ip packets
Recently Published Documents


TOTAL DOCUMENTS

85
(FIVE YEARS 8)

H-INDEX

9
(FIVE YEARS 0)

Author(s):  
Ei Ei Khaing ◽  
Khin Than Nyunt ◽  
Sandar Moe ◽  
Mya Thet Khaing

Today, security is very important in the communication system over through the Internet. The Transmission control protocol and Internet protocol (TCP/IP) protocol suite is used in the Internet communication that it includes five layers in which it is construct IPSec VPN Tunnel between two routers at the network layer. IPsec have two protocols that it is authentication header and encapsulation security payload (ESP) in which two protocols is shown simulation and then it is give encryption, authentication and confidentiality in which for packets at the IPSec layer within network layer and adds new IP header at the network layer. IPSec is designed to provide security at the network layer that it protects the entire IP packets. It takes an IP packet and then it includes the header, applies IPSec security methods to the entire packet and adds a new IP header. The system purpose is known use router devices at the network layer and then this layer is built IPSec VPN tunnel between routers that when it is known how does command line. IPsec VPN tunnel is built based on ACL (access list), crypto isakmp (internet security association and key management protocol) policy, transform set and crypto map and then the system is aimed to know it facts configuration and then to know used routers at the network layer and is built IPSec VPN tunnel between two routers. This system is simulated using packets tracer software 7.1.


Author(s):  
Manni Kumar ◽  
Osho Gupta ◽  
Shikha Rani

In this technological arena, a firewall is a major tool for network security system to predetermine its basic rules so that it can control and monitor incoming and outgoing network traffic. The firewall generally restricts the faulty and unusual data entering the system. It can be categorized as host-based firewalls and network-based firewalls. There are various applications of firewall and how these firewalls can help the underwater wireless sensor network (UWSN) in protecting the sensor nodes where a huge amount of sensitive data is communicated among different countries. Firewall mainly aims to secure the network from different attacking devices and the attackers in a very efficient way. Firewall creates a barrier in which only the authorized data can be passed through after continuously checking by the firewall policies. To protect a local system and network of system from threats which are generally network based firewall is the most effective way. The design of the firewall is required to be accurate as it acts as a filter at higher protocol layer and some levels of IP-packets.


2020 ◽  
Author(s):  
Johannes Loevenich ◽  
Roberto Rigolin F. Lopes ◽  
Paulo H. Rettore ◽  
Sharath M. Eswarappa ◽  
Peter Sevenich

This letter introduces a stochastic model to maximize the probability of message delivery over ever-changing communication scenarios in tactical networks. Our model improves modern tactical systems implementing store-and-forward mechanisms organized in a hierarchy of layers for messages, IP packets and radios. The goal is to compute close to optimal parameters for a transport protocol by computing the optimum redundancy for the user data-flow to overcome packet loss during changes in the link data rate, including disconnections. Experiments in a VHF network illustrate the numerical results from our model using messages with different sizes over two patterns of data rate change.


2020 ◽  
Author(s):  
Johannes Loevenich ◽  
Roberto Rigolin F. Lopes ◽  
Paulo H. Rettore ◽  
Sharath M. Eswarappa ◽  
Peter Sevenich

This letter introduces a stochastic model to maximize the probability of message delivery over ever-changing communication scenarios in tactical networks. Our model improves modern tactical systems implementing store-and-forward mechanisms organized in a hierarchy of layers for messages, IP packets and radios. The goal is to compute close to optimal parameters for a transport protocol by computing the optimum redundancy for the user data-flow to overcome packet loss during changes in the link data rate, including disconnections. Experiments in a VHF network illustrate the numerical results from our model using messages with different sizes over two patterns of data rate change.


2020 ◽  
Vol 8 (3) ◽  
pp. 08-15
Author(s):  
Thazin Tun

The usage of Denial of Service (DoS) and Distributed Denial of Service (DDoS) packets by the assailant may change and dependent on various sorts of administrations and protocols. A flooding DDoS attack depends on an immense volume of assault traffic which is named as a Flooding based DDoS packet. Flooding-based DDoS packet endeavors to block the injured individual's system transfer speed with genuine-looking however undesirable IP information. Because of which Legitimate IP packets can’t arrive at the unfortunate casualty in view of the absence of data transfer capacity asset. Internet Control Message Protocol (ICMP) Flood started by sending countless ICMP packets to a remote host. Thus, the deceived framework's assets will be devoured by taking care of the assaulting packets, which in the long run makes the framework be inaccessible by different customers. In this paper, we distinguish of ICMP Flood DDoS packet by utilizing WireShark.


Author(s):  
Osvaldo Fonseca ◽  
Ítalo Cunha ◽  
Elverton Fazzion ◽  
Brivaldo Junior ◽  
Ronaldo A. Ferreira ◽  
...  
Keyword(s):  

Author(s):  
Trio Adiono ◽  
Syifaul Fuada ◽  
Rosmianto Aji Saputro

<p class="0abstract">Visible Light Communication (VLC) is an emerging optical communication technology with rapid development nowadays. VLC is considered as a compliment and successor of radio-frequency (RF) wireless communication. There are various typical implementations of VLC in which one of them is for exchanging data TCP/IP packets, thus the user can browse the internet as in established Wireless fidelity (Wi-Fi) technology. Briefly, we can call it by Light fidelity (Li-Fi). This paper described the design and implementation of System-on-Chip (SoC) subsystem for Li-Fi application where the implemented SoC consists of hardware (H/W) and software (S/W). In the H/W aspect, Physical Layer (PHY) is made by using UART communication with Ethernet connection to communicate with Host/Device personal-computer (PC). In the S/W aspect, Xillinux operating system (OS) is used. The H/W- as well as S/W-SoC, are realized in FPGA Zybo Zynq-7000 EPP development board. The functional test result shows (without optical channel or Zybo-to-Zybo only) that the implemented SoC is working as expected. It is able to exchange TCP/IP packets between two PCs. Moreover, Ethernet connection has bandwidth up to 83.6 Mbps and PHY layer <em>baud rate</em> has bandwidth up to 921600 bps.</p>


Sign in / Sign up

Export Citation Format

Share Document