146 research outputs found

    Development of a Graduate Course on the Transition to Internet Protocol Version 6

    Get PDF
    Internet and mobile connectivity has grown tremendously in the last few decades, creating an ever increasing demand for Internet Protocol (IP) addresses. The pool of Internet Protocol version 4 (IPv4) addresses, once assumed to be more than sufficient for every person on this planet, has reached its final stages of depletion. With The Internet Assigned Numbers Authority’s (IANA) global pools depleted, and four of the five Regional Internet Registries (RIR) pools down to the their last /8 block, the remaining addresses will not last very long. In order to ensure continuous growth of the internet in the foreseeable future, we would need a newer internet protocol, with a much larger address space. Specifically, with that goal in mind the Internet Protocol version 6 (IPv6) was designed about two decades ago. Over the years it has matured, and has proven that it could eventually replace the existing IPv4. This thesis presents the development a graduate level course on the transition to IPv6. The course makes an attempt at understanding how the new IPv6 protocol is different than the currently used IPv4 protocol. And also tries to emphasize on the options existing to facilitate a smooth transition of production networks from IPv4 to IPv6

    ARCFIRE : experimentation with the recursive InterNetwork Architecture

    Get PDF
    European funded research into the Recursive Inter-Network Architecture (RINA) started with IRATI, which developed an initial prototype implementation for OS/Linux. IRATI was quickly succeeded by the PRISTINE project, which developed different policies, each tailored to specific use cases. Both projects were development-driven, where most experimentation was limited to unit testing and smaller scale integration testing. In order to assess the viability of RINA as an alternative to current network technologies, larger scale experimental deployments are needed. The opportunity arose for a project that shifted focus from development towards experimentation, leveraging Europe's investment in Future Internet Research and Experimentation (FIRE+) infrastructures. The ARCFIRE project took this next step, developing a user-friendly framework for automating RINA experiments. This paper reports and discusses the implications of the experimental results achieved by the ARCFIRE project, using open source RINA implementations deployed on FIRE+ Testbeds. Experiments analyze the properties of RINA relevant to fast network recovery, network renumbering, Quality of Service, distributed mobility management, and network management. Results highlight RINA properties that can greatly simplify the deployment and management of real-world networks; hence, the next steps should be focused on addressing very specific use cases with complete network RINA-based networking solutions that can be transferred to the market

    Revenue Maximization in an Optical Router Node Using Multiple Wavelengths

    Get PDF
    In this paper, an optical router node with multiple wavelengths is considered. We introduce revenue for successful transmission and study the ensuing revenue maximization problem. We present an efficient and accurate heuristic procedure for solving the NP-hard revenue maximization problem and investigate the advantage offered by having multiple wavelengths

    Redesign of iMoro Robot

    Get PDF
    IMoro is a robot in which students and researchers had been working on for more than 10 years. Some thesis and post-doctoral researches have been made about iMoro. This robot is actually in RoboLab, where it can be visited. Students have the freedom to go there and play or work with the different kind of robots, so this thesis is focused to ease this work with iMoro. This thesis continues the work made by other students and improves the robot as much as possible. To achieve that, a series of improvements, mainly in hardware part, are going to be exposed in this thesis. Some improvements in the software parts will be also made, but only as first step of what can be done. IMoro is a multidirectional robot with four wheels which can be moved independently forward or backward, and around Z axis. A 6 degree of freedom manipulator is also attached to the plat-form with a tiltable base which can be inclined 45º. The power supply is administrated to the robot with a complex electrical circuit, which automatically switch between the batteries and the charger station. All these mechanisms, in addition to others, will be explained and in detail. The phases of the development of this thesis involve: compilation of information related to past studies, disassembling the robot to understand its functioning, structuring of a plan for different improvements and implementation of this advances. The improvements made on iMoro in the Hardware part are: device redistribution, redo of the wiring, creation of a second platform, creation of an external case and creation of a charger sta-tion. On the other hand, in the software part, a user´s manual is started with the steps to connect your personal computer with the onboard computer robot

    Network-aware Active Wardens in IPv6

    Get PDF
    Every day the world grows more and more dependent on digital communication. Technologies like e-mail or the World Wide Web that not so long ago were considered experimental, have first become accepted and then indispensable tools of everyday life. New communication technologies built on top of the existing ones continuously race to provide newer and better functionality. Even established communication media like books, radio, or television have become digital in an effort to avoid extinction. In this torrent of digital communication a constant struggle takes place. On one hand, people, organizations, companies and countries attempt to control the ongoing communications and subject them to their policies and laws. On the other hand, there oftentimes is a need to ensure and protect the anonymity and privacy of the very same communications. Neither side in this struggle is necessarily noble or malicious. We can easily imagine that in presence of oppressive censorship two parties might have a legitimate reason to communicate covertly. And at the same time, the use of digital communications for business, military, and also criminal purposes gives equally compelling reasons for monitoring them thoroughly. Covert channels are communication mechanisms that were never intended nor designed to carry information. As such, they are often able to act ``below\u27\u27 the notice of mechanisms designed to enforce security policies. Therefore, using covert channels it might be possible to establish a covert communication that escapes notice of the enforcement mechanism in place. Any covert channel present in digital communications offers a possibility of achieving a secret, and therefore unmonitored, communication. There have been numerous studies investigating possibilities of hiding information in digital images, audio streams, videos, etc. We turn our attention to the covert channels that exist in the digital networks themselves, that is in the digital communication protocols. Currently, one of the most ubiquitous protocols in deployment is the Internet Protocol version 4 (IPv4). Its universal presence and range make it an ideal candidate for covert channel investigation. However, IPv4 is approaching the end of its dominance as its address space nears exhaustion. This imminent exhaustion of IPv4 address space will soon force a mass migration towards Internet Protocol version 6 (IPv6) expressly designed as its successor. While the protocol itself is already over a decade old, its adoption is still in its infancy. The low acceptance of IPv6 results in an insufficient understanding of its security properties. We investigated the protocols forming the foundation of the next generation Internet, Internet Protocol version 6 (IPv6) and Internet Control Message Protocol (ICMPv6) and found numerous covert channels. In order to properly assess their capabilities and performance, we built cctool, a comprehensive covert channel tool. Finally, we considered countermeasures capable of defeating discovered covert channels. For this purpose we extended the previously existing notions of active wardens to equip them with the knowledge of the surrounding network and allow them to more effectively fulfill their role

    To Minimize the Consumption of Logical Addresses in a Network using OSPF with Overloading Technique

    Get PDF
    Routing protocols are used to assist the exchange of routing information between routers Routing Protocols find the best path to each network which is then added to routing table OSPF is a route distribution protocol In this paper NAT overloading is applied on OSPF network to decreases the consumption of IP addresses The output of overloading technique is shown by GNS-

    D3.6.1: Cookbook for IPv6 Renumbering in SOHO and Backbone Networks

    Get PDF
    In this text we present the results of a set of experiments that are designed to be a first step in the process of analysing how effective network renumbering procedures may be in the context of IPv6. An IPv6 site will need to get provider assigned (PA) address space from its upstream ISP. Because provider independent (PI) address space is not available for IPv6, a site wishing to change provider will need to renumber from its old network prefix to the new one. We look at the scenarios, issues and enablers for such renumbering, and present results and initial conclusions and recommendations in the context of SOHO and backbone networking. A subsequent deliverable (D3.6.2) will refine these findings, adding additional results and context from enterprise and ISP renumbering scenarios

    The Use of Firewalls in an Academic Environment

    No full text

    Renumbering Still Needs Work

    Full text link
    • …
    corecore