文章主要探讨了医院网际互连协议第4版(Internet Protocol version 4,IPv4)网络向网际互连协议第6版(Internet Protocol version 6,IPv6)网络过渡的通信技术应用,重点分析了双栈技术、隧道技术以及转换技术在过渡过程中的应用。通过华为...文章主要探讨了医院网际互连协议第4版(Internet Protocol version 4,IPv4)网络向网际互连协议第6版(Internet Protocol version 6,IPv6)网络过渡的通信技术应用,重点分析了双栈技术、隧道技术以及转换技术在过渡过程中的应用。通过华为eNSP模拟器构建双栈网络环境,并进行多项测试验证其可行性。结果表明,双栈技术能有效支持IPv4和IPv6协议共存,为医院网络现代化提供技术保障。同时,研究强调在过渡过程中需考虑的安全挑战和设备升级问题,提出了具体的实施策略和优化建议。展开更多
文章以临夏现代职业学院校园网互联网协议版本6(Internet Protocol version 6,IPv6)升级改造为例,介绍互联网协议版本4(Internet Protocol version 4,IPv4)校园网现状和存在的问题,比较IPv4与IPv6的优缺点,结合IPv6迁移改造的双协议栈...文章以临夏现代职业学院校园网互联网协议版本6(Internet Protocol version 6,IPv6)升级改造为例,介绍互联网协议版本4(Internet Protocol version 4,IPv4)校园网现状和存在的问题,比较IPv4与IPv6的优缺点,结合IPv6迁移改造的双协议栈、隧道技术,探索规划阶段性升级改造IPv6的建设方案,重点讨论IPv4/IPv6双栈校园网技术实现。展开更多
分析了IPv6(Internet Protocol Version 6)与IPv4(Internet Protocol Version 4)各自的特点以及两者之间的区别和联系,介绍了多播技术、双栈技术、隧道技术、协议转换技术等4种过渡技术,并讨论了各种技术的工作原理。在IPv6与IPv4的互...分析了IPv6(Internet Protocol Version 6)与IPv4(Internet Protocol Version 4)各自的特点以及两者之间的区别和联系,介绍了多播技术、双栈技术、隧道技术、协议转换技术等4种过渡技术,并讨论了各种技术的工作原理。在IPv6与IPv4的互联通信中,尽可能地保留了IPv4,使其在IPv6环境中有效运行,从而保证了数据包的安全性。实例验证结果表明,所提出的转换协议技术实现了2个协议之间的互联通信。展开更多
随着云计算、物联网、大数据等网络技术迅速发展和高校信息化建设需求的日益剧增,导致智慧校园建设中网际互连协议(Internet Protocol,IP)地址严重不足,因此提出采用网际协议版本4(Internet Protocol version 4,IPv4)/网际协议版本6(Int...随着云计算、物联网、大数据等网络技术迅速发展和高校信息化建设需求的日益剧增,导致智慧校园建设中网际互连协议(Internet Protocol,IP)地址严重不足,因此提出采用网际协议版本4(Internet Protocol version 4,IPv4)/网际协议版本6(Internet Protocol version 6,IPv6)过渡技术解决这个问题。首先,深入研究IPv4/IPv63种过渡技术;其次,结合智慧校园建设的实际情况和网络管理实践经验,提出了符合高校的IPv4/IPv6过渡策略;最后,完成了高校IPv6校园网方案设计和部署实现,以期为IPv6智慧校园建设和IPv6应用顺利推广提供参考依据和技术保障。展开更多
The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(...The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules.展开更多
The future generation networks or 4G networks constitute of varied technologies converged over the Internet protocol version 6(IPv6) core. The 4G networks offer varied services over different interfaces to the user no...The future generation networks or 4G networks constitute of varied technologies converged over the Internet protocol version 6(IPv6) core. The 4G networks offer varied services over different interfaces to the user nodes. Mobility management in 4G networks is an issue that exists. The handover protocols for mobility management in 4G networks that currently exist, do not consider wireless signal degradation during handover operations. This paper introduces the Noise Resilient Reduced Registration Time Care of Mobile IP(NR RRTC:MIP) protocol for handover management. A handover decision algorithm based on the signal strength measured by the user nodes is considered in the NR RRTC: MIP protocol. A simulation study is discussed in the paper to evaluate the performance of the NR RRTC: MIP protocol. The results obtained from the simulation study prove that the NR RRTC: MIP protocol effectively reduces handover latencies and improves network performance.展开更多
PIM-SM(Protocol Independent Multicast-Sparse Mode) is a main multicast routing pro-tocol in the IPv6(Internet Protocol version 6).It can use either a shared tree or a shortest path tree to deliver data packets,consequ...PIM-SM(Protocol Independent Multicast-Sparse Mode) is a main multicast routing pro-tocol in the IPv6(Internet Protocol version 6).It can use either a shared tree or a shortest path tree to deliver data packets,consequently the multicast IP lookup engine requires,in some cases,two searches to get a correct lookup result according to its multicast forwarding rule,and it may result in a new requirement of doubling the lookup speed of the lookup engine.The ordinary method to satisfy this requirement in TCAM(Ternary Content Addressable Memory) based lookup engines is to exploit parallelism among multiple TCAMs.However,traditional parallel methods always induce more re-sources and higher design difficulty.We propose in this paper a novel approach to solve this problem.By arranging multicast forwarding table in class sequence in TCAM and making full use of the intrinsic characteristic of the TCAM,our approach can get the right lookup result with just one search and a single TCAM,while keeping the hardware of lookup engine unchanged.Experimental results have shown that the approach make it possible to satisfy forwarding IPv6 multicast packets at the full link rate of 20 Gb/s with just one TCAM with the current TCAM chip.展开更多
文摘文章主要探讨了医院网际互连协议第4版(Internet Protocol version 4,IPv4)网络向网际互连协议第6版(Internet Protocol version 6,IPv6)网络过渡的通信技术应用,重点分析了双栈技术、隧道技术以及转换技术在过渡过程中的应用。通过华为eNSP模拟器构建双栈网络环境,并进行多项测试验证其可行性。结果表明,双栈技术能有效支持IPv4和IPv6协议共存,为医院网络现代化提供技术保障。同时,研究强调在过渡过程中需考虑的安全挑战和设备升级问题,提出了具体的实施策略和优化建议。
文摘文章以临夏现代职业学院校园网互联网协议版本6(Internet Protocol version 6,IPv6)升级改造为例,介绍互联网协议版本4(Internet Protocol version 4,IPv4)校园网现状和存在的问题,比较IPv4与IPv6的优缺点,结合IPv6迁移改造的双协议栈、隧道技术,探索规划阶段性升级改造IPv6的建设方案,重点讨论IPv4/IPv6双栈校园网技术实现。
文摘分析了IPv6(Internet Protocol Version 6)与IPv4(Internet Protocol Version 4)各自的特点以及两者之间的区别和联系,介绍了多播技术、双栈技术、隧道技术、协议转换技术等4种过渡技术,并讨论了各种技术的工作原理。在IPv6与IPv4的互联通信中,尽可能地保留了IPv4,使其在IPv6环境中有效运行,从而保证了数据包的安全性。实例验证结果表明,所提出的转换协议技术实现了2个协议之间的互联通信。
文摘随着云计算、物联网、大数据等网络技术迅速发展和高校信息化建设需求的日益剧增,导致智慧校园建设中网际互连协议(Internet Protocol,IP)地址严重不足,因此提出采用网际协议版本4(Internet Protocol version 4,IPv4)/网际协议版本6(Internet Protocol version 6,IPv6)过渡技术解决这个问题。首先,深入研究IPv4/IPv63种过渡技术;其次,结合智慧校园建设的实际情况和网络管理实践经验,提出了符合高校的IPv4/IPv6过渡策略;最后,完成了高校IPv6校园网方案设计和部署实现,以期为IPv6智慧校园建设和IPv6应用顺利推广提供参考依据和技术保障。
基金funded by the Deanship of Scientific Research at Najran University for this research through a Grant(NU/RG/SERC/12/50)under the Research Groups at Najran University,Saudi Arabia.
文摘The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules.
基金the Special Research Fund for the Doctoral Program of Higher Education(No.20050248037)the National Natural Science Foundation of China(No.50779033)
文摘The future generation networks or 4G networks constitute of varied technologies converged over the Internet protocol version 6(IPv6) core. The 4G networks offer varied services over different interfaces to the user nodes. Mobility management in 4G networks is an issue that exists. The handover protocols for mobility management in 4G networks that currently exist, do not consider wireless signal degradation during handover operations. This paper introduces the Noise Resilient Reduced Registration Time Care of Mobile IP(NR RRTC:MIP) protocol for handover management. A handover decision algorithm based on the signal strength measured by the user nodes is considered in the NR RRTC: MIP protocol. A simulation study is discussed in the paper to evaluate the performance of the NR RRTC: MIP protocol. The results obtained from the simulation study prove that the NR RRTC: MIP protocol effectively reduces handover latencies and improves network performance.
基金Supported by the National High-Tech Research and De-velopment Plan of China (No. 2007AA01Z2a1)the Na-tional Grand Fundamental Research 973 Program of China (No. 2007CB307102)
文摘PIM-SM(Protocol Independent Multicast-Sparse Mode) is a main multicast routing pro-tocol in the IPv6(Internet Protocol version 6).It can use either a shared tree or a shortest path tree to deliver data packets,consequently the multicast IP lookup engine requires,in some cases,two searches to get a correct lookup result according to its multicast forwarding rule,and it may result in a new requirement of doubling the lookup speed of the lookup engine.The ordinary method to satisfy this requirement in TCAM(Ternary Content Addressable Memory) based lookup engines is to exploit parallelism among multiple TCAMs.However,traditional parallel methods always induce more re-sources and higher design difficulty.We propose in this paper a novel approach to solve this problem.By arranging multicast forwarding table in class sequence in TCAM and making full use of the intrinsic characteristic of the TCAM,our approach can get the right lookup result with just one search and a single TCAM,while keeping the hardware of lookup engine unchanged.Experimental results have shown that the approach make it possible to satisfy forwarding IPv6 multicast packets at the full link rate of 20 Gb/s with just one TCAM with the current TCAM chip.