The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an application of Internet Protocol Options for enhancing self-authenticated feature to the Internet Protocol. The options consist of Keyed-Hash Message Authentication Code and timestamp. In the network access control system, local network devices needing to access protected networks have to attach the options to packet header before sending to destination through a network access...
For ubiquitous network services, wireless local-area network (WLAN) systems using plural access-points (APs) are often deployed in a network field. Then, a host may detect signals from multiple APs that are interfered. This redundancy can cause performance degradations and energy wastes if a small number of hosts participates the network. On the other hand, if many hosts participate there, the number...
A function design of NAPT based on middleware and a system implementation of border gateway is proposed, connecting Ethernet with the Internet via non-IP link. The middleware is built by using Libpcap and Libnet in border gateway for excellent extendibility and compatibility. The data structure, algorithm, chart flow for NAPT are given.The test results show that the gateway successfully implements...
Many wireless sensor network applications require a gateway device to interface with services running on the Internet. Because of the software complexity involved in this device, it is often realized using a real-time operating system running on an application processor. Most systems burden the user with developing the protocol handling and device configuration and management inside the application...
In the existing IPSec architecture, in which tunnel is built in kernel, the number of concurrent tunnels is restricted by IP address configured on the machine and user can not control the process of establishing tunnel. This brings inconvenience when we use personal computer to measure the performance parameters of VPN Gateway (e.g. the maximum number of concurrent tunnels and the maximum rate of...
This paper proposes an implementation of IEEE 802.21 MIH (Media Independent Handover) in Linux kernel space for cognitive and smart handovers. In the proposed scheme, the surrounding wireless access network information is collected and provided by IEEE 802.21 MIH, and the mobile node (MN) performs time-limited smart scanning with interleaved packet delivery for target access point. For better performance,...
How to effectively manage network resources, compute occupation of the network resources and monitor people's online behavior has become pressing needs. On the other hand, some new IPv6 resources have emerged and how to make users access these IPv6 resources easily also becomes an urgent problem. In this paper, a flow statistics and network access control system has been proposed which realizes the...
The IETF's Next Steps in Signaling (NSIS) framework provides an up-to-date signaling protocol suite that can be used to dynamically install, maintain, and manipulate state in network nodes. In its two-layered architecture, the General Internet Signaling Transport (GIST) protocol is responsible for the transport and routing of signaling messages. The strong presence of Network Address Translation (NAT)...
As a comparatively new IPC, Netlink socket has its own predominance in the communication between user process and kernel space. This paper has analyzed the application of Netlink socket in the IPSec support mechanism, summarized the Netlink socket message supported by kernel IPSec module, implemented the IPSec configuration with Netlink sockets.
The infrastructure of the modern Internet has become a complex mesh of varying network types. A single network protocol cannot optimally support every underlying technology and the diverse nature of these networks places increasing strain on the concept of running IP over everything and everything over IP. The introduction of new protocols and services also forces network administrators to employ...
The paper has firstly made thorough research and analysis to the IPsec support mechanism in Linux kernel 2.6 and then has given out a comprehensive building scheme of the IPsec VPN security gateway based on Linux kernel 2.6, combined with self-designed VPN security gateway console, the security gateway's interaction with kernel module, and the IKE module. The paper has designed and implemented an...
The gateway realizes the fusion of wireless sensor network and external network. Some low performance gateways cannot meet the requirement of surge data collection. Consequently, a gateway that based on PXA270, using embedded Linux is designed to meet the requirement. To protect the data that transmitted by Ethernet through the gateway, a TCP/IP strategy is constituted, which can reduce the probability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.