The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the heterogeneity of end systems and their networking applications grows, networking challenges to meet the various requirements of traffics from different applications should be coped with new networking features, not possible in today's Internet. OpenFlow proposes an open programmable interface to leverage more network controllability by separating control and data path of a network device and...
By using SNMP to collect network layer and data link layer information, network topologic can be discovered. This article presents how to get topologic from network step by step. An algorithm is also given for removing duplicate connections on map if VLAN exists.
Random Early Detection (RED) algorithm, a framework of active queue management (AQM), has been proposed in order to improve the performance of congestion routers due to the increased use of Internet. But, the basic problem of a lag between congestion's occurrence and its remedy remained. To overcome this problem of RED, Explicit Congestion Notification (ECN) proposed by the IETF that allows end-to-end...
More and more network applications have appeared in recent years. Government, university, industry and individual Internet users and network services need more bandwidth and various network applications. Many new network protocols are proposed so that it is now becoming harder to manage the network. In the conditional network, every network protocol uses the fixed port, the so-called well-known port...
Clustering solutions are frequently used in large enterprise and mission critical applications with high performance and availability requirements. This is achieved by deploying multiple servers for the purpose of load balancing or by having redundant servers for the purpose of high availability. Most cluster management tools focus on the availability of servers and IP connectivity, and rely on shared...
Aiming at the security requirement of the Intranet that is different from Internet, an security architecture for Intranet is proposed. In physical layer and data link layer, based on network switch the intranet is divided into several parts separated from each other as required. In network layer, making use of the NAT gateway integrated in virtual server the intranet or its part is hidden to ensure...
The network topology discovery is the basis of network management. A hierarchical design model which includes access layer, distribution layer and core layer is widely used in a construction of a switched LAN. ??Layer 3 switching?? and VLAN is used in equipments from different vendors. This paper proposes an algorithm of physical topology discovery of heterogeneous IP networks with VLAN which is designed...
Network monitoring is an important method of network management and preserving safe operation. This paper presents a switched LAN (local area network) monitor mechanism based on ARP spoofing. Using WinPcap library function to capture the packets in switched LAN, the method contributes to the follow-up data analysis and detection of attack. Experimental data and analysis results show the effectiveness...
Switched Ethernet is being used for real time transmissions in industrial automation more and and more. Most modern industrial switches are equipped with mechanisms to deal with time predictability. However, real-time transmission not only requires these mechanisms, but also the proper policies for managing network resources. This paper proposes the use of contracts. A contract is a set of transmission...
Starting from the actual needs of network management, such as cabling topology graph auto-discovery which also contains room address-switch ports mapping mainly used in the post-maintenance, a method of hardware and software system integration solution to the management of practical problems encountered is proposed. To facilitate the integration, a telnet supported method of device interoperability...
OpenFlow is proposed as an architectural platform and a unified control plane for packet and circuit networks, with the main goal of simplifying network control and management while fostering innovative change in them.
In order to solve the problems that the process of the evolution is only in one step and the investment in network is so costly when the network in nowadays evolutes to NGN(Next Generation Networking), this paper has get a deep research about the soft switch, media gateway control protocol, access gateway and media server and such kind of technology and then submit a kind of design methodology, through...
Routers, whose main tasks include forwarding and best route computing, have undergone several design architectures in the last years in order to deal with the explosion of traffic in the Internet. Next generation routers are made with enhanced memory capacity and computing resources, distributed across a very high speed switching fabric. However, the current routing software products, particularly...
Guarantee of QoS (quality of service) and mobility management are important research areas in NGN (next generation networks). Most people have been taking a route of mobile IP over MPLS (MIoM) to meet such challenge. However, MIoM has a drawback considering that MPLS itself does not have any direct control over transmission at the physical layer, instead, it has to rely on existing data link layer...
Precise information of MAC layer topology is important for both network management and network analysis. There are many topology discovery algorithms based on the address forwarding tables but they supposed that the network to discovery hasn't redundant links or these algorithms are not effective to discover redundant links. In this paper, we present algorithms based on address forwarding tables (AFT)...
The Internet Protocol version 6 (IPv6) protocol represents an emerging networking capability designed to enhance transport, management and security of IP packets through the networks. IPv6 packet header required for this protocol is much larger than that of the current IPv4 protocol. The processing of IPv6 packets can be complex depending on how many packet header options are needed for a given mode...
In this paper, a novel algorithm for automatic topology discovery of large-scale multi-subnet physical networks was proposed, this algorithm used information reachable-address and port's traffic statistics information as constraints, based on skeleton initialization, refinement and stitching. Practically, this algorithm can accurately discovery the complete topology of a large-scale multi-subnet physical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.