2,129 research outputs found

    IMPLEMENTATION OF GENERIC ROUTING ENCAPSULATION USING CISCO PACKTER TRACER

    Get PDF
    Virtual Private Network (VPN) is a technology that offers low-cost remote access solutions for companies. The IPSec protocol provides cryptography services and network security for data transmission. Generic Routing Encapsulation (GRE) tunnel exists to encapsulate multicast and broadcast packets into unicast packets. This is very usable which IPSec does not support encryption of multicast and broadcast packets. The target of this simulation is that Router 1 shows that the network is protected by GRE. The first thing to do is set the network topology. Here, for example, there are two offices that want to transmit data to each other. Each of these offices has a switch, FTP server, DNS server, router, and PC. Then set the IP address of each device and connect it with cables. Router 2 and Router 3 function to connect the two offices in one WAN network. Each of these data transmissions is IPSec protected for data encryption protection then GRE coated for transmission encapsulation. From simulation results, we can conclude that both network can be connected and communicated each other with protection from GRE tunnel

    Nameless in Cyberspace: Anonymity on the Internet

    Get PDF
    Proposals to limit anonymous communications on the Internet would violate free speech rights long recognized by the Supreme Court. Anonymous and pseudonymous speech played a vital role in the founding of this country. Thomas Paine's Common Sense was first released signed, "An Englishman." Alexander Hamilton, John Jay, James Madison, Samuel Adams, and others carried out the debate between Federalists and Anti-Federalists using pseudonyms. Today, human rights workers in China and many other countries have reforged the link between anonymity and free speech. Given the importance of anonymity as a component of free speech, the cost of banning anonymous Internet speech would be enormous. It makes no sense to treat Internet speech differently from printed leaflets or books

    Cyberspace Sovereignty? – The Internet and the International System

    Get PDF
    Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of the Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather. By linking with the Internet, we don\u27t mean absolute freedom of information. I think there is a general understanding about this. If you go through customs, you have to show your passport. It\u27s the same with management of information. There is no contradiction at all between the development of telecommunications infrastructure and the exercise of state sovereignty. Will cyberspace exercise its own sovereignty? Does it do so already

    Spatial Dispersion of Peering Clusters in the European Internet

    Get PDF
    We study the role played by geographical distance in the peering decisions between Internet Service Providers. Firstly, we assess whether or not the Internet industry shows clustering in peering; we then concentrate on the dynamics of the agglomeration process by studying the effects of bilateral distance in changing the morphology of existing peering patterns. Our results show a dominance of random spatial patterns in peering agreements. The sign of the effect of distance on the peering decision, driving the agglomeration/dispersion process, depends, however, on the initial level of clustering. We show that clustered patterns will disperse in the long run

    Demonstrating Android P2P capabilities through a prototype application

    Get PDF
    TĂ€napĂ€eval suheldakse aina rohkem elektroonilisi seadmeid kasutades. See tĂ€hendab, et seadmed vahetavad palju andmeid. Tihti on need andmed isiklikud, kuid saatmine toimub vĂ€ga avalikul viisil. Kasutades levinud klient-server lĂ€henemisviisi, vĂ”ib server andmeid nĂ€ha vĂ”i isegi muuta, mis tĂ€hendab, et andmete autentsus ja privaatsus on rikutud, juhul kui kasutatakse ebausaldusvÀÀrset serverit. Lisaks eelistavad paljud inimesed suhtlemiseks ja andmevahetuseks mobiilseid seadmeid (tahvelarvutit vĂ”i telefoni) tavalisele arvutile, kuid ikka veel ei eksisteeri lihtsat ning turvalist viisi selle tegemiseks. See töö analĂŒĂŒsib erinevaid andmevahetusmeetodeid P2P (peer-to-peer) viisil, mis erineb traditsioonilisest klient-server andmevahetusmudelist. Lisaks luuakse nĂ€iterakendus Androidile, mis demonstreerib, kuidas lihtsal moel luua P2P ĂŒhendus mitmete seadmete vahel. Rakendus toetab sĂ”numite saatmist klientide vahel ning sisaldab Hangmani mĂ€ngu, mis demonstreerib mĂ€ngude programmeerimist P2P suhtluse abil.Nowadays more and more people are communicating using electronic devices. This means that all kinds of data are transferred between devices. These are often private data but sent in a very public manner. When using traditional client-server approach, data may be seen or even altered by the server which means that the authenticity and privacy of data is always under question when using untrusted servers. Furthermore many people prefer to use mobile devices (tablet or mobile phone) instead of a PC for communicating and changing data yet there still does not exist a simple way to do it with certain privacy. This thesis analyzes different methods for sending and receiving data between clients in a P2P (peer-to-peer) way instead of using traditional client-server model. Also a proof-of-concept application is written for Android which demonstrates how to easily enable P2P communication between multiple devices. Application will support sending messages between peers and also includes an example Hangman game for demonstrating game programming with P2P communication

    Critical Infrastructures You Can Trust: Where Telecommunications Fits

    Full text link
    This paper discusses two NISs: the public telephone network (PTN) and the Internet. Being themselves large and complex NISs, they not only merit study in their own right but can help us to understand some of the technical problems faced by the developers and operators of other NISs. In addition, the high cost of building a global communications infrastructure from the ground up implies that one or both of these two networks is likely to furnish communications services for most other NISs. Therefore, an understanding of the vulnerabilties of the PTN and Internet informs the assessment of the trustworthiness of other NISs. Ideas for improving the trustworthiness of the PTN and Internet are also proposed, both for the short-term (by improved use of existing technologies and procedures) and for the long-term (by identifying some areas where the state-of-the-art is inadequate and research is therefore needed). Finally, some observations are offered about Internet telephony and the use of the Internet for critical infrastructures
    • 

    corecore