scholarly journals Securing and Improving the Internet Architecture

2020 ◽  
Vol 13 (4) ◽  
pp. 42
Author(s):  
Austin Liu

The information transfer protocol that supports the modern Internet with its hundreds of thousands of petabytes per month to billions of Internet users across the world was designed in 1981, and it lacks the capacity to properly ensure the security and stability of the Internet today. Features such as the prevention of network attacks, a large address space for the increasing number of devices, verification of the source of an Internet request, and so on are all absent from the current architecture. This paper seeks to review, summarize, and compare six proposals submitted to address the issues IP faces: the Accountable Internet Protocol, the Expressive Internet Architecture, MobilityFirst, Passport, StopIt, and the Traffic Validation Architecture. Finally, the paper details a protocol design that not only is feasible to adopt with the present infrastructure/computing power but also addresses some of the pressing issues of IP, with particular focus on the address space, mitigation of network attacks, and source verification.

Author(s):  
Md. Anwar Hossain ◽  
Mst. Sharmin Akter

Routing is a design way to pass the data packet. User is assigns the path in a routing configuration. A significant role played by the router for providing the dynamic routing in the network. Structure and Configuration are different for each routing protocols. Next generation internet protocol IPv6 which provides large address space, simple header format. It is mainly effective and efficient routing. It is also ensure good quality of service and also provide security. Routing protocol (OSPFv3) in IPv6 network has been studied and implemented using ‘cisco packet tracer’. ‘Ping’ the ping command is used to check the results. The small virtual network created in Cisco platform .It is also used to test the OSPFv3 protocol in the IPv6 network. This paper also contains step by step configuration and explanation in assigning of IPv6 address in routers and end devices. The receiving and sending the packet of data in a network is the responsibility of the internet protocol layer. It also contains the data analysis of packet forwarding through IPv6 on OSPFv3 in simulation mode of cisco packet virtual environment to make the decision eventually secure and faster protocol in IPv6 environment.


2020 ◽  
Vol 7 (1) ◽  
pp. 22-28
Author(s):  
Vladimir Eliseev ◽  
Anastasiya Gurina

  Abstract— The paper investigates the causes of widespread use by cybercriminals of the Internet of Things for organizing network attacks and other illegal use. An analysis of existing approaches and technologies for protecting networked computer devices is presented, as well as the main factors that prevent their use in the world of Internet of Things. An approach is suggested that ensures the integration of protective mechanisms directly into the composition of Things. Various variants of technology implementation are considered. Key aspects and potential ways of implementing the proposed approach are noted.Tóm tắt— Bài báo nghiên cứu về các phương thức được tội phạm mạng sử dụng rộng rãi trong Internet vạn vật (IoT), để tổ chức các tấn công mạng và các hành vi bất hợp pháp khác. Bài báo phân tích các phương pháp và công nghệ hiện có để bảo vệ các thiết bị kết nối mạng, cũng như các yếu tố chính để ngăn chặn việc sử dụng chúng trong IoT. Cách tiếp cận được đề xuất là đảm bảo việc tích hợp các cơ chế bảo vệ trực tiếp vào cấu trúc của IoT. Bài báo cũng xem xét các biến thể khác của việc thực hiện công nghệ này. Từ đó, đưa ra lưu ý về các khía cạnh chính và cách thức cài đặt tiềm năng để thực hiện phương pháp được đề xuất. 


2019 ◽  
pp. 1818-1839
Author(s):  
Hosnieh Rafiee ◽  
Christoph Meinel

With the increased use of the Internet to share confidential information with other users around the world, the demands to protect this information are also increasing. This is why, today, privacy has found its important place in users' lives. However, Internet users have different interpretations of the meaning of privacy. This fact makes it difficult to find the best way to address the privacy issue. In addition, most of the current standard protocols in use over the Internet do not support the level of privacy that most users expect. The purpose of this chapter is to discuss the best balance between users' expectation and the practical level of privacy to address user privacy needs and evaluate the most important protocols from privacy aspects.


2011 ◽  
pp. 273-285 ◽  
Author(s):  
Alev M. Efendioglu ◽  
Vincent F. Yip

The number of Internet users around the world has been steadily growing and this growth has provided the impetus and the opportunities for global and regional e-commerce. However, as with the Internet, different characteristics (infrastructure and socio-economic) of the local environment have created a significant level of variation in the acceptance and growth of e-commerce in different regions of the world. Our research focuses on the impact of these infrastructure and socio-economic factors on e-commerce development in China and the findings provide insights into the role of culture in e-commerce, and the factors that may impact a broader acceptance and development of e-commerce in China. In this chapter, we present and discuss our findings, and propose some strategies for success for e-commerce in China.


There are very few surveys conducted worldwide regarding internet users' opinions about internet regulation. What's more, the authors have already discussed the importance of measuring public opinion around the world in their endeavour to design and propose a fair IRS that will be accepted by the internet users at a national level. In this chapter, the authors discuss the design of their questionnaire and how it was evolved from the initial 2007 UK questionnaire to the current one that was used for conducting surveys in six different countries. This chapter presents the procedure that was used for collecting responses and what kinds of “safeguard” measures were taken in order to avoid deterioration of the gathered survey data. What's more, the analysis procedure of the gathered data is being presented, and the authors discuss the possibility of biased questionnaires and how the latter can be tackled further in future research.


Author(s):  
Xiaobin Li

A recent report from China Internet Network Information Center indicates that by the end of June 2015, 668 million Chinese have used the internet, which places China as the country with the most internet users in the world. As more Chinese get online, the internet has been integrated into providing education in China, where the age group using the internet the most often is between the ages of 20 and 29. Many of these youth are higher education students. With 34.6 million students the Chinese higher education system is the largest in the world, in which a significant proportion of the students' learning has been impacted by information and communication technology (ICT). The purpose of this article is to provide an overview of how the development of ICT in China has influenced higher education, what opportunities ICT offers for higher education, and what challenges Chinese face in further developing higher education with ICT.


2005 ◽  
Vol 22 (4) ◽  
pp. 306-310
Author(s):  
Andre Phillips ◽  
Michael C. B. Ashley

AbstractSatellite cloud imagery is a standard tool of meteorology, and also of ground-based observational astronomy. Fast access to cloud imagery through the Internet now permits more accurate prediction of local cloud cover than was formerly the case. This is particularly useful for automatic and remotely operated telescopes, where an observer may be at a considerable distance from the telescope itself. Since satellite imagery can now be accessed through the Internet with such ease, direct reception of radio transmissions from weather satellites may seem unnecessary. However, advances in computing power and radio receiver technology permit simple automated receipt of satellite transmissions, particularly from the NOAA series of low Earth orbit satellites. This has the advantage of more up-to-date, and higher resolution, cloud imagery than can be obtained from the Internet. We have operated such a satellite receiving station since 2003 April, and have found it particularly useful when remotely operating our telescopes at Siding Spring Observatory (SSO). By automatically publishing our cloud imagery onto the World Wide Web we have established a resource that is widely used by other local observatories and by the general public.


2019 ◽  
Vol 3 (2) ◽  
pp. 125
Author(s):  
Andri Veno ◽  
Tulus Prijanto ◽  
Nurkholis Nurkholis

E-Commerce is an affiliation of E-bisnis in electronic media era, which is fifth industry revolution era (digital era). It is shown by many companies using internet as the most effective means to advertise and promote products produced competing either nationally or globally. Indonesia is one of potential market in Asia even in the world with the fifth largest population in the world in 2017, which the population are more than 263 million people; while the internet users up to 30 June 2017 in Indonesia are more than 132 million people. Of 200 respondents, which the mean of age was 18-24 years old. The respondents consisted of 110 male and 90 female, thus the average gender in Solo was male. The result of analysis showed that Trust was positively and significantly influence Purchase intention, Website Quality was positively significantly influence the Purchase intention, and Percived Risk was positively and significantly influence the Purchase intention, so that each improvement of Percived Risk score would improve Purchase intention.


HortScience ◽  
1994 ◽  
Vol 29 (5) ◽  
pp. 579a-579
Author(s):  
Tim Rhodus

Effective communication of horticultural information over long distances requires the ability to present and receive not only text-based information but also images, sounds, and live-action video. Until recently, the Internet enabled users to communicate in each of these four modes, but not simultaneously. However, as a result of the World-Wide Web (WWW) project and the creation of NCSA Mosaic software, Internet users are able to access and deliver practically any form of communication, as long as it can be digitized. Information from around the world on literally thousands of subjects is now available 24 hours a day. Opportunities to communicate with the general public, primary and secondary science students, or practicing horticulturists are no longer limited by publication delays, travel distances, or media limitations.


2021 ◽  
Author(s):  
O. Vishali Priya ◽  
R. Sudha

In today’s world, technology is constantly evolving; various instruments and techniques are available in the agricultural field. And within the agrarian division, the IoT preferences are Knowledge processing. With the help of introduced sensors, all information can be gathered. The reduction of risks, the mechanization of industry, the enhancement of production, the inspection of livestock, the monitoring of environment conditions, the roboticization of greenhouses, and crop monitoring Nearly every sector, like smart agriculture, has been modified by Internet-of-Things (IoT)-based technology, which has shifted the industry from factual to quantitative approaches. The ideas help to link real devices that are equipped with sensors, actuators, and computing power, allowing them to collaborate on a task while staying connected to the Internet, dubbed the “Internet of Things” (IoT). According to the World Telecommunication Union’s Worldwide Guidelines Operation, the Internet of Things (IoT) is a set of sensors, computers, software, and other devices that are connected to the Internet. The paper is highly susceptible to the consequences of its smart agriculture breakthrough.


Sign in / Sign up

Export Citation Format

Share Document