TRANSPORT TUNNELING SYSTEM WITH A COMMUNICATION HACKING FRAMEWORK
Journal Title: ICTACT Journal on Communication Technology - Year 2018, Vol 9, Issue 4
Abstract
This paper aims to reduce the transfer restrictions of networks at the transport layer under prohibition-in-principle rules, and to introduce a communication system that virtualizes a programmable network function. The second aim facilitates the realization of the first. Specifically, we target Intranets that restrict transport-layer communications using a firewall. When such an organization’s networks serve multiple departments, external communication to a department is restricted to the available transport number under the rule of the prohibition-in-principle. Our proposed transport proxy system architecture represents the transfer of network applications via well-known protocols such as HTTP (80), using the urgent pointer in the transmission control protocol header. Our architecture improves the flexibility and scalability of the network without requiring complex encapsulation. Finally, the framework is demonstrated through an experimental implementation of the system. Moreover, adding the transport tunneling system offered flexibility while barely affecting the download time of the files.
Authors and Affiliations
Satoshi Kodama, Rei Nakagawa
A REVIEW ON OVERVIEW OF WORLDWIDE INTEROPERABILITY FOR MICROWAVE ACCESS (WIMAX) INNOVATION AND ITS FUTURE UTILIZATIONS
This paper introduces the elements of the Worldwide Interoperability for Microwave Access (WiMAX) innovation and future utilizations of WiMAX. It is a connection oriented wireless network that assures Quality of Service...
PERFORMANCE EVALUATION OF DSDV IN HYBRID WIRELESS MESH NETWORK
Wireless Mesh Network (WMN) is a new wireless technology and it has the features of large area network coverage, Internet broadband access, self-healing, self-configuring and self-organizing. Routing is an important rese...
QUALITY OF SERVICE IMPROVEMENTS IN IEEE 802.11AX WI-FI
IEEE 802.11ax is the latest high rate Wi-Fi technology (also known as high efficiency Wireless) introduces some new features like OFDMA, Uplink multi-user MIMO (UL MU-MIMO) to deliver benefits in reliability, capacity, a...
AN INVESTIGATION OF SECURITY TECHNIQUES FOR CONCEALED DDOS EXPOSURE ATTACKS
Due to the influence of the multi-level system, the DDoS became a significant investigation in modern days. This encourages us to reduce the data loss and service overheads. In order to investigate these issues, an inves...
A HETEROGENEOUS MULTIPROCESSOR SYSTEM-ON-CHIP ARCHITECTURE INCORPORATING MEMORY ALLOCATION
This paper describes the development of a Multiprocessor System-on-Chip (MPSoC) with a novel interconnect architecture incorporating memory allocation. It addresses the problem of mapping a process network with data depe...