scholarly journals Network Address Translation using a Programmable Dataplane Processor

Author(s):  
Juan Sebastian Mejia Vallejo ◽  
Daniel Lazkani Feferman ◽  
Christian Esteve Rothenberg

A short-term solution for the depletion of Internet Protocol (IP) addresses and scaling problems in network routing is the reuse of IP address by placing Network Address Translators (NAT) at the borders of stub domains. In this article, we propose an implementation of NAT using Programming ProtocolIndependent Packet Processors (P4) language, taking advantage of its features such as target-agnostic dataplane programmability. Through the MACSAD framework, we generate a software switch that achieves high performance with the support of different hardware (H/W) and Software (S/W) platforms. The main contributions of this paper relate to the performance evaluation results of the NAT implementation using P4 language with MACSAD compiler.

Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1510 ◽  
Author(s):  
Prakash Veeraraghavan ◽  
Dalal Hanna ◽  
Eric Pardede

The Internet Protocol (IP) version 4 (IPv4) has several known vulnerabilities. One of the important vulnerabilities is that the protocol does not validate the correctness of the source address carried in an IP packet. Users with malicious intentions may take advantage of this vulnerability and launch various attacks against a target host or a network. These attacks are popularly known as IP Address Spoofing attacks. One of the classical IP-spoofing attacks that cost several million dollars worldwide is the DNS-amplification attack. Currently, the availability of solutions is limited, proprietary, expensive, and requires expertise. The Internet is subjected to several other forms of amplification attacks happening every day. Even though IP-Spoofing is one of the well-researched areas since 2005, there is no holistic solution available to solve this problem from the gross-root. Also, every solution assumes that the attackers are always from outside networks. In this paper, we provide an efficient and scalable solution to solve the IP-Spoofing problem that arises from malicious or compromised inside hosts. We use a modified form of Network Address Translation (NAT) to build our solution framework. We call our framework as NAT++. The proposed infrastructure is robust, crypto-free, and easy to implement. Our simulation results have shown that the proposed NAT++ infrastructure does not consume more than the resources required by a simple NAT.


2014 ◽  
Vol 687-691 ◽  
pp. 2689-2692
Author(s):  
Zhao Li Wu

NAT (Network Address Translation) is the process of transforming one IP address in the datagram header into another. In practical applications, NAT is mainly used to realize the function of the access of private network to public network. The method of using a small number of public IP addresses representing a large quantity of private IP addresses will help to slow down the depletion of the IP address space available. As the Network Architecture is becoming more complex, the way, under such context, the NAT technology functions is of great importance. This dissertation will mainly analyze the special treatment of NAT in the following aspects like unified address management ,the priority level of address pool ,NAT mapping in PING Operation ,the treatment of ICMP err packet ,the NAT transformation of fragmented packet as well as the infinitive connection of multi –core products.


2009 ◽  
Vol 2009 ◽  
pp. 1-6
Author(s):  
Maher Ben Jemaa ◽  
Nahla Abid ◽  
Maryline Laurent-Maknavicius ◽  
Hakima Chaouchi

The role of Internet Protocol (IP) is becoming more and more problematic especially with the new requirements of mobility and multihoming. Host Identity protocol (HIP) defines a new protocol between the network and transport layers in order to provide a better management to those requirements. The protocol defines a new namespace based on cryptographic identifiers which enable the IP address roles dissociation. Those new identifiers identify hosts rather than IP addresses. Because HIP is a quite recent protocol, we propose to present an experimental evaluation of its basic characteristics.


2013 ◽  
Vol 284-287 ◽  
pp. 2835-2839 ◽  
Author(s):  
Kuan Lin Chen ◽  
Shaw Hwa Hwang ◽  
Cheng Yu Yeh

Although the integration of SIP-based systems with a network address translation (NAT) environment has been investigated extensively, SIP-based system operation in symmetric model NAT remains relatively unexplored. This paper studies the application of symmetric NAT traversal techniques to SIP-based systems. This study focuses on following the SIP process, a non-additive service server, and employs standard SIP commands such as “REGISTER,” “INVITE,” and “200 OK” to predict and deliver the IP addresses and port numbers of the local NAT. This study also implements RTP streaming in the client-to-client (C2C) mode. The symmetric NAT traversal method for the SIP increases the direct peer-to-peer connection rate. This approach also avoids the STUN and RTP-Relay server. Experimental results with 50 types of NAT indicate that symmetric NAT traversal performs better than the STUN solution. The RTP-Relay server bandwidth cost is likewise superior to the TURN solution. These finding have important implications for SIP-based system developers and carrier providers.


2018 ◽  
Vol 10 (2) ◽  
pp. 74-94 ◽  
Author(s):  
Jonathan McKeague ◽  
Kevin Curran

The Internet is built atop the Internet Protocol (IP) which has at its heart a unique identifier known as an IP address. Knowing the location of an IP address can be very useful in many situations such as for banks to know if a connection is in progress from online fraud hotspots. IP addresses can be spoofed allowing hackers to bypass geographical IP restrictions and thus render some category of fraud prevention useless. Anonymous proxies (AP) which act as intermediate relays which disguise the source IP addresses can play a large role in cybercrime. There is a need to ascertain whether an incoming IP connection is an original source matched IP address, or one being routed through an anonymising proxy. This article concentrates on various methods used by anonymising proxies, the characteristics of the anonymous proxies and the potential mechanisms available to detect if a proxy is in use.


Author(s):  
Do Van Tien

Dynamic Host Configuration Protocol (DHCP) allows the automatic networking configuration of computers and devices (clients) in Internet Protocol (IP) networks. It is used by clients to request an IP address and obtain configuration parameters (netmask, router IP address, Domain Name Server –DNS– address etc.) for IP networking from a DHCP server. For this purpose, a pool of IP addresses is administered and maintained in a DHCP server. In order to reuse an IP address that is no longer needed by the client to which it was assigned, a lease time parameter is applied. That is, each client leases an IP address from the chosen DHCP server for a limited period of time.


2016 ◽  
Vol 1 (1) ◽  
pp. 51-58
Author(s):  
Juwanda Natali ◽  
Fajrillah Fajrillah ◽  
T.M. Diansyah

To build a network interconnect Local Area Network (LAN) that will be needed in the form of Virtual groups Local Area Network (LAN). DHCP IP address given by the router to the PC located in the network. NAT (Network Address Translation) is one method that is used as an IP translation to gain entrance into a different network. NAT (Network Address Translation) can allow a host to go into different networks without allowing the host intended to tap into their networks using VLAN With the two different networks into a single switch can be connected. Giving DHCP IP will allow the network administrator to provide the IP address to a PC for IP assigned automatically by the router. An IP host is forwarded in a network with NAT.


Author(s):  
Ei Ei khaing ◽  
Mya Thet Khaing ◽  
Akari Myint Soe ◽  
Shwe Sin Myat Than

Nowadays, many people will be used internet that for their work, communication, education, economic and organization necessary that is used today. Network address translation (NAT) is a method of remapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. A network is a system of hardware and software, put together for the purpose of communication and resource sharing. A network includes transmission hardware devise to interconnect transmission media and to control transmissions and software to decode and format data. The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks. Knowledge on how the internet is able to communicate with internet users is a mystery to some people. Internet communication need to be TCP/IP protocol which means that TCP is Transmission Control Protocol, or what is sometimes simply used to refer to Internet Protocol, is the basic unit for communication on the internet. This can also be applied to private internet, like Ethernet and so on. Despite TCP and IP being used interchangeably, there is a slight difference between the two in relation to the roles they play IP is directly responsible for obtaining internet addresses and then it is the work of TCP to deliver the data obtained to the addresses achieved by IP. TCP/IP provides end-to-end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination. This paper aim is described operation and models of TCP-IP suite in data communication network.


Sign in / Sign up

Export Citation Format

Share Document