The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The article issue is the enterprise information protection within the internet of things concept. The aim of research is to develop arrangements set to ensure secure enterprise IPv6 network operating. The object of research is the enterprise IPv6 network. The subject of research is modern switching equipment as a tool to ensure network protection. The research task is to prioritize functioning of...
In this paper, we implemented OpenFlow scheduled bundle in the Open vSwitch software switch and evaluated its performance in SDN testbed networks under different scenarios. The scheduled bundle is a very new mechanism proposed in the OpenFlow protocol for achieving consistent updates among multiple SDN switches. However, this feature has not been supported in any hardware SDN switches or any software...
Ethernet plays an important role in the layer 2 network. Unfortunately, the tremendous Address Resolution Protocol (ARP) broadcast traffic among massive hosts limits the scale of Ethernet. Recently, Software-Defined Network (SDN) has been proposed to suppress broadcast traffic by centralized control. However, existing approaches based on SDN suffer from an adaptability limitation as they cannot independently...
Intelligent Network Application Protocol allows telecom operators to differentiate themselves by providing value-added services in addition to the standard telecom services. In some telecom operators, switch-wide usage of INAP service causes interaction for tandem calls which need to be transited towards adjacent switch instead of INAP query. In this work, we share our experience and design solution...
The advantages of avionics switched network in network scale and flexibility greatly improve the communication performance of avionics network, promote the development of IMA/DIMA technology and also increase network scale and complexity. Meanwhile, requirements for the management of the avionics system are also on the rise. In this paper, the characteristics of SNMP protocol and airborne switched...
To predict lower bounds on the performance of applications, the cloud should provide guarantees on bandwidth that each virtual machine can obtain. By competing for spare network bandwidth, current solutions that provide bandwidth guarantees can achieve work conservation as well. However, they usually fail to provide accurate bandwidth guarantees, for the interference between traffic for achieving...
in this work, SDN has been utilized to alleviate and eliminate the problem of ARP poisoning attack. This attack is the underlying infrastructure for many other network attacks, such as, man in the middle, denial of service and session hijacking. In this paper we propose a new algorithm to resolve the problem of ARP spoofing. The algorithm can be applied in two different scenarios. The two scenarios...
In this paper authors present a new method to organize hardware search in the tables of rules in the software defined network (SDN) switch. This paper describes the design features of modern SDNs based on open standard OpenFlow, main problems of modern OpenFlow switches, and proposes a new approach for building hardware search based on field-programmable gate arrays (FPGAs). The proposed method allows...
This paper presents a new curriculum for the Computer Networks Design course intended as advanced course for computer science students. We have developed an adaptive curriculum, which introduces two CISCO CCNA 3 (LAN Switching) and 4 (WAN Technologies) courses instead of the existing (regular) tutorials and laboratory exercises. The students can choose whether they would like to learn the course by...
Many commercial and open-source network simulators are available; however, most of them are not suited for novices in college and school education or learning. Moreover, although Ethernet has recently become much more important, simulators that can be used for this purpose is rare because most simulators suited for education and learning are designed for IP communication. The author developed a simple...
In this paper, we propose a distributed storage system which relocates data blocks autonomously among the storage nodes. In the system which is composed of heterogeneous storage nodes, there are performance gaps among the storage devices. The storage tiers are made by such gaps in the system. When frequently accessed data blocks are placed on improper storage tier, system performance may decline....
Traditionally, the architecture of control system in large physics experiment is based on PLC and DCS like EPICS. For the control information in controls system, its timestamp is marked in control computer after transferred from PLC to computer. This mode will introduce more time deviation in time stamp. In CSNS, we will use a new PLC from BECKHOFF which can provide real-time timestamp, and we can...
If everything had gone according to plan, the Internet as we know it would never have sprung up. That plan, devised 35 years ago, instead would have created a comprehensive set of standards for computer networks called Open Systems Interconnection, or OSI. Its architects were a dedicated group of computer industry representatives in the United Kingdom, France, and the United States who envisioned...
Along with the progress of the demonstration centre of construction projects, using the application in place of funds to purchase a lot of network equipment, in order to solve the network equipment unified management and maintenance problem, an method of network VTP domain for computer experimental teaching demonstration center is presented. First, the VTP concept, function and characteristics are...
The effect of interleaving an alternate task during tutoring and testing was studied in the context of an online problem-solving software tutor. A controlled study was used and ANOVA was used for data analysis. It was found that introduction of the alternate task did not result in any difference in the scores of control and test groups during testing. It did not promote greater cognitive or affective...
Over the past 20 years, IPv4 network development for the computer to make a great contribution, however, gradually revealed its flaws. IPv6 to replace IPv4 with its inevitability. However, because these two protocols are very different. And the transition to equipment and software with updates and upgrades, and how to minimize the cost to achieve the campus network from IPv4 to IPv6 transition is...
The USB chip 68013A accommodate the higher data rates specified by USB 2.0 specification .This chip has an enhanced 8051 processor with whole memory bus and some I/O pins. We can control I/O pins or complex peripheral through the control endpoint EP0. It takes full advantage of the resource of chip to avoid transfer control data on high speed endpoint such as EP2. This paper illuminates the method...
In 1972, three years after ARPANET started to operate, the Spanish telephone company, then CTNE and now Telefónica, launched the first worldwide public data transmission service, based upon packet switching technology; twelve years later, in France, started to being offered TRANSPAC services. When starting its operation, the Spanish network had three main hosts, installed in Madrid (Univac 418 III),...
In early 1970's British Post Office set its first plan for the establishment of a public digital data network. In parallel this approach was an investigation of the two switching methods: a) the circuit switching technique and b) the newly developed packet switching. In accord the “Experimental Packet Switched Service - EPSS” has been established. This was functionally separated from existing digital...
Network security plays an important part in LAN system. The 802.1X protocol provides a port-based network access control to the LAN. In this paper, three cases of user name attacks against the 802.1X are given firstly. Then, the design flaws of 802.1X system are analyzed. At last, an improved authentication process is presented and how to prevent the user name attacks is discussed.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.