Taking into chief consideration the features of aviation nodes in satellite networks, such as high moving speed, long communication distance, and high connection frequency, this article proposes an aviation-oriented m...Taking into chief consideration the features of aviation nodes in satellite networks, such as high moving speed, long communication distance, and high connection frequency, this article proposes an aviation-oriented mobility management method for IP/low earth orbit (LEO) satellite networks. By introducing the concept of ground station real-time coverage area, the proposed method uses ground-station-based IP addressing method and cell paging scheme to decrease the frequency of IP binding update requests as well as the paging cost. In comparison with the paging mobile IP (P-MIP) method and the handover-independent IP mobility management method, as is verified by the mathematical analysis and simulation, the proposed method could decrease the management cost. It also possesses better ability to support the aviation nodes because it is subjected to fewer influences from increased node speeds and newly coming connection rates.展开更多
Technology is expanding like a mushroom,there are various benefits of technology,in contrary users are facing serious losses by this technology.Furthermore,people lost their lives,their loved ones,brain-related diseas...Technology is expanding like a mushroom,there are various benefits of technology,in contrary users are facing serious losses by this technology.Furthermore,people lost their lives,their loved ones,brain-related diseases,etc.The industry is eager to get one technology that can secure their finance-related matters,personal videos or pictures,precious contact numbers,and their current location.Things are going worst because every software has some sort of legacy,deficiency,and shortcomings through which exploiters gain access to any software.There are various ways to get illegitimate access but on the top is Linux Kali with QRLjacker by user grabber command.This study recapitulates the impacts of the said technology and related avoidance.Detail contemplation depicts social media users like WhatsApp users can take a long sigh of relief when they will adopt the recommended methods.The problem is breaching of legitimate social media real-time location by an illegitimate user through Linux Kali,for this reason,end-user has no knowledge to spoof their IP to protect their real-time location.This paper will address the solution to the said problem.展开更多
Nowadays, there is a huge Intemet in the computer network, and a unified management on hundreds of thousands of computers has become a common phenomenon. Thus, it's not hard to imagine that the computer network is vu...Nowadays, there is a huge Intemet in the computer network, and a unified management on hundreds of thousands of computers has become a common phenomenon. Thus, it's not hard to imagine that the computer network is vulnerable to be threatened in security. In this paper, the problems of the computer network security are discussed. By establishing a reasonable fault tree system, computer security evaluation is completed within a given range, and each computer has its own IP address. In this process, it is necessary to find out a MAC address related to each IP address. A standard form is needed for address management, and then ARP table emerges. The emergence of ARP makes each IP address corresponding to MAC address, and also the communication between computers becomes very convenient. However, the t network security will be affected accordingly.展开更多
In the design and construction process of Next Generation Internet, it is important to identify the source of each IP packet forwarding accurately, especially for the support of precise fine-grained management,control...In the design and construction process of Next Generation Internet, it is important to identify the source of each IP packet forwarding accurately, especially for the support of precise fine-grained management,control, traceability and improving the trustworthiness of the Internet. This paper designed a scalable Network Identity(NID) scheme for the Internet users, proposed NIDTGA(Network Identity and Time Generated Address), an IPv6 address generation algorithm embedded NID and time information, then designed and implemented an IPv6 address generation and traceback system based on NIDTGA. The design of NIDTGA, which reflects the length, time and owner attributes of the IP address, can be a good support to ADN(Address Driven Network). At the same time, by embedding the key elements of user identity and time in the IPv6 address,and by taking into account both the traceability and privacy, NIDTGA can provide a technical basis for the establishment of the network trust mechanism, and achieve the traceability of security event.展开更多
The IP packet forwarding of current Internet is mainly destination based. In the forwarding process, the source IP address is not checked in most cases.This causes serious security, management and accounting problems....The IP packet forwarding of current Internet is mainly destination based. In the forwarding process, the source IP address is not checked in most cases.This causes serious security, management and accounting problems. Based on the drastically increased IPv6 address space, a "source address validation architecture" (SAVA) is proposed in this paper, which can guarantee that every packet received and forwarded holds an authenticated source IP address. The design goals of the architecture are lightweight, loose coupling, "multi-fence support" and incremental deployment. This paper discusses the design and implementation for the architecture, including inter-AS, intra-AS and local subnet. The performance and scalability of SAVA are described. This architecture is deployed into the CNGI-CERNET2 infrastructure a large-scale native IPv6 backbone network of the China Next Generation Internet project. We believe that the SAVA will help the transition to a new, more secure and dependable Internet.展开更多
Given the emerging problems of today’s Internet,many new Internet architectures have been proposed by the net-working community.In general,the new approaches can be categorized into two types:evolutionary approaches ...Given the emerging problems of today’s Internet,many new Internet architectures have been proposed by the net-working community.In general,the new approaches can be categorized into two types:evolutionary approaches and clean-slate approaches.The representative evolutionary solution is IPv6,while representative clean-slate approaches are NDN(Named Data Networking),MobilityFirst,NEBULA,XIA(Expressive Internet Architecture),and SDN(Software-Defined Networking).A comprehensive survey of these approaches are presented.Additionally,a novel network architecture that we recently proposed:ADN(Address-Driven Networking)is described,which intends to address the challenges faced by today’s Internet via the flexible and innovative utilization of IP addresses.展开更多
基金National Natural Science Foundation of China (60532030)National Natural Science Foundation for Distinguished Young Scholars (60625102)
文摘Taking into chief consideration the features of aviation nodes in satellite networks, such as high moving speed, long communication distance, and high connection frequency, this article proposes an aviation-oriented mobility management method for IP/low earth orbit (LEO) satellite networks. By introducing the concept of ground station real-time coverage area, the proposed method uses ground-station-based IP addressing method and cell paging scheme to decrease the frequency of IP binding update requests as well as the paging cost. In comparison with the paging mobile IP (P-MIP) method and the handover-independent IP mobility management method, as is verified by the mathematical analysis and simulation, the proposed method could decrease the management cost. It also possesses better ability to support the aviation nodes because it is subjected to fewer influences from increased node speeds and newly coming connection rates.
文摘Technology is expanding like a mushroom,there are various benefits of technology,in contrary users are facing serious losses by this technology.Furthermore,people lost their lives,their loved ones,brain-related diseases,etc.The industry is eager to get one technology that can secure their finance-related matters,personal videos or pictures,precious contact numbers,and their current location.Things are going worst because every software has some sort of legacy,deficiency,and shortcomings through which exploiters gain access to any software.There are various ways to get illegitimate access but on the top is Linux Kali with QRLjacker by user grabber command.This study recapitulates the impacts of the said technology and related avoidance.Detail contemplation depicts social media users like WhatsApp users can take a long sigh of relief when they will adopt the recommended methods.The problem is breaching of legitimate social media real-time location by an illegitimate user through Linux Kali,for this reason,end-user has no knowledge to spoof their IP to protect their real-time location.This paper will address the solution to the said problem.
文摘Nowadays, there is a huge Intemet in the computer network, and a unified management on hundreds of thousands of computers has become a common phenomenon. Thus, it's not hard to imagine that the computer network is vulnerable to be threatened in security. In this paper, the problems of the computer network security are discussed. By establishing a reasonable fault tree system, computer security evaluation is completed within a given range, and each computer has its own IP address. In this process, it is necessary to find out a MAC address related to each IP address. A standard form is needed for address management, and then ARP table emerges. The emergence of ARP makes each IP address corresponding to MAC address, and also the communication between computers becomes very convenient. However, the t network security will be affected accordingly.
基金supported by National Natural Science Foundation of China(Grant No.NSFC61402257)National Basic Research Program of China(973 Program)(Grant Nos.2009CB320500+1 种基金2009CB320501)Tsinghua University Self-determined Project(No.2014z21051)
文摘In the design and construction process of Next Generation Internet, it is important to identify the source of each IP packet forwarding accurately, especially for the support of precise fine-grained management,control, traceability and improving the trustworthiness of the Internet. This paper designed a scalable Network Identity(NID) scheme for the Internet users, proposed NIDTGA(Network Identity and Time Generated Address), an IPv6 address generation algorithm embedded NID and time information, then designed and implemented an IPv6 address generation and traceback system based on NIDTGA. The design of NIDTGA, which reflects the length, time and owner attributes of the IP address, can be a good support to ADN(Address Driven Network). At the same time, by embedding the key elements of user identity and time in the IPv6 address,and by taking into account both the traceability and privacy, NIDTGA can provide a technical basis for the establishment of the network trust mechanism, and achieve the traceability of security event.
基金the National Natural Science Foundation of China (Grant No. 90704001)the National Basic Research Program of China (973 Program) (Grant No. 2003CB314800)
文摘The IP packet forwarding of current Internet is mainly destination based. In the forwarding process, the source IP address is not checked in most cases.This causes serious security, management and accounting problems. Based on the drastically increased IPv6 address space, a "source address validation architecture" (SAVA) is proposed in this paper, which can guarantee that every packet received and forwarded holds an authenticated source IP address. The design goals of the architecture are lightweight, loose coupling, "multi-fence support" and incremental deployment. This paper discusses the design and implementation for the architecture, including inter-AS, intra-AS and local subnet. The performance and scalability of SAVA are described. This architecture is deployed into the CNGI-CERNET2 infrastructure a large-scale native IPv6 backbone network of the China Next Generation Internet project. We believe that the SAVA will help the transition to a new, more secure and dependable Internet.
基金supported by The National Basic Research Program of China(973 program)(2014CB347800)The National Natural Science Foundation of China(No.61522205,No.61432002,No.61133006)+1 种基金The National High Techndogy Research Development Program of China(863 program)(No.2013AA013303,No.2015AA01A705,No.2015AA016102)ZTE communications and Tsinghua University Initiative Scientific Research Program.
文摘Given the emerging problems of today’s Internet,many new Internet architectures have been proposed by the net-working community.In general,the new approaches can be categorized into two types:evolutionary approaches and clean-slate approaches.The representative evolutionary solution is IPv6,while representative clean-slate approaches are NDN(Named Data Networking),MobilityFirst,NEBULA,XIA(Expressive Internet Architecture),and SDN(Software-Defined Networking).A comprehensive survey of these approaches are presented.Additionally,a novel network architecture that we recently proposed:ADN(Address-Driven Networking)is described,which intends to address the challenges faced by today’s Internet via the flexible and innovative utilization of IP addresses.