• Title/Summary/Keyword: IP Address Management

Search Result 95, Processing Time 0.024 seconds

Load Balancing and Interference Delay Aware Routing in IoT Aware Wireless Mesh Networks

  • Jilong Li;Murad Khan;Byeongjik Lee;Kijun Han
    • Journal of Internet Technology
    • /
    • v.20 no.1
    • /
    • pp.293-300
    • /
    • 2019
  • The Internet of Things (IoT) enables embedded devices to connect to the internet either through IP or the web in a physical environment. The increase in performance of wireless access services, adaptive load balancing, and interference routing metric becomes the key challenges in Wireless Mesh Networks (WMN). However, in the case of IoT over WMN, a large number of users generate abundant net flows, which can result in network traffic jam. Therefore, in this paper, we propose a Load Balancing and Interference Delay Aware routing metric algorithm to efficiently address the issues present in the current work. The proposed scheme efficiently utilizes the available mesh station queue information and the number of mesh stations suffering from channel interference in the available path. The simulations results show that the proposed scheme performed superior to the existing routing metrics present in the current literature for similar purposes.

Hybrid Hierarchical Architecture for Mobility Management in Mobile Content Centric Networking (이동 콘텐트 중심 네트워킹 구조에서의 하이브리드 계층적 이동성 관리 방안)

  • Lee, Ji-hoon
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.1147-1151
    • /
    • 2018
  • As personal users create and share lots of contents at any time and any places, new networking architecture such as content centric networking (CCN) has emerged. CCN utilizes content name as a packet identifier, not address. However, current CCN has a limitation for content source mobility management. The movement of content sources cause long delivery latency and long service disruption. To solve that, a hierarchical mobility management was was proposed. However, the hierarchical mobility management scheme has still the loss of interest packets and long handoff latency. So, this paper presents the hybrid hierarchical mobility management in mobile CCN environements to reduce both the loss rate of interest packets and the handoff latency. It is shown from the performance evaluations shows that the proposed scheme provides low loss rate of control message.

Research on the Identification of Network Access Type of End-Hosts for Effective Network Management (효율적인 네트워크 자원 관리를 위한 호스트의 접속 유형 판별에 관한 연구)

  • Hur, Min;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.965-974
    • /
    • 2012
  • As the use of smart devices has become popular, the number of smart devices connected to network has increased and the amount of traffic from them has grown rapidly. The management of mobile traffic and IP address for smart devices in an enterprise network is crucial problem for efficient operation of network. The information about connection type of a terminal host to the network will be very useful for stable and efficient management of an enterprise network. Also, this information might be used to identify NAT device. In this paper, we propose a methodology to identify the connection type of a terminal host using RTT (Round-Trip-Time) value extracted from captured packets. We prove the feasibility of our proposed method in a target campus network.

Enhancing the Session Security of Zen Cart based on HMAC-SHA256

  • Lin, Lihui;Chen, Kaizhi;Zhong, Shangping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.466-483
    • /
    • 2017
  • Zen Cart is an open-source online store management system. It is used all over the world because of its stability and safety. Today, Zen Cart's session security mechanism is mainly used to verify user agents and check IP addresses. However, the security in verifying the user agent is lower and checking the IP address can affect the user's experience. This paper, which is based on the idea of session protection as proposed by Ben Adida, takes advantage of the HTML5's sessionStorage property to store the shared keys that are used in HMAC-SHA256 encryption. Moreover, the request path, current timestamp, and parameter are encrypted by using HMAC-SHA256 in the client. The client then submits the result to the web server as per request. Finally, the web server recalculates the HMAC-SHA256 value to validate the request by comparing it with the submitted value. In this way, the Zen Cart's open-source system is reinforced. Owing to the security and integrity of the HMAC-SHA256 algorithm, it can effectively protect the session security. Analysis and experimental results show that this mechanism can effectively protect the session security of Zen Cart without affecting the original performance.

Network Security Situational Awareness using Traffic Pattern-Map (트래픽 패턴-맵을 이용한 네트워크 보안 상황 인지 기술)

  • Chang Beom-Hwan;Na Jung-Chan;Jang Jong-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.3
    • /
    • pp.34-39
    • /
    • 2006
  • This paper introduces a network security situation awareness tool using a traffic pattern map which facilitates recognizing a current network status by extracting and analyzing predetermined traffic features and displaying an abnormal or harmful traffic which deteriorates network performance. The traffic pattern-map consists of $26{\times}26$ intersections, on which the occupancy rate of the port having maximum occupancy is displayed as a bar graph. In general, in case of the Internet worm, the source address section on the traffic pattern map is activated. In case of DDoS the destination address section is activated.

  • PDF

An Implementation of IPv6 PIM-SSM in Linux Systems

  • Jeong Sang Jin;Kim Hyoung Jun
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.558-561
    • /
    • 2004
  • Currently, most IP multicasting applications are implemented based on Any-Source Multicast (ASM) model that supports many to many multicast services. However, it is known that current ASM-based multicast architecture has several deployment problems such as address allocation, lack of access control, and inefficient handling of well-known multicast sources. Source-Specific Multicast (SSM) working group in IETF proposed SSM architecture to overcome the weaknesses of ASM architecture. The architecture of SSM is based on one to many multicast services. Also, in order to provide SSM service, Multicast Listener Discovery Version 2 (MLDv2) protocol should be supported. In this paper, we introduce the architecture of SSM protocol and multicast group management protocol. After that, we present the architecture and implementation of IPv6 SSM and MLDv2 protocols in Linux systems.

  • PDF

A Content-Name Encoding Scheme for CCN (콘텐츠 중심 네트워킹의 콘텐츠 이름 인코딩 기법)

  • Kim, DaeYoub
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.6
    • /
    • pp.697-705
    • /
    • 2014
  • For enhancing network efficiency, content-centric networking (CCN) allows network nodes to temporally cache a transmitted response message(Data) and then to directly respond to a request message (Interest) for previously cached contents. Also, CCN is designed to utilize a hierarchical content-name for transmitting Interest/Data instead of a host identity like IP address. This content-name included in Interest/Data reveals both content information itself and the structure of network domain of a content source which is needed for transmitting Interest/Data. To make matters worse, This content-name is human-readable like URL. Hence, through analyzing the content-name in Interest/Data, it is possible to analyze the creator of the requested contents. Also, hosts around the requester can analyze contents which are asked by the requester. Hence, for securely implementing CCN, it is essentially needed to make the content-name illegible. In this paper, we propose content-name encoding schemes for CCN so as to make the content-name illegible and evaluate the performance of our proposal.

A Study on the Development of Hard Disk Recoder and Remote Control Using Embedded Linux (임베디드 리눅스를 이용한 하드디스크 레코더 및 원격 제어 구현에 관한 연구)

  • Park, Seung-Ho;Lee, Jong-Su
    • Proceedings of the KIEE Conference
    • /
    • 2004.07d
    • /
    • pp.2429-2431
    • /
    • 2004
  • In this paper, we have designed a remote controlable HDR System using all embedded linux board. The system is composed of three parts - a HDR System, a PC client program for remote control and a Nameserver for registering and aquisition of the IP address. The system is built in an embedded board using a linux kernel. With the Linux the system can support networking and file system for a hard disk management In addition, the system embeds a web-server and a ftp-server for remote manipulation and file transfer. And the hardwares of the system are controlled by the linux device driver mechanism. MPEG1/2 technique is used to compress TV tuner signal and external analog video/audio signal. And compressed data is stored in a hard disk. The data stored in the system is accesable through lan or internet. And RTP protocol is used to enable the system to service live stream of instant video/audio input.

  • PDF

Design of an Intrusion Detection System for Defense in Depth (계층적 방어를 위한 침입탐지 시스템 설계)

  • Koo, Min-Jeong;Han, Woo-Chul;Chang, Young-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.525-526
    • /
    • 2010
  • 2000년 대규모 DDoS 공격이래, 2009년 7월 7일 국가주요정부기관 및 인터넷 포털, 금융권 등의 웹사이트 대상으로 1차, 2차, 3차로 나누어 대규모 사이버 공격이 발생하였다. 지속적으로 발전되는 행태를 보이고 DDoS 공격에 대해 본 논문에서는 계층적인 침입탐지시스템을 설계하였다. 네트워크 패킷을 분석하기 위해 e-Watch, NetworkMiner등의 패킷, 프로토콜 분석도구를 이용하여 TCP/IP의 Layer별 공격을 분석한 후 패킷의 유입량, 로그정보, 접속정보, Port, Address 정보를 분석하고 계층침입에 대한 방어를 수행하도록 설계하였다. 본 논문은 DDoS(Distributed Denial of Service)에 대한 패킷 전송에 대해 계층적인 방어를 통해 보다 안정적인 패킷수신이 이루어진다.

  • PDF

A Study on the Design of Addressing in Defense Computer Network (국방전산망의 주소지정방식 설계에 관한 연구)

  • Park Jong-Tae;Kim Hwa-Su;Ra Yong-Su
    • Journal of the military operations research society of Korea
    • /
    • v.18 no.2
    • /
    • pp.44-55
    • /
    • 1992
  • According to the plan on Defense Computer Network, hundreds of troops and ten thousands of end users will be joined in the Defense Computer Networn the near future. Thus, we need hierarchical addressing methods between source station and destination station in order to send a message efficiently. On the basis of the above background, we proposed the addressing methods for both TCP/IP environment which is a current standard protocol and OSI environment which will be a future protocol in this paper. The network interface. routings and address management have considered in our proposed addressing methods.

  • PDF