Results 1 - 10
of
8,206
Implementation and Analyses of the Mobile-IP Protocol
- Thesis report for a masters degree in Computer Science at the Department of Teleinformatics
, 1996
"... This report is the result of a masters degree project conducted at the Department of Teleinformatics at the Royal Institute of Technology during the autumn 1995. The area investigated is the Mobile Internet Protocol, especially its implementation and efficiency.
The thesis work is divided into thre ..."
Abstract
- Add to MetaCart
into three areas. The first area includes the development and implementation of a Management Information Base for the Mobile-IP protocol. The second area deals with the porting of a Mobile-IP implementation for SunOS to MachOS and Solaris. The last area covers the tests done to measure the throughput
Implementationand Analyses of the Mobile-IP Protocol
"... This report is the result of a masters degree project conducted at the Department of Teleinformatics at the Royal Institute of Technology during the autumn 1995. The area investigated is the Mobile Internet Protocol, especially its implementation and efficiency. The thesis work is divided into three ..."
Abstract
- Add to MetaCart
into three areas. The first area includes the development and implementation of a Management Information Base for the Mobile-IP protocol. The second area deals with the porting of a Mobile-IP implementation for SunOS to MachOS and Solaris. The last area covers the tests done to measure the throughput
Covert Channels in TCP/IP Protocol Stack
, 2013
"... We give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack. Techniques are organized according to affected layer and protocol. For every covert channel its data bandwidth is given. ..."
Abstract
- Add to MetaCart
We give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack. Techniques are organized according to affected layer and protocol. For every covert channel its data bandwidth is given.
Analysis of Mobile IP Protocols Security
"... This paper describes the route optimization between Mobile IPv6 nodes which introduced several vulnerabilities in mobile environment. We first explain all the possible threats evolved due to route optimization technique and then possible defense mechanism to counter them. We have analyzed all that d ..."
Abstract
- Add to MetaCart
that defense mechanism through comparative discussion and tried to find out best solution which may be more efficient and less complex. General Terms Security of mobile network, Analysis of mobile IP, Network design of mobile devices.
On the Security of the Mobile IP Protocol Family
"... The Internet Engineering Task Force (IETF) has worked on network layer mobility for more than 10 years and a number of RFCs are available by now. Although the IETF mobility protocols are not present in the Internet infrastructure as of today, deployment seems to be imminent since a number of organiz ..."
Abstract
- Add to MetaCart
The Internet Engineering Task Force (IETF) has worked on network layer mobility for more than 10 years and a number of RFCs are available by now. Although the IETF mobility protocols are not present in the Internet infrastructure as of today, deployment seems to be imminent since a number
Security Model for TCP/IP Protocol Suite
"... Abstract—the Internet has instantly evolved into a vast global network in the growing technology. TCP/IP Protocol Suite is the basic requirement for today’s Internet. Internet usage continues to increase exponentially. So network security becomes a growing problem. Even though IPv6 comes with build ..."
Abstract
- Add to MetaCart
Abstract—the Internet has instantly evolved into a vast global network in the growing technology. TCP/IP Protocol Suite is the basic requirement for today’s Internet. Internet usage continues to increase exponentially. So network security becomes a growing problem. Even though IPv6 comes with build
The Deisgn Philosophy of the DARPA Internet Protocols
- In ACM SIGCOMM
, 1988
"... The Intemet protocol suite, TCP/IP, was first proposed fifteen years ago, It was developed by the Defense Advanced Research Projects Agency (DARPA), and has been used widely in military and commercial systems. While there have been papers and specifications that describe how the protocols work, it i ..."
Abstract
-
Cited by 551 (2 self)
- Add to MetaCart
The Intemet protocol suite, TCP/IP, was first proposed fifteen years ago, It was developed by the Defense Advanced Research Projects Agency (DARPA), and has been used widely in military and commercial systems. While there have been papers and specifications that describe how the protocols work
II. THE STRUCTURE OF THE LINUX TCP/IP PROTOCOL
"... wide range of hardware, etc. It is popular because of its open source code and free available applications. The kernel of Linux supports a lot of CPU platforms, and it is a real multitask OS that provides virtual memory protection, demand loading and powerful network function. The network function i ..."
Abstract
- Add to MetaCart
is a very important part of the Linux kernel. More then 30 % of the Web server on the Internet are constructed on Linux. The network function of Linux has the following characteristics: it provides BSD SOCKET interface for user applications, it supports network protocols such as IP, IPX, AppleTalk, X
Security Analysis of Voice-over-IP Protocols
"... Transmission of voice communications as datagram packets over IP networks, commonly known as Voice-over-IP (VoIP) telephony, is rapidly gaining wide acceptance. With private phone conversations being conducted on insecure public networks, security of VoIP communications is increasingly important. ..."
Abstract
- Add to MetaCart
. We present a structured security analysis of the VoIP protocol stack, which consists of signaling (SIP), session description (SDP), key establishment (SDES, MIKEY, and ZRTP) and secure media transport (SRTP) protocols. Using a combination of manual and tool-supported formal analysis, we uncover
Results 1 - 10
of
8,206