TRANSPORT TUNNELING SYSTEM WITH A COMMUNICATION HACKING FRAMEWORK
Journal Title: ICTACT Journal on Communication Technology - Year 2018, Vol 9, Issue 4
Abstract
This paper aims to reduce the transfer restrictions of networks at the transport layer under prohibition-in-principle rules, and to introduce a communication system that virtualizes a programmable network function. The second aim facilitates the realization of the first. Specifically, we target Intranets that restrict transport-layer communications using a firewall. When such an organization’s networks serve multiple departments, external communication to a department is restricted to the available transport number under the rule of the prohibition-in-principle. Our proposed transport proxy system architecture represents the transfer of network applications via well-known protocols such as HTTP (80), using the urgent pointer in the transmission control protocol header. Our architecture improves the flexibility and scalability of the network without requiring complex encapsulation. Finally, the framework is demonstrated through an experimental implementation of the system. Moreover, adding the transport tunneling system offered flexibility while barely affecting the download time of the files.
Authors and Affiliations
Satoshi Kodama, Rei Nakagawa
CERTIFICATE REVOCATION SCHEME BASED ON WEIGHTED VOTING GAME AND RATIONAL SECURE MULTIPARTY COMPUTING
The Mobile Adhoc Network consists of deployed mobile nodes which lead to the frequent changes in network topology. Due to topology changes, required infrastructure is unavailable for communication. Moreover, malicious no...
IMPROVED PACKET DELIVERY RATIO IN MOBILE ADHOC NETWORKS USING BTSNA-DS ALGORITHM
Mobile Ad-hoc Networks (MANETs) in which moving nodes act as mobile-terminals as well as routing stations. These movements cause the change in the network topology. In this connection, route establishment is the primary...
A TLBO-BASED ENERGY EFFICIENT BASE STATION SWITCH OFF AND USER SUBCARRIER ALLOCATION ALGORITHM FOR OFDMA CELLULAR NETWORKS
Downlink of a cellular network with orthogonal frequency-division multiple access (OFDMA) is considered. Joint base station switch OFF and user subcarrier-allocation with guaranteed user quality of service, is shown to b...
A MULTI AWARE MULTI-LEVELS HETEROGENOUS ROUTING (MAMHR) PROTOCOL FOR WIRELESS SENSOR NETWORKS
Wireless Sensor Networks (WSNs) are generally set out in a remote workplace, since the sensor nodes are tiny in size, cost-proficient, low-power gadgets, and have restricted battery supply. Due to the constrained availab...
SECURE TRANSMISSION OF BIO-MEDICAL DATA USING STEGANOGRAPHY
To transmit secret data over the internet, the information should be sent in a way attacker finds it difficult to read the secret data. In this paper patient’s secret information is hidden in the bio-medical signal like...