• Title/Summary/Keyword: address

Search Result 7,632, Processing Time 0.033 seconds

A Cluster-based Address Allocation Protocol in MANET Environment (MANET 환경에서 클러스터 기반 주소 할당 프로토콜)

  • Cho, Young-Bok;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.9A
    • /
    • pp.898-904
    • /
    • 2007
  • I must receive node discernment address for communication between node that participate to network in MANETs(Mobile Ad-hoc Networks). Address is created by node confidence or different node. I achieve address redundancy check (Duplicate Address Detection) to examine whether this address is available unique address. However, this method happens problem that MANETs' extensity drops. This paper can manage by group unit binding transfer nodes to group in MANETs. I suggest method that apply special quality of cluster that exchange subordinate decrease and mobility government official of control message are easy in address assignment protocol minimize time required in redundancy check and solves extensity problem. Method that propose in this paper shows excellent performance according to node number increase than wave and MANETConf [2] through simulation.

Design and Implementation of a Home Networking base on IPv6 using telephone number (IPv6 기반 전화번호를 이용한 홈 네트워킹 설계 및 구현)

  • 장영재;나상준;이병호
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.137-140
    • /
    • 2003
  • IPv6 that is next generation internet was appeared because of the shortage of IPv4 address. In present, there has been studying about the home networking which allocates IPv6 address to home appliances. In this paper, It makes 16bits unicast address using remainder 4bits after making 124bits address using 64bits prefix address of IPv6 and 60bits having the form of E.164 proposed RFC2916, IETF and implemented and designed the home networking communicating home appliances having unique unicast address

  • PDF

Adaptive Partition-Based Address Allocation Protocol in Mobile Ad Hoc Networks

  • Kim, Ki-Il;Peng, Bai;Kim, Kyong-Hoon
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.141-147
    • /
    • 2009
  • To initialize and maintain self-organizing networks such as mobile ad hoc networks, address allocation protocol is essentially required. However, centralized approaches that pervasively used in traditional networks are not recommended in this kind of networks since they cannot handle with mobility efficiently. In addition, previous distributed approaches suffer from inefficiency with control overhead caused by duplicated address detection and management of available address pool. In this paper, we propose a new dynamic address allocation scheme, which is based on adaptive partition. An available address is managed in distributed way by multiple agents and partitioned adaptively according to current network environments. Finally, simulation results reveal that a proposed scheme is superior to previous approach in term of address acquisition delay under diverse simulation scenarios.

Trends in Network Address Moving Technology (네트워크 주소 이동 기술 동향)

  • Park, K.M.;Woo, S.;Moon, D.S.;Kim, I.K.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.6
    • /
    • pp.73-82
    • /
    • 2017
  • Moving Target Defense(MTD) is a novel security technology concept in which the IT infrastructure changes its form actively and prevents various types of cyber attacks. Network address moving technology is the field that has been most actively researched in terms of MTD. A number of studies on network address moving published over the last decade have suggested a virtual address-based network address moving technology for efficiency in the implementation. However, virtual address-based network address moving technology has serious vulnerabilities in terms of security and availability. This paper examines the technological characteristics of the existing studies and analyzes their limitations. It suggests security requirements to be considered when designing the network address moving technology through a technological analysis.

Distributed Address Configuration Mechanism Using Address Pool in MANET (MANET 환경에서 주소 영역기반 주소할당 분산기법)

  • Ahn, Sang-Hyun;Lim, Yu-Jin;Yu, Hyun
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.753-760
    • /
    • 2009
  • As it becomes increasingly important that Internet access is available anywhere at any time, providing MANET (Mobile Ad-Hoc Network) with the Internet access attracts more attention. The existing DHCP (Dynamic Host Configuration Protocol) address configuration schemes require message exchanges between MANET nodes and the DHCP server through multi-hop routes. Messages can be easily dropped in the wireless multi-hop communication environment and the address configuration may be instable and need long delay. In this paper, we propose a new address configuration scheme using the concept of address pool allocation. In the proposed scheme, the DHCP server assigns a part of its address pool to a node instead of a single address and the node can assign a part of its own address pool to its neighbor nodes. Through simulation studies, we show that our scheme yields about 77% of the address configuration delay and 61% of the control message overhead of the existing DHCP based mechanism.

A Dynamic Internet Address Model for Providing Customized Information (사용자 맞춤형 정보 제공을 위한 동적 인터넷 주소 모델)

  • Lee, Young Ho;Koo, Yong Wan
    • Journal of Internet Computing and Services
    • /
    • v.17 no.4
    • /
    • pp.27-34
    • /
    • 2016
  • The referents of internet addresses are no longer limited to web sites. A new address service by the international organization for the internet address (ICANN) introduces an open space for the TLD (Top Level Domain) strings so that each service, content, product, and other linguistic expressions may be allowed. The open TLD addresses are more suitable for representing the address of service units, contents, or products. In this paper, as an alternative to static Internet address service to return a consistent mapping result regardless of a user-specific different requirements, we design a dynamic internet address mapping model that returns mapping result to suit user particular requirements. In addition, we propose a method for implementing a internet address service without any changes in the existing domain protocols. It may implement a dynamic internet address by attaching to a encoded user's metadata and environment data within a internet address representation, and adding the module for dynamic mapping to the name servers. Through this proposal, trying to expand the functions of internet address, it is expected to be able to provide customized informaiton retrieval services for each user by using just internet address.

MAC Address Spoofing Attack Detection and Prevention Mechanism with Access Point based IEEE 802.11 Wireless Network (Access Point 기반 무선 네트워크 환경에서의 MAC Address Spoofing 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.85-96
    • /
    • 2008
  • An authentication procedure on wired and wireless network will be done based on the registration and management process storing both the user's IP address and client device's MAC address information. However, existent MAC address registration/administration mechanisms were weak in MAC Spoofing attack as the attacker can change his/her own MAC address to client's MAC address. Therefore, an advanced mechanism should be proposed to protect the MAC address spoofing attack. But, existing techniques sequentially compare a sequence number on packet with previous one to distinguish the alteration and modification of MAC address. However, they are not sufficient to actively detect and protect the wireless MAC spoofing attack. In this paper, both AirSensor and AP are used in wireless network for collecting the MAC address on wireless packets. And then proposed module is used for detecting and protecting MAC spoofing attack in real time based on MAC Address Lookup table. The proposed mechanism provides enhanced detection/protection performance and it also provides a real time correspondence mechanism on wireless MAC spoofing attack with minimum delay.

  • PDF

A Duplicate Address Resolution Protocol in Mobile Ad Hoc Networks

  • Lin Chunhung Richard;Wang Guo-Yuan Mikko
    • Journal of Communications and Networks
    • /
    • v.7 no.4
    • /
    • pp.525-536
    • /
    • 2005
  • In an IP-based network, automated dynamic assignment of IP addresses is preferable. In most wired networks, a node relies on a centralized server by using dynamic host configuration protocol (DHCP) to obtain a dynamic IP address. However, the DHCP­based approach cannot be employed in a mobile ad hoc network (MANET) due to the uncertainty of any centralized DHCP server. That is, a MANET may become partitioned due to host mobility. Therefore, there is no guarantee to access a DHCP server. A general approach to address this issue is to allow a mobile host to pick a tentative address randomly, and then use duplicate address resolution (DAR) protocol to resolve any duplicate addresses. In this paper, an innovative distributed dynamic host configuration protocol designed to configure nodes in MANET is presented. The proposed protocol not only can detect the duplicate address, but also can resolve the problem caused by duplicate address. It shows that the proposed protocol works correctly and is more universal than earlier approaches. An enhanced version of DAR scheme is also proposed in this paper to solve the situation of duplicate MAC address. The new and innovative approach proposed in this paper can make the nodes in MANET provide services to other networks and avoid packets from being delivered to incorrect destinations.

A New Driving Method for Gray-scale Expression in an AC Plasma Display Panel (교류형 플라즈마 디스플레이 패널에서 계조표현을 위한 새로운 구동방식)

  • 김재성;황현태;서정현;이석현
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.53 no.8
    • /
    • pp.407-414
    • /
    • 2004
  • In this paper, a new gray scale expression method that divides the scan lines into multiple blocks is suggested. The proposed method can drive 16 sub-fields per 1 TV field in the panel with XGA ($1366{\times}768$) resolution. The on and off states of even subfields depend on the condition of odd subfields. The write address mode is used in the odd subfields, while the erase address mode is used in the even subfields. Because the ramp reset pulse is applied every 2 sub-fields, both the contrast ratio and the dynamic voltage margin are sufficiently obtained in comparison with previous AWD (Address While Display) methods. In realizing 16 subfields, shortening the scan time in the erase address period was important. The X bias voltage in the erase address period affected the minimum address voltage but did not the delay time of the address discharge. The delay time of the address discharge was affected by the address voltage and the time interval between the last sustain discharge and the scanning time. We also evaluated the dynamic false contour. New method shows an improved image quality in horizontal moving, but discontinuous lines were observed at the boundaries of each block in vertical moving

A Study of an NAT Protocol using Virtual IP Information in the TCP Segment (TCP 세그멘트내의 가상 IP 정보를 이용하는 NAT 프로토콜에 대한 연구)

  • Hwang, Jae-Yong;Ju, Gi-Ho
    • The Journal of Engineering Research
    • /
    • v.5 no.1
    • /
    • pp.45-55
    • /
    • 2004
  • NAT (Network Address Translation) is an IP address modification protocol that translates private IP address into authentic Internet address. The main features of NAT are to improve network security and to save IP address. Generally speaking, in order to perform its functionality, NAT uses the address information in the packet header. Certain application protocols, however, use the information in the packet data as well as the information in the packet header to perform end-to-end communication. Therefore, to support these types of application protocols, NAT should be able to perform appropriate translation of protocol information in the packet data. In this thesis, we design and implement a method which translates virtual IP information in the packet date into real IP information by using port proxy server.

  • PDF