internet protocols
Recently Published Documents


TOTAL DOCUMENTS

175
(FIVE YEARS 36)

H-INDEX

11
(FIVE YEARS 2)

2022 ◽  
Author(s):  
Juliao Braga ◽  
Jeferson Campos Nobre ◽  
Lisandro Zambenedetti Granville ◽  
Marcelo Santos

The IETF is responsible for the standardization and development of Internet protocols and this is based on the voluntary participation ofprofessionals, academics, and resear- chers from around the world. Volunteers work together through email lists and in three face-to-face meetings yearly. This proposal considers the importance ofidentifying mul- tidisciplinary opportunities around the Internet Engineering Task Force (IETF) in the process ofcreating or improving innovative standards on the Internet. We will discuss the organization of working groups, highlighting discussions ranging from protocols known as the Internet Protocol (IP) to research groups such as Things-to-Things (T2TRG) that discuss standards on the Internet ofThings (IoT). The opportunity to discuss theoretical/- practical challenges and manners of collaboration at the IETF opens up a vast prospect ofinclusion for the Brazilian community, as it becomes aware ofhow the IETF is consti- tuted and remains active, vigilant and prepared for the necessary changes for the smooth functioning of the Internet. The multidisciplinary, in the field of computing science that aggregates the volunteering of the IETF, is evident and needs the active help of people with diversified knowledge and in areas other than, necessarily, networks. In this way, this chapter covers since basic foundations on the Internet, the functioning of the IETF, the process ofdevelopment ofnew protocols, as well as the necessary tools and rules for writing an Internet-Draft (I-D).


Author(s):  
Richard Essah ◽  
Darpan Anand

The internet protocols are increasingly imposed in recent times, there is a need to propose a study on the performance analysis on OSPFV3 and EIGRP in IPV6 application. IP is currently involved in sensitive areas of internet protocols, remote sensing, telepresence, computer networks and so on. The IP exists in two versions (IPv4 and IPv6), the difference between these two protocols is distinguished in terms of features, operation, and performance. In this study, measuring and evaluation on the performance of the two IPv4 and IPv6 protocols in the networks of communicating companies are proposed for further studies based on the literature gaps identified. The study should be performed by varying the routing protocols RIP, RIPnG, OSPF, OSPFv3, IS-IS and ISIS v6. Further studies should conduct simulation on performance analysis of OSPFV3 and EIGRP in IPV6 applications. The gaps identified after reviewing a number of literature on OSPFV3 and EIGRP with IPV6 network needs to be done since it sought to bridge gaps in literature.


Author(s):  
Daniel Del Gaudio ◽  
Pascal Hirmer

The internet of things envisions self-controlled and decentralized environments in which hardware devices, equipped with sensors and actuators, communicate with each other through standardized internet protocols to reach common goals. However, this leads to very complex environments, for example smart factories, which require fulfilling a large variety of challenges to enable functioning IoT applications. These challenges include, for example, powerful communication technologies and standards, security, privacy, efficiency, or robustness. Hence, a combination of many different research areas is necessary to create holistic IoT environments and applications. This is especially the case in safety-critical environments, such as smart cities or smart factories. In this survey paper, the authors discuss challenges and research gaps in the area of IoT. By doing so, they discuss whether these challenges are fulfilled by state-of-the-art approaches or whether there are still research gaps to be filled.


2021 ◽  
Author(s):  
Peter P. Rohde

Following the emergence of quantum computing, the subsequent quantum revolution will be that of interconnecting individual quantum computers at the global level. In the same way that classical computers only realised their full potential with the emergence of the internet, a fully-realised quantum internet is the next stage of evolution for quantum computation. This cutting-edge book examines in detail how the quantum internet would evolve in practise, focusing not only on the technology itself, but also the implications it will have economically and politically, with numerous non-technical sections throughout the text providing broader context to the discussion. The book begins with a description of classical networks before introducing the key concepts behind quantum networks, such as quantum internet protocols, quantum cryptography, and cloud quantum computing. Written in an engaging style and accessible to graduate students in physics, engineering, computer science and mathematics.


2021 ◽  
Vol 2 (3) ◽  
pp. 10-15
Author(s):  
Naseef Husam Mohammad Alnile ◽  
Yasmin Makki Mohialden ◽  
Majd S. Ahmed ◽  
Majd S. Ahmed

This research examines the Internet Protocol (IP) versions 4, 5, and 6, as well as the differences between them and which protocol is more suitable for the future of the internet, among other things. Through this research, we have established the most advantageous characteristics of these protocols, as well as the specific elements that each protocol uses to allow the internet network to operate at maximum capacity. The main aim of this study is to discover which of the internet protocols, IPv4, IPv5, or IPv6, is the most widely used. IPv4 is the most widely used protocol, followed by IPv5. The most essential elements of getting a more relevant job on the internet network are highlighted in this article. It all comes down to how IP protocols operate and what they accomplish.


2021 ◽  
Vol 6 (1) ◽  
pp. 80
Author(s):  
Tamsir Ariyadi ◽  
Muhamad Agung Prabowo

Dibutuhkannya komunikasi dalam menunjang interaksi antar perusahaan yang memiliki kaitan yang sangat erat terhadap perkembangan teknologi informasi melalui jaringan komputer. Virtual Private Network atau biasa disebut VPN memiliki peran penting dalam perkembangan sistem keamanan dalam jaringan internet, terutama dalam membatasi hak akses terhadap server, database, dan sejenisnya dalam meminimalisir terjadinya akses illegal terhadap data-data penting perusahaan. VPN memiliki beberapa tipe salah seperti VPN Tunnel dan IPSec, VPN Tunnel memiliki konsep yang lebih sederhana dibandingkan dengan IPSec karena dapat menghubungkan server dan client secara remoteaccess yang hanya membutuhkan 1 router saja yang terhubung pada sisi server. IPSec memiliki tingkat keamanan yang lebih tinggi dibandingkan dengan VPN Tunnel dengan jalur komunikasi dilengkapi dengan kriptografi. IPSec yang berjalan pada L2TP memiliki tingkat kinerja yang lebih baik dibandingkan VPN Tunnel berdasarkan hasil yang telah di dapatkan, karena konsep yang mengharuskan router terkoneksi secara point-to-point. Kata Kunci - Virtual Private Network (VPN), IPSec, Tunneling, Quality of Service, Peformance


2021 ◽  
Author(s):  
Marcos Allende López ◽  
Diego López ◽  
Sergio Cerón ◽  
Antonio Leal ◽  
Adrián Pareja ◽  
...  

This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH, will be no longer secure. Quantum computers will be able to break them within a short period of time. Similarly, Grover's algorithm concedes a quadratic advantage for mining blocks in certain consensus protocols such as proof of work. Today, there are hundreds of billions of dollars denominated in cryptocurrencies that rely on blockchain ledgers as well as the thousands of blockchain-based applications storing value in blockchain networks. Cryptocurrencies and blockchain-based applications require solutions that guarantee quantum resistance in order to preserve the integrity of data and assets in their public and immutable ledgers. We have designed and developed a layer-two solution to secure the exchange of information between blockchain nodes over the internet and introduced a second signature in transactions using post-quantum keys. Our versatile solution can be applied to any blockchain network. In our implementation, quantum entropy was provided via the IronBridge Platform from CQC and we used LACChain Besu as the blockchain network.


2021 ◽  
Vol 8 ◽  
Author(s):  
Justin Haloot ◽  
Omar Sheikh ◽  
Fatima Dollar ◽  
Heta Javeri ◽  
Hendre Jeannetta Fichardt ◽  
...  

Background: Due to the ongoing coronavirus disease 2019 (COVID-19) pandemic, a need for precise donning and doffing protocols for personal protective equipment (PPE) among healthcare infrastructures is paramount. Procedures involving the cardiac catheterization laboratory (CCL) are routinely non-aerosolizing but have the potential for rapid patient deterioration, creating the need for aerosolizing generating procedures. Multiple societal and governmental guidelines on the use of PPE during medical procedures are available on Internet websites; however, there is limited literature available in peer-reviewed formats in this context. This study aims to provide an overview of current PPE donning and doffing protocols specific to the catheterization laboratory.Methods: A series of internet searches regarding donning and doffing of PPE in the CCL including published articles and internet protocols were compiled and compared using Pubmed.gov, Google.com, www.twitter.com, and www.youtube.com.Results: Most institutions used N95 masks, shoe covers, at least one head covering, face shield or goggles, two pairs of gloves, and inner and outer gowns. Doffing variation was greater than donning. Doffing has the potential to contaminate the healthcare worker (HCW), and therefore, this step of PPE management requires further study. Common steps in temporal priority included cleaning of gloved hands, removal of outer (or only) gown, removal of outer gloves, repeat gloved hand cleaning, removal of facial PPE last, and a final non-gloved hand cleaning.Conclusions: This analysis provides a summary of commonly used practices that may be considered when designing CCL-specific PPE protocols. Analysis of consistent steps from the literature led the authors to formulate a suggested protocol for CCL HCWs when performing procedures on patients with confirmed or suspected/unknown COVID-19.


2021 ◽  
Vol 106 ◽  
pp. 143-149
Author(s):  
Lokku Guru Kumar ◽  
Gangireddy Harinatha Reddy ◽  
Payasam Venkata Sai ◽  
Sk. Irfan ◽  
K. Pushpa Pujitha

In today’s global scenario, with the evolution of new technologies and robust ideas, the world gets more involved and embed the advancements of wireless communication with information technology. An ongoing Gartner report assesses that, by 2021, there will be 25.1 billion web associated gadgets, developing at a pace of 32% every year. Bounties of automation are minimizing the human assistance, intervention and reduced risk factor in industry. Here Industrial Automation is used to control systems or things such as computers or robots or machines or sensors with the help of Internet protocol and cloud computing. In this paper six parameters viz., vibration, temperature, humidity, air quality, sound rate and pressure are monitored and controlled remotely using cloud computing. The system performance automatically changes on the basis of sensor data being collected at regular intervals with a feedback mechanism, thereby allowing the system to control or monitor various devices using internet protocols. The threshold values for all the sensors are set as per the industrial standards. These automation techniques find extensive applications in various control mechanisms to operate the equipment under production processes like boilers and heat-treating ovens, steering and stabilization, pressure exerted by ideal gases in confined containers, vibrations by machinery, air pollution released from chemical composites etc.,


Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1624
Author(s):  
Annalisa Bertoli ◽  
Andrea Cervo ◽  
Carlo Alberto Rosati ◽  
Cesare Fantuzzi

The field of cyber-physical systems is a growing IT research area that addresses the deep integration of computing, communication and process control, possibly with humans in the loop. The goal of such area is to define modelling, controlling and programming methodologies for designing and managing complex mechatronics systems, also called industrial agents. Our research topic mainly focuses on the area of data mining and analysis by means of multi-agent orchestration of intelligent sensor nodes using internet protocols, providing also web-based HMI visualizations for data interpretability and analysis. Thanks to the rapid spreading of IoT systems, supported by modern and efficient telecommunication infrastructures and new decentralized control paradigms, the field of service-oriented programming finds new application in wireless sensor networks and microservices paradigm: we adopted such paradigm in the implementation of two different industrial use cases. Indeed, we expect a concrete and deep use of such technologies with 5G spreading. In the article, we describe the common software architectural pattern in IoT applications we used for the distributed smart sensors, providing also design and implementation details. In the use case section, the prototypes developed as proof of concept and the KPIs used for the system validation are described to provide a concrete solution overview.


Sign in / Sign up

Export Citation Format

Share Document