813 research outputs found

    STATEFUL METHOD FOR ACCESS POINT DISCOVERY OF WIRELESS LOCAL AREA NETWORK CONTROLLER

    Get PDF
    Access points (APs) for a wireless local area network (WLAN) can discover a wireless LAN controller (WLC) address (in order to establish a management session with the WLC) through a variety of mechanisms, such as Dynamic Host Configuration Protocol (DHCP) option 43 mechanisms, Domain Name System (DNS) server mechanisms, and Layer 2 (L2) broadcast discovery mechanisms. The DHCP discovery mechanism is the most commonly used mechanism for WLC discovery but is a laborious and manual task that may be prone to errors. Techniques proposed herein provide an easy to use, stateful, and reliable mechanism through which an AP can discover a WLC by leveraging a DHCP relay agent that can forward DHCP packets between clients and servers. The techniques involve various functionalities including, but not limited to, a stateful process that can be used to measure reachability and latency to each configured WLC Internet Protocol (IP) address, the creation of an updated priority list of WLC IP addresses based on network latency, and the inline insertion of the list of WLC IP addresses in the DHCP exchange between a server and AP

    Juniper Networks

    Get PDF
    Some relay agents extract lease information from the DHCP messages exchanged between the client and DHCP server. This lease information is used by relay agents for various purposes like antispoofing and prevention of flooding. RFC 4388 defines a mechanism for relay agents to retrieve the lease information from the DHCP server when this information is lost. The existing lease query mechanism is data-driven, which means that a relay agent can initiate the lease query only when it starts receiving data to and from the clients. In certain scenarios, this model is not scalable. This document first looks at issues in the existing mechanism and then proposes a new query type, query by Remote ID, to address these issues. Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by th

    Smart Agent and Modified Master-Backup Algorithm for Auto Switching Dynamic Host Configuration Protocol Relay through Wireless Router

    Get PDF
    Several problems happened in a wireless router which is the number of clients that connected to DHCP (Dynamic Host Configuration Protocol) services and also durability in connectivity. Wireless router which is used in the office nowadays usually has a small memory and also CPU power. Memory or CPU sometimes could be running out when a wireless router does some background services. DHCP is one of the services needed to run in a wireless router. DHCP is interrupted when memory or CPU is full. DHCP relay and modification of the backup algorithm needed to overcome this situation when the memory or CPU in the wireless router is limited. The modification of the backup algorithm is a mechanism to switch the main router with the backup router when the main router memory is busy. DHCP relay could become a DHCP server directly when the main router is busy. Wireless router in another side could be formatted with open-source OS such as OpenWRT to become bridge interface that connected to DHCP relay. The scenario that tested in this research is using Cisco DHCP relay services in combination with OpenWRT wireless router, in variation with Mikrotik original “capsman” protocol with DHCP relay in combination with wireless-enabled Mikrotik and also in combination with OpenWRT wireless router. The result shows that OpenWRT in configuration with DHCP relay and backup algorithm could extend the number of a client connected, and also the durability of the wireless router runs its services as DHCP forwarder to DHCP relay and DHCP server. Theoretically, the number of the client that could connect in class C IPv4 address is 253 clients. Practically, in some wireless router brand, the number of the client is limited to 15 to 30 clients because that number is an optimal client for consuming the bandwidth. DHCP relay scenario could extend that limit to have a larger number of the client, and the new backup algorithm in combination also doesn’t decrease IP release time significantly from usual DHCP using a direct connection

    INTERNET PROTOCOL VERSION 6 PREFIX COLORING IN SOFTWARE DEFINED ACCESS FABRIC FOR DIFFERENTIATED POLICY ENFORCEMENT

    Get PDF
    Techniques are described herein for Internet Protocol version 6 (IPv6) prefix coloring in Software Defined Access (SDA) fabric. These techniques may enable differentiated policy enforcement

    Honeynet design and implementation

    Get PDF
    Over the past decade, webcriminality has become a real issue. Because they allow the botmasters to control hundreds to millions of machines, botnets became the first-choice attack platform for the network attackers, to launch distributed denial of service attacks, steal sensitive information and spend spam emails. This work aims at designing and implementing a honeynet, specific to IRC bots. Our system works in 3 phasis: (1) binaries collection, (2) simulation, and (3) activity capturing and monitoring. Our phase 2 simulation uses an IRC redirection to extract the connection information thanks to a IRC redirection (using a DNS redirection and a "fakeserver"). In phase 3, we use the information previously extracted to launch our honeyclient, which will capture and monitor the traffic on the C&C channel. Thanks to our honeynet, we create a database of the activity of IRC botnets (their connection characteristics, commands on the C&C ), and hope to learn more about their behavior and the underground market they create.M.S.Committee Chair: Wenke Lee; Committee Member: Jonathon Giffin; Committee Member: Mustaque Ahama

    Models and Protocols for Resource Optimization in Wireless Mesh Networks

    Get PDF
    Wireless mesh networks are built on a mix of fixed and mobile nodes interconnected via wireless links to form a multihop ad hoc network. An emerging application area for wireless mesh networks is their evolution into a converged infrastructure used to share and extend, to mobile users, the wireless Internet connectivity of sparsely deployed fixed lines with heterogeneous capacity, ranging from ISP-owned broadband links to subscriber owned low-speed connections. In this thesis we address different key research issues for this networking scenario. First, we propose an analytical predictive tool, developing a queuing network model capable of predicting the network capacity and we use it in a load aware routing protocol in order to provide, to the end users, a quality of service based on the throughput. We then extend the queuing network model and introduce a multi-class queuing network model to predict analytically the average end-to-end packet delay of the traffic flows among the mobile end users and the Internet. The analytical models are validated against simulation. Second, we propose an address auto-configuration solution to extend the coverage of a wireless mesh network by interconnecting it to a mobile ad hoc network in a transparent way for the infrastructure network (i.e., the legacy Internet interconnected to the wireless mesh network). Third, we implement two real testbed prototypes of the proposed solutions as a proof-of-concept, both for the load aware routing protocol and the auto-configuration protocol. Finally we discuss the issues related to the adoption of ad hoc networking technologies to address the fragility of our communication infrastructure and to build the next generation of dependable, secure and rapidly deployable communications infrastructures

    Next Generation DHCP Deployments

    Get PDF
    Dynamic Host Configuration Protocol has facilitated mobile computing and made life easier for system administrators. This article examines some of the unique security problems found in DHCP environments, including a new technique for passively and remotely fingerprinting hosts using the protocol

    Data Communications and Network Technologies

    Get PDF
    This open access book is written according to the examination outline for Huawei HCIA-Routing Switching V2.5 certification, aiming to help readers master the basics of network communications and use Huawei network devices to set up enterprise LANs and WANs, wired networks, and wireless networks, ensure network security for enterprises, and grasp cutting-edge computer network technologies. The content of this book includes: network communication fundamentals, TCP/IP protocol, Huawei VRP operating system, IP addresses and subnetting, static and dynamic routing, Ethernet networking technology, ACL and AAA, network address translation, DHCP server, WLAN, IPv6, WAN PPP and PPPoE protocol, typical networking architecture and design cases of campus networks, SNMP protocol used by network management, operation and maintenance, network time protocol NTP, SND and NFV, programming, and automation. As the world’s leading provider of ICT (information and communication technology) infrastructure and smart terminals, Huawei’s products range from digital data communication, cyber security, wireless technology, data storage, cloud-computing, and smart computing to artificial intelligence
    • 

    corecore