期刊文献+
共找到24篇文章
< 1 2 >
每页显示 20 50 100
运用Network Coding改进IPv6网络的邻居发现协议 被引量:1
1
作者 张金刚 权义宁 赵守凯 《武汉工程大学学报》 CAS 2010年第5期94-98,共5页
通过对IPv6网络中,对网络管理、拓扑发现等起着重要作用的以ICMPv6报文为基础的邻居发现协议相关算法的分析,结合Network Coding的基本思想,针对广泛使用多播包容易引发网络拥塞、降低链接带宽利用率这一问题,提出了一种理论上基于Netwo... 通过对IPv6网络中,对网络管理、拓扑发现等起着重要作用的以ICMPv6报文为基础的邻居发现协议相关算法的分析,结合Network Coding的基本思想,针对广泛使用多播包容易引发网络拥塞、降低链接带宽利用率这一问题,提出了一种理论上基于Network Coding传输模式的改进方案,并以一个实例验证其有效性. 展开更多
关键词 network Coding 网络编码 ipv6 邻居发现 ICMPV6
在线阅读 下载PDF
Sniffing Threat and Practices in IPv6 Networks 被引量:1
2
作者 YI Xiushuang WEN Zhankao ZHANG Dengke 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1389-1393,共5页
The IPv4 protocol suite is vulnerable to a variety of attacks. IPv6 security is in many ways the same as IPv4 security, the basic mechanisms for transporting packets across the network stay mostly unchanged, and the u... The IPv4 protocol suite is vulnerable to a variety of attacks. IPv6 security is in many ways the same as IPv4 security, the basic mechanisms for transporting packets across the network stay mostly unchanged, and the upper-layer protocols that transport the actual application data are mostly unaffected. This paper illustrates sniffing threat against IPv4 and then compares how the threat might influence an IPv6 networks. This is prefaced by a brief overview of current practices around the design of an IPv4 Internet edge network and then followed by a review of how that IPv4 edge network needs to evolve in order to secure the addition of IPv6. As IPv6 security is a large and complex subject, and also, IPv6 network is still at the very beginning stage and has not been fully examined in fact, this paper focus on the security requirements of medium edge networks. 展开更多
关键词 sniffing threat PRACTICE ipv6 network
在线阅读 下载PDF
Distributed sampling measurement method of network traffic in high-speed IPv6 networks
3
作者 Pan Qiao Pei Changxing 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期835-840,共6页
With the advent of large-scale and high-speed IPv6 network technology, an effective multi-point traffic sampling is becoming a necessity. A distributed multi-point traffic sampling method that provides an accurate and... With the advent of large-scale and high-speed IPv6 network technology, an effective multi-point traffic sampling is becoming a necessity. A distributed multi-point traffic sampling method that provides an accurate and efficient solution to measure IPv6 traffic is proposed. The proposed method is to sample IPv6 traffic based on the analysis of bit randomness of each byte in the packet header. It offers a way to consistently select the same subset of packets at each measurement point, which satisfies the requirement of the distributed multi-point measurement. Finally, using real IPv6 traffic traces, the conclusion that the sampled traffic data have a good uniformity that satisfies the requirement of sampling randomness and can correctly reflect the packet size distribution of full packet trace is proved. 展开更多
关键词 network measurement traffic sampling ipv6 distributed measurement Shannon entropy
在线阅读 下载PDF
Research and Design of IPv6 Network Management and Operations Support System
4
作者 Chen Bin Ji Wenchong Qiu Zhonghui (China Network Communications Group Corporation, Beijing 100032, China) 《ZTE Communications》 2006年第1期16-20,共5页
IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet a... IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet and relevant equipment interfaces are not perfect. A Network Management System (NMS) at the network layer helps implement the integrated management of a network with equipment from multiple vendors, including the network resources and topology, end-to-end network performance, network failures and customer Service Level Agreement (SLA) management. Though the NMS will finally realize pure IPv6 network management, it must be accommodated to the management of relevant IPv4 equipment. Therefore, modularized and layered structure is adopted for the NMS in order to implement its smooth transition. 展开更多
关键词 work Research and Design of ipv6 network Management and Operations Support System Design RFC IETF NMS MIB RMON NGI SNMP ICMP
在线阅读 下载PDF
智能终端主流平台——Android的IPv6分析 被引量:7
5
作者 董智明 张志荣 +1 位作者 张长学 魏文娟 《移动通信》 2011年第1期80-84,共5页
Android平台作为目前非常热门的开源智能手机操作系统,已经风靡全球。其发展之迅速,大有不可阻挡之势。文章通过移植Android原始代码的实验板和已经上市的手机,从Wire Ethernet、Wi-Fi以及3G(EV-DO)三种上网方式的实验,比较深入地研究了... Android平台作为目前非常热门的开源智能手机操作系统,已经风靡全球。其发展之迅速,大有不可阻挡之势。文章通过移植Android原始代码的实验板和已经上市的手机,从Wire Ethernet、Wi-Fi以及3G(EV-DO)三种上网方式的实验,比较深入地研究了Android从底层芯片到上层浏览器对于IPv6的支持情况,对未来Android终端厂商开发IPv6功能具有很好的参考意义。 展开更多
关键词 ANDROID ipv6 WI-FI PPP network RELAY
在线阅读 下载PDF
SIP穿越异类网(IPv6/IPv4)的解决方案
6
作者 宋敏 黄正谦 《计算机工程》 CAS CSCD 北大核心 2004年第17期95-97,共3页
讨论了如何在不改动终端的情况下,实现异类网之间的SIP通信。在分析SIP消息包和常见的IPv4/IPv6转换机制的基础上,描述了一种应用层网关与NAPT-PT相结合的解决方案及其实现。
关键词 会话初始协议 ipv6 network ADDRESS PORT translation-pt’otocal translation(NAPT-PT) ALG
在线阅读 下载PDF
Building Traversing NAT IPv6 Tunnel Gateway System Relies on Netfilter/Iptable Framework 被引量:1
7
作者 余勇 王伟 《Journal of Electronic Science and Technology of China》 2006年第4期438-442,共5页
The transition from IPv4 to IPv6 is doomed to be a long process. The network Address translation (NAT) technology is used very popularly in IPv4 network to make up the shortage of network address. It is a desiderate... The transition from IPv4 to IPv6 is doomed to be a long process. The network Address translation (NAT) technology is used very popularly in IPv4 network to make up the shortage of network address. It is a desiderated problem to make the users behind NAT gateway to access to IPv6 networks. By studying the transition technology from IPv4 to IPv6 and introducing NAT technology in IPv6, a scenario is put forward through 6to4 tunnel The scenario is implemented and the gateway system's performance is analyzed. 展开更多
关键词 ipv6 network address translation (NAT) transition TRAVERSE SYSTEM
在线阅读 下载PDF
The Preliminary Design of IPv6 Home Gateway and Terminal
8
作者 Chengyi Wang Ren Gao 《Journal of Electromagnetic Analysis and Applications》 2009年第1期61-65,共5页
This paper briefly analyzes the advantages of IPv6 used at Intelligent home and describes an IPv6 home network frame. It also studies IPv6 transition technical problems facing home gateways and gives the summaries to ... This paper briefly analyzes the advantages of IPv6 used at Intelligent home and describes an IPv6 home network frame. It also studies IPv6 transition technical problems facing home gateways and gives the summaries to the main protocol of each node of home network and their mutual relations. The key nodes of the home network based on IPv6, including the hardware design and software design of the home gateway and home network controller, are systematically de-signed in the paper. Finally, it illustrates the actual test environment and test in detail. The paper gives a view of the fact that the intelligent home appliances are becoming the current trend with the accelerating the transition of IPv4 to IPv6 and home network-wide implementation of IPv6 is about to become a reality, holding that the network controllers and home gateway based on ARM processor can support IPv6 and carry on the implementation of remote control and local control based on Web Browser. 展开更多
关键词 ipv6 HOME GATEWAY HOME network TERMINAL Controller CGI
在线阅读 下载PDF
带您走进IPv6——专访美国AIO网络CEO陈醴
9
《网管员世界》 2007年第15期13-13,共1页
随着大量影音运用及手机装置开始使用Web2.0,IPv4地址数量已开始出现短缺。一些敏感的企业或机构开始关注帮助增进网络扩充性的IPv6技术。在走进IPv6的世界时,互联网访问加速不可忽视。近日,美国AIO网络应用加速交换机产品在拉斯韦... 随着大量影音运用及手机装置开始使用Web2.0,IPv4地址数量已开始出现短缺。一些敏感的企业或机构开始关注帮助增进网络扩充性的IPv6技术。在走进IPv6的世界时,互联网访问加速不可忽视。近日,美国AIO网络应用加速交换机产品在拉斯韦加斯Interop展览上获得“网络应用加速及性能(Application Networks & Performance)”项目冠军。本刊记者边艳菊日前就相关话题采访了该公司CEO陈醴先生。 展开更多
关键词 ipv6技术 网络应用 CEO AIO 美国 networks INTEROP WEB2.0
在线阅读 下载PDF
Research on IPv6 Transition Evolvement and Security Architecture of Smart Distribution Grid Data Communication System
10
作者 Xin Miao Xi Chen 《Journal of Energy and Power Engineering》 2012年第1期146-149,共4页
Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethe... Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems. 展开更多
关键词 Smart distribution grid data communication network ipv6 transition evolvement safety threaten security architecture.
在线阅读 下载PDF
FedACT:An adaptive chained training approach for federated learning in computing power networks
11
作者 Min Wei Qianying Zhao +4 位作者 Bo Lei Yizhuo Cai Yushun Zhang Xing Zhang Wenbo Wang 《Digital Communications and Networks》 CSCD 2024年第6期1576-1589,共14页
Federated Learning(FL)is a novel distributed machine learning methodology that addresses large-scale parallel computing challenges while safeguarding data security.However,the traditional FL model in communication sce... Federated Learning(FL)is a novel distributed machine learning methodology that addresses large-scale parallel computing challenges while safeguarding data security.However,the traditional FL model in communication scenarios,whether for uplink or downlink communications,may give rise to several network problems,such as bandwidth occupation,additional network latency,and bandwidth fragmentation.In this paper,we propose an adaptive chained training approach(Fed ACT)for FL in computing power networks.First,a Computation-driven Clustering Strategy(CCS)is designed.The server clusters clients by task processing delays to minimize waiting delays at the central server.Second,we propose a Genetic-Algorithm-based Sorting(GAS)method to optimize the order of clients participating in training.Finally,based on the table lookup and forwarding rules of the Segment Routing over IPv6(SRv6)protocol,the sorting results of GAS are written into the SRv6 packet header,to control the order in which clients participate in model training.We conduct extensive experiments on two datasets of CIFAR-10 and MNIST,and the results demonstrate that the proposed algorithm offers improved accuracy,diminished communication costs,and reduced network delays. 展开更多
关键词 Computing power network(CPN) Federated learning(FL) Segment routing ipv6(SRv6) Communication overheads Model accuracy
在线阅读 下载PDF
基于6LoWPAN的物联网寻址策略研究 被引量:17
12
作者 王义君 钱志鸿 +1 位作者 王雪 孙大洋 《电子与信息学报》 EI CSCD 北大核心 2012年第4期763-769,共7页
在6LoWPAN(IPv6 over Low-power Wireless Personal Area Network)的基础上,该文提出应用于物联网的寻址策略,实现基于IEEE 802.15.4协议的底层异构网络与互联网的实时通信。寻址策略包括IPv6地址自动配置和报头压缩。采用的分层地址自... 在6LoWPAN(IPv6 over Low-power Wireless Personal Area Network)的基础上,该文提出应用于物联网的寻址策略,实现基于IEEE 802.15.4协议的底层异构网络与互联网的实时通信。寻址策略包括IPv6地址自动配置和报头压缩。采用的分层地址自动配置策略,首先在底层网络内部允许节点使用16位短地址导出的链路本地地址进行数据分组传输,该链路本地地址需通过执行基于分簇的重复地址检测机制保证唯一性;其次,每个底层网络中的Sink节点通过上层IP路由器获取全球路由前缀,并与接口标识符相结合,形成Sink节点的全球地址,实现底层网络与互联网的数据交换。同时,通过在报头压缩编码中植入链路本地地址和全球地址控制位,提出了一种适用于物联网应用的报头压缩方案IIPHC(IoTs IPv6 Header Compression)。如果地址类型为链路本地地址,则采用简单灵活的IIPHC1方案,如果地址类型为全球地址,则采用相对复杂但有效的IIPHC2方案。仿真及测试结果表明,基于6LoWPAN的物联网寻址策略在网络开销、时延、吞吐量、能耗等性能方面存在一定的优越性。 展开更多
关键词 物联网 底层网络 6LoWPAN(ipv6 over LOW-POWER Wireless PERSONAL Area network) 地址自动配置 报头压缩
在线阅读 下载PDF
Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
13
作者 Shadi Al-Sarawi Mohammed Anbar +2 位作者 Basim Ahmad Alabsi Mohammad Adnan Aladaileh Shaza Dawood Ahmed Rihan 《Computers, Materials & Continua》 SCIE EI 2023年第10期491-515,共25页
The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(... The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules. 展开更多
关键词 Internet of Things ipv6 over low power wireless personal area networks Routing Protocol for Low-Power and Lossy networks Internet Protocol Version 6 distributed denial of service wireless sensor networks
在线阅读 下载PDF
Integrating Mobile Ad Hoc Network to the Internet
14
作者 王茂宁 《Journal of Electronic Science and Technology of China》 CAS 2005年第4期304-309,共6页
A novel scheme is presented to integrate mobile ad hoc networks (MANETs) with the lnternet and support mobility across wireless local area networks (WLANs) and MANETs. The mobile nodes, connected as a MANET, emplo... A novel scheme is presented to integrate mobile ad hoc networks (MANETs) with the lnternet and support mobility across wireless local area networks (WLANs) and MANETs. The mobile nodes, connected as a MANET, employ the optimize d link state routing (OLSR) protocol for routing within the MANET. Mobility management across WLANs and MANETs is achieved through the hierarchical mobile IPv6 (HMIPv6) protocol. The performance is evaluated on a HMIPv6 based test-bed composed of WLANs and MANETs. The efficiency gain obtained from using HMIPv6 in such a hybrid network is investigated. The investigation result shows that the use of HMIPv6 can achieve up to 27% gain on reducing the handoff latency when a mobile roams within a domain. Concerning the reduction of the signaling load on the lnternet, the use of HMIPv6 can achieve at least a 54% gain and converges to 69%. 展开更多
关键词 mobile ad hoc network (MANET) optimized link state routing (OLSR) wireless networks mobile ipv6 hierarchical mobile 1Pv6
在线阅读 下载PDF
F5 Networks:助运营商轻松应对行业变化
15
作者 叶惠 《通讯世界》 2013年第8期35-35,共1页
2013年,越来越多移动运营商开启了4G之旅。从3G到4G以及从IPv4到IPv6等众多行业变化都会让运营商的网络日渐复杂。与此同时,移动运营商还面临着移动用户继续快速增加、智能终端类型不断丰富、及移动数据流量不断攀升等挑战。在这种前... 2013年,越来越多移动运营商开启了4G之旅。从3G到4G以及从IPv4到IPv6等众多行业变化都会让运营商的网络日渐复杂。与此同时,移动运营商还面临着移动用户继续快速增加、智能终端类型不断丰富、及移动数据流量不断攀升等挑战。在这种前提下,简化网络的安全性和管理功能,为用户提供面向应用的安全解决方案至为关键。 展开更多
关键词 移动运营商 networkS 行业 安全解决方案 移动用户 ipv6 ipv4 终端类型
在线阅读 下载PDF
Arbor Networks推出网络基础设施安全与传输流监测平台
16
作者 陈宜风 《互联网周刊》 2010年第4期17-17,共1页
近日,全球企业网安全服务控制解决方案领先提供商ArborNetworks公司正式举行产品发布会,宣布推出业界领先水平的网络基础设施安全与传输流监测平台Arbor Peakflow SP5.1版。PeakflowSP5.1是第一种提供IPv6可见性和安全性的产品,
关键词 networks公司 网络基础设施 安全服务 传输流 平台 监测 产品发布会 ipv6
在线阅读 下载PDF
Building an IPv6 address generation and traceback system with NIDTGA in Address Driven Network 被引量:7
17
作者 LIU Ying REN Gang +3 位作者 WU JianPing ZHANG ShengLin HE Lin JIA YiHao 《Science China Chemistry》 SCIE EI CAS CSCD 2015年第12期10-23,共14页
In the design and construction process of Next Generation Internet, it is important to identify the source of each IP packet forwarding accurately, especially for the support of precise fine-grained management,control... In the design and construction process of Next Generation Internet, it is important to identify the source of each IP packet forwarding accurately, especially for the support of precise fine-grained management,control, traceability and improving the trustworthiness of the Internet. This paper designed a scalable Network Identity(NID) scheme for the Internet users, proposed NIDTGA(Network Identity and Time Generated Address), an IPv6 address generation algorithm embedded NID and time information, then designed and implemented an IPv6 address generation and traceback system based on NIDTGA. The design of NIDTGA, which reflects the length, time and owner attributes of the IP address, can be a good support to ADN(Address Driven Network). At the same time, by embedding the key elements of user identity and time in the IPv6 address,and by taking into account both the traceability and privacy, NIDTGA can provide a technical basis for the establishment of the network trust mechanism, and achieve the traceability of security event. 展开更多
关键词 network identity ipv6 Address Driven network IP traceback IP address generation
原文传递
Optimizing Resource Management for IoT Devices in Constrained Environments
18
作者 Sadia Islam Nilima Md Khokan Bhuyan +3 位作者 Md Kamruzzaman Jahanara Akter Rakibul Hasan Fatema Tuz Johora 《Journal of Computer and Communications》 2024年第8期81-98,共18页
Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but... Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations. 展开更多
关键词 Internet of Things Resource Constraint ipv6 Protocol IP-Based network Management network Management Protocol network Configuration Protocol
在线阅读 下载PDF
Modeling of Malicious Code Propagations in Internet of Things 被引量:2
19
作者 林昭文 苏飞 马严 《China Communications》 SCIE CSCD 2011年第1期79-86,共8页
Nowadays, the main communication object of Internet is human-human. But it is foreseeable that in the near future any object will have a unique identification and can be addressed and con- nected. The Internet will ex... Nowadays, the main communication object of Internet is human-human. But it is foreseeable that in the near future any object will have a unique identification and can be addressed and con- nected. The Internet will expand to the Internet of Things. IPv6 is the cornerstone of the Internet of Things. In this paper, we investigate a fast active worm, referred to as topological worm, which can propagate twice to more than three times faster tl^an a traditional scan-based worm. Topological worm spreads over AS-level network topology, making traditional epidemic models invalid for modeling the propagation of it. For this reason, we study topological worm propagation relying on simulations. First, we propose a new complex weighted network mod- el, which represents the real IPv6 AS-level network topology. And then, a new worm propagation model based on the weighted network model is constructed, which descries the topological worm propagation over AS-level network topology. The simulation results verify the topological worm model and demonstrate the effect of parameters on the propagation. 展开更多
关键词 IOT ipv6 worm propagation worm model weighted complex network
在线阅读 下载PDF
Technology Trends and Architecture Research for Future Mobile Internet
20
作者 吴建平 李贺武 +3 位作者 孙文琦 吴茜 江卓 赵玮 《China Communications》 SCIE CSCD 2013年第6期14-27,共14页
With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also... With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also facing more challenges, particularly regarding bandwidth, address space, security, mobility, and energy. In this article, we analyse the five abovementioned challenges and then survey related technology trends. We also describe the progress of architecture research aimed at the future mobile Internet. We reach the conclusion that a single technology cannot solve all the problems of mobile Internet, and future research should focus more on how to make architectures and technologies work together more effectively. 展开更多
关键词 mobile Internet network architecture ipv6
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部