期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Design and Analysis of an Adaptive Handover Protocol for 4G Networks
1
作者 BHASKAR Subbe Gowda SATISH KUMAR Gandluru Arthur Edwin RAMANA REDDY Patil 《Journal of Shanghai Jiaotong university(Science)》 EI 2015年第2期209-217,共9页
The future generation networks or 4G networks constitute of varied technologies converged over the Internet protocol version 6(IPv6) core. The 4G networks offer varied services over different interfaces to the user no... The future generation networks or 4G networks constitute of varied technologies converged over the Internet protocol version 6(IPv6) core. The 4G networks offer varied services over different interfaces to the user nodes. Mobility management in 4G networks is an issue that exists. The handover protocols for mobility management in 4G networks that currently exist, do not consider wireless signal degradation during handover operations. This paper introduces the Noise Resilient Reduced Registration Time Care of Mobile IP(NR RRTC:MIP) protocol for handover management. A handover decision algorithm based on the signal strength measured by the user nodes is considered in the NR RRTC: MIP protocol. A simulation study is discussed in the paper to evaluate the performance of the NR RRTC: MIP protocol. The results obtained from the simulation study prove that the NR RRTC: MIP protocol effectively reduces handover latencies and improves network performance. 展开更多
关键词 mobile internet protocol internet protocol version 6(ipv6) handover latency mobility management received signal strength MOBILE
原文传递
IPComp协议在IPv6中的研究与实现
2
作者 马航航 於时才 高永国 《科学技术与工程》 2009年第14期4162-4166,共5页
实际应用中,当对IP数据包应用AH或ESP协议时,会导致传输的IP数据包长度增加,加重网络负载,数据包被再次分段,增大数据传输的时延等问题。介绍了使用IPComp协议对经过IPsec处理的数据包进行压缩的方法,并实现了在支持IPv6协议的Linux平... 实际应用中,当对IP数据包应用AH或ESP协议时,会导致传输的IP数据包长度增加,加重网络负载,数据包被再次分段,增大数据传输的时延等问题。介绍了使用IPComp协议对经过IPsec处理的数据包进行压缩的方法,并实现了在支持IPv6协议的Linux平台下数据包经IPComp协议压缩后的数据传输。 展开更多
关键词 lPComp协议 ipv6协议 ipsec协议
在线阅读 下载PDF
IPComp协议在IPv6协议下应用
3
作者 袁新治 李力 +1 位作者 吴芳宇 徐彤阳 《科技广场》 2006年第1期42-43,共2页
IPv6协议下,数据包应用AH或ESP协议使得数据包长度增加,从而导致网络负载增加,数据传输时延增加。本文介绍了使用IPComp在IPv6协议下处理的数据包进行压缩以减小数据包长度的方法。
关键词 ipcomp协议 ipv6协议 TPsec协议
在线阅读 下载PDF
IPv6环境下的IPSEC通信安全审计机制研究 被引量:3
4
作者 杜学凯 吴承荣 严明 《计算机应用与软件》 2017年第1期298-305,320,共9页
当前IPv6网络正在逐步推广,由于IPv6地址可以满足全球的网络节点唯一地址的需求,所以IPv6用户越来越多地使用点对点的安全通信技术IPSEC。然而,对于很多机构来说,网络内部的IPSEC通信的合法监管逐渐变得困难,这是一个需要解决的问题。... 当前IPv6网络正在逐步推广,由于IPv6地址可以满足全球的网络节点唯一地址的需求,所以IPv6用户越来越多地使用点对点的安全通信技术IPSEC。然而,对于很多机构来说,网络内部的IPSEC通信的合法监管逐渐变得困难,这是一个需要解决的问题。针对于这样的场景,提出一种在IPv6网络中运用基于中间人机制与密钥托管机制的IPSEC通信安全审计方法,设计并实现一种在IPv6网络内部以及IPv6网络之间进行IPSEC通信安全审计的原型系统,并进行IPv6网络环境下的功能验证与性能分析。实验表明,该方法能够很好得达到进行IPv6网络环境下IPSEC审计的效果。 展开更多
关键词 ipv6网络 安全审计 中间人机制 密钥托管 Internet protocol Security
在线阅读 下载PDF
新一代Internet协议IPv6
5
作者 黄健青 胡秋灵 《现代电子技术》 1999年第5期23-24,27,共3页
分析了IPv6动议的原因,从六个方面详细描述了IPv6的技术特点。
关键词 INTERNET protocol ipv6
在线阅读 下载PDF
IPv6与IPv4的互联技术 被引量:8
6
作者 张晓燕 张浩 《系统仿真技术》 2018年第1期74-77,86,共5页
分析了IPv6(Internet Protocol Version 6)与IPv4(Internet Protocol Version 4)各自的特点以及两者之间的区别和联系,介绍了多播技术、双栈技术、隧道技术、协议转换技术等4种过渡技术,并讨论了各种技术的工作原理。在IPv6与IPv4的互... 分析了IPv6(Internet Protocol Version 6)与IPv4(Internet Protocol Version 4)各自的特点以及两者之间的区别和联系,介绍了多播技术、双栈技术、隧道技术、协议转换技术等4种过渡技术,并讨论了各种技术的工作原理。在IPv6与IPv4的互联通信中,尽可能地保留了IPv4,使其在IPv6环境中有效运行,从而保证了数据包的安全性。实例验证结果表明,所提出的转换协议技术实现了2个协议之间的互联通信。 展开更多
关键词 IPv4(Internet protocol VERSION 4) ipv6(Internet protocol VERSION 6) 隧道技术 地址空间
在线阅读 下载PDF
下一代互联网协议IPv6的主要特点
7
《电子元器件应用》 2005年第9期44-44,46,48,共3页
关键词 下一代互联网协议 ipv6 protocol Version 特点 IPV4协议 IETF IP协议
在线阅读 下载PDF
通过“隧道”的IPv6
8
作者 明延堂 《网管员世界》 2005年第10期82-83,共2页
IPv6是新一代Internet通信协议,具有许多的功能特色:全新的表头格式、较大的地址空间、有效及阶层化的地址与路由架构、内建的安全性、与邻近节点相互作用的新型通信协议Neighbor Discovery Protocol for IPv6、可扩展性等。作为网络... IPv6是新一代Internet通信协议,具有许多的功能特色:全新的表头格式、较大的地址空间、有效及阶层化的地址与路由架构、内建的安全性、与邻近节点相互作用的新型通信协议Neighbor Discovery Protocol for IPv6、可扩展性等。作为网络管理者,有必要加强对IPv6的了解,为以后IPv4的全面升级做好准备。 展开更多
关键词 ipv6 DISCOVERY Internet protocol 隧道 通信协议 地址空间 网络管理者 相互作用
在线阅读 下载PDF
WINDOWS环境下DHCPv6协议的动态链接库的研究与实现
9
作者 赵文进 《计算机与数字工程》 2010年第7期181-185,共5页
研究并分析了IPv6中的动态主机配置协议DHCPv6,并基于相关草案和协议,在WINDOWS环境中以动态链接库的形式设计并实现了DHCPv6协议,应用于IPv6教学试验平台,取得了预期效果。
关键词 ipv6(Internet protocol Version 6) DHCPv6(Dynamic Host Configuration protocol for ipv6) 地址自动配置 路由器宣告
在线阅读 下载PDF
Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
10
作者 Shadi Al-Sarawi Mohammed Anbar +2 位作者 Basim Ahmad Alabsi Mohammad Adnan Aladaileh Shaza Dawood Ahmed Rihan 《Computers, Materials & Continua》 SCIE EI 2023年第10期491-515,共25页
The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(... The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules. 展开更多
关键词 Internet of Things ipv6 over low power wireless personal area networks Routing protocol for Low-Power and Lossy Networks Internet protocol Version 6 distributed denial of service wireless sensor networks
在线阅读 下载PDF
ARRANGING MULTICAST FORWARDING TABLE IN CLASS SEQUENCE IN TERNARY-CAM FOR LINE-SPEED LOOKUP
11
作者 Li Yufeng Qiu Han +1 位作者 Lan Julong Wang Binqiang 《Journal of Electronics(China)》 2009年第2期214-221,共8页
PIM-SM(Protocol Independent Multicast-Sparse Mode) is a main multicast routing pro-tocol in the IPv6(Internet Protocol version 6).It can use either a shared tree or a shortest path tree to deliver data packets,consequ... PIM-SM(Protocol Independent Multicast-Sparse Mode) is a main multicast routing pro-tocol in the IPv6(Internet Protocol version 6).It can use either a shared tree or a shortest path tree to deliver data packets,consequently the multicast IP lookup engine requires,in some cases,two searches to get a correct lookup result according to its multicast forwarding rule,and it may result in a new requirement of doubling the lookup speed of the lookup engine.The ordinary method to satisfy this requirement in TCAM(Ternary Content Addressable Memory) based lookup engines is to exploit parallelism among multiple TCAMs.However,traditional parallel methods always induce more re-sources and higher design difficulty.We propose in this paper a novel approach to solve this problem.By arranging multicast forwarding table in class sequence in TCAM and making full use of the intrinsic characteristic of the TCAM,our approach can get the right lookup result with just one search and a single TCAM,while keeping the hardware of lookup engine unchanged.Experimental results have shown that the approach make it possible to satisfy forwarding IPv6 multicast packets at the full link rate of 20 Gb/s with just one TCAM with the current TCAM chip. 展开更多
关键词 ipv6(Internet protocol version 6) Multicast lookup Forwarding table TCAM(Ternary Content Addressable Memory)
在线阅读 下载PDF
Comparison between OSPFv3 and OSPFv2
12
作者 Mustafa ElGili Mustafa 《Wireless Sensor Network》 2014年第4期43-48,共6页
This paper aims to compare between OSPFv2 and OSPFv3, to explain the impact of the change in OSPFv3 packet format and the over load when OSPFv3 uses IPv6 packet instead of IPv4 packet format that was used by OSPFv2, a... This paper aims to compare between OSPFv2 and OSPFv3, to explain the impact of the change in OSPFv3 packet format and the over load when OSPFv3 uses IPv6 packet instead of IPv4 packet format that was used by OSPFv2, and the comparison based on common OSPF packets that was sent in the same network. 展开更多
关键词 ROUTING protocols OSPF OSPFv2 OSPFV3 ipv6
在线阅读 下载PDF
Optimizing Resource Management for IoT Devices in Constrained Environments
13
作者 Sadia Islam Nilima Md Khokan Bhuyan +3 位作者 Md Kamruzzaman Jahanara Akter Rakibul Hasan Fatema Tuz Johora 《Journal of Computer and Communications》 2024年第8期81-98,共18页
Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but... Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations. 展开更多
关键词 Internet of Things Resource Constraint ipv6 protocol IP-Based Network Management Network Management protocol Network Configuration protocol
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部