap devices, memory, radio and make, in most cases, no access to the production and energy. Some great challenges of sensor networks are different; we focus on security in the form of wireless sensor networks. To some network wireless sensor network in order to optimize use of the sensor, so that the network can be as long as possible. But the management of the important mission of the sensor network, denial of service (DoS) attacks against the destruction of the efficient use of network resources and the vital functions of the network. DoS attacks can be one of the greatest threats to security threats be considered. In fact, there are many different layers of the OSI-DOS.</p>
APA, Harvard, Vancouver, ISO, and other styles
8

Jiang, Jian Feng, Jian Feng Jiang, Xian Zhang, and Jin Xia Sun. "Complementary QoS Strategy Research and Application in Large-Scale Switched Networks." Advanced Materials Research 712-715 (June 2013): 2664–70. http://dx.doi.org/10.4028/www.scientific.net/amr.712-715.2664.

Full text
Abstract:
Large-scale switched networks based on hierarchical architecture put forward higher requirements for the quality of service. This paper analyzes the advantages, disadvantages and the application environment of the traditional QoS architecture based on business according to the second layer and the third layer of the OSI reference model. Then a complementary strategy model integrating Differentiated service model with Integrated service model is designed to enhance the QoS of a large-scale switched network. Simulation results prove that the model can improve the networks QoS in many aspects such as transmission delay, packet loss rate, delay jitter and network throughput.
APA, Harvard, Vancouver, ISO, and other styles
9

Kanaris, Loizos, Charalampos Sergiou, Akis Kokkinis, Aris Pafitis, Nikos Antoniou, and Stavros Stavrou. "On the Realistic Radio and Network Planning of IoT Sensor Networks." Sensors 19, no. 15 (July 24, 2019): 3264. http://dx.doi.org/10.3390/s19153264.

Full text
Abstract:
Planning and deploying a functional large scale Wireless Sensor Network (WSN) or a Network of Internet of Things (IoTs) is a challenging task, especially in complex urban environments. A main network design bottleneck is the existence and/or correct usage of appropriate cross layer simulators that can generate realistic results for the scenario of interest. Existing network simulators tend to overlook the complexity of the physical radio propagation layer and consequently do not realistically simulate the main radio propagation conditions that take place in urban or suburban environments, thus passing inaccurate results between Open Systems Interconnection (OSI) layers. This work demonstrates through simulations and measurements that, by correctly passing physical information to higher layers, the overall simulation process produces more accurate results at the network layer. It is demonstrated that the resulting simulation methodology can be utilized to accomplish realistic wireless planning and performance analysis of the deployed nodes, with results that are very close to those of real test-beds, or actual WSN deployments.
APA, Harvard, Vancouver, ISO, and other styles
10

Chandnani, Manali, Mukesh Kumar Khandelwal, and Meeta Sharma. "A Survey on Synchronization Approach in MAC Layer Protocols." International Journal of Business Data Communications and Networking 13, no. 1 (January 2017): 9–27. http://dx.doi.org/10.4018/ijbdcn.2017010102.

Full text
Abstract:
The Open Systems Interconnection (OSI) model describes the layered approach for communication between two networked systems. The Data link layer of OSI model consists of a sub layer known as MAC layer for achieving coordination among the communicating nodes to access the shared channel. This channel is shared between multiple nodes in a communication network and the packets transmitted at same time by different nodes collide with each other. This situation leads to loss of data and bandwidth gets wasted. To avoid this situation, MAC layer supports various protocols: TDMA, ALOHA, CSMA/CD, CSMA/CA and many hybrid techniques which employ their own criteria of synchronization for minimizing the collisions. In this paper the authors discuss about the MAC layer and the multiple access protocols which it supports for achieving synchronization among the nodes in the channel.
APA, Harvard, Vancouver, ISO, and other styles
11

Phijik, Battula, and Chakunta Venkata Guru Rao. "Pragmatic Security-Aware Cross-Layer Design for Wireless Networks from Vampire Attacks." Ingénierie des systèmes d information 26, no. 6 (December 27, 2021): 559–67. http://dx.doi.org/10.18280/isi.260606.

Full text
Abstract:
Wireless networks rely on ad hoc communication in an emergency, such as a search and rescue or military missions. WLAN, WiMAX, and Bluetooth are often used in Ad Hoc networks. Using a TCP/IP wireless network poses several challenges. Packet loss in 802.11 may be caused by noise or the network. TCP/IP connects non-adjacent layers of the network, resolving cross-layer communication technology for cross-layer communication. It regulates data transmission energy. This structure solves an issue in various ways. It is often used to improve data transfer. Currently, the OSI reference model's layers and functions are not explicitly connected. Only DCL can send multimedia data via wireless networks. The research employs CLD to improve wireless security—invasions of ad hoc networks (MANETs). The research helps secure wireless MANs (MANETs), Vampire Attack Defense (VAP) algorithms. A Secure Cross-Layer Design SCLD-AHN protocol is included. The paper contributes to controlling security attacks in wireless Mobile Ad Hoc Networks (MANET's). In MANETs effectiveness of Vampire Attack Defense (VAP) algorithms is evaluated and analyzed. It also proposes a Secure Cross-Layer Design for the ad hoc networks (SCLD-AHN) protocol.
APA, Harvard, Vancouver, ISO, and other styles
12

Moreira Santos, María Genoveva, and Pedro Antonio Alcívar Marcillo. "Security in the data link layer of the OSI model on LANs wired Cisco." Journal of Science and Research: Revista Ciencia e Investigación 3, CITT2017 (February 23, 2018): 106–12. http://dx.doi.org/10.26910/issn.2528-8083vol3isscitt2017.2018pp106-112.

Full text
Abstract:
There are no technologies or protocols completely secure in network infrastructures, for this reason, this document aims to demonstrate the importance of configuring security options on network equipments. On this occasion we will focus on the data link layer of the OSI model, which is where controls have begun to be implemented at level of protocols. The tools that are used in the research facilitate the implementation of a virtual laboratory, which consists of a base operating system (windows) in which virtualbox is installed to mount linux mint, which will generate attacks; while in VMware, we installed a virtual machine that allows you to add the image of a switch to our network simulation software (GNS3), which integrates all the components. The tests were able to identify the vulnerabilities in MAC, ARP, VLAN and STP, and then to proceed to patch these security aws. Keeping the setting by default or ignoring the characteristics of network equipment are usually the reasons why these vulnerabilities exist. Finally, it was proved how easy it can be to run an attack and at the same time to implement security measures on the layer 2 of the OSI.
APA, Harvard, Vancouver, ISO, and other styles
13

Al Hayajneh, Abdullah, Md Zakirul Alam Bhuiyan, and Ian McAndrew. "A Novel Security Protocol for Wireless Sensor Networks with Cooperative Communication." Computers 9, no. 1 (January 20, 2020): 4. http://dx.doi.org/10.3390/computers9010004.

Full text
Abstract:
This paper builds upon the foundation and clarifies specifications for a necessary security protocol in Wireless Sensor Networks (WSNs) with cooperative communications. It is designed to enhance performance and resiliency against cyber-attacks. Recent literature has shown that developing a WSN with Cooperative Communication greatly increases the performance of the network, but also exposes new vulnerabilities. The technique operates by transmitting packets of data to neighboring relay nodes in a cooperative fashion to reach the destination. In this paper, we consider security issues in WSNs with cooperative communication on each layer of the OSI model: physical layer, data link layer, network layer, service (topology) layer, and application layer. For each layer, we clarify the main task, enumerate the main attacks and threats, specify the primary security approaches and techniques (if any), and discuss possible new attacks and problems that may arise with the use of cooperative communications. Furthermore, we show for some attacks (e.g., jamming, packet dropping, and wormhole) that using cooperative communication improves the network resiliency and reliability. Finally, we propose a security protocol that addresses many of these shortcomings, while outlining the remaining issues that need further work and research.
APA, Harvard, Vancouver, ISO, and other styles
14

De Cleyn, P., and C. Blondia. "Impact of Cross-Layer Adaptations of Mobile IP on IEEE 802.11 Networks on Video Streaming." International Journal of Adaptive, Resilient and Autonomic Systems 1, no. 3 (July 2010): 59–80. http://dx.doi.org/10.4018/jaras.2010070104.

Full text
Abstract:
The OSI network layer model provides a strictly separated stacked architecture to abstract the behavior of one layer from the other. Although this model has a lot of advantages, it also makes it easy to lose the bigger picture. In this paper, the authors describe the advantages that can be made by cross-layering the link layer and networking layer to optimize handovers. The performance gain of these cross-layer adaptations will be analyzed using a simulation scenario and compared to the results from a real-life video streaming test. The authors will show that the performance gain in network parameters cannot be directly mapped on the gain of the video quality.
APA, Harvard, Vancouver, ISO, and other styles
15

T, Varsha, Shrihari, and Dr Nagaraja G. S. "IoT based a Smart Home Automation System Using Packet Tracer." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (January 31, 2023): 183–87. http://dx.doi.org/10.22214/ijraset.2023.48514.

Full text
Abstract:
Abstract: The technology is seeing a rapid growth day by day in the life of humans. Rapid growth intechnology has led to newer inventions that has made human lives very comfortable. The introduction of Internet Of Things (IOT) has brought a drastic change in the way humans lead their lives. Network plays an important role in each and every technology as it allows connection and communication between different objects and entities of any application. Different models like OSI, TCP demonstrate how computer system communicate over a network. Each of these models have different layers in it. This paper mainly focuses on the application layer which enables effective communication with other applications on different computer systems and different networks. Also the paper discuss different application layer IoT based protocols that work in the application layer by considering the scenario of Smart Home to demonstrate working of each protocol.
APA, Harvard, Vancouver, ISO, and other styles
16

Oktavianus, Yoppi Lisyadi, Ikhwana Elfitri, and Onno Widodo Purbo. "Perancangan dan Analisis Jaringan FTTB Berbasis Teknologi GPON Pada Bangunan Hotel." INOVTEK Polbeng - Seri Informatika 8, no. 1 (June 17, 2023): 88. http://dx.doi.org/10.35314/isi.v8i1.3213.

Full text
Abstract:
This paper presents the design and implementation of a Fiber To The Building (FTTB) network infrastructure based on Gigabit Passive Optical Network (GPON) technology in a hotel cluster building located in West Sumatra, Indonesia. GPON technology was selected for its cost-effectiveness and efficiency in the distribution area, particularly when the terminal bandwidth is set at ≤500 Mbps. The waterfall method was utilized in the network's design. The results were tested and analyzed across three Open System Interconnection (OSI) layers: the physical layer, represented by the link power budget; the datalink layer, represented by the Traffic Container (T-CONT); and the network layer, represented by the QoS network performance. The link power budget showed a minimum received power of -16.41 dBm on the downlink and -18.95 dBm on the uplink, with a power margin value above zero. T-CONT has been implemented with the fixed bandwidth value set to provide a bandwidth guarantee meeting the minimum requirement of 1.1 Mbps. The network performance of the FTTB GPON demonstrated excellent performance, as per Internet Protocol Harmonization Over Network (TIPHON) standards, recording a latency of 1.18 ms, jitter of 0.18 ms, and zero packet loss
APA, Harvard, Vancouver, ISO, and other styles
17

Chupaev, A. V., R. S. Zaripova, R. R. Galyamov, and A. Y. Sharifullina. "The use of industrial wireless networks based on standard ISA-100.11a and protocol WirelessHART in process control." E3S Web of Conferences 124 (2019): 03013. http://dx.doi.org/10.1051/e3sconf/201912403013.

Full text
Abstract:
This article considers wireless technologies in the field of automation of technological processes and production in the energy, chemical, petrochemical and oil refining, gas, railway, mining, metallurgical and other industries where the use of wireless industrial devices is necessary due to specific features. Wireless technologies provide the ability to connect measuring devices directly to the wireless network with further transfer of information through a wireless gateway to an automated control system. This article will discuss the types of wireless networks that are classified according to the possible range of action (Wireless Wide area network, Wireless Local Area Network, Wireless Personal Area Network). The most common standards of organization of wireless industrial networks, including IEEE 802.11 b/g/n, IEEE 802.15.1, IEEE 802.15.4, IEEE 802.16 e, will also be considered, including in the field of management of chemical-technological processes and productions. Data transmission protocols ISA-100.11.a and WirelessHART and a number of their features will be analyzed. The basic standard network structures based on the ISA-100.11.a and WirelessHART protocols, their typical components, will be considered. The article provides an analytical comparison of the ISA100.11a and WirelessHART over the OSI network model layers, including the physical layer, the link layer, the network layer, the transport layer, the session layer, the presentation layer and the application layer (process control, management, security, application sublayer). The main stages of calculation of wireless industrial network are given, in particular: calculation of the network information load, calculation of the network’s energy parameters, frequency-territorial planning, development of the communication scheme and interface with external networks. The formulas for calculating the network information load using Nazarov’s methodology, calculating the network’s energy parameters, taking into account the overall losses in the propagation of radio waves, including losses in free space, losses in partitions and walls inside the building, losses due to interference and signal fading are given.
APA, Harvard, Vancouver, ISO, and other styles
18

Jafri, Syed Talib Abbas, Irfan Ahmed, Sundus Ali, Jamaiah Yahaya, Faizan Qamar, and Zuriani Hayati Abdullah. "Split Hop Penalty for Transmission Quality Metrics in a Better Approach to Mobile Ad Hoc Networking (BATMAN) for IoT-Based MANET." Symmetry 15, no. 5 (April 24, 2023): 969. http://dx.doi.org/10.3390/sym15050969.

Full text
Abstract:
Various routing protocols have been developed for wireless ad hoc networks to shift from infrastructure-based networks to self-controlling and self-configurable networks. These ad hoc networks are easy to implement and have plenty of application in the fields of healthcare, transportation, smart cities, etc. Although almost all of the routing protocols work on the Open Systems Interconnection (OSI) model’s network layer, a few routing protocols support routing on the data link layer of the OSI model rather than the conventional one. One of these routing protocols include the Better Approach To Mobile Ad Hoc Networking (BATMAN). Though BATMAN is a comparably new routing protocol and included in the Linux kernel, it suffers from performance deterioration and latency issues that need to be addressed especially in the Internet of Things (IoT). This paper presents a symmetry-based split hop penalty for BATMAN version 4 to improve the network’s performance in multi-hop scenarios. Split hop penalty defines two different sets of penalties to accommodate the routing protocol metric based on the interface media type. The experiments were conducted within the campus building of the university with physical nodes, and the obtained results highlight that overall performance is improved in terms of throughput, latency, and jitter while no performance gain is measured in packet loss and routing loops that are still present.
APA, Harvard, Vancouver, ISO, and other styles
19

R, Gautam, Suyog P, and G. S. Nagaraja. "Analysis of SNMP Based Protocols in IoT and Real- World Scenarios." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (November 30, 2022): 1867–71. http://dx.doi.org/10.22214/ijraset.2022.47293.

Full text
Abstract:
bstract: In the scenario of large organizations device management and maintenance plays an important role in proper functioning of network connected devices. SNMP (Simple NetworkManagement Protocol) is an internet Protocol running in the application layer of the OSI modelthat governs the functioning of the network devices such as routers, switches and access points. The implementation of SNMP is done mainly using UDP (User Datagram Protocol) which is best effort protocol leaving the responsibility of error correction to the application layer. Whatcan be gathered from the local device and what may be modified and set are specified by SNMPManagement Information Bases, or MIBs for short.
APA, Harvard, Vancouver, ISO, and other styles
20

Biradar, Shilpa, J. Shiny Duela, P. Ramya, Flory Francis, Tarun Singhal, Ankur Singhal, Ranjan Mishra, R. Govindaraj, and Amare Kebede Asfaw. "Improved Channel Capacity in 5G Ultradense Network." Wireless Communications and Mobile Computing 2022 (June 25, 2022): 1–9. http://dx.doi.org/10.1155/2022/7948395.

Full text
Abstract:
In general, it is necessary to evaluate the required bandwidth in each segment of the 5G ultradense network. After doing so, it is necessary to decide on the choice of OSI network and connection layer technologies. The most suitable models of network equipment are determined according to the technologies so selected. This question is not easy because performance depends directly on the performance of the hardware and also on the performance, software, and hardware configuration. These channel capabilities are the criteria for evaluating the performance of channels and equipment on 5G networks. In this paper, a model is proposed to increase the channel capacity of the 5G ultradense network. It is designed to increase the bandwidth usage of the channel and increase its functionality. Its main special feature is that its energy and power consumption is very low compared to other methods. This method is also ideal for sending more data with less power.
APA, Harvard, Vancouver, ISO, and other styles
21

Reddy, K. Shyam Sunder, Vempati Krishna, M. Prabhakar, Punna Srilatha, K. Gurnadha Gupta, and Ravula Arun Kumar. "Machine Learning Based Classification Model for Network Traffic Anomaly Detection." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7s (July 13, 2023): 563–76. http://dx.doi.org/10.17762/ijritcc.v11i7s.7048.

Full text
Abstract:
In current days, cloud environments are facing a huge challenge from the attackers in terms of various attacks thrown to the cloud service providers. In both industry and academics, the problem of detection and mitigation of DDoS attacks is now a challenging issue. Detecting Distributed Denial of Service (DDos) threats is mainly a classification problem that can be addressed using data mining, machine learning and deep learning techniques. DDoS attacks can occur in any of the seven-layer OSI model's network. Hence, detecting the DDoS attacks is an important task for cloud service providers to overcome dangerous attacks and loss incurred to stake holders and also the provider.
APA, Harvard, Vancouver, ISO, and other styles
22

Abilov, A. V., A. V. Chunaev, A. I. Nistyuk, and I. A. Kaisina. "Data Transmission Model with Lost Fragments Recovery Based on Application Layer ARQ." Vestnik IzhGTU imeni M.T. Kalashnikova 24, no. 3 (2021): 104–11. http://dx.doi.org/10.22213/2413-1172-2021-3-104-111.

Full text
Abstract:
Wireless networks in difficult conditions of signal receiving are characterized by a high level of burst data losses, at which a large number of data fragments can be lost in a row. In this case, to recover the lost data, the use of forward error correction methods (FEC) in most cases does not give a sufficient effect. The use of standard data loss recovery methods based on automatic retransmission request (ARQ) at the data link and transport layers of the OSI model can lead to significant delays, which is often unacceptable for real-time streaming services. In such a case, it may be preferable to skip the piece of data rather than delay waiting for the piece to be delivered on retransmissions. The use of ARQ-based techniques on application layer of OSI model for data streaming allows for a more efficient recovery of lost data chunks in wireless networks with a high level of burst losses. The known models of a discrete channel for wireless networks allow for analytically assessing the probability of data loss, however, they do not take into account cases with retransmission of lost data. The study proposes a mathematical model of data transmission in a wireless communication channel based on the Gilbert model, which takes into account the loss recovery by the ARQ method and allows you to calculate the data loss ratio. To check the adequacy of the proposed model, a software was developed that ensures the transmission of data streaming in a wireless communication network with recovery of fragment losses at the application level, and a corresponding experimental study was carried out. It is shown that the mathematical model takes into account the burstiness of transmitted data losses and their recovery by the ARQ method.
APA, Harvard, Vancouver, ISO, and other styles
23

Biradar, Prabhavati, and Purushottama T L. "DESIGN OF TRAFFIC ENGINEERED MULTI-PROTOCOL LABEL SWITCHING-TRANSPORT PROFILE (MPLS-TP) FOR THE ENHANCEMENT OF QUALITY OF SERVICE." International Journal of Research -GRANTHAALAYAH 5, no. 4RACEEE (April 30, 2017): 58–67. http://dx.doi.org/10.29121/granthaalayah.v5.i4raceee.2017.3323.

Full text
Abstract:
Multiprotocol Label Switching (MPLS) is a switching technology. MPLS-TP is a progressive version of MPLS in the field of packet switched data network. MPLS-TP is a high-end technology which implements network methodologies in a transport layer. For managing virtual private network(VPN) services, MPLS is of developing enthusiasm to the service providers (SPs) and furthermore to VPN customers. MPLS-enabled routers allot a few labels to the packets, and in view of these allocated labels it produces sending decisions. The prime expectation after the MPLS technology is to eliminate the need of OSI model data link layered (layer-2) technology i.e. frame relay, Ethernet, asynchronous transfer mode (ATM). This paper gives data about the components of Multi-Protocol Label Switching (MPLS), correlation of MPLS with traditional Routing and Packet Switching, MPLS label format and MPLS operation.
APA, Harvard, Vancouver, ISO, and other styles
24

O. Hasan, Ammar. "Application Based performance monitoring heavy data transmission of Local Area Network." Kufa Journal of Engineering 13, no. 3 (July 31, 2022): 14–40. http://dx.doi.org/10.30572/2018/kje/130302.

Full text
Abstract:
There are many applications should be work online, these applications can be seen in the application layer of OSI reference model, each one of these consumes particular band width, bit rate and network speed depending of the resources that used to make any application operate for example there is a widely difference between video streaming network application and text chatting application. In this paper when any computer network needs to be examined, at least two different applications should be taken for example to monitor network performance when these application going to work and get in action. In this paper the researcher designed and a local area network to implement dedicated applications, monitor the network factors performance, get results, and compare between applications.
APA, Harvard, Vancouver, ISO, and other styles
25

Martynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.

Full text
Abstract:
The paper discusses the main stages of development of cryptographic protocols from SSL 2.0 (Secure Socket Layer) to TLS 1.3 (Transport Layer Security), which ensure the protection of transport layer data in the OSI model. A brief description of the modification of the RuTLS protocol based on TLS 1.3 and their main differences is given. The development of IPsec, which provides cryptographic protection of communications at the network level of the OSI model, is considered using examples of the development of the three most commonly used protocols. These include IKE (Internet Key Exchange), AH (Authentication Header), and ESP (Encapsulation Security Payload). For the SSL/TLS and IPsec specifications, the basic handshake protocols and the main stages of their development are considered. The described handshakes include primary cryptographic information exchange cycles in the form of identifiers of interaction participants, one-time numbers, lists of supported cryptographic combinations. Authentication of participants based on certificates, shared symmetric keys, data exchange for establishing a shared Diffie — Hellman secret, development of key material for secret keys of communication sessions, message authentication, and other cryptographic parameters are presented. For different versions of SSL/TLS and IPsec, the logical structures of application data cryptographic protection functions are described.
APA, Harvard, Vancouver, ISO, and other styles
26

Tennakoon, Chaminda, and Subha Fernando. "Deep learning model for distributed denial of service (DDoS) detection." International Journal of ADVANCED AND APPLIED SCIENCES 9, no. 2 (February 2022): 109–18. http://dx.doi.org/10.21833/ijaas.2022.02.012.

Full text
Abstract:
Distributed denial of service (DDoS) attacks is one of the serious threats in the domain of cybersecurity where it affects the availability of online services by disrupting access to its legitimate users. The consequences of such attacks could be millions of dollars in worth since all of the online services are relying on high availability. The magnitude of DDoS attacks is ever increasing as attackers are smart enough to innovate their attacking strategies to expose vulnerabilities in the intrusion detection models or mitigation mechanisms. The history of DDoS attacks reflects that network and transport layers of the OSI model were the initial target of the attackers, but the recent history from the cybersecurity domain proves that the attacking momentum has shifted toward the application layer of the OSI model which presents a high degree of difficulty distinguishing the attack and benign traffics that make the combat against application-layer DDoS attack a sophisticated task. Striding for high accuracy with high DDoS classification recall is key for any DDoS detection mechanism to keep the reliability and trustworthiness of such a system. In this paper, a deep learning approach for application-layer DDoS detection is proposed by using an autoencoder to perform the feature selection and Deep neural networks to perform the attack classification. A popular benchmark dataset CIC DoS 2017 is selected by extracting the most appealing features from the packet flows. The proposed model has achieved an accuracy of 99.83% with a detection rate of 99.84% while maintaining the false-negative rate of 0.17%, which has the heights accuracy rate among the literature reviewed so far.
APA, Harvard, Vancouver, ISO, and other styles
27

Zhou, Wei, Xing Jiang, Qingsong Luo, Shanguo Huang, Bingli Guo, Xiang Sun, Shaobo Li, Xiaochuan Tan, Mingyi Ma, and Tianwen Fu. "Design and Implementation of Semi-Physical Platform for Label Based Frame Switching in Integrated Satellite Terrestrial Networks." Applied Sciences 12, no. 13 (July 1, 2022): 6674. http://dx.doi.org/10.3390/app12136674.

Full text
Abstract:
With the explosion of traffic demand in recent years, the integration of satellite optical networks and terrestrial networks (ISTN) creates a promising networking solution for future low-latency, high-rate, and high-capacity communications. Owing to the high cost of deploying and maintaining a satellite optical network, it is critical to carefully design and plan the network to ensure the performance of the network. Thus, a semi-physical simulation platform based on software-defined networks (SDNs) is developed to simulate a satellite optical network and evaluate the performance of the proposed label-based advanced orbiting system (AOS) frame switching method that adheres to the Consultative Committee for Space Data Systems’ recommended standard (CCSDS). The semi-physical simulation platform has two major innovations: (1) adapting and integrating network protocols between the CCSDS and open system interconnect (OSI) reference models, particularly at the data link layer, and (2) the foundation for an SDN-based satellite optical network. In the control plane, real-time VxWorks Simulators serve as controllers to establish and manage various network protocols and the link manager protocol (LMP). Here, network protocols include open shortest path first (OSPF) for routing managing and controlling messages, constraint shortest path first–traffic engineering (CSPF-TE), and constraint-label distribution protocol (CR-LDP) for routing data services. LMP is used to assign and reserve satellite optical link resources. The performance of the architecture and protocols is evaluated via a semi-physical simulation platform.
APA, Harvard, Vancouver, ISO, and other styles
28

Ikuesan, Adeyemi R., Mazleena Salleh, Hein S. Venter, Shukor Abd Razak, and Steven M. Furnell. "A heuristics for HTTP traffic identification in measuring user dissimilarity." Human-Intelligent Systems Integration 2, no. 1-4 (June 2, 2020): 17–28. http://dx.doi.org/10.1007/s42454-020-00010-2.

Full text
Abstract:
AbstractThe prevalence of HTTP web traffic on the Internet has long transcended the layer 7 classification, to layers such as layer 5 of the OSI model stack. This coupled with the integration-diversity of other layers and application layer protocols has made identification of user-initiated HTTP web traffic complex, thus increasing user anonymity on the Internet. This study reveals that, with the current complex nature of Internet and HTTP traffic, browser complexity, dynamic web programming structure, the surge in network delay, and unstable user behavior in network interaction, user-initiated requests can be accurately determined. The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. The algorithm was experimentally tested on a group of users, to ascertain the certainty of identifying user-initiated requests. The result demonstrates that user-initiated HTTP requests can be reliably identified with a recall rate at 0.94 and F-measure at 0.969. Additionally, this study extends the paradigm of user identification based on the intrinsic characteristics of users, exhibited in network traffic. The application of these research findings finds relevance in user identification for insider investigation, e-commerce, and e-learning system as well as in network planning and management. Further, the findings from the study are relevant in web usage mining, where user-initiated action comprises the fundamental unit of measurement.
APA, Harvard, Vancouver, ISO, and other styles
29

Satria, Andy, and Fanny Ramadhani. "Analisis Keamanan Jaringan Komputer dengan Menggunakan Switch Port Security di Cisco Packet Tracer." sudo Jurnal Teknik Informatika 2, no. 2 (May 21, 2023): 52–60. http://dx.doi.org/10.56211/sudo.v2i2.260.

Full text
Abstract:
Perkembangan teknologi yang semakin pesat dalam jaringan komputer membuat meningkatnya kebutuhan akses jaringan untuk memudahkan pekerjaan seperti kualitas jaringan yang stabil, cepat, dan efisien serta keamanan jaringan yang terkendali. Salah satu faktor yang dapat mempengaruhi kualitas jaringan adalah sistem keamanan jaringan atau network security. Metode yang digunakan pada penelitian ini adalah metode kualitatif dengan metode pendekatan deskriptif. Tujuan dari penelitian ini adalah dengan memanfaatkan Switch Port Security untuk pengamanan jaringan lokal (LAN) dalam membatasi hak akses host atau port demi kestabilan jaringan komputer sehingga pekerjaan tidak menjadi terhambat dan juga dapat mengurangi tingkat kejahatan di dalam jaringan. Switch Port Security bekerja di layer 2 dari bawah yaitu Data Link OSI Layer. Pada penelitian ini menggunakan tiga macam Violation yaitu Restrict, Protect, dan Shutdown.
APA, Harvard, Vancouver, ISO, and other styles
30

Iltaf, Walid. "Efficient Data Forwarding Mechanism in Backbone Networks by Employing MPLS Technology." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 13 (November 30, 2016): 7347–54. http://dx.doi.org/10.24297/ijct.v15i13.4802.

Full text
Abstract:
Multiprotocol Label Switching (MPLS) is a relatively new WAN technology that is attracting the networking professionals around the globe. Many ISPs have already deployed it in their network. Yet, some other ISPs are in the pipeline to deploy it. Nevertheless, it has caught the attention of professionals soon after it was developed. Instead of the IP address or MAC address, MPLS works on small labels. These labels are inserted between Data Link layer and Network layer of the OSI model. Forwarding decisions are based on these labels; instead of looking at complex routing tables. The MPLS network is configured, and tested under different conditions. A comparison is drawn between the IP and MPLS network. The obtained results show that MPLS has a lower end to end delay and less CPU utilization. Furthermore, MPLS has lesser processing delay as compared to the IP network. The performance difference is basically due to the intelligent forwarding mechanism of MPLS technology. It is also important to further investigate this topic in terms of security considerations. The labels values are not encrypted during transmission, and there is no authorization mechanism defined. It will be highly beneficial to have more sophisticated suite of security tools to encounter threats and vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
31

Rajesh Shyamala Devi, B., A. George, and Aby K. Thomas. "Performance investigation of low power radio duty cycling MAC for resource constrained WSN." International Journal of Engineering & Technology 7, no. 1.9 (March 1, 2018): 93. http://dx.doi.org/10.14419/ijet.v7i1.9.9741.

Full text
Abstract:
Wireless Sensor Networks (WSN) are the corner stone of next generation communication networks. The OSI Layer 2 and Layer 3 communication technologies of the WSN are the important aspects in communication and networking research. The protocols and standards of WSN in different layers are already well defined. In this article, we evaluate the Layer 2 mechanisms which meet the special demands of WSNs for resource constrained applications. Large number of WSN devices need to be deployed in a typical environmental monitoring use cases. In this work we consider a use case of sensors and actuators in a small geographical region. For this a short range communication technology such as IEEE 802.15.4 is considered. Various type of sensors are deployed in the same region, in this cases effective MAC mechanism is required to effectively allocate the channel resource among these devices. The main concentration of this article is about the energy consumption of WSN devices. As the devices and network is resource constrained, energy efficient hardware’s, communication networking protocols and suitable software implementations are required. As far as the energy efficient protocols are considered MAC mechanisms is one of the very important processes, where suitable energy efficient mechanisms need to be selected. In the recent literatures showed that Contiki MAC is one of the suitable MAC layer implementation with dedicated Radio Duty Cycling Layer (RDC) which conserves the WSN nodes battery power. In this article we analyze the state of the art Layer 2 mechanisms for WSN in environmental monitoring use case, by a theoretical analysis and simulation based experiments.
APA, Harvard, Vancouver, ISO, and other styles
32

Pestin, Maxim S., and Alexander S. Novikov. "Simulation model of wireless ad-hoc network to study algorithms of traffic routing." Journal Of Applied Informatics 17, no. 4 (August 31, 2022): 75–86. http://dx.doi.org/10.37791/2687-0649-2022-17-4-75-86.

Full text
Abstract:
Communication network simulators are software designed to model, explore, test and debug network technologies, including wireless decentralized self-organizing networks or ad-hoc networks. They greatly simplify the research, development and optimization of routing protocols in these networks. However, the well-known simulators have a number of disadvantages, including the difficulty of adding custom extensions to ad-hoc network routing protocols, the lack of the necessary network stack, the lack of routing algorithm visualization modes, low performance, and difficulty in debugging communication protocols. The purpose of this work is to create a simulation model of a wireless network that would allow us to explore, debug and evaluate the developed algorithms and routing protocols for ad-hoc networks. At the same time, the requirements for interface ergonomics and the ability to visualize the operation of algorithms, ensure the collection of statistics, and create various scenarios for the operation of the network come to the fore. The article proposes the structure of the simulation model, which includes the modules of the network subscriber, application software, network layer of the OSI data transmission model, radio module, radio transmission environment, statistics collection, visualization and scenario management. To solve the tasks set, the approach of discrete-event modeling was used. To create a simulator of wireless decentralized networks and routing algorithms, a set of classes was developed that implement the modules of the simulation model. Based on the proposed structure, module classes and discrete event simulation algorithm, a software implementation of the simulation model was created using the C++ programming language and the Qt framework. The developed simulation model was used in the course of an experimental study of the effectiveness of the network routing algorithm. The proposed software will simplify the development and debugging of algorithms and routing protocols for ad-hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
33

Gu, Yong Hong, Wei Huang, and Qiao Li Yang. "Design and Implementation of a Multi-Channel HDLC Protocol Controller Based on FPGA." Advanced Materials Research 383-390 (November 2011): 6840–45. http://dx.doi.org/10.4028/www.scientific.net/amr.383-390.6840.

Full text
Abstract:
To transmit and receive data over any network successfully, a protocol is required to manage the flow. High-level Data Link Control (HDLC) protocol is defined in Layer 2 of OSI model and is one of the most commonly used Layer 2 protocol. HDLC supports both full-duplex and half-duplex data transfer. In addition, it offers error control and flow control. Currently on the market there are many dedicated HDLC chips, but these chips are neither of control complexity nor of limited number of channels. This paper presents a new method for implementing a multi-channel HDLC protocol controller using Altera FPGA and VHDL as the target technology. Implementing a multi-channel HDLC protocol controller in FPGA offers the flexibility, upgradability and customization benefits of programmable logic and also reduces the total cost of every project which involves HDLC protocol controllers.
APA, Harvard, Vancouver, ISO, and other styles
34

Miswar, Nur, Herman Herman, and Imam Riadi. "COMPARING THE PERFORMANCE OF OSPF AND OSPF-MPLS ROUTING PROTOCOL IN FORWARDING TCP AND UDP PACKET." Jurnal Teknik Informatika (Jutif) 4, no. 5 (November 12, 2023): 1237–47. http://dx.doi.org/10.52436/1.jutif.2023.4.5.1456.

Full text
Abstract:
Routing is an important process in computer networks, which involves selecting a path for packet data. The routing mechanism is governed by protocols at layer three of the OSI model or layer two of the TCP/IP model. Routing can be static or dynamic, with dynamic routing algorithms automatically determining the best path in the network. One commonly used dynamic routing protocol is Open Shortest Path First (OSPF), which automatically selects the optimal route for data packets based on received network topology information. The need for more advanced and scalable routing solutions led to the development of Multi-Protocol Label Switching (MPLS), introducing the concept of label switching for faster and more efficient data forwarding. This research aims to analyze the performance of OSPF and OSPF MPLS routing scenarios regarding TCP and UDP services. Through evaluation of Quality of Service (QoS) parameters, including throughput, packet loss, delay, and jitter. This study simulates the network using GNS3 software, with TCP and UDP services transmitted for durations of 15, 30, and 60 seconds. The results showed performance for both scenarios with an average index value of 3.75, indicating "good" network performance according to TIPHON standards across all measurement sessions. Although MPLS OSPF showed slightly lower throughput compared to non-MPLS OSPF, both scenarios showed very low packet loss, low delay, and stable jitter. The evaluation also highlights that the use of OSPF MPLS for UDP services reduces the time delay. Both non-MPLS OSPF and MPLS OSPF effectively support TCP and UDP services, with MPLS OSPF showing advantages in certain QoS parameters, especially for UDP services.
APA, Harvard, Vancouver, ISO, and other styles
35

Rao, Gottapu Sankara, and P. Krishna Subbarao. "A Novel Approach for Detection of DoS / DDoS Attack in Network Environment using Ensemble Machine Learning Model." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (October 27, 2023): 244–53. http://dx.doi.org/10.17762/ijritcc.v11i9.8340.

Full text
Abstract:
One of the most serious threat to network security is Denial of service (DOS) attacks. Internet and computer networks are now important parts of our businesses and daily lives. Malicious actions have become more common as our reliance on computers and communication networks has grown. Network threats are a big problem in the way people communicate today. To make sure that the networks work well and that users' information is safe, the network data must be watched and analysed to find malicious activities and attacks. Flooding may be the simplest DDoS assault. Computer networks and services are vulnerable to DoS and DDoS attacks. These assaults flood target systems with malicious traffic, making them unreachable to genuine users. The work aims to enhance the resilience of network infrastructures against these attacks and ensure uninterrupted service delivery. This research develops and evaluates enhanced DoS/DDoS detection methods. DoS attacks usually stop or slow down legal computer or network use. Denial-of-service (DoS) attacks prevent genuine users from accessing and using information systems and resources. The OSI model's layers make up the computer network. Different types of DDoS strikes target different layers. The Network Layer can be broken by using ICMP Floods or Smurf Attacks. The Transport layer can be attacked using UDP Floods, TCP Connection Exhaustion, and SYN Floods. HTTP-encrypted attacks can be used to get through to the application layer. DoS/DDoS attacks are malicious attacks. Protect network data from harm. Computer network services are increasingly threatened by DoS/DDoS attacks. Machine learning may detect prior DoS/DDoS attacks. DoS/DDoS attacks proliferate online and via social media. Network security is IT's top priority. DoS and DDoS assaults include ICMP, UDP, and the more prevalent TCP flood attacks. These strikes must be identified and stopped immediately. In this work, a stacking ensemble method is suggested for detecting DoS/DDoS attacks so that our networked data doesn't get any worse. This paper used a method called "Ensemble of classifiers," in which each class uses a different way to learn. In proposed methodology Experiment#1 , I used the Home Wifi Network Traffic Collected and generated own Dataset named it as MywifiNetwork.csv, whereas in proposed methodology Experiment#2, I used the kaggle repository “NSL-KDD benchmark dataset” to perform experiments in order to find detection accuracy of dos attack detection using python language in jupyter notebook. The system detects attack-type or legitimate-type of network traffic during detection ML classification methods are used to compare how well the suggested system works. The results show that when the ensembled stacking learning model is used, 99% of the time it is able to find the problem. In proposed methodology two Experiments are implemented for comparing detection accuracy with the existing techniques. Compared to other measuring methods, we get a big step forward in finding attacks. So, our model gives a lot of faith in securing these networks. This paper will analyse the behaviour of network traffics.
APA, Harvard, Vancouver, ISO, and other styles
36

Zakharov, Konstantin V., Maksim A. Khodorchenko, Igor D. Karpov, Igor A. Ognev, and Sergei A. Zyryanov. "Development of a system for monitoring network traffic with filtering elements at the L2." Digital technology security, no. 2 (June 30, 2022): 34–47. http://dx.doi.org/10.17212/2782-2230-2022-2-34-47.

Full text
Abstract:
This article proposes a network traffic monitoring system with filtering elements at the data link layer (L2) of the OSI model. This article presents the general requirements and approaches to the construction of the proposed monitoring and filtering system. The developed device is built on the basis of SDN technology, which makes it possible to create a more flexible and multifunctional network device compared to traditional network devices. In the process of developing the device, standard methods and components available to the masses were used. Under the conditions of the tasks set, a schematic diagram of the developed device based on the TE0714 TRM model board and the SFP standard transceiver is presented. It is proposed to use the device for a monitoring system with filtering elements. Network traffic monitoring is proposed to be implemented based on the SNMP protocol to collect information from critical network nodes. It is proposed to implement network traffic filtering based on a "white" list of MAC addresses to limit the list of devices that have access to the system. The practical significance of this article lies in the description of the approach to the development of a fundamental device for monitoring public and personal networks with flexibly defined additional and basic functions. The proposed device, thanks to the use of SDN technology, provides individual customization for customer requests, which means the possibility of expanding functionality without purchasing new hardware and firmware. The proposed device, due to the use of SDN technology, provides individual customization for customer requests, which means the possibility of expanding the functionality without purchasing new hardware and firmware.
APA, Harvard, Vancouver, ISO, and other styles
37

Kocher, Idrees Sarhan. "AN EXPERIMENTAL SIMULATION OF ADDRESSING AUTO-CONFIGURATION ISSUES FOR WIRELESS SENSOR NETWORKS." Academic Journal of Nawroz University 10, no. 4 (November 25, 2021): 1–13. http://dx.doi.org/10.25007/ajnu.v10n4a957.

Full text
Abstract:
Wireless Sensor Networks (WSN) is now an evolving technology and has a broad range of applications, such as battlefield surveillance, traffic surveillance, detection of forest fires, detection of floods, etc. The communication nature of the wireless sensor network is unprotected and dangerous due to deployment in hostile environments, restricted resources, an automatic nature, and untrusted media for broadcast transmission. For wireless sensor networks, several routing protocols have been suggested, but none of them have been developed with protection as a target. The majority function in routing algorithms currently in place for sensor networks optimize a restricted capacities in sensor nodes and the application based design of WSNs. A WSNs, however, are exposed to a number of possible threats that impede the network's regular activity. Thus, there is a strong need to provide the routing protocols of the OSI structure layer with a safe mechanism to prevent an attacker from obstructing it. The well-known attacks against all layers are discussed in this systematic roadmap, and debilitating attacks against routing protocols are analyzed and defined in particular. Several suggested attack countermeasures, design considerations and paper contributions are also included in the routing protocols. The assertion of the study is that WSN routing protocols must be built with protection in mind, and this is the only efficient solution in WSNs for safe routing. The aim of this paper is also to provide problems, attacks and countermeasures related to protection. Finally, it is hoped that this roadmap would inspire potential researchers to come up with smarter and better protection measures and make their network safer. The first such research analysis of secure routing protocols in WSNs is this roadmap study.
APA, Harvard, Vancouver, ISO, and other styles
38

Sambangi, Swathi, and Lakshmeeswari Gondi. "A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression." Proceedings 63, no. 1 (December 25, 2020): 51. http://dx.doi.org/10.3390/proceedings2020063051.

Full text
Abstract:
The problem of identifying Distributed Denial of Service (DDos) attacks is fundamentally a classification problem in machine learning. In relevance to Cloud Computing, the task of identification of DDoS attacks is a significantly challenging problem because of computational complexity that has to be addressed. Fundamentally, a Denial of Service (DoS) attack is an intentional attack attempted by attackers from single source which has an implicit intention of making an application unavailable to the target stakeholder. For this to be achieved, attackers usually stagger the network bandwidth, halting system resources, thus causing denial of access for legitimate users. Contrary to DoS attacks, in DDoS attacks, the attacker makes use of multiple sources to initiate an attack. DDoS attacks are most common at network, transportation, presentation and application layers of a seven-layer OSI model. In this paper, the research objective is to study the problem of DDoS attack detection in a Cloud environment by considering the most popular CICIDS 2017 benchmark dataset and applying multiple regression analysis for building a machine learning model to predict DDoS and Bot attacks through considering a Friday afternoon traffic logfile.
APA, Harvard, Vancouver, ISO, and other styles
39

Sundararajan, Aditya, Aniket Chavan, Danish Saleem, and Arif Sarwat. "A Survey of Protocol-Level Challenges and Solutions for Distributed Energy Resource Cyber-Physical Security." Energies 11, no. 9 (September 6, 2018): 2360. http://dx.doi.org/10.3390/en11092360.

Full text
Abstract:
The increasing proliferation of distributed energy resources (DERs) on the smart grid has made distributed solar and wind two key contributors to the expanding attack surface of the network; however, there is a lack of proper understanding and enforcement of DER communications security requirements. With vendors employing proprietary methods to mitigate hosts of attacks, the literature currently lacks a clear organization of the protocol-level vulnerabilities, attacks, and solutions mapped to each layer of the logical model such as the OSI stack. To bridge this gap and pave the way for future research by the authors in determining key DER security requirements, this paper conducts a comprehensive review of the key vulnerabilities, attacks, and potential solutions for solar and wind DERs at the protocol level. In doing so, this paper serves as a starting point for utilities, vendors, aggregators, and other industry stakeholders to develop a clear understanding of the DER security challenges and solutions, which are key precursors to comprehending security requirements.
APA, Harvard, Vancouver, ISO, and other styles
40

Galushka, V. V., D. V. Fatkhi, and E. R. Gazizov. "A method for generating a local network graph based on the analysis of address sets." Advanced Engineering Research 21, no. 3 (October 18, 2021): 284–89. http://dx.doi.org/10.23947/2687-1653-2021-21-3-284-289.

Full text
Abstract:
Introduction. The paper deals with the problem of automated construction of a local area network using tools and methods for traffic analysis at the link layer of OSI model. The problem is caused by two factors. These are difficulties of the manual determination of the communication between equipment and the lack of physical access to communication lines of an already functioning network. The purpose of the work is to reduce the time spent on building a local network diagram through automating the process of determining the communication between the equipment.Materials and Methods. To solve the set tasks, a method for determining the relative location of devices is proposed. The network adapters of a specialized software and hardware complex, which are connected to a communication line break at different points of the network, are used in opposite directions. The method used is based on calculations of intersections of address sets received from these adapters. The structural schemes of the construction of such a software and hardware complex and the requirements for it are given. The methods of obtaining MAC addresses from transit packets are described. Examples of libraries of software components for performing this operation are given. The structure of a relational database is proposed for storing the received data. The format and content of the fields of its table are described.Results. Using the developed methods, a typical example of an Ethernet network shows a way to determine the relative location of end devices specified by their MAC addresses, as well as at least two switches located between them. The signs by which it is possible to judge the presence of switching equipment in a particular segment are determined. A method is proposed that enables through using a set of relational operations, to sequentially refine the network topology until the required accuracy is achieved.Discussion and Conclusions. The results obtained can be used under the administration of large local networks with an extensive structure. The proposed approach allows you to reduce the time required for building a scheme. This is possible due to the automation of the process of obtaining information about devices operating on the network and their mutual location.
APA, Harvard, Vancouver, ISO, and other styles
41

Huening, Felix, Holger Heuermann, Franz-Josef Wache, and Rami Audisho Jajo. "A new wireless sensor interface using dual-mode radio." Journal of Sensors and Sensor Systems 7, no. 2 (September 21, 2018): 507–15. http://dx.doi.org/10.5194/jsss-7-507-2018.

Full text
Abstract:
Abstract. The integration of sensors is one of the major tasks in embedded, control and “internet of things” (IoT) applications. For the integration mainly digital interfaces are used, starting from rather simple pulse-width modulation (PWM) interface to more complex interfaces like CAN (Controller Area Network). Even though these interfaces are tethered by definition, a wireless realization is highly welcome in many applications to reduce cable and connector cost, increase the flexibility and realize new emerging applications like wireless control systems. Currently used wireless solutions like Bluetooth, WirelessHART or IO-Link Wireless use dedicated communication standards and corresponding higher protocol layers to realize the wireless communication. Due to the complexity of the communication and the protocol handling, additional latency and jitter are introduced to the data communication that can meet the requirements for many applications. Even though tunnelling of other bus data like CAN data is generally also possible the latency and jitter prevent the tunnelling from being transparent for the bus system. Therefore a new basic technology based on dual-mode radio is used to realize a wireless communication on the physical layer only, enabling a reliable and real-time data transfer. As this system operates on the physical layer it is independent of any higher layers of the OSI (open systems interconnection) model. Hence it can be used for several different communication systems to replace the tethered physical layer. A prototype is developed and tested for real-time wireless PWM, SENT (single-edge nibble transmission) and CAN data transfer with very low latency and jitter.
APA, Harvard, Vancouver, ISO, and other styles
42

Shibanov, R. E., I. A. Kaysina, A. V. Abilov, and K. E. Korepanov. "Transmission quality evaluation of multistreaming video data from the UAV to the ground station in network simulator 3 simulation environment using WI-FI standards." Vestnik IzhGTU imeni M.T. Kalashnikova 26, no. 1 (April 8, 2023): 91–99. http://dx.doi.org/10.22213/2413-1172-2023-1-91-99.

Full text
Abstract:
The article presents the results of transmitting video data simulation in real time from video cameras on board Unmanned Aerial Vehicles (UAVs) to a ground station (GS). The main purpose of the article was to evaluate the impact of the flying source node number on Quality of Service (QoS) metrics, such as Packet Delivery Ratio and Goodput at OSI model application layer. A scenario was considered when hovering over UAVs, in the zone of reliable communication, transmitted a stream of video data to a ground station, then the distance between the UAV and the GS increased to repeat the experiment. The bitrate was maintained at the same level, close to the bitrate of real high-definition video. The experiment was carried out in the Network Simulator 3 (NS-3) simulation environment for scenarios with one, two, four, and eight source nodes. Simulation results have shown the negative impact of the increasing the number of flying source nodes on Quality of Service (QoS) metrics such as Packet Delivery Rate (PDR) and Goodput. Recommendations regarding the applicability of different standards of the 802.11 family to scenarios for using UAVs in the multistreaming video data transmission mode are given. A change in the relationship of useful throughput on the number of source nodes by 15 % was also found.
APA, Harvard, Vancouver, ISO, and other styles
43

Gadasin, Denis V., and Andrey V. Schvedov. "APPLICATION OF A TRANSPORT TASK FOR LOAD BALANCING IN CONDITIONS OF SOURCE DATA FUZZINESS." T-Comm 18, no. 1 (January 17, 2024): 13–20. http://dx.doi.org/10.36724/2072-8735-2024-18-1-13-20.

Full text
Abstract:
The structure of the ISO/OSI model does not allow choosing the optimal packet transmission route at the channel level and preventing the formation of ring routes. These functions are performed by the network layer. In general, the problem of packet routing is solved by the switch based on the routing algorithm, which contains a hidden "flooding" mechanism. A packet from the sender's switch is sent to all ports, except for the port where the packet was received. When a packet arrives, the switch analyzes the header and if the address in the header matches the address to which the switch belongs, then the packet is accepted. This situation, combined with the unevenness of sending a message, creates an increased load on switching devices at random times and determines the problem of distributing the input data flow in conditions of pulsating traffic. Pulsating traffic can be considered as a fuzziness lying within certain boundaries. To smooth traffic, it is possible to use clusters of switching devices, which in turn are considered as outgoing devices for the next level of clusters. Thus, to distribute the load, it is possible to apply the flow distribution algorithm used in solving the transport problem.
APA, Harvard, Vancouver, ISO, and other styles
44

Alasri, Abbas, and Rossilawati Sulaiman. "Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool." International Journal of Engineering & Technology 7, no. 4.7 (September 27, 2018): 322. http://dx.doi.org/10.14419/ijet.v7i4.7.20570.

Full text
Abstract:
A web service is defined as the method of communication between the web applications and the clients. Web services are very flexible and scalable as they are independent of both the hardware and software infrastructure. The lack of security protection offered by web services creates a gap which attackers can make use of. Web services are offered on the HyperText Transfer Protocol (HTTP) with Simple Object Access Protocol (SOAP) as the underlying infrastructure. Web services rely heavily on the Extended Mark-up Language (XML). Hence, web services are most vulnerable to attacks which use XML as the attack parameter. Recently, a new type of XML-based Denial-of-Service (XDoS) attacks has surfaced, which targets the web services. The purpose of these attacks is to consume the system resources by sending SOAP requests that contain malicious XML content. Unfortunately, these malicious requests go undetected underneath the network or transportation layers of the Transfer Control Protocol/Internet Protocol (TCP/IP), as they appear to be legitimate packets.In this paper, a middleware tool is proposed to provide real time detection and prevention of XDoS and HTTP flooding attacks in web service. This tool focuses on the attacks on the two layers of the Open System Interconnection (OSI) model, which are to detect and prevent XDoS attacks on the application layer and prevent flooding attacks at the Network layer.The rule-based approach is used to classify requests either as normal or malicious,in order to detect the XDoS attacks. The experimental results from the middleware tool have demonstrated that the rule-based technique has efficiently detected and prevented theattacks of XDoS and HTTP flooding attacks such as the oversized payload, coercive parsing and XML external entities close to real-time such as 0.006s over the web services. The middleware tool provides close to 100% service availability to normal request, hence protecting the web service against the attacks of XDoS and distributed XDoS (DXDoS).\
APA, Harvard, Vancouver, ISO, and other styles
45

Snellen, David. "DECnet/OSI (part 2)." International Journal of Network Management 2, no. 1 (March 1992): 18–27. http://dx.doi.org/10.1002/nem.4560020106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Fong, K., and J. Reinstedler. "Development of an OSI application layer protocol interface." ACM SIGCOMM Computer Communication Review 19, no. 3 (July 1989): 21–57. http://dx.doi.org/10.1145/74674.74676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Dudnik, Andriy, Ivan Bakhov, Oleksandr Makhovych, Yulia Ryabokin, and Oleksandr Usachenko. "Models and Methods for Improving Performance of Wireless Computer Networks Based on the Decomposition of Lower Layers of the OSI Reference Model." International Journal of Emerging Technology and Advanced Engineering 12, no. 1 (January 16, 2022): 152–62. http://dx.doi.org/10.46338/ijetae0122_15.

Full text
Abstract:
The paper discusses models and methods for improving the performance of wireless computer networks built based on the decomposition of the lower levels of the OSI reference model. A method to improve the performance of networks is suggested, which functionally combines the physical and network layers, which improves its efficiency in marginal reception areas almost twice. A model of the block diagram of a device for improving data transmission quality in marginal reception areas or those with insufficient noise immunity is developed based on the so-called communication quality status monitoring, as well as a model of the block diagram of a wireless adaptive capacity reallocation router based on dynamic channels capacity reallocation, which allows adequately reallocating IS resources depending on traffic and user priority. Keywords— Bluetooth, FIFO discipline, IEEE 802.11, OSI/ISO reference model, wireless computer networks.
APA, Harvard, Vancouver, ISO, and other styles
48

Snellen, David. "Decnet/osi protocols: The physical, data link and network layers." International Journal of Network Management 1, no. 2 (December 1991): 82–95. http://dx.doi.org/10.1002/nem.4560010205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Yuliia, KOSTIUK, and SHESTAK Yaroslav. "THE TRANSPORT LAYER OF THE ISO/OSI MODEL IN COM­PUTER NETWORKS." INTERNATIONAL SCIENTIFIC-PRACTICAL JOURNAL "COMMODITIES AND MARKETS" 40, no. 4 (December 22, 2021): 49–58. http://dx.doi.org/10.31617/tr.knute.2021(40)05.

Full text
Abstract:
Background. The transport layer is designed to deliver data without errors, losses and duplication in the order in which they were transmitted. It provides data transfer between two applications with the required level of reliability. Transport layer protocols, which guarantee reliable data delivery, establish a virtual connection before data exchange and resend segments in case of loss or damage. The aim of the study was to determine the role of transport security protocols in computer networks. Materials and methods. To achieve the goal, the study used statistical analysis and a systematic approach. Results. TCP provides reliable message transmission through the formation of logical connections, while allowing peers on the sending computer and the receiving computer to support data exchange in duplex mode. It also has the ability to seamlessly send a byte stream generated on one of the computers to any other computer connected to the network.In addition, TCP controls the connection load, UDP does not control anything but the integrity of the received datagrams. Conclusion. The difference between TCP and UDP is the so-called "delivery guarantee". TCP requires a response from the client to whom the data packet is delivered, confirmation of delivery, and for this he needs a pre-established connection. TCP is also considered reliable, unlike UDP, which is called "unreliable datagram protocol". TCP eliminates data loss, duplication and shuffling of packets, delays, UDP allows all this, and it does not need a connection to work., as a result of which the data is transferred on UDP, should manage received, even with losses.
APA, Harvard, Vancouver, ISO, and other styles
50

Tardo, J. "Standardizing cryptographic services at OSI higher layers." IEEE Communications Magazine 23, no. 7 (July 1985): 25–29. http://dx.doi.org/10.1109/mcom.1985.1092610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography