60 results on '"Address pool"'
Search Results
2. Towards Enhancing the Endpoint Security using Moving Target Defense (Shuffle-based Approach) in Software Defined Networking
- Author
-
M. U. Farooq, M. F. Hyder, W. Raza, U. Ahmed, and Waseemullah
- Subjects
Flexibility (engineering) ,Spoofing attack ,Address pool ,business.industry ,Computer science ,Virtual IP address ,virtual IP ,Information technology ,Endpoint security ,Engineering (General). Civil engineering (General) ,T58.5-58.64 ,Information sensitivity ,IP shuffling ,software defined networking ,T1-995 ,endpoint security ,TA1-2040 ,business ,Software-defined networking ,moving target defense ,Host (network) ,Technology (General) ,Computer network - Abstract
Static IP addresses make the network vulnerable to different attacks and once the machines are compromised, any sensitive information within the network can be spoofed. Moving Target Defense (MTD) provides an efficient mechanism for proactive security by constantly changing different system attributes. Software Defined Networks (SDNs) provide greater flexibility in designing security solutions due to their centralized management and programming capabilities. In this paper, a mechanism for the protection of endpoint security is developed using IP address host shuffling. In the proposed approach, the real IP address of the host is masked and a virtual IP address is assigned. The virtual IPs are mined from the pool of unassigned IP addresses. The address pool is created using a pseudo-random number generator to guarantee high randomness. This approach helps in invalidating the intelligence gathered by the adversaries through the changes in the network configuration that will disturb attack execution, eventually leading to attack failure. Transparency is attained via preserving the actual IP intact and mapping a virtual IP to it. The proposed solution is implemented using the RYU Controller and Mininet. The efficient results obtained from the experiments substantiate the effectiveness of the MTD approach for enhancing endpoint security.
- Published
- 2021
- Full Text
- View/download PDF
3. survey on the performance analysis of IPv6 transition technologies
- Author
-
Gábor Lencse and Ahmed Taha Hammo Al-hamadani
- Subjects
Technology ,IPv4 address exhaustion ,Address pool ,computer.internet_protocol ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,ipv6 transition technologies ,464xlat ,dual stack ,tunneling ,map-t/e ,Building and Construction ,Benchmarking ,Service provider ,IPv4 ,IPv6 ,Risk analysis (engineering) ,Software deployment ,Packet loss ,computer - Abstract
As the public IPv4 address space has already been depleted, the full deployment of IPv6 became indispensable, especially for service providers, as it offers a sufficient address pool. However, the ongoing IPv6 transition seems to be a lengthy task because of the numerous challenges it faces. Therefore, it is expected that IPv4 and IPv6 will coexist for a long time. Consequently, many transition technologies have been developed for this purpose. Several research papers have conducted performance analysis for a number of these transition technologies and even compared them based on some measuring metrics like RTT, throughput, jitter, packet loss, and so on. This paper reviews the results of these papers, discusses their findings, and gives some guidelines fora feasible benchmarking methodology.
- Published
- 2021
- Full Text
- View/download PDF
4. Squeezing the Gap: An Empirical Study on DHCP Performance in a Large-Scale Wireless Network
- Author
-
Weizhen Dang, Jinzhe Shan, Jilong Wang, Fenghua Li, Jessie Hui Wang, Jing'an Xue, and Haibo Wang
- Subjects
Authentication ,Address pool ,Dynamic Host Configuration Protocol ,Computer Networks and Communications ,Computer science ,Wireless network ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,02 engineering and technology ,Computer Science Applications ,Empirical research ,Server ,0202 electrical engineering, electronic engineering, information engineering ,The Internet ,Electrical and Electronic Engineering ,business ,Software ,Computer network - Abstract
Dynamic Host Configuration Protocol (DHCP) is widely used to dynamically assign IP addresses to users. However, due to little knowledge on the behavior and performance of DHCP, it is challenging to configure lease time and divide IP addresses for address pools properly in large-scale wireless networks. In this paper, we conduct the largest known measurement on the behavior and performance of DHCP in the wireless network of T University (TWLAN). We find the performance of DHCP is far from satisfactory: (1) The non-authenticated devices lead to a waste of 25% of addresses at the rush hour. (2) Address pool utilization varies greatly under the current address division strategy. (3) A device does not generate traffic for 67% of the lease time on average. Meanwhile, we observe devices of different locations and operating systems show diverse online patterns. A unified lease time setting could result in an inefficient usage of addresses. To address the problems, taking account of authentication information and online patterns, we propose a new leasing strategy. The results show it outperforms three state-of-the-art baselines and reduces the number of assigned addresses by 24% and the average total lease time by 17% without significantly increasing the DHCP server load. Besides, we further propose an adaptive address division strategy to balance the address utilization of pools, which can be deployed in parallel with the new leasing strategy and reduce the risk of address exhaustion.
- Published
- 2020
- Full Text
- View/download PDF
5. Analysis of Route Announcements of Unassigned IP Addresses
- Author
-
Akira Shibuya, Masato Uchida, Masayuki Okada, and Kentaro Goto
- Subjects
Address pool ,SIMPLE (military communications protocol) ,business.industry ,Computer science ,The Internet ,business ,Computer security ,computer.software_genre ,computer - Abstract
It is known that some of the unassigned IP addresses are announced as legitimate routes, even though they are never assigned to any end-user. The reason for this is that the current routing system of the Internet with BGP allows unassigned IP addresses to be announced as well. On the other hand, actual situation is still unclear and there is no solid method for such an investigation. Thus, we conducted the very first investigation in Japan and proposed a simple and effective method. In our proposed method, we compare the address pool delegated to Japan and the actual route information that is available online. As a result, we have revealed that some unassigned IP addresses had been announced from both within Japan and overseas for several years because of human-setting-error. These problems affect not only registries, ISPs or carriers but also general end-users as well.
- Published
- 2021
- Full Text
- View/download PDF
6. Research on NAT Traversal Communication based on MQTT
- Author
-
Fengjie Wu, Yisheng Tang, Weijian Mai, and Zuolian Liu
- Subjects
MQTT ,Network architecture ,Address pool ,business.industry ,Computer science ,computer.internet_protocol ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,05 social sciences ,050801 communication & media studies ,IPv4 ,IPv6 ,NAT traversal ,0508 media and communications ,0502 economics and business ,050211 marketing ,The Internet ,business ,computer ,Computer network - Abstract
With the increasing numbers of clients connected to the Internet, the IPv4 address pool is nearly saturated. The industry introduces solutions of using IPv4/IPv6 dual-stack connection or NAT to mitigate the saturation. Nevertheless, these resolutions either create security issues or compromise the end-to-end communication ability. Our paper conducts research on end-to-end communication under NAT based on the MQTT protocol by subscribing and publishing messages to a particular topic. We propose a network architecture that utilizes a broker to relay the client's and the server's message, design the software implementation, and attach a sequence number into the payload of messages to resolve the shifting in MQTT's asynchronous transmission. We also evaluate the MQTT protocol's performance in variant QoS settings compared with widely used HTTP and analyze the network traffic using Wireshark, demonstrating that MQTT outperforms HTTP in 4G cellular networks. However, the developer should be aware of the lack of mature frameworks such as Django, and further research needs to be conducted.
- Published
- 2021
- Full Text
- View/download PDF
7. Research on Fast Quering Approach of User Demand Response Resource in Large Scale Resource Address Pool
- Author
-
Yuan Jindou, Chen Songsong, Xie Zhihan, Chen Tieyi, Liu Kai, and Xue Li
- Subjects
Demand response ,Load management ,Electric power system ,Resource (project management) ,Address pool ,Computer science ,business.industry ,Peaking power plant ,Electricity ,Environmental economics ,Grid ,business - Abstract
At present, the research of power system demand response mainly tends to the research of ‘peak shaving and valley filling’, that is, under the premise that some loads on the user side are interruptible or transferable loads, the grid can mobilize the enthusiasm of users directly or indirectly through effective economic or technical means to achieve peak shaving and valley filling. The power grid guides the users to use electricity orderly by means of electric charge compensation, differential electricity price, time of use price and other incentive measures, that is, the power market can reduce the peak valley difference of power grid, reduce the loss of power grid and load impact, and ensure the reliable operation of the power grid. In this paper, according to the research status of demand response, combined with the requirements of the demand response system, the multi user demand response resource address pool is studied and designed. Based on the resource address pool, the rapid query under the demand response demand can be realized.
- Published
- 2020
- Full Text
- View/download PDF
8. A Distributed Autonomous Organization for Internet Address Management
- Author
-
Marcelo Bagnulo, Zhiwei Yan, Bingyang Liu, Stefano Angieri, Chuang Wang, Alberto García-Martínez, and Ministerio de Economía y Competitividad (España)
- Subjects
Internet ,Telecomunicaciones ,Address pool ,business.industry ,Computer science ,Strategy and Management ,05 social sciences ,Cryptography ,Network security ,Computer security ,computer.software_genre ,IP networks ,Intervention (law) ,Routing protocols ,Order (exchange) ,Currency ,Overhead (business) ,0502 economics and business ,The Internet ,Resource management ,Electrical and Electronic Engineering ,business ,computer ,050203 business & management - Abstract
The current system to manage the global pool of IP addresses is centralized in five transnational organizations, known as regional internet registries (RIRs). Each of them manages the address pool for many countries. In this paper, we present InBlock, a distributed autonomous organization that provides the decentralized management of IP addresses. The InBlock also fulfills the same objectives as those fulfilled by the current IP address allocation organizations, i.e., uniqueness, fairness, conservation, aggregation, registration, and minimized overhead. The InBlock is implemented as a set of blockchain's smart contracts in Ethereum, and it implements all the functions needed for the management of a global pool of addresses without any human intervention. Any entity may request an allocation of addresses to the InBlock registry by performing a (crypto)currency transfer to the InBlock. The fee required, along with the annual renewal fee, serves as a mechanism to deter stockpiling and other wasteful practices. As with any novel technology, there are many open questions about the usage of blockchains to build an IP address registry. For this reason, we believe that practical experimentation is required in order to have hands-on experience, so we propose to conduct an experiment on the InBlock as a starting point to inform about the future directions in this space. This work was supported by Huawei through the InBlock HIRP prize and by the Spanish Ministry of Economy and Competitiveness through the 5G-City project (TEC2016-76795-C6-3-R).
- Published
- 2020
9. Dynamic Control Method of Explicit Address Mapping Table in IPv6 Single-Stack Network
- Author
-
Osamu Nakamura and Yasunobu Toyota
- Subjects
Hardware_MEMORYSTRUCTURES ,Address pool ,business.industry ,Computer science ,computer.internet_protocol ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Internet traffic ,IPv4 ,Network operations center ,IPv6 ,Network planning and design ,0203 mechanical engineering ,IPv6 transition mechanism ,0202 electrical engineering, electronic engineering, information engineering ,The Internet ,business ,computer ,Computer network - Abstract
In recent years, Internet Data Center (IDC) network operation with IPv6 single-stack gathers attention because of IPv4 address pool exhaustion and the high operational load associated with IPv4/IPv6 dual-stack. Since IPv4 traffic still accounts for a large percentage of the total Internet traffic, it is necessary to provide IPv4 services even in IPv6 single-stack networks. A method of providing IPv4 accessibility in an IPv6 single-stack network is known as IPv4 as a Service (IPv4aaS); there are three possible approaches. This research proves that IPv4/IPv6 translation is the most compatible and effective for IDC network operations. The SIIT-DC network design has been standardized as a way to provide IPv4 services with IPv4 / IPv6 Translation. In SIIT-DC, a translation node referred to as Border Relay (BR) is connected between the IPv4 Internet and an IPv6 IDC network in order to translate IPv4 and IPv6 mutually (in order to enable IPv4 service provision in IPv6 server). However, to operate an SIIT-DC network without the lack of redundancy and operational load spikes in multi-homing networks, the Explicit Address Mapping Table (EAMT) must be shared dynamically and consistently with BRs. This paper compares approaches to control EAMT dynamically in SIIT-DC environment and clarifies the benefits and drawbacks of each. The results are expected to contribute to the design of IPv6 single-stack networks in IDC.
- Published
- 2020
- Full Text
- View/download PDF
10. A survey: Reward distribution mechanisms and withholding attacks in Bitcoin pool mining
- Author
-
Wei Li, Zhipeng Cai, Saide Zhu, Chunqiang Hu, and Hong Li
- Subjects
Address pool ,business.industry ,Computer science ,Stochastic game ,Distribution (economics) ,Variance (accounting) ,Computer security ,computer.software_genre ,Theoretical Computer Science ,Computational Mathematics ,Computational Theory and Mathematics ,Artificial Intelligence ,business ,computer - Abstract
The past three years have seen the rapid increase of Bitcoin difficulty, which has led to a substantial variance in solo mining. As a result, miners tend to join a large open pool to get a more stable reward. Nowadays, mining pools take up over 98% of Bitcoins total computation power. In a sense, this is a manifestation of Bitcoin that tends to be centralized. Thus, researchers have shown an increased interest in pool mining payoff and security. The purpose of this paper is to review and summarize recent research in Bitcoin pool mining system. We first introduce several common reward distribution schemes, and analyze their advantages and disadvantages with some improvement mechanisms; In the second section, to address pool security problems, we examined the practical utility of some existing and potential attack strategies. To study those malicious attack in details, several defense methods are collected. Finally, we make an outlook on Bitcoin future.
- Published
- 2018
- Full Text
- View/download PDF
11. Secure Consensus Generation with Distributed DoH
- Author
-
Haya Shulman, Philipp Jeitner, and Michael Waidner
- Subjects
Computer Science - Networking and Internet Architecture ,Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science - Cryptography and Security ,Work (electrical) ,Address pool ,business.industry ,Computer science ,Server ,business ,Cryptography and Security (cs.CR) ,Computer network - Abstract
Many applications and protocols depend on the ability to generate a pool of servers to conduct majority-based consensus mechanisms and often this is done by doing plain DNS queries. A recent off-path attack [1] against NTP and security enhanced NTP with Chronos [2] showed that relying on DNS for generating the pool of NTP servers introduces a weak link. In this work, we propose a secure, backward-compatible address pool generation method using distributed DNS-over-HTTPS (DoH) resolvers which is aimed to prevent such attacks against server pool generation.
- Published
- 2020
- Full Text
- View/download PDF
12. Predict and Write: Using K-Means Clustering to Extend the Lifetime of NVM Storage
- Author
-
Faisal Nawab, Heiner Litz, and Saeed Kargar
- Subjects
B.7.1 ,I.2 ,FOS: Computer and information sciences ,Computer Science - Machine Learning ,Address pool ,Indirection ,Computer science ,H.2.4 ,k-means clustering ,Databases (cs.DB) ,02 engineering and technology ,Machine Learning (cs.LG) ,Non-volatile memory ,Information engineering ,Computer engineering ,Computer Science - Databases ,020204 information systems ,Hardware Architecture (cs.AR) ,0202 electrical engineering, electronic engineering, information engineering ,State (computer science) ,Cache ,Cluster analysis ,Computer Science - Hardware Architecture - Abstract
Non-volatile memory (NVM) technologies suffer from limited write endurance. To address this challenge, we propose Predict and Write (PNW), a K/V-store that uses a clustering-based machine learning approach to extend the lifetime of NVMs. PNW decreases the number of bit flips for PUT/UPDATE operations by determining the best memory location an updated value should be written to. PNW leverages the indirection level of K/V-stores to freely choose the target memory location for any given write based on its value. PNW organizes NVM addresses in a dynamic address pool clustered by the similarity of the data values they refer to. We show that, by choosing the right target memory location for a given PUT/UPDATE operation, the number of total bit flips and cache lines can be reduced by up to 85% and 56% over the state of the art., Comment: ICDE2021
- Published
- 2020
- Full Text
- View/download PDF
13. Countermeasure Method Against Unauthorized and Anonymous Information System Data Collection
- Author
-
Aleksandr A. Rudkovskiy, Vladimir E. Khitsenko, and Evgeny A. Basinya
- Subjects
Address pool ,Network security ,business.industry ,Computer science ,Overlay network ,Computer security ,computer.software_genre ,Identification (information) ,Network address ,Information system ,business ,computer ,Countermeasure (computer) ,Vulnerability (computing) - Abstract
In this paper, we describe the problematics of the network security in corporate networks. We study the vulnerability of existing information system to unauthorized identification and analysis of the object's properties. We consider one of the professional hacking strategies performed during the stage of gathering information about the target system using anonymization technology (protected virtual channels, overlay technology and networks). We propose an original countermeasure method against such unauthorized analysis. The scientific novelty of the work is identifying and profiling the intruders who use anonymization technology for malicious activity by compiling attack vectors based on a number of parameters: anonymization network type, network address space, networks address pool exhaustion level, passive or active scanning type (scanning, probing), progress of the scan, correlation of parameters due to artificial delays and other factors. This approach is combined with the author's operating system and services falsification method that can work with various services for different hackers. This allows to successfully misinform and profile the attacker at the first stage of the cyberattack, then falsificate the object of the attack and redirect the attacker to the created trap-object. The software implementation of the author's method was successfully experimentally investigated and tested. The target area of application are server solutions that operate based on the TCP/IP Protocol stack
- Published
- 2019
- Full Text
- View/download PDF
14. A SDN-Based Hierarchical Authentication Mechanism for IPv6 Address
- Author
-
Xiao Liang and Heyao Chen
- Subjects
050101 languages & linguistics ,Authentication ,Access network ,IPv6 address ,Address pool ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,05 social sciences ,02 engineering and technology ,Encryption ,IPv6 ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,Security management ,business ,Software-defined networking ,Computer network - Abstract
The emergence of IPv6 protocol extends the address pool, but it also exposes all the Internet-connected devices to danger. Currently, there are some traditional schemes on security management of network addresses, such as prevention, traceability and encryption authentication, but few studies work on IPv6 protocol. In this paper, we propose a hierarchical authentication mechanism for the IPv6 source address with the technology of software defined network (SDN). This mechanism combines the authentication of three parts, namely the access network, the intra-domain and the inter-domain. And it can provide a fine-grained security protection for the devices using IPv6 addresses.
- Published
- 2019
- Full Text
- View/download PDF
15. IPv6 QoS for Multimedia Applications
- Author
-
Muhammad Hasanain Chaudary, Muhammad Naveed, Farooq Haider, and Muhammad Asif
- Subjects
Integrated services ,Multimedia ,Address pool ,computer.internet_protocol ,Computer science ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Throughput ,computer.software_genre ,IPv4 ,IPv6 ,law.invention ,law ,Packet loss ,Internet Protocol ,computer - Abstract
Since the last decade, we have seen a swift formation of real-time applications on the web and numerous exploration regarding Quality of Service (QoS) [1] in mainly IPv4 (Internet Protocol version 4). In IPv4 the address pool has to turn out to be exhausted gradually. As the current development of Internet Protocol (IP) goes on, the placement of IPv6 QoS is proceeding. In IPv4 QoS solutions, DiffServ is the finest method to meet QoS needs for real-time applications. The aim of this research project is to assess the IPv4/IPv6 QoS performance for real-time multimedia applications like streaming of videos which drives over DiffServ in IPv4/IPv6 networks. In this paper, we also studied the Assured Forwarding (AF), Expedited Forwarding (EF), Traffic aggregation and the outcome of multiple performance parameters such as throughput packet loss, end-to-end delay, and variation in delay. Using different tools and techniques, we measured and analyzed DiffServ integration in IPv4/IPv6 network the research project shows that, IPV6 abilities against IPV4 and give confidence to ISP's to deploy IPv6 to provide their customer quality of services support.
- Published
- 2019
- Full Text
- View/download PDF
16. Performance analysis and comparison of four DNS64 implementations under different free operating systems
- Author
-
Gábor Lencse and Sandor Repas
- Subjects
Hardware architecture ,Address pool ,Computer science ,business.industry ,computer.internet_protocol ,05 social sciences ,Response time ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,NAT64 ,IPv6 deployment ,IPv4 ,IPv6 ,Embedded system ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,Operating system ,The Internet ,Electrical and Electronic Engineering ,business ,computer ,050203 business & management - Abstract
The depletion of the global IPv4 address pool made the deployment of IPv6, the new version of the Internet Protocol, inevitable. In this paper, the transition mechanisms for the first phase of IPv6 deployment are surveyed and the DNS64 plus NAT64 solution is found appropriate. The most important free and open source DNS64 implementations are selected: BIND, TOTD, Unbound and PowerDNS. The test environment and the testing method are described. The first three of the selected DNS64 implementations are tested under Linux, OpenBSD and FreeBSD whereas PowerDNS is tested only under Linux. Their performance characteristics (response time, number of answered requests per second, CPU and memory consumption) are measured and compared. The effect of the hardware architecture of the test computer is also examined by using single-core, dual-core and quad-core test computers. The stability of all the tested DNS64 solutions are analyzed under overload conditions to test if they may be used in production environments with strong response time requirements. Our measurement results show significant differences in the performance of the tested DNS64 implementations, e.g. Unbound served four times more requests per second than PowerDNS (when executed by a single-core CPU under Linux and load was generated by eight clients). However, no absolute order can be determined, because it is influenced by different factors such as the architecture of the hardware, especially the number of cores, because BIND and PowerDNS are multithreaded (therefore they can profit from the multiple cores) but TOTD and Unbound are not. Also the operating system of the DNS64 server has significant influence on the performance of the DNS64 implementations under certain conditions. All the details of our measurements are disclosed and all the results are presented in the paper. An easy-to-use implementation selection guide is also provided as a short summary of our high number of results.
- Published
- 2016
- Full Text
- View/download PDF
17. Inferring Carrier-Grade NAT Deployment in the Wild
- Author
-
Ioana Livadariu, Amogh Dhamdhere, Alberto Dainotti, Karyn Benson, and Ahmed Elmokashfi
- Subjects
Address pool ,computer.internet_protocol ,business.industry ,Computer science ,Network telescope ,Autonomous system (Internet) ,020206 networking & telecommunications ,02 engineering and technology ,Carrier-grade NAT ,IPv4 ,IPv6 ,Software deployment ,Server ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,The Internet ,business ,computer ,Computer network - Abstract
Given the increasing scarcity of IPv4 addresses, network operators are resorting to measures to expand their address pool or prolong the life of existing addresses. One such approach is Carrier-Grade NAT (CGN), where many end-users in a network share a single public IPv4 address. There is limited data about the prevalence of CGN, despite the implications on performance, security, and ultimately, the adoption of IPv6. In this work, we present passive measurement-based techniques for detecting CGN deployments across the entire Internet, without the requirement of access to machines behind a CGN. Specifically, we identify patterns in how client IP addresses are observed at M-Lab servers and at the UCSD network telescope to infer whether those clients are behind a CGN. We apply our methods on data collected from 2014 to 2016. We find that CGN deployment is increasing rapidly. Overall, we infer that 4.1K autonomous systems are deploying CGN, 6 times the number inferred by the most recent studies.
- Published
- 2018
- Full Text
- View/download PDF
18. Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET
- Author
-
Mohsin Hassan Magray, Suhail Ahmad, and Wajid Ali Hamdani
- Subjects
Address pool ,Computer science ,computer.internet_protocol ,business.industry ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Network engineering ,Multiprotocol Label Switching ,Traffic flow ,IPv4 ,law.invention ,IPv6 ,Traffic flow (computer networking) ,Differentiated services ,Traffic engineering ,law ,Label switching ,Next-generation network ,Internet Protocol ,The Internet ,business ,computer ,Computer network - Abstract
Over the last two decades, we have witnessed a rapid deployment of real-time applications on the Internet and many research works focus on Quality of Service (QoS), in particular using IPv4 (Internet Protocol Version 4). The inevitable exhaustion of the remaining IPv4 address pool has become progressively evident and as a result the evolution of Internet Protocol (IP) continues leading to the deployment of IPv6 QoS. Today, there is limited experience in the deployment of QoS for IPv6 traffic in MPLS backbone networks in conjunction with DiffServ (Differentiated Services) support. DiffServ itself does not have the ability to control the traffic flow whereas MPLS Traffic Engineering (TE) can control the traffic and can set up end-to-end routing path before data can be forwarded. Multi-Protocol Label Switching (MPLS) plays a key role in next generation networks by delivering QoS and traffic engineering features which is helpful in managing traffic when some links or paths are under and/or over utilized This paper presents a QoS performance study of some applications such as voice, video conferencing, mail and web over DiffServ with MPLS in IPv4/IPv6 networks using Optimized Network Engineering Tool (OPNET). The effectiveness of DiffServ and MPLS integration in IPv4/IPv6 network is illustrated and analyzed.
- Published
- 2015
- Full Text
- View/download PDF
19. Seamless converging system for IPv4/IPv6 transition
- Author
-
Zhao Qin
- Subjects
Stateless protocol ,Hardware_MEMORYSTRUCTURES ,IPv6 address ,Address pool ,Computer science ,business.industry ,computer.internet_protocol ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,ComputerSystemsOrganization_PROCESSORARCHITECTURES ,IPv4 ,Electronic mail ,IPv6 ,Stateful firewall ,The Internet ,business ,computer ,Computer network - Abstract
The IPv4 address pool of ICANN has been depleted. Internet service providers are accelerating the research and deployment of IPv6 transition solution. Dual stack and tunneling technologies can only allow IPv4 and IPv6 to coexist, but can't make IPv4 and IPv6 network interact with each other. For alleviating the shortage of IPv4 address, accelerating the deployment of IPv6 and promoting the seamless converging of IPv4 and IPv6 network, this paper illustrate the design and implementation of an IPv4/IPv6 seamless converging system. The system is mainly composed by stateful and stateless protocol translation modules and can make hosts with shared IPv4 address or global IPv6 address access IPv4 Internet across IPv6 backbone.
- Published
- 2017
- Full Text
- View/download PDF
20. On exploiting SDN to facilitate IPv4/IPv6 coexistence and transition
- Author
-
Jia-Jhun Lin, Shin-Ming Cheng, Kai-Ching Wang, and Yen-Chun Liu
- Subjects
Engineering ,Hardware_MEMORYSTRUCTURES ,Address pool ,computer.internet_protocol ,business.industry ,Address space ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Load balancing (computing) ,computer.software_genre ,Virtualization ,IPv4 ,NAT64 ,IPv6 ,0203 mechanical engineering ,Virtual machine ,0202 electrical engineering, electronic engineering, information engineering ,business ,computer ,Computer network - Abstract
Today, the booming of the IoT (Internet of things) makes the volume of IP network devices grow rapidly, and IPv4 address pool was exhausted. While IPv6 is considered to be a feasible solution due to its sufficient address space, the slow deployment of IPv6 makes the necessity of the transition from IPv4 to IPv6. This paper proposes a framework for IPv4/IPv6 co-existence by leveraging Software-Defined Network (SDN) to facilitate the IPv6-to-IPv4 address conversion. In particular, a virtual machine with 6to4NAT functionality is generated dynamically when IPv6 traffic appears in IPv4 island. With the aid of SDN and virtualization on NAT64 nodes, the load balancing of IPv6-to-IPv4 traffic is facilitated. We implement this platform by using OpenStack in a real network testbed, and show that the proposed solution is a more flexible deployment architecture.
- Published
- 2017
- Full Text
- View/download PDF
21. The Special Treatment of NAT
- Author
-
Zhao Li Wu
- Subjects
Ping (video games) ,Network architecture ,Address pool ,Network packet ,Computer science ,Datagram ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,General Medicine ,Internet Control Message Protocol ,NAT traversal ,NAT Port Mapping Protocol ,Header ,business ,Network address translation ,IP address management ,Private network ,Computer network - Abstract
NAT (Network Address Translation) is the process of transforming one IP address in the datagram header into another. In practical applications, NAT is mainly used to realize the function of the access of private network to public network. The method of using a small number of public IP addresses representing a large quantity of private IP addresses will help to slow down the depletion of the IP address space available. As the Network Architecture is becoming more complex, the way, under such context, the NAT technology functions is of great importance. This dissertation will mainly analyze the special treatment of NAT in the following aspects like unified address management ,the priority level of address pool ,NAT mapping in PING Operation ,the treatment of ICMP err packet ,the NAT transformation of fragmented packet as well as the infinitive connection of multi –core products.
- Published
- 2014
- Full Text
- View/download PDF
22. A novel P2P IPTV system for IPv4/v6 networks
- Author
-
Hao Tu, Zhitang Li, Zhengbiao Guo, and Shuyu Liu
- Subjects
Interconnection ,IPv6 address ,Address pool ,Computer Networks and Communications ,computer.internet_protocol ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,IPTV ,Peer-to-peer ,computer.software_genre ,IPv4 ,IPv6 ,Hardware and Architecture ,Media Technology ,The Internet ,business ,computer ,Software ,Computer network - Abstract
As IPv4 address pool has been completely depleted and the transition from IPv4 to IPv6 has become a trend, P2P video streaming through IPv4/v6 hybrid network is now needed, for equipments with different types of IP addresses widely exist on the Internet. Traditionally, large-scale commercial P2P-IPTV systems have been deployed in IPv4 networks. However, these systems do not support equipments with IPv6 addresses and cannot work in IPv4/v6 hybrid networks. To overcome this problem, we propose a novel dual-stack-based architecture to distribute contents to different networks. The core element of the system is the dual-stack tracker which makes all equipments with IP address interconnect with each other and form a hybrid network. Meanwhile, equipments with IPv4/v6 addresses act as bridges, which distribute contents to IPv4 and IPv6 networks. The paper focuses on how to make all equipments with different types of IP addresses work in one system, analyzing the architecture and performance results related to the use of IPv6 bandwidth. This system has been deployed and broadcasted the 2010 FIFA World Cup South Africa with 755 kbps video stream, and our results demonstrate the feasibility of video over IPv4/v6 hybrid network for a representative application.
- Published
- 2013
- Full Text
- View/download PDF
23. Tree based variable length address autoconfiguration protocol for mobile ad hoc networks
- Author
-
Nagendla Ramakrishnaiah and Pakanati Chenna Reddy
- Subjects
Address pool ,business.industry ,Computer science ,Wireless ad hoc network ,Distributed computing ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Mobile ad hoc network ,Variable length ,0203 mechanical engineering ,Header ,0202 electrical engineering, electronic engineering, information engineering ,Tree based ,Latency (engineering) ,Link-local address ,business ,Computer network - Abstract
The purpose of an address autoconfiguration protocol for Mobile Ad hoc Networks (MANETs) is to assign a unique address to each node and maintain the address pool. Address allocation in ad hoc networks is dynamic. Node mobility and infrastructure-less behavior of ad hoc networks makes address autoconfiguration a difficult task. In this paper, a scheme is proposed for address autoconfiguration of MANETs. The proposed scheme constructs the network as a virtual tree and uses variable length addressing scheme. Nodes are classified into coordinator and normal nodes. Coordinator nodes assign addresses to new nodes and reclaim addresses when necessary. One of the coordinator nodes acts as a header node and it increments the address length to accommodate new nodes if the address range is exhausted. Normal nodes act as relaying nodes between new nodes and coordinator nodes. This scheme uniformly distributes coordinator nodes across the network to reduce address latency and to overcome uneven density problem. It designates one fourth of the total nodes as coordinator nodes to reduce overhead.
- Published
- 2016
- Full Text
- View/download PDF
24. Worm hole-black hole attack detection and avoidance in Manet with random PTT using FPGA
- Author
-
K A Arun Kumar
- Subjects
Authentication ,Address pool ,business.industry ,Network packet ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Physical layer ,020206 networking & telecommunications ,02 engineering and technology ,Mobile ad hoc network ,Code rate ,Encryption ,Packet drop attack ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,business ,Computer Science::Cryptography and Security ,Computer network - Abstract
Manet or Mobile Ad-Hoc Networks are self-forming networks which does not require a fixed infrastructure for its communication. Manet plays a critical role in Military Communication and Disaster Management system. Initially there will be multiple nodes with separate address assigned from an address pool, which will form the network when needed. Worm-hole attack and black-hole attack are the severe security issues faced by Manet. The normal security mechanisms like encryption and authentications have no big roles in these types of attacks. The paper discuss the FPGA implementation of black hole-worm hole detection and avoidance algorithm. The packets from a black-hole or worm-hole are detected in the MAC-Physical layer itself by randomly varying the Packet Travel Time (PTT). The Mac layer and the physical layer are implemented using Partial-Reconfiguration technique so that the symbol rate, modulation schemes and coding rate can be changed randomly while the system is running without using extra hardware. Probe request and probe response messages are used to ensure authentication for the nodes for forming the network.
- Published
- 2016
- Full Text
- View/download PDF
25. The NAT64/DNS64 tool suite for IPv6 transition
- Author
-
I. Van Beijnum, Alberto García-Martínez, and Marcelo Bagnulo
- Subjects
IPv6 ,Computer Networks and Communications ,computer.internet_protocol ,Computer science ,02 engineering and technology ,Internet traffic engineering ,NAT64 ,DNS64 ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,IP address management ,Telecomunicaciones ,IPv4 address exhaustion ,Hardware_MEMORYSTRUCTURES ,IPv6 address ,Address pool ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,020207 software engineering ,ComputerSystemsOrganization_PROCESSORARCHITECTURES ,Internet hosting service ,Bogon filtering ,IPv4 ,Computer Science Applications ,Internet Connection Sharing ,NAT traversal ,NAT-PT ,The Internet ,business ,computer ,Network address translation ,Computer network - Abstract
It is clear that there is not enough time to upgrade existing Internet hosts to dual stack before the IPv4 address pool depletes. This implies that the IPv6 transition and co-existence must support interaction between IPv4 nodes and IPv6 nodes. In this article we describe NAT64 and DNS64, a tool suite that provides a way forward in the IPv4-to-IPv6 transition by allowing communication among unmodified IPv6 and IPv4 nodes. The research of Marcelo Bagnulo leading to these results has received funding from the Ministry of Science and Innovation of Spain, under the QUARTET project (TIN2009-13992-C02- 01) and the MEDIANET project (S2009-TIC1468). The work of Alberto García-Martínez is partially supported by BONE (Building the Future Optical Network in Europe), a Network of Excellence funded by the European Commission through the 7th ICT-Framework Program, and by the MEDIANET project (S2009-TIC1468). Publicado
- Published
- 2012
- Full Text
- View/download PDF
26. Distributed Address Configuration Mechanism Using Address Pool in MANET
- Author
-
Yu Jin Lim, Sang Hyun Ahn, and Hyun Yu
- Subjects
IPv6 address ,Dynamic Host Configuration Protocol ,Address pool ,computer.internet_protocol ,Computer science ,business.industry ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Gateway address ,Link-local address ,business ,computer ,Reverse Address Resolution Protocol ,Network address translation ,IP address management ,Computer network - Abstract
As it becomes increasingly important that Internet access is available anywhere at any time, providing MANET (Mobile Ad-Hoc Network) with the Internet access attracts more attention. The existing DHCP (Dynamic Host Configuration Protocol) address configuration schemes require message exchanges between MANET nodes and the DHCP server through multi-hop routes. Messages can be easily dropped in the wireless multi-hop communication environment and the address configuration may be instable and need long delay. In this paper, we propose a new address configuration scheme using the concept of address pool allocation. In the proposed scheme, the DHCP server assigns a part of its address pool to a node instead of a single address and the node can assign a part of its own address pool to its neighbor nodes. Through simulation studies, we show that our scheme yields about 77% of the address configuration delay and 61% of the control message overhead of the existing DHCP based mechanism.Keywords:MANET, DHCP, Address Configuration, Address Pool
- Published
- 2009
- Full Text
- View/download PDF
27. DHCP and NAT
- Author
-
Ltd. Huawei Technologies Co.
- Subjects
Address pool ,Dynamic Host Configuration Protocol ,Computer science ,Relay ,law ,Nat ,business.industry ,business ,law.invention ,Computer network - Abstract
This chapter describes the basic concepts and working process of DHCP as well as DHCP relay. It also introduces the basic concepts, principles, and application scenarios of NAT.
- Published
- 2016
- Full Text
- View/download PDF
28. Application compatibility of the NAT64 IPv6 transition technology
- Author
-
Gábor Lencse, Tamas Hajas, and Sandor Repas
- Subjects
Telnet ,File Transfer Protocol ,Address pool ,computer.internet_protocol ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,computer.file_format ,Peer-to-peer ,computer.software_genre ,IPv4 ,IPv6 deployment ,NAT64 ,IPv6 ,syslog ,Default gateway ,Operating system ,The Internet ,business ,computer ,BitTorrent ,Computer network - Abstract
The proliferation of smart phones and other Internet capable devices together with the depletion of the global IPv4 address pool will be a huge driving force for the deployment of IPv6 in the forthcoming years. The communication of an IPv6 only client with an IPv4 only server is a typical practical task to be solved among the many issues of the co-existence of IPv4 and IPv6. The usage of DNS64+NAT64 may be a good solution if our applications can flawlessly work with it. As for NAT64 implementations, TAYGA running under Linux and Packet Filter (PF) of OpenBSD were tested with the following application level protocols: HTTP, HTTPS, SMTP, POP3, IMAP4, Telnet, SSH, FTP, OpenVPN, RDP, Syslog, BitTorrent, Skype and SIP. The client-server application protocols could traverse through the NAT64 gateway flawlessly but the peer to peer ones failed. In contrast to the results of other researchers, OpenVPN worked perfectly with NAT64.
- Published
- 2015
- Full Text
- View/download PDF
29. Port number consumption of the NAT64 IPv6 transition technology
- Author
-
Gábor Lencse, Tamas Hajas, and Sandor Repas
- Subjects
IPv6 address ,File Transfer Protocol ,Address pool ,computer.internet_protocol ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Gateway (computer program) ,Service provider ,IPv4 ,IPv6 deployment ,Port (computer networking) ,NAT64 ,IPv6 ,Default gateway ,Server ,The Internet ,business ,computer ,Computer network - Abstract
Due to the depletion of the global IPv4 address pool, the internet service providers will be able to supply their new clients with IPv6 addresses only in the near future. The application of the DNS64 and NAT64 technologies can enable the IPv6 only clients to communicate with the still dominant IPv4 only servers. However, the clients of certain applications such as HTTP and FTP use multiple sessions and thus they consume multiple ports. This phenomenon may cause a lack of ports situation at the NAT64 gateway. Therefore the port consumption of the different applications is an important design parameter of the NAT64 gateways. In this paper, the port consumption of different NAT64 compatible applications was measured. It was also determined what factors can influence the port consumption of a web or an ftp client. The detailed description of our measurement method is given. Our results can give a valuable help for careful design and configuration of a NAT64 gateway.
- Published
- 2015
- Full Text
- View/download PDF
30. Ipv6 Change Threats Behavior
- Author
-
Homam El-Taj and Firas Najjar
- Subjects
Hardware_MEMORYSTRUCTURES ,General Computer Science ,Address pool ,Computer science ,computer.internet_protocol ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Internet privacy ,Computer security ,computer.software_genre ,IPv4 ,IPv6 ,Attack ,business ,computer - Abstract
IPv4 address pool is already exhausted; therefore, the change to use IPv6 is eventually necessary to give us a massive address pool. Although IPv6 was built with security in mind, extensive research must be done before deploying IPv6 to ensure the protection of security and privacy. This paper firstly presents the differences between the old and new IP versions (IPv4 and IPv6), and how these differences will affect the attacks, then the paper will show how the attacks on IPv4 and IPv6 will remain mostly the same; furthermore, the use of IPv6 will give rise to new types of attacks and change other types’ behavior.
- Published
- 2015
- Full Text
- View/download PDF
31. The magic of internet protocol
- Author
-
Khaldoun Batiha
- Subjects
Intranet ,Address pool ,business.industry ,Computer science ,computer.internet_protocol ,Network security ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Computer security ,computer.software_genre ,IPv4 ,law.invention ,IPv6 ,IPv6 packet ,law ,Internet Protocol ,Microsoft Windows ,Telecommunications ,business ,computer - Abstract
As the developing use of web and intranet keep on expanding colossally, the issue to suit more clients and gadgets has been risen. Subsequently, a location range must be required to oblige the hurry. Sadly, IPv4 address region and alternatives are insufficient to meet this new necessity. A fresh out of the box new Protocol is expected to satisfy the developing interest. IPv6 is the best response to the above issues. We should have an early on study on IPv6 convention. IPv6 convention offers verity of advantages that incorporates a more extensive location region and upgraded choices and changes that are not beforehand be found in the IPv4. IPv6 in contrast with IPv4 have a wide address range, simple documentations for representation of a location, enhanced administrations and alternatives, upgraded header, propelled highlights, new choices and bolster, auto setup highlight, new convention bolster, Network Security, Virus and Worms Security, Support for different Operating frameworks and stage including Microsoft windows, Linux and MAC.
- Published
- 2017
- Full Text
- View/download PDF
32. Distributed address assignment with address borrowing for ZigBee networks
- Author
-
Cheng Kuan Lin, Shu Chiung Hu, Wen-Tsuen Chen, and Yu-Chee Tseng
- Subjects
Router ,Static routing ,Dynamic Source Routing ,Address pool ,Computer science ,business.industry ,Address space ,Distributed computing ,Policy-based routing ,Wireless Routing Protocol ,Geographic routing ,Key distribution in wireless sensor networks ,business ,Wireless sensor network ,Hierarchical routing ,NeuRFon ,Triangular routing ,Computer network - Abstract
ZigBee is a popular communication standard for wireless sensor networks. It suggests a distributed address assignment mechanism (DAAM), which is easy to implement but may restrict the number of children of a router and the depth of the network. Since DAAM is too conservative, the utilization of the 16-bit address pool may become poor, causing the orphan problem. In this paper, we propose a distributed address assignment scheme by allowing a parent to borrow a subtree of address space from a neighbor to alleviate the orphan problem. When a new node tries to associate with a parent router which has no free address, this parent router will inquire its 2hop neighbors for lending a subtree of free address space. We also propose a light-weight routing to support one-to-one routing in this environment.
- Published
- 2014
- Full Text
- View/download PDF
33. Enabling QoS in stateful auto-configuration protocol used in IPv6 based manets
- Author
-
Krishnan Murugan, R. Punitha, and T. R. Reshmi
- Subjects
IPv6 address ,Address pool ,business.industry ,computer.internet_protocol ,Computer science ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Gateway address ,DHCPv6 ,Link-local address ,business ,Host (network) ,computer ,Network address translation ,Reverse Address Resolution Protocol ,Computer network - Abstract
The Mobile Ad-Hoc NETworks (MANETs) is an easy deployable, infrastructure-less networks. In IPv6 based MANETs the address configuration is done either with a stateless mechanisms or with the help of server like Dynamic Host Configuration Protocol version 6 (DHCPv6). The DHCPv6 server initially resides on the node which acts as the Internet gateway (IGW) in the network and later on each of the configured nodes will become a server. The node which enters the network, will request for an IP address and the server distributes a unique IP address and an address pool. Formerly the new node identifies the server using a random selection algorithm and this method faces many QoS issues due to the usage of the random selection algorithm. The proposed technique addresses the issues using a QoS enabled algorithm, which reduces the address acquisition delay and packet drops in the network, and thereby enhancing the performance of the network. The proposed technique is simulated and compared with the random selection algorithm using Network Simulator Version 2 (NS2).
- Published
- 2013
- Full Text
- View/download PDF
34. Understanding IPv6 Populations in the Wild
- Author
-
George Michaelson, Geoff Huston, Michael Bailey, and Manish Karir
- Subjects
Hardware_MEMORYSTRUCTURES ,IPv6 address ,Address pool ,Exploit ,business.industry ,Computer science ,computer.internet_protocol ,Display advertising ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Network interface ,Computer security ,computer.software_genre ,IPv4 ,IPv6 ,6to4 ,business ,computer ,Computer network - Abstract
With the global exhaustion of the IPv4 address pool, there has been significant interest in understanding the adoption of IPv6. Previous studies have shown that IPv6 traffic continues to be a very small fraction of the overall total traffic in any network, but its use is gradually increasing. Utilizing a novel display advertising approach to reach behind NAT and other firewall devices, we engage in a seven-month study of IPv6 in which we observe 14M unique IPv6 addresses including native IPv6, teredo, as well as 6to4. We exploit the intrinsic information within IPv6 addresses in order to infer IPv6 properties, such as, coarse grained geographic location, ISPs, the use of native IPv6 versus transition techniques, cone NAT usage, and even network interface manufacturer identifiers. We find that while the number of native IPV6 addresses in the wild is small (1.3%) a large number of IPv6 hosts are IPv6 capable via transition techniques such as teredo and 6to4.
- Published
- 2013
- Full Text
- View/download PDF
35. Performance Analysis and Comparison of 6to4 Relay Implementations
- Author
-
Gábor Lencse and Sandor Repas
- Subjects
Speedup ,General Computer Science ,Address pool ,business.industry ,Computer science ,computer.internet_protocol ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,IPv6 deployment ,IPv4 ,IPv6 ,law.invention ,Packet loss ,Relay ,law ,Embedded system ,6to4 ,business ,computer ,Computer network - Abstract
the depletion of the public IPv4 address pool may speed up the deployment of IPv6. The coexistence of the two versions of IP requires some transition mechanisms. One of them is 6to4 which provides a solution for the problem of an IPv6 capable device in an IPv4 only environment. From among the several 6to4 relay implementations, the following ones were selected for testing: sit under Linux, stf under FreeBSD and stf under NetBSD. Their stability and performance were investigat- ed in a test network. The increasing measure of the load of the 6to4 relay implementations was set by incrementing the number of the client computers that provided the traffic. The packet loss and the response time of the 6to4 relay as well as the CPU utilization and the memory consumption of the computer running the tested 6to4 relay implementations were measured. The implementations were tested also under very heavy load conditions to see if they are safe to be used in production systems. Keywords—IPv6 deployment; IPv6 transition solutions; 6to4; performance analysis
- Published
- 2013
- Full Text
- View/download PDF
36. Erlang-based dimensioning for IPv4 Address+Port translation
- Author
-
Tanguy Ropitault, Frederic Perrin, Laurent Toutain, Isabelle Kraemer, Bertrand Grelot, Patrick Maillé, and Florent Fourcot
- Subjects
010302 applied physics ,IPv4 address exhaustion ,Network architecture ,IPv6 address ,Port Control Protocol ,Address pool ,business.industry ,Computer science ,computer.internet_protocol ,02 engineering and technology ,021001 nanoscience & nanotechnology ,01 natural sciences ,Port (computer networking) ,IPv4 ,IPv6 ,NAT Port Mapping Protocol ,0103 physical sciences ,The Internet ,0210 nano-technology ,business ,Telecommunications ,computer ,IP address management ,Network address translation ,Computer network - Abstract
As the IPv4 address pool is being exhausted, it becomes urgent to find a way to migrate IPv4 network architectures to IPv6, or to reduce the use of IPv4 addresses. In this paper, we discuss a strategy known as “Address + Port” translation, which consists in several users sharing the same IPv4 address and being distinguished by a range of port numbers. Of critical importance for the feasibility of such a mechanism is the knowledge of the minimum number of ports to allocate to users so that no service degradation is perceived. To that extent, we analyse the port consumption of the most port-consuming Internet applications, web browsing, and present some aggregate port consumption curves for the student population of our campus. Our results suggest that a port range of 1000 ports is totally transparent to users (which would allow to share a single IPv4 address among 64 users), while 400 ports (i.e., 150 users per address) is sufficient for most of users. Finally, the number of users per address could be further improved by benefiting from statistical multiplexing, i.e., using dynamical instead of fixed port range allocation.
- Published
- 2012
- Full Text
- View/download PDF
37. One Novel Method for NAT-PT of IPv4/IPv6 Translator
- Author
-
Gao Ying, Waixi Liu, and Tang Dong
- Subjects
Hardware_MEMORYSTRUCTURES ,Address pool ,business.industry ,Computer science ,Network packet ,computer.internet_protocol ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,IPv4 ,IPv6 ,Internet Control Message Protocol ,NAT traversal ,Session (computer science) ,business ,computer ,Network address translation ,Computer network - Abstract
From IPv4 to IPv6 is a long evolution process and protocol translation technology will be required during the course of gradual deployment of IPv6. To solve current problem in NAT-PT of IPv4/IPv6 translator, a novel solution which change the session parameters is proposed. This paper contributes the following: Firstly, Bi-Direction translation of IPv4/IPv6 is implemented based on the same address pool, and fragged IP packets can also be translated. Secondly, the Discard rate is decreased to 1/65536 while one IPv4 address serve 2 64 sessions. Thirdly, truly full translation for TCP/UDP/ICMP packet is completed.
- Published
- 2012
- Full Text
- View/download PDF
38. Effect of Packet Delay Variation on Video-Voice over DiffServ-MPLS in IPv4-IPv6 Networks
- Author
-
Md. Nazmul Islam Khan, Mohammad Saiful Islam, Md. Tariq Aziz, and Adrian Popescu
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science - Performance ,Address pool ,computer.internet_protocol ,business.industry ,Computer science ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Multiprotocol Label Switching ,IPv4 ,law.invention ,IPv6 ,Computer Science - Networking and Internet Architecture ,Performance (cs.PF) ,Differentiated services ,law ,Internet Protocol ,Packet delay variation ,business ,computer ,Computer network - Abstract
Over the last years, we have witnessed a rapid deployment of real-time applications on the Internet as well as many research works about Quality of Service (QoS), in particular IPv4 (Internet Protocol version 4). The inevitable exhaustion of the remaining IPv4 address pool has become progressively evident. As the evolution of Internet Protocol (IP) continues, the deployment of IPv6 QoS is underway. Today, there is limited experience in the deployment of QoS for IPv6 traffic in MPLS backbone networks in conjunction with DiffServ (Differentiated Services) support. DiffServ itself does not have the ability to control the traffic which has been taken for end-to-end path while a number of links of the path are congested. In contrast, MPLS Traffic Engineering (TE) is accomplished to control the traffic and can set up end-to-end routing path before data has been forwarded. From the evolution of IPv4 QoS solutions, we know that the integration of DiffServ and MPLS TE satisfies the guaranteed QoS requirement for real-time applications. This paper presents a QoS performance study of real-time applications such as voice and video conferencing in terms of Packet Delay Variation (PDV) over DiffServ with or without MPLS TE in IPv4/IPv6 networks using Optimized Network Engineering Tool (OPNET). We also study the interaction of Expedited Forwarding (EF), Assured Forwarding (AF) traffic aggregation, link congestion, as well as the effect of performance metric such as PDV. The effectiveness of DiffServ and MPLS TE integration in IPv4/IPv6 network is illustrated and analyzed. This paper shows that IPv6 experiences more PDV than their IPv4 counterparts., Comment: 21 Pages, 8 Figures; January 2012, Volume 3, Number 1 (IJDPS)
- Published
- 2012
- Full Text
- View/download PDF
39. A Cluster-Based Load Balancing for Multi-NAT
- Author
-
Jianping Wu, Lin-Jian Song, and Yong Cui
- Subjects
Address pool ,computer.internet_protocol ,Computer science ,business.industry ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Load balancing (computing) ,IPv4 ,IPv6 ,Nat ,Long period ,The Internet ,business ,computer ,Cluster based - Abstract
The Internet currently bears both rapid exhaustion of IPv4 address pool and the slow development of IPv6. IPv4-IPv6 coexistence is proved to be a long period. Multi-NAT, which is desirable in large scaled IPv4-IPv6 coexistent network, has some inherent difficulties in the traffic balancing and failure recovery. In this paper we design a novel Cluster-based Load Balancing scheme for Multi-NAT which is composed of load balancer, extended NAT box and cache server. Additionally in order to load-balance the traffic adaptively according to the state of each NAT box, an Adaptive Reassigning Algorithm (ARA) is proposed to enabling our scheme to accommodate dynamic change of traffic and recover rapidly from failures. In the simulation the cluster-based load balancing outperforms other existing DNS-based Multi-NAT schemes and meets the requirements of large scaled NAT.
- Published
- 2012
- Full Text
- View/download PDF
40. A design and implementation of nickname-based sockets for applications inside NATed network
- Author
-
Tomoya Inoue, Yuuki Takano, Yoichi Shinoda, and Shinsuke Miwa
- Subjects
IPv4 address exhaustion ,IPv6 address ,Address pool ,business.industry ,Computer science ,computer.internet_protocol ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,computer.software_genre ,IPv4 ,NAT traversal ,NAT Port Mapping Protocol ,Network socket ,Operating system ,business ,computer ,Network address translation ,Computer network - Abstract
The central IPv4 address pool managed by Internet Assigned Numbers Authority (IANA) was depleted in January 2011. Nevertheless, almost all nodes on the Internet still continue communicating with each other by using Internet protocol version 4 (IPv4). Since IPv4 addresses have been employed for a long time, it is difficult to immediately shift network layer protocol from IPv4 to IPv6. Therefore, the connectivity using IPv4 address is still required. There is a technology called Large Scale NAT (LSN) which keeps IPv4 address network being connected even though IPv4 addresses are depleted. In the case of home networks and small business networks by LSN, there is usually only a single private IPv4 address on the outside of network interface. Although NAT mechanism has many advantages, it has the negative effect which makes behavior of server side applications unavailable to the Internet. As a result, LSN also has the similar issue.To overcome this issue, we propose a nickname-based network socket software library for future server-side applications. We developed a software which is P2P network based distributed directory service system called "CAGE" having NAT traversal mechanism. Further, using the functions of CAGE software, we also developed a software library of nickname-based sockets called "PRISON". Our proposed software library is available on operating systems such as Linux and MacOS X. In this paper, we discuss the design and implementation of CAGE software and PRISON software library.
- Published
- 2011
- Full Text
- View/download PDF
41. Policy proposal
- Author
-
L. Jean Camp and Zheng Dong
- Subjects
Address pool ,computer.internet_protocol ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,IPv4 ,Work (electrical) ,The Internet ,Limit (mathematics) ,business ,computer ,Protocol (object-oriented programming) ,Ip address ,IP address management ,Computer network - Abstract
The fourth revision of the Internet protocol (IPv4) has been so widely implemented, that the IPv4 address pool approaches full allocation. Currently, only 8% of the IPv4 address blocks are not yet allocated by IANA. Based on the allocation history, IPv4 addresses will be fully allocated in 2012 [11]. In this work, we analyze the historical allocation records of APNIC, the organization which manages IP address allocations in the Asia-Pacific region. We propose three policies that can be implemented by APNIC. We then validate our policies by simulating the APNIC allocations. The experiments show that the lifetime of IPv4 could be significantly extended.
- Published
- 2010
- Full Text
- View/download PDF
42. Managing the last eights
- Author
-
Xiaoyong Zhou, Rui Wang, and L. Jean Camp
- Subjects
SIMPLE (military communications protocol) ,Address pool ,business.industry ,Management science ,computer.internet_protocol ,IPv4 ,IPv6 ,Risk analysis (engineering) ,Work (electrical) ,Software deployment ,Political science ,The Internet ,business ,Protocol (object-oriented programming) ,computer - Abstract
IP addresses are critical resources for Internet development. The available IPv4 address pool is projected to fully allocated within 3--5 years, but the deployment of the alternative protocol, IPv6, is not accelerating. Recently, several proposals have introduced new approaches to managing IPv4 allocation. However, the market proposals in particular imply fundamental changes to the nature of IPv4 address allocation. This work analyzes the allocation history of ARIN, the organization which manages address allocation in the America region. Based on the historical data and projected trends, we propose three simple management policies which can be immediately implemented with limited resources and without either significant registrar cost nor drastic modifications on current allocation strategy. We verify the effectiveness of our policies using historical data.
- Published
- 2010
- Full Text
- View/download PDF
43. The Impact of Port-Based Address-Sharing on Residential Broadband Access Networks
- Author
-
Marcus Brunner, H. Zuleger, Rolf Winter, Jürgen Quittek, and Andreas Ripke
- Subjects
IPv4 address exhaustion ,Address pool ,computer.internet_protocol ,Computer science ,business.industry ,Broadband networks ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Computer security ,computer.software_genre ,IPv4 ,Port (computer networking) ,IPv6 ,Server ,Broadband ,Telecommunications ,business ,computer ,IP address management - Abstract
The looming depletion of the public IPv4 address space has recently inspired a number of proposals intended to work around the inevitable address shortage. Broadly, all of these can be classified as address sharing, tunneling and translation mechanisms. While IPv6 is the proper solution to the problem as it simply makes more addresses available, the deployment hurdles of IPv6 make it questionable whether it will be universally available once the IPv4 address pool runs out. In this paper we focus on one of these solutions, namely A+P, that allocates a "fraction" of an IP address to end hosts by restricting the usable port range. We compare a number of strategies to use and reuse port numbers. Based on data from an ISP's access line serving nearly 7000 residential broadband customers these strategies are analyzed. To this end, we performed a hypothetical optimization exercise to find the optimal number of customers that can share a single IPv4 address.
- Published
- 2010
- Full Text
- View/download PDF
44. IPv6 for Smart Object Networks and the Internet of Things
- Author
-
Jean-Philippe Vasseur and Adam Dunkels
- Subjects
Virtual routing and forwarding ,Engineering ,Address pool ,business.industry ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,IP forwarding ,IP Multimedia Subsystem ,NAT traversal ,Next-generation network ,business ,IP address management ,Network address translation ,Computer network - Abstract
This chapter focuses on the utility of IPv6 in smart object networks and the internet. IPv6 is an evolution of IPv4, which builds on IPv4 with no change in the fundamental and architectural principles of the IP protocol suite. IPv4 has been deployed at a scale unimaginable by its original designers and is currently used by more than a billion devices. It was initially well understood that a new revision of IP would be needed because of the exponential growth of IP connected devices, as the most accurate models predict an exhaustion of the IPv4 address pool by March 2012. The need to connect billions of IP smart objects makes IPv6 the IP protocol version of choice for smart object networks. Although the adoption of IPv6 has been delayed because of migration cost, the migration to IPv6 is inevitable and has already started. From an architectural standpoint, IPv6 is built on the fundamental architectural principles of IP. It is not a new protocol but an evolution of IPv4 offering address space an order of magnitude larger than with IPv4, along with various useful features for smart object networks such as stateless configuration, which would allow the network to support dynamic address assignment without requiring heavy state management in the network. IPv6 also offers the possibility of returning to the root foundation of IP. This is achieved with a thin IP layer in charge of routing the traffic across the network with full support of IP multicast and QoS over a variety of link layers on top of which multiple transport protocols and applications can be used with total transparency, unique addresses, and application independence.
- Published
- 2010
- Full Text
- View/download PDF
45. Enhanced Distributed Address Assignment Scheme for ZigBee-Based Wireless Sensor Networks
- Author
-
Doohyun Ko, Hyeong-Jong Ju, and Sunshin An
- Subjects
Flexibility (engineering) ,Routing protocol ,Address pool ,business.industry ,Address space ,Computer science ,Distributed computing ,Node (networking) ,Routing (electronic design automation) ,business ,Network topology ,Wireless sensor network ,Computer network - Abstract
ZigBee is a standard that is suitable for wireless sensor networks. In ZigBee, sensor nodes can be connected by a tree topology called Distributed Address Assignment Mechanism (DAAM). It has the merits as follows: 1) it is easy to implement; 2) it simplifies the task of routing. It restricts the number of children and the depth of the network by setting a topological parameter set, which is defined as a topological policy in this paper. While there are many different kinds of geographical distributions, DAAM can have only one topological policy. If the policy in DAAM is unsuitable for the geographical deployment, the utilization of the address pool is very low. Thus, in spite that there is a large address space, some devices cannot join the sensor networks. To overcome the problem, this paper proposes Enhanced Distributed Address Assignment Scheme (EDAAS) based on DAAM; it can separate the node distribution into several simpler elements which can have their own topological policies. The evaluation shows that it can manage address space with more flexibility by using an additional storage.
- Published
- 2009
- Full Text
- View/download PDF
46. A comparative review of IPv4 and IPv6 for research test bed
- Author
-
Ahmed Patel, Rosilah Hassan, and Mohd. Khairil Sailan
- Subjects
Service (systems architecture) ,Engineering ,Intranet ,Hardware_MEMORYSTRUCTURES ,Address pool ,business.industry ,computer.internet_protocol ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,IPv4 ,IPv6 ,Risk analysis (engineering) ,Return on investment ,The Internet ,business ,Telecommunications ,computer ,Network address translation - Abstract
The Internet is migrating from IPv4 to IPv6. To determine the features for research test bed product selection, we compare the up-to-date information of IPv4 and IPv6. Currently IPv6 network penetration is still low but it is expected to grow, while IPv4 address pool is projected by Regional Internet Registry to be exhausted by the end of 2011. The reason why uptake of IPv6 is still low is because of high cost of service migration from IPv4 to IPv6, successfully used of IPv4 Network Address Translation for Intranet and unproven return of investment in IPv6 technology. This paper aims to review few migration path from IPv4 to IPv6 and some of the existing IPv6 products.
- Published
- 2009
- Full Text
- View/download PDF
47. IPTV over WiMax with MIPv6 handovers
- Author
-
Jarno Pinola and Kostas Pentikousis
- Subjects
Address pool ,business.industry ,Computer science ,computer.internet_protocol ,Testbed ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,IPTV ,WiMAX ,IPv4 ,IPv6 ,Backhaul (telecommunications) ,Mobile IP ,Mobile telephony ,business ,Telecommunications ,computer ,Mobility management ,Computer network - Abstract
As the IPv4 unallocated address pool nears exhaustion, an increasing number of IPv6 deployments is anticipated. In the domain of mobility management research and development, mobile IPv6 has long been favored over mobile IPv4. Nevertheless, although in principle WiMax supports IPv6 in various configurations and requires MIPv6 for network-level mobility management, in practice, vendors are actively deploying these capabilities only in part. This paper provides a thorough review of the role of IPv6 and MIPv6 in WiMax networks, surveying the work in relevant standardization bodies. The second contribution of this paper is a testbed evaluation of IPTV streaming over WiMAX. We employ two WiMax testbeds deployed in Finland and Portugal, interconnected by GEANT and quantify MIPv6 performance in a real-time multimedia streaming scenario over WiMAX. Beyond demonstrating the feasibility of such a deployment, our results indicate that WiMAX can provide a viable option as both access and backhauling technology. (26 refs.)
- Published
- 2009
- Full Text
- View/download PDF
48. Mobile-autoconf: Mobility management with autoconfiguration in mobile ad-hoc networks
- Author
-
M. Mukherjee, Sarmistha Neogy, and Sourav Saha
- Subjects
Address pool ,Computer science ,Wireless ad hoc network ,Robustness (computer science) ,business.industry ,Quality of service ,Denial-of-service attack ,Mobile ad hoc network ,business ,Mobility management ,Computer network - Abstract
A mobile node needs to be configured with a unique IP address. It has been seen that address autoconfiguration is a suitable technique in MANETs because of high mobility of nodes. Extensive survey of previous autoconfiguration related schemes reveal the need for reducing DoS attack, security breaches and improving DAD, QoS and overall performance. This paper also presents a critical study of mobility management related schemes. In this paper, we propose a scheme Mobile-autoconf that employs ring-based hierarchy for both autoconfiguration and mobility management for larger MANETs. It reduces DAD dependency, scope for DoS attack and temporary address dependency. It reduces cost increases reliability, robustness and location management becomes easier. QoS improvement and recycling of address pool are also aimed at here. The simulation of Mobile-autoconf is also carried out.
- Published
- 2008
- Full Text
- View/download PDF
49. A Handoff Algorithm Based on Care-of Address Pool for Hierarchical Mobile IPv6
- Author
-
Kai Cai, Chenghao Li, Zhimin Yang, and Rongyi Chen
- Subjects
Address pool ,Handover ,business.industry ,Computer science ,Mobile IP ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Mobile computing ,Mobile telephony ,Roaming ,business ,Care-of address ,Computer network - Abstract
In Mobile IPv6 (MIPv6), a mobile node (MN) often needs to send binding update (BU) messages to the distant home agent (HA) and the correspondent nodes (CNs), when it is far away from the home network and the CNs, or in the frequent moving environment. This process increases handoff latency as well as lots of interactive signaling and network load. In order to improve handoff performance and implement seamless roaming, it is necessary to improve handoff process of MIPv6 protocol. In this paper, we analyze the handoff performance for HMIPv6, and then propose handoff algorithm based on Care-of Address Pool for Hierarchical Mobile IPv6 (CoAP-HMIPv6). Performance analysis and simulation experiments presented in this paper show that our proposal can be used to solve the problems with MIPv6 handoff communication.
- Published
- 2008
- Full Text
- View/download PDF
50. Running on Empty: The Challenge of Managing Internet Addresses
- Author
-
William Lehr, Tom Vest, and Eliot Lear
- Subjects
IPv4 address exhaustion ,Address pool ,computer.internet_protocol ,Address space ,business.industry ,IP forwarding ,Computer security ,computer.software_genre ,IPv4 ,Internet governance ,IPv6 ,The Internet ,Business ,computer - Abstract
Over a quarter century has passed since IP addresses from the Internet’s now globally ubiquitous (IPv4) address pool first began to be distributed to and used by operators of the 28,000 and counting independent routing domains that constitute today’s Internet. At current demand rates, the total pool of IPv4 addresses is expected to be fully allocated within the next 3-5 years. Despite the looming exhaustion of the address pool, many Internet network operators have exhibited reluctance to transition to the successor address resource pool (IPv6). In light of the looming scarcity of IPv4 addresses, there is growing interest in the potential for market-based allocation mechanisms to induce more efficient use of the IPv4 address space and to smooth the transition to IPv6. Some of these proposals include allowing existing allocations to be reclaimed or traded to supplement the supply of IPv4 addresses to meet continuing demand. This paper will provide an appropriate contextual framing, suitable for a multidisciplinary audience, of the ongoing discussion of how market forces might be introduced to enhance the management of the Internet address space. We discuss some of the proposals currently under consideration and highlight the key points of contention. While we conclude that market-based incentives can play an important role, how they are implemented needs to be carefully considered in light of the requirements for Internet routing, the politics of global Internet governance, and the likely implications on the transition to IPv6. For example, we believe inappropriately allowing unrestricted trading of IPv4 addresses could have the perverse effect of increasing the aggregate costs of Internet routing, retarding the migration to IPv6, and thereby adversely impacting Internet growth and architecture. On the other hand, while the existing framework for Internet address management has served reasonably well to date, retaining the status quo is likely to result in a burgeoning black/grey market in IPv4 addresses and similar unfavorable outcomes with respect to aggregate costs and Internet architecture. Further research and collective discussion is needed to identify how best to forge a middle road toward improved Internet address management. The discussion provided herein is intended to help frame and seed the debate.
- Published
- 2008
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.