610 research outputs found

    Description and Experience of the Clinical Testbeds

    Get PDF
    This deliverable describes the up-to-date technical environment at three clinical testbed demonstrator sites of the 6WINIT Project, including the adapted clinical applications, project components and network transition technologies in use at these sites after 18 months of the Project. It also provides an interim description of early experiences with deployment and usage of these applications, components and technologies, and their clinical service impact

    IPv6 Network Mobility

    Get PDF
    Network Authentication, Authorization, and Accounting has been used since before the days of the Internet as we know it today. Authentication asks the question, “Who or what are you?” Authorization asks, “What are you allowed to do?” And fi nally, accounting wants to know, “What did you do?” These fundamental security building blocks are being used in expanded ways today. The fi rst part of this two-part series focused on the overall concepts of AAA, the elements involved in AAA communications, and highlevel approaches to achieving specifi c AAA goals. It was published in IPJ Volume 10, No. 1[0]. This second part of the series discusses the protocols involved, specifi c applications of AAA, and considerations for the future of AAA

    The Use of Firewalls in an Academic Environment

    No full text

    Ipv6 Migration Framework For Government Agencies In Malaysia

    Get PDF
    Malaysia adalah sebahagian daripada negara-negara dunia yang berusaha untuk berhijrah ke protokol Internet Versi 6 (lPv6) Malaysia is involved in the worldwide effort to migrate to IPv6 due to the giobal IPv4 address depletion and other IPv4 limitations as well as to derive IPv6 benefits

    Traversing NAT: A Problem

    Get PDF
    This quasi-experimental before-and-after study measured and analyzed the impacts of adding security to a new bi-directional Network Address Translation (NAT). Literature revolves around various types of NAT, their advantages and disadvantages, their security models, and networking technologies’ adoption. The study of the newly created secure bi-directional model of NAT showed statistically significant changes in the variables than another model using port forwarding. Future research of how data will traverse networks is crucial in an ever-changing world of technology

    Evaluation of IPv6 transition mechanisms using QoS service policies

    Get PDF
    IPv6 networks are rarely fully IPv6 from end to end particularly when interconnected over other providers core data networks, hence the need for IPv6 transition methods or mechanisms. Previous studies have identified some potential impact on performance where transitions occur. This study considered implementations where Quality of Service (QoS) service policies have been applied in the IPv6 network to determine if the transition mechanisms were able to guarantee the same performance and level of service when the IPv6 traffic transitions over a core IPv4 network. Using a test lab, traffic generators and data capture tools the study was able to fully test the transition mechanisms using data rates and link speeds that replicated equipment and traffic levels used in real world implementations. The study showed that the Quality of Service classes applied were maintained across the transition network providing the service guarantees required for a range of traffic classes. Results indicated that the transition implementations on the devices used (Cisco ISR 4351) translate the QoS settings from IPv6 to IPV4 and vice versa were highly effective and with negligible additional impact on performance occurring due to the additional processing required

    Wireless backhaul in future cellular communication

    Get PDF
    Abstract. In 5G technology, huge number of connected devices are needed to be considered where the expected throughput is also very ambitious. Capacity is needed and thus used frequencies are expected to get higher (above 6 GHz even up to 80 GHz), the Cell size getting smaller and number of cells arising significantly. Therefore, it is expected that wireless backhaul will be one option for Network operators to deliver capacity and coverage for high subscriber density areas with reduced cost. Wireless backhaul optimization, performance and scalability will be on the critical path on such cellular system. This master’s thesis work includes connecting a base station by using the wireless backhaul by introducing a VPN in the proposed network. We find the bottleneck and its solution. The network is using 3.5 GHz wireless link instead of LAN wire for backhaul link between the EnodeB and the core network (OpenEPC). LTE TDD band 42 acting as a Wireless Backhaul (Link between EnodeB and Band 42 CPE Router). The status and attachment procedure are observed from different nodes of the openEPC and from the VPN machine. Step by step we have established a tunnel between the CPE device and the VPN server using PPTP and L2TP with IPSec tunneling protocol. The progression towards the final implementation brings in step by step all difficulties and bottlenecks are documented in the study
    corecore