internet protocol
Recently Published Documents


TOTAL DOCUMENTS

1080
(FIVE YEARS 212)

H-INDEX

29
(FIVE YEARS 5)

2022 ◽  
Vol 197 ◽  
pp. 377-384
Author(s):  
Bramantyo Adhilaksono ◽  
Bambang Setiawan

Inter ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 9-27
Author(s):  
Becky Self

The use of telephone and VoIP (Voice over Internet Protocol) interviews has become necessary owing to the legal restrictions and safety measures introduced during the COVID-19 pandemic. This has furthered scholarly dialogue surrounding the choice of interview mode, and the assumption that face-to-face interviews are the "gold standard" [Novick, 2008: 397]. The general public has also become more accustomed to utilising VoIP in their day-to-day lives. In this article, I discuss this change in communication methods and the impact it could have on interview modes. Nevertheless, the researcher's and participant's contexts remain paramount when deciding which interview mode to employ. For this reason, Oltmann's model [Oltmann, 2016] has been extended to include VoIP, providing a more complete framework for researchers to make an informed decision when contemplating interview modes.


2021 ◽  
Vol 1 (13) ◽  
pp. 3-11
Author(s):  
Phan Văn Kỷ ◽  
La Hữu Phúc

Tóm tắt—IPSec (Internet Protocol Security) là bộ giao thức an toàn nhằm bảo vệlưu lượng dữ liệu qua mạng Internet. Mỗi kết nối mật trong mô hình triển khai IPSec có một bộ thuật toán, tham số bảo mật riêng. Để đảm bảo các kết nối mật hoạt động ổn định trong môi trường truyền tin với băng thông lớn, việc quản lý nhiều kết nối mật đồng thời trên thiết bị IPSec đóng vai trò vô cùng quan trọng. Do tính phức tạp của quá trình quản lý, thông thường vấn đề này được thực hiện bằng phần mềm trên hệđiều hành. Giải pháp này bị hạn chế do quá trình trao đổi dữ liệu giữavi mạch Field Programmable Gate Array (FPGA) và bộ vi xử lý. Trong bài viết này, nhóm tác giả đưa ra một giải pháp tổ chức, quản lý kết nối mật sau khi sử dụng giao thức Internet Key Exchange (IKE) để trao đổi khóa cho IPSec trên FPGA sử dụng ngôn ngữ mô tả phần cứng, nhằm đáp ứng yêu cầu tốc độ cao với nhiều kết nối.Abstract—IPSec (Internet Protocol Security) is a secure protocol aiming to protect data traffic via the Internet. There is a separate set of algorithms and security parameters in each secure connection in the IPSec deployment model. In order to ensure stable connections in high-bandwidth environments, managing multiple secure connections simultaneously on IPSec devices holds a significant role. Due to the complexity of the management process, this is commonly done by software on the operating system. This solution is restricted due to data exchange between field-programmable gate array (FPGA) and microprocessor. In this article, a solution was proposed to organize and manage a confidential connection after using Internet Key Exchange (IKE) to exchange keys for IPSec directly using hardware description language on FPGA, aiming to meet high-speed requirements with many connections.


2021 ◽  
pp. 1-4
Author(s):  
Rosa M. Delgado

BACKGROUND: Originally, digital healthcare was created to support underserved and rural patients gain access to health services. Phones, devices, and computers need IP (Internet Protocol) addresses to connect to the Internet. OBJECTIVE: This paper aims to study the close relationship between the Internet and the transformation of healthcare services. METHODS: The current protocol in use is the Internet protocol version 4 (IPv4), whose number of Internet addresses has been globally exhausted. The Internet Protocol version 6 (IPv6) with 47 octillion unique addresses for every person on the planet has become the only option for sustainable growth and innovation. However, most of the worldwide industry is still in IPv4. In the era of Artificial Intelligence, Internet of Things, Fifth Generation of Cellular Technology (5G), and Blockchain, there will be a massive need of IP addresses. For 2025, experts predict over 1.5 billion new IPv6 users which will continue to grow exponentially. RESULTS: Nations need to tackle the increasing industry requirements for IPv6 and telehealth adoption to benefit from the full IPv6 connectivity which is the key strategic advantage for the healthcare industry. CONCLUSION: The strategic potential that telehealth brings to the healthcare industry is widely appreciated. However, what are the implications of its expansion around the world? How can we prioritize the poorest and most vulnerable in society without new technologies?


Author(s):  
Adnan Hasan Bdair Alghuraibawi ◽  
Rosni Abdullah ◽  
Selvakumar Manickam ◽  
Zaid Abdi Alkareem Alyasseri

Security network systems have been an increasingly important discipline since the implementation of preliminary stages of Internet Protocol version 6 (IPv6) for exploiting by attackers. IPv6 has an improved protocol in terms of security as it brought new functionalities, procedures, i.e., Internet Control Message Protocol version 6 (ICMPv6). The ICMPv6 protocol is considered to be very important and represents the backbone of the IPv6, which is also responsible to send and receive messages in IPv6. However, IPv6 Inherited many attacks from the previous internet protocol version 4 (IPv4) such as distributed denial of service (DDoS) attacks. DDoS is a thorny problem on the internet, being one of the most prominent attacks affecting a network result in tremendous economic damage to individuals as well as organizations. In this paper, an exhaustive evaluation and analysis are conducted anomaly detection DDoS attacks against ICMPv6 messages, in addition, explained anomaly detection types to ICMPv6 DDoS flooding attacks in IPv6 networks. Proposed using feature selection technique based on bio-inspired algorithms for selecting an optimal solution which selects subset to have a positive impact of the detection accuracy ICMPv6 DDoS attack. The review outlines the features and protection constraints of IPv6 intrusion detection systems focusing mainly on DDoS attacks.


Author(s):  
Nina Siti Aminah ◽  
Muhamamad Reza Ramadhani Raharjo ◽  
Maman Budiman

Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-line-of-sight (NLOS) condition, they are limited to reception distances up to 55 meters.


Author(s):  
Amany Mohammad Abood ◽  
Maysam Sameer Hussein ◽  
Zainab G. Faisal ◽  
Zainab H. Tawfiq

Video monitoring systems are undergoing an evolution from conventional analog to digital clarification to provide better rate and security over internet protocols. In addition, analog surveillance becomes insufficient to face enormous demand of security of system contains more than hundreds of camera often deployed in hotels environments far away from room control. This paper presents the design and simulation of a video monitoring scheme in excess of a transmission control protocol/internet protocol (TCP/IP) system using MATLAB. Sophisticated cameras could record directly high-definition digital videos based on digital technology which simply communicate the control room relaying on ordinary internet protocol infrastructure networks. This technology provides a flexible network interface over a wide variety of heterogeneous technology networks. Though, the acceptance of IP designed for video monitoring pretense severe difficulties in terms of power processing, system dependability, required bandwidth, and security of networks. The advantage of IP based video monitoring system has been investigated over conventional analog systems and the challenges of the method are described. The open research issues are still requiring a final solution to permits complete abandon against conventional technology of analog methods. In conclusion, the method to tackle the purpose of video monitoring in actual operation is proposed and verified properly by means of model simulation.


2021 ◽  
Author(s):  
C. Gomez ◽  
S.M. Darroudi ◽  
T. Savolainen ◽  
M. Spoerk

Sign in / Sign up

Export Citation Format

Share Document