This document proposes an API for IPv6 multihoming based on Hash Based Addresses (HBA) and Cryptographically Generated Addresses (CGA). The API allows applications to access multihoming functions like failure detection, reachability testing, and locator exchange. HBA and CGA provide secure mapping between host identifiers and locators. HBA includes known prefixes in a hashed structure, while CGA uses public/private keys so locators can be signed. The API would give applications control over multihoming parameters and functions.
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...IJERA Editor
There is always a tradeoff between privacy and the desired level of security for any internet user in the
contemporary cyber world. Cyber security, of late, is paramount and its breach could lead to untoward
consequences, at times, disastrous. The advent of the IPv6 provides a hope to resolve this tradeoff satisfactorily.
Included in the IPV6 suite is a method for devices to automatically configure their own addresses in a secure
manner. This technique is called Cryptographically Generated Addresses (CGAs). CGA provides the ownership
proof necessary for an IPv6 address without relying on any trust authority. However, the computation involved
in CGAs is very high, especially for a high security level defined by the security parameter (Sec). The sheer cost
involved here may pose to be an inhibiting factor for any user to continue with this security regime and may
tempt her not to change her address on a frequent basis. Thus, the way forward could be to modify the standard
CGA to make it more applicable across applications and scenarios and at the same time not to let it compromise
with the optimum security level. We propose to reduce the CGA granularity of the security level from 16 to 8,
which make it more feasible for use in most applications and scenarios. And the privacy part is taken care of by
changing addresses over time which protects users from being tracked. Here, we strive to implement and
evaluate these extensions to the standard CGA.
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
This paper is focused on the Translator strategy for migration of IPv4 to Ipv6 implemented in Cisco packet
tracer. It describes the design and configuration of network devices and packet transfer between devices of IPv4
and IPv6 networks using NAT-PT as transition mechanism. First major version of IP, IPv4 is the dominant
protocol of internet.IPv6 is developed to deal with long anticipated problem of IPv4 running out of addresses.
The migration from IPv4 to IPv6 must be implemented node by node by using auto-configuration procedures to
eliminate the need to configure IPv6 hosts manually.
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...IJECEIAES
This paper attempts to build up a simple, strong and secure cryptographic algorithm. The result of such an attempt is “RC6-Cascade” which is 320-bits RC6 like block cipher. The key can be any length up to 256 bytes. It is a secret-key block cipher with precise characteristics of RC6 algorithm using another overall structure design. In RC6-Cascade, cascading of F-functions will be used instead of rounds. Moreover, the paper investigates a hardware design to efficiently implement the proposed RC6-Cascade block cipher core on field programmable gate array (FPGA). An efficient compact iterative architecture will be designed for the F-function of the above algorithm. The goal is to design a more secure algorithm and present a very fast encryption core for low cost and small size applications.
Reduce the False Positive and False Negative from Real Traffic with Intrusion...inventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...IJERA Editor
There is always a tradeoff between privacy and the desired level of security for any internet user in the
contemporary cyber world. Cyber security, of late, is paramount and its breach could lead to untoward
consequences, at times, disastrous. The advent of the IPv6 provides a hope to resolve this tradeoff satisfactorily.
Included in the IPV6 suite is a method for devices to automatically configure their own addresses in a secure
manner. This technique is called Cryptographically Generated Addresses (CGAs). CGA provides the ownership
proof necessary for an IPv6 address without relying on any trust authority. However, the computation involved
in CGAs is very high, especially for a high security level defined by the security parameter (Sec). The sheer cost
involved here may pose to be an inhibiting factor for any user to continue with this security regime and may
tempt her not to change her address on a frequent basis. Thus, the way forward could be to modify the standard
CGA to make it more applicable across applications and scenarios and at the same time not to let it compromise
with the optimum security level. We propose to reduce the CGA granularity of the security level from 16 to 8,
which make it more feasible for use in most applications and scenarios. And the privacy part is taken care of by
changing addresses over time which protects users from being tracked. Here, we strive to implement and
evaluate these extensions to the standard CGA.
Implementation of “Traslator Strategy” For Migration of Ipv4 to Ipv6IJERA Editor
This paper is focused on the Translator strategy for migration of IPv4 to Ipv6 implemented in Cisco packet
tracer. It describes the design and configuration of network devices and packet transfer between devices of IPv4
and IPv6 networks using NAT-PT as transition mechanism. First major version of IP, IPv4 is the dominant
protocol of internet.IPv6 is developed to deal with long anticipated problem of IPv4 running out of addresses.
The migration from IPv4 to IPv6 must be implemented node by node by using auto-configuration procedures to
eliminate the need to configure IPv6 hosts manually.
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...IJECEIAES
This paper attempts to build up a simple, strong and secure cryptographic algorithm. The result of such an attempt is “RC6-Cascade” which is 320-bits RC6 like block cipher. The key can be any length up to 256 bytes. It is a secret-key block cipher with precise characteristics of RC6 algorithm using another overall structure design. In RC6-Cascade, cascading of F-functions will be used instead of rounds. Moreover, the paper investigates a hardware design to efficiently implement the proposed RC6-Cascade block cipher core on field programmable gate array (FPGA). An efficient compact iterative architecture will be designed for the F-function of the above algorithm. The goal is to design a more secure algorithm and present a very fast encryption core for low cost and small size applications.
Reduce the False Positive and False Negative from Real Traffic with Intrusion...inventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTSijcisjournal
National Institute of Science and Technology (NIST) published the first Secure Hash Standard SHA-0 in 1993 as Federal Information Processing Standard publication (FIPS PUBS) which two years later was replaced by SHA-1 to improve the original design and added SHA-2 family by subsequent revisions of the FIPS. Most of the widely used cryptographic hash functions are under attack today. With the need to maintain a certain level of security, NIST had selected new cryptographic hash function through public competition. The winning algorithm, Keccak will not only have to establish a strong security, but also has to exhibit good performance and capability to run. In this context, we have analysed SHA-3 finalists along with the used standard SHA-2. The performances of respective algorithms are evaluated by computing cycles per byte. The empirical analysis shows that two SHA-3 finalists viz. Skein and BLAKE perform better which are nearly same as the performance of SHA-2.
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTSijcisjournal
National Institute of Science and Technology (NIST) published the first Secure Hash Standard SHA-0 in 1993 as Federal Information Processing Standard publication (FIPS PUBS) which two years later was replaced by SHA-1 to improve the original design and added SHA-2 family by subsequent revisions of the FIPS. Most of the widely used cryptographic hash functions are under attack today. With the need to maintain a certain level of security, NIST had selected new cryptographic hash function through public competition. The winning algorithm, Keccak will not only have to establish a strong security, but also has to exhibit good performance and capability to run. In this context, we have analysed SHA-3 finalists along with the used standard SHA-2. The performances of respective algorithms are evaluated by computing cycles per byte. The empirical analysis shows that two SHA-3 finalists viz. Skein and BLAKE perform better which are nearly same as the performance of SHA-2.
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTSijcisjournal
National Institute of Science and Technology (NIST) published the first Secure Hash Standard SHA-0 in
1993 as Federal Information Processing Standard publication (FIPS PUBS) which two years later was
replaced by SHA-1 to improve the original design and added SHA-2 family by subsequent revisions of the
FIPS. Most of the widely used cryptographic hash functions are under attack today. With the need to
maintain a certain level of security, NIST had selected new cryptographic hash function through public
competition. The winning algorithm, Keccak will not only have to establish a strong security, but also has
to exhibit good performance and capability to run. In this context, we have analysed SHA-3 finalists along
with the used standard SHA-2. The performances of respective algorithms are evaluated by computing
cycles per byte. The empirical analysis shows that two SHA-3 finalists viz. Skein and BLAKE perform better
which are nearly same as the performance of SHA-2.
M.E Computer Science Parallel and Distributed System ProjectsVijay Karan
List of Parallel and Distributed System IEEE 2006 Projects. It Contains the IEEE Projects in the Domain Parallel and Distributed System for M.E Computer Science students.
M.Phil Computer Science Parallel and Distributed System ProjectsVijay Karan
List of Parallel and Distributed System IEEE 2006 Projects. It Contains the IEEE Projects in the Domain Parallel and Distributed System for M.Phil Computer Science students.
M phil-computer-science-parallel-and-distributed-system-projectsVijay Karan
List of Parallel and Distributed System IEEE 2006 Projects. It Contains the IEEE Projects in the Domain Parallel and Distributed System for M.Phil Computer Science students.
An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3Eswar Publications
Internet Protocol Version 6 (IPv6) is the next generation protocol and in the near future, routers are going to become more faster and new technologies are going to reduce the Internet delay. IPv6 global unicast address is similar to IPv4 public address and globally routable. This Global unicast address assignment process provides new function called Stateless Address Auto Configuration (SLAAC) is a significant feature for host itself generating and configuring own addresses to enable communication. In this paper aims to describe experimental about IPv6 address assignment for global unicast address and evaluation of a host using various parameters such as Default router IP address, Throughput, Average End to End Delay and Domain Name Server (DNS) IP address. The study was carried out using an open source Network Simulator (NS-3) to study and analyses the behavior of IPv6 address assignment.
In today’s network-based cloud computing era, software applications are playing big role. The security of these software applications is paramount to the successful use of these applications. These applications utilize cryptographic algorithms to secure the data over the network through encryption and decryption
processes. The use of parallel processors is now common in both mobile and cloud computing scenarios.
Cryptographic algorithms are compute intensive and can significantly benefit from parallelism. This paper
introduces a parallel approach to symmetric stream cipher security algorithm known as RC4A, which is
one of the strong variants of RC4. We present an efficient parallel implementation to the compute intensive
PRGA that is pseudo-random generation algorithm portion of the RC4A algorithm and the resulted
algorithm will be named as PARC4-I. We have added some functionality in terms of lookup tables.
Modified algorithm is having four lookup tables instead of two and is capable of returning four distinct
output bytes at each iteration. Further, with the help of Parallel Additive Stream Cipher Structure and loop
unrolling method, encryption/decryption is being done on multi core machine. Finally, the results shows
that PARC4-I is a time efficient algorithm.
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingIJERA Editor
In today’s world to provide a security to a public network like a cloud network is become a toughest task however more likely to reduce the cost at the time of providing security using cryptographic technique to delegate the mask of the decryption task to the cloud servers to reduce the computing cost. As a result, attributebased encryption with delegation emerges. Still, there are caveats and questions remaining in the previous relevant works. For to solution to all problems the cloud servers could tamper or replace the delegated cipher text and respond a forged computing result with malicious intent. They may also cheat the eligible users by responding them that they are ineligible for the purpose of cost saving. Furthermore, during the encryption, the access policies may not be flexible enough as well. Since policy for general circuits enables to achieve the strongest form of access control, a construction for realizing circuit cipher text-policy attribute-based hybrid encryption with verifiable delegation has been considered in our work. In such a system, combined with verifiable computation and encrypt-then-mac mechanism, the data confidentiality, the fine-grained access control and the correctness of the delegated computing results are well guaranteed at the same time. Besides, our scheme achieves security against chosen-plaintext attacks under the k-multilinear Decisional Diffie-Hellman assumption. Moreover, an extensive simulation campaign confirms the feasibility and efficiency of the proposed solution. There are two complementary forms of attribute-based encryption. One is key-policy attribute-based encryption (KP-ABE) [8], [9], [10], and the other is cipher text-policy attribute-based encryption. In a KP-ABE system, the decision of access policy is made by the key distributor instead of the enciphered, which limits the practicability and usability for the system in practical applicationsthe access policy for general circuits could be regarded as the strongest form of the policy expression that circuits can express any program of fixed running time
As robust as the IP protocol is, it does not perform the actual .docxcargillfilberto
As robust as the IP protocol is, it does not perform the actual transmission of the data. In this step, you will investigate the network protocol called
Transmission Control Protocol (TCP)
, responsible for creation, reliability of delivery, and proper assembling of data packets.
In addition to IP, TCP is also widely used on the internet, especially for any network communication where it is essential to confirm receipt of the transmission. Many of the network protocols used to implement cloud computing use both TCP and IP. You will review TCP’s workings and discuss them in your final technical report.
In general, there is no guarantee that a data packet will reach its destination. Packets can get lost or corrupted during transmission, and there are network applications where you need assurance that the packets have reached their destination. To achieve reliability, TCP establishes connections between communicating hosts, using port numbers to refer to applications on these hosts. Then, packets are created, sequenced, transmitted, acknowledged, and retransmitted if missing or containing errors. Finally, at the destination, they are reassembled into the original messages.
To synchronize the flow of packets between sender and receiver, and avoid packet congestion in case of varying speeds, TCP uses
sliding windows
for packets remaining in processing at a given time, at both the sender and receiver ends.
In the next step, you will look into subnetting BallotOnline’s IP addresses.
One of the drawbacks of IPv4 is the maximum number of network devices it can support. IPv4 addressing uses a 32-bit network address. This allows for 232,, or a little over 4 billion devices. However, today there are significantly more devices on the internet. Even though the more robust IPv6 version has been introduced and efforts are under way to assure wide adoption, IPv4 is still widely used.
One method used to more efficiently use the IPv4 network addresses is a technique to optimize the addresses by splitting them into network addresses and host addresses within designated networks. You will need to take advantage of IP address splitting so that you can efficiently use and allocate the IPv4 network addresses that have been assigned to BallotOnline.
For a given large network, rather than addressing all the hosts using the host part of the address,
subnetting
allows for splitting the network into several smaller ones by borrowing the host part bits and adding them to the network bits. It supports efficient management of local networks composed of multiple LANs. In this step, you will investigate subnetting conventions and discuss them in your final report in order to lay ground for the use of subnets by BallotOnline.
As the network engineer for BallotOnline, you know that subnetting a network into several smaller and variable-sized networks will be best for the organization's needs. BallotOnline has been assigned a network address block by the
In.
The Internet Engineering Task Force (IETF) proposed proxy mobile ipv6 (PMIPv6) is a very promising
network based mobility management protocol. There are three entities LMA MAG and AAA server required
for the proper functioning of PMIPv6.. In PMIPv6 Networks having many disadvantages like signaling
overhead , handover latency ,packet loss problem and long authentication latency problems during
handoff. So we propose a new mechanism called SPAM which performs efficient authentication procedure
globally with low computational cost. It also supports global access technique using ticket based
algorithm. Which allows user’s mobile terminals to use only one ticket to communicate with their neighbor
Access Points? This algorithm not only reduces the mobile terminal’s computational cost but also provides
user ID protection to protect user privacy. Through this technique, it can implement handover
authentication protocol, which in turn results in less computation cost and communication delay when
compared with other existing methods.
Internet Protocol version 6 (IPv6) is the latest version of the
Internet Protocol (IP), the communications protocol that
provides an identification and location system for computers
on networks and routes traffic across the Internet.
IPv4 & IPv6 are not designed to be interoperable, complicating
the transition to IPv6. However, several IPv6 transition
mechanisms have been devised to permit communication
between IPv4 and IPv6 hosts.
Migration of corperate networks from ipv4 to ipv6 using dual stackpraveenReddy268
Migration of corperate networks from ipv4 to ipv6 using dual stack
in this you will be learning about internet protocols of version4 & 6.And also about OSI layers and their architecture and coding to the routers
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...cscpconf
Intelligent transportation system (ITS) consists of moving networks, where the network mobility
(NEMO) basic support is adopted as a mobility management protocol for moving networks.
Even though NEMO basic support (NBS) provides a basic mobility support for ITS systems, the
mobile routers (MR) need to participate in the mobility signaling. In the literature, network
based mobility management such as Proxy Mobile IPv6 (PMIPv6) based solutions are explored
for mobility management. However, the signaling overhead incurred due to this approach is still
need to be optimized. In this paper, we introduce a bulk binding update solution for the
registration of MR with local mobility anchor (LMA) in moving networks. The bulk binding
update procedure uses a group identifier for group of MRs during the periodic binding update
process which reduces the signaling overhead compared with the basic PMIPv6 based
approach. The numerical results demonstrate that the proposed approach gives a better
performance in terms of signaling overhead and handover latency than NBS, and simplePIMPv6 based solutions.
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTSijcisjournal
National Institute of Science and Technology (NIST) published the first Secure Hash Standard SHA-0 in 1993 as Federal Information Processing Standard publication (FIPS PUBS) which two years later was replaced by SHA-1 to improve the original design and added SHA-2 family by subsequent revisions of the FIPS. Most of the widely used cryptographic hash functions are under attack today. With the need to maintain a certain level of security, NIST had selected new cryptographic hash function through public competition. The winning algorithm, Keccak will not only have to establish a strong security, but also has to exhibit good performance and capability to run. In this context, we have analysed SHA-3 finalists along with the used standard SHA-2. The performances of respective algorithms are evaluated by computing cycles per byte. The empirical analysis shows that two SHA-3 finalists viz. Skein and BLAKE perform better which are nearly same as the performance of SHA-2.
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTSijcisjournal
National Institute of Science and Technology (NIST) published the first Secure Hash Standard SHA-0 in 1993 as Federal Information Processing Standard publication (FIPS PUBS) which two years later was replaced by SHA-1 to improve the original design and added SHA-2 family by subsequent revisions of the FIPS. Most of the widely used cryptographic hash functions are under attack today. With the need to maintain a certain level of security, NIST had selected new cryptographic hash function through public competition. The winning algorithm, Keccak will not only have to establish a strong security, but also has to exhibit good performance and capability to run. In this context, we have analysed SHA-3 finalists along with the used standard SHA-2. The performances of respective algorithms are evaluated by computing cycles per byte. The empirical analysis shows that two SHA-3 finalists viz. Skein and BLAKE perform better which are nearly same as the performance of SHA-2.
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTSijcisjournal
National Institute of Science and Technology (NIST) published the first Secure Hash Standard SHA-0 in
1993 as Federal Information Processing Standard publication (FIPS PUBS) which two years later was
replaced by SHA-1 to improve the original design and added SHA-2 family by subsequent revisions of the
FIPS. Most of the widely used cryptographic hash functions are under attack today. With the need to
maintain a certain level of security, NIST had selected new cryptographic hash function through public
competition. The winning algorithm, Keccak will not only have to establish a strong security, but also has
to exhibit good performance and capability to run. In this context, we have analysed SHA-3 finalists along
with the used standard SHA-2. The performances of respective algorithms are evaluated by computing
cycles per byte. The empirical analysis shows that two SHA-3 finalists viz. Skein and BLAKE perform better
which are nearly same as the performance of SHA-2.
M.E Computer Science Parallel and Distributed System ProjectsVijay Karan
List of Parallel and Distributed System IEEE 2006 Projects. It Contains the IEEE Projects in the Domain Parallel and Distributed System for M.E Computer Science students.
M.Phil Computer Science Parallel and Distributed System ProjectsVijay Karan
List of Parallel and Distributed System IEEE 2006 Projects. It Contains the IEEE Projects in the Domain Parallel and Distributed System for M.Phil Computer Science students.
M phil-computer-science-parallel-and-distributed-system-projectsVijay Karan
List of Parallel and Distributed System IEEE 2006 Projects. It Contains the IEEE Projects in the Domain Parallel and Distributed System for M.Phil Computer Science students.
An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3Eswar Publications
Internet Protocol Version 6 (IPv6) is the next generation protocol and in the near future, routers are going to become more faster and new technologies are going to reduce the Internet delay. IPv6 global unicast address is similar to IPv4 public address and globally routable. This Global unicast address assignment process provides new function called Stateless Address Auto Configuration (SLAAC) is a significant feature for host itself generating and configuring own addresses to enable communication. In this paper aims to describe experimental about IPv6 address assignment for global unicast address and evaluation of a host using various parameters such as Default router IP address, Throughput, Average End to End Delay and Domain Name Server (DNS) IP address. The study was carried out using an open source Network Simulator (NS-3) to study and analyses the behavior of IPv6 address assignment.
In today’s network-based cloud computing era, software applications are playing big role. The security of these software applications is paramount to the successful use of these applications. These applications utilize cryptographic algorithms to secure the data over the network through encryption and decryption
processes. The use of parallel processors is now common in both mobile and cloud computing scenarios.
Cryptographic algorithms are compute intensive and can significantly benefit from parallelism. This paper
introduces a parallel approach to symmetric stream cipher security algorithm known as RC4A, which is
one of the strong variants of RC4. We present an efficient parallel implementation to the compute intensive
PRGA that is pseudo-random generation algorithm portion of the RC4A algorithm and the resulted
algorithm will be named as PARC4-I. We have added some functionality in terms of lookup tables.
Modified algorithm is having four lookup tables instead of two and is capable of returning four distinct
output bytes at each iteration. Further, with the help of Parallel Additive Stream Cipher Structure and loop
unrolling method, encryption/decryption is being done on multi core machine. Finally, the results shows
that PARC4-I is a time efficient algorithm.
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingIJERA Editor
In today’s world to provide a security to a public network like a cloud network is become a toughest task however more likely to reduce the cost at the time of providing security using cryptographic technique to delegate the mask of the decryption task to the cloud servers to reduce the computing cost. As a result, attributebased encryption with delegation emerges. Still, there are caveats and questions remaining in the previous relevant works. For to solution to all problems the cloud servers could tamper or replace the delegated cipher text and respond a forged computing result with malicious intent. They may also cheat the eligible users by responding them that they are ineligible for the purpose of cost saving. Furthermore, during the encryption, the access policies may not be flexible enough as well. Since policy for general circuits enables to achieve the strongest form of access control, a construction for realizing circuit cipher text-policy attribute-based hybrid encryption with verifiable delegation has been considered in our work. In such a system, combined with verifiable computation and encrypt-then-mac mechanism, the data confidentiality, the fine-grained access control and the correctness of the delegated computing results are well guaranteed at the same time. Besides, our scheme achieves security against chosen-plaintext attacks under the k-multilinear Decisional Diffie-Hellman assumption. Moreover, an extensive simulation campaign confirms the feasibility and efficiency of the proposed solution. There are two complementary forms of attribute-based encryption. One is key-policy attribute-based encryption (KP-ABE) [8], [9], [10], and the other is cipher text-policy attribute-based encryption. In a KP-ABE system, the decision of access policy is made by the key distributor instead of the enciphered, which limits the practicability and usability for the system in practical applicationsthe access policy for general circuits could be regarded as the strongest form of the policy expression that circuits can express any program of fixed running time
As robust as the IP protocol is, it does not perform the actual .docxcargillfilberto
As robust as the IP protocol is, it does not perform the actual transmission of the data. In this step, you will investigate the network protocol called
Transmission Control Protocol (TCP)
, responsible for creation, reliability of delivery, and proper assembling of data packets.
In addition to IP, TCP is also widely used on the internet, especially for any network communication where it is essential to confirm receipt of the transmission. Many of the network protocols used to implement cloud computing use both TCP and IP. You will review TCP’s workings and discuss them in your final technical report.
In general, there is no guarantee that a data packet will reach its destination. Packets can get lost or corrupted during transmission, and there are network applications where you need assurance that the packets have reached their destination. To achieve reliability, TCP establishes connections between communicating hosts, using port numbers to refer to applications on these hosts. Then, packets are created, sequenced, transmitted, acknowledged, and retransmitted if missing or containing errors. Finally, at the destination, they are reassembled into the original messages.
To synchronize the flow of packets between sender and receiver, and avoid packet congestion in case of varying speeds, TCP uses
sliding windows
for packets remaining in processing at a given time, at both the sender and receiver ends.
In the next step, you will look into subnetting BallotOnline’s IP addresses.
One of the drawbacks of IPv4 is the maximum number of network devices it can support. IPv4 addressing uses a 32-bit network address. This allows for 232,, or a little over 4 billion devices. However, today there are significantly more devices on the internet. Even though the more robust IPv6 version has been introduced and efforts are under way to assure wide adoption, IPv4 is still widely used.
One method used to more efficiently use the IPv4 network addresses is a technique to optimize the addresses by splitting them into network addresses and host addresses within designated networks. You will need to take advantage of IP address splitting so that you can efficiently use and allocate the IPv4 network addresses that have been assigned to BallotOnline.
For a given large network, rather than addressing all the hosts using the host part of the address,
subnetting
allows for splitting the network into several smaller ones by borrowing the host part bits and adding them to the network bits. It supports efficient management of local networks composed of multiple LANs. In this step, you will investigate subnetting conventions and discuss them in your final report in order to lay ground for the use of subnets by BallotOnline.
As the network engineer for BallotOnline, you know that subnetting a network into several smaller and variable-sized networks will be best for the organization's needs. BallotOnline has been assigned a network address block by the
In.
The Internet Engineering Task Force (IETF) proposed proxy mobile ipv6 (PMIPv6) is a very promising
network based mobility management protocol. There are three entities LMA MAG and AAA server required
for the proper functioning of PMIPv6.. In PMIPv6 Networks having many disadvantages like signaling
overhead , handover latency ,packet loss problem and long authentication latency problems during
handoff. So we propose a new mechanism called SPAM which performs efficient authentication procedure
globally with low computational cost. It also supports global access technique using ticket based
algorithm. Which allows user’s mobile terminals to use only one ticket to communicate with their neighbor
Access Points? This algorithm not only reduces the mobile terminal’s computational cost but also provides
user ID protection to protect user privacy. Through this technique, it can implement handover
authentication protocol, which in turn results in less computation cost and communication delay when
compared with other existing methods.
Internet Protocol version 6 (IPv6) is the latest version of the
Internet Protocol (IP), the communications protocol that
provides an identification and location system for computers
on networks and routes traffic across the Internet.
IPv4 & IPv6 are not designed to be interoperable, complicating
the transition to IPv6. However, several IPv6 transition
mechanisms have been devised to permit communication
between IPv4 and IPv6 hosts.
Migration of corperate networks from ipv4 to ipv6 using dual stackpraveenReddy268
Migration of corperate networks from ipv4 to ipv6 using dual stack
in this you will be learning about internet protocols of version4 & 6.And also about OSI layers and their architecture and coding to the routers
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...cscpconf
Intelligent transportation system (ITS) consists of moving networks, where the network mobility
(NEMO) basic support is adopted as a mobility management protocol for moving networks.
Even though NEMO basic support (NBS) provides a basic mobility support for ITS systems, the
mobile routers (MR) need to participate in the mobility signaling. In the literature, network
based mobility management such as Proxy Mobile IPv6 (PMIPv6) based solutions are explored
for mobility management. However, the signaling overhead incurred due to this approach is still
need to be optimized. In this paper, we introduce a bulk binding update solution for the
registration of MR with local mobility anchor (LMA) in moving networks. The bulk binding
update procedure uses a group identifier for group of MRs during the periodic binding update
process which reduces the signaling overhead compared with the basic PMIPv6 based
approach. The numerical results demonstrate that the proposed approach gives a better
performance in terms of signaling overhead and handover latency than NBS, and simplePIMPv6 based solutions.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Normal Labour/ Stages of Labour/ Mechanism of Labour
An API For IPv6 Multihoming
1. An API for IPv6 Multihoming
based on HBA and CGA
Isaı́as Martı́nez-Yelmo
Departamento de Telematica
Universidad Carlos III de Madrid
Av. Universidad 30. 28911 Leganes
Madrid (Spain)
Email: imyelmo@it.uc3m.es
Alberto Garcı́a-Martı́nez
Departamento de Telematica
Universidad Carlos III de Madrid
Av. Universidad 30. 28911 Leganes
Madrid (Spain)
Email: alberto@it.uc3m.es
Marcelo Bagnulo Braun
Departamento de Telematica
Universidad Carlos III de Madrid
Av. Universidad 30. 28911 Leganes
Madrid (Spain)
Email: marcelo@it.uc3m.es
Abstract— This paper proposes an API for Multihoming in
IPv6. This API is based on the Hash Based Addresses and
Cryptographically Generated Addresses approaches, which are
being developed by the IETF multi6 Working Group. The support
of Multihoming implies several actions such as failure detec-
tion procedures, reachability tests, re-homing procedures and
exchange of locators. Applications can benefit from transparent
access to Multihoming services only if per host Multihoming
parameters are defined. However, more benefits could be obtained
by applications if they will be able to configure these parameters.
The proposed Multihoming API provides different functions to
applications which can modify some parameters and invoke some
functions related with the Multihoming Layer.
I. INTRODUCTION
Networked applications are fundamental tools in our daily
lives. So, high available connections and resiliency [1] are
usually required by enterprises and small-users. Providing this
high availability is a difficult task because of the fact that
network failures can always happen; thus, redundancy tech-
niques such as Multihoming are needed. In IPv4, Multihoming
is based on announcing all the prefixes of a site through
all the providers using the Border Gateway Protocol (BGP).
Therefore, if a connection fails, a new path could be found
with another provider. Small-users never use BGP in their
equipments because of the scalability problems of the protocol
[2] and its complexity. So, Multihoming cannot be supported
for small-users unless NAT-based boxes are used [3], with all
the problems that NATs present such as need for Application
Level Gateways, disruption of end-to-end security, etc.
Some goals for Multihoming in IPv6 have been defined in
[4], these goals are fault tolerance, load sharing, transport layer
survivability and enhanced scalability for small-users. One
of the proposed solutions combines Hash Based Addresses
(HBA) [5] and Cryptographically Generated Addresses(CGA)
[6].
This paper proposes a Multihoming API for the approach
based on HBA and CGA. It is structured as follows. In section
II, the Multihoming solution which is being developed actually
by the IETF multi6 Working Group is presented. In section
III a Multihoming API is described; the proposed API allows
an ordered access to the Multihoming functionalities shown in
the previous section. Future work is considered in section IV.
Finally, conclusions about the presented work are exposed.
II. MULTIHOMING IN IPV6
Several roles are played by IPv4 addresses and IPv6 ad-
dresses:
• Identifier: IP addresses are passed to upper layers to be
used as identifiers for the local and remote end points of
a communication.
• Locator: IP addresses reflect the topological location of
a host in the Internet
• Forwarding Label: Routers forward packets taking into
account their destination IP address.
Due to this overload of roles, when a communication path
suffers a failure, it is impossible to change the locator of
the communication, even if this communication could be
continued using another locator, because the identifier would
also change and the Transport Level could not identify new
packets as belonging to the same flow [7].
The proposal of the IETF multi6 Working Group is based on
a new Multihoming Layer placed between the IP routing sub-
layer and the IP end-point sublayer [8]. This layer manages a
set of locators corresponding to a given identifier.
A goal started by RFC 3582 [4] is to avoid introducing
new vulnerabilities in the deployment of Multihoming. The
requirement of mapping different locators for a single identifier
enables new vulnerabilities like flooding and hijacking attacks
[9]. Therefore, it is necessary to prevent these attacks, so the
solution should provide a secure mapping between identifiers
and locators. The solution based on HBA and CGA provides
this secure mapping; either there is a restriction in the locators
to use (HBA approach), or there is a secure way of exchanging
new locators based on signatures(CGA approach). Thus, it can
be assured that the locators are associated with the identifier
which is being used in the communication.
Other functionalities are needed for the Multihoming sup-
port; for instance, it is needed to change the actual locators
of an ongoing communication, this is called re-homing pro-
cedure. Nevertheless, a re-homing procedure should only be
needed when a failure has been happened; thus, it is necessary
2. to check the communication through reachability tests. There
are two options:
• Bidirectionally operational address pair: The locator
pair used in the communications is the same in both
directions.
• Unidirectionally operational address pair: The locator
pair used in each direction of the communication is
different.
For each case, a reachability test is proposed in [10].
Finally, if reachability tests are not successful, working
locators must be found; reachability tests with the new pairs
of locators must be performed until a pair allows a new path
to establish the communication. Once a pair of valid locators
is found, a re-homing procedure can be executed for those
locators.
After presenting the different functions required for Mul-
tihoming support, we will explain the CGA and HBA ap-
proaches.
A. CGA (Cryptographically Based Addresses)
The CGA approach provides the secure mapping between
identifier and locators through asymmetric cryptography. A
CGA is an IPv6 address which can be used as a predefined
valid locator, and its interface ID [11] is related to a public key.
This relation is due to the fact that the interface ID is a hash
(SHA-1 hash algorithm [12]) of the data structure showed in
the Fig.1. The data structure is called CGA Parameters Data
Structure and contains a modifier, a subnet prefix, a public key
and an optional field; only the leftmost 64 bits of the hash of
the structure forms the interface ID. Furthermore, there should
be a CGA per each subnet prefix owned by the host if we want
the information about the public key to be accessible from any
subnet prefix.
The establishment of a communication could be done
through the DNS service, since a CGA is a valid IPv6 address
and it would be probably mapped with a name. If new locators
are to be added for its later use, an exchange between the
multihomed host and the other side of the communication
must be performed. This exchange includes the new locators,
Modifier
(16 octets)
Subnet Prefix
(8 octets)
Collision Count
(1 octet)
Public Key
(Variable Length)
Extension Fields
(Optional, Variable Length)
Fig. 1. CGA Parameters Data Structure
the CGA Parameters Data Structure and a signature of the
locators with the private key associated with the public key
contained in the CGA Parameters Data Structure. The security
of this process relies on the fact that the other side of the
communication checks that the hash of the received CGA
Parameters Data Structures matches with the interface ID
of the other host; this means that the public key inside the
received CGA Parameters Data Structure belongs to the other
host and the signature of the locators can be checked. Thus,
if the check of the signature is successful, it implies that the
locators are valid.
Note that an attacker requires bruce force methods to obtain
a new pair of private/public keys to obtain a hash of the
CGA Parameters Data Structure equal to the interface ID
of the host which is being attacked. If [6] is read carefully,
we can see that the complexity of the attack is O 259
and
additional security can be added to the CGA by means of
the Sec parameter. The Sec parameter is embedded in the
interface ID (the 3 leftmost bits of the ID) and requires that
an adjustable size part of the leftmost 112 bits of another
hash (again a SHA-1 algorithm), named hash2, equals to
zero. With this requirement, the complexity of a bruce-force
attack is O 259+16∗Sec
. It has to be taken into account the
fact that this extra security is not without a cost, since hosts
have to make O 216∗Sec
hash2 operations until a CGA Data
Structure fits with the Sec parameter condition.
Nevertheless, CGA have a problem due to the fact that
the computational cost of asymmetric public operations for
signing the locators with the private key is very large.
B. HBA (Hash Based Addresses)
The idea of HBA [5] is to avoid the computational cost
of CGA. This is due to the fact that HBA does not need
asymmetric key cryptography for the exchange of locators.
The solution proposed in HBA is to include in a HBA
Parameters Data Structure all the known subnet prefixes by
a host. As in CGA, a hash operation is applied to the HBA
Parameters Data Structure, but in this case information about
the known prefixes by the host is included. The leftmost 64 bits
are again the interface ID which will be added to the subnet
prefix. This process must be applied to all subnet prefixes
contained in the HBA Parameters Data Structure; thus, after a
HBA set of addresses is obtained, only these addresses could
be used as locators in a Multihoming environment.
The interface ID is now a container of information about
the different subnet prefixes of the host and the verification
process of the HBA is similar to the CGA case, but in this
case the verified information is the subnet prefixes owned by
the host and not a public key. Due to this last fact, only prefixes
of the host are known. When a packet with an unknown source
address is received, it must be checked that the prefix belongs
to the set of prefixes contained in the HBA Parameters Data
Structure, and that the locator address belongs to the HBA set
generated from the same HBA Parameters Data Structure. This
means making a hash of the HBA Parameters Data Structure
with a subnet prefix equal to the received. If the leftmost 64
3. Ext Type Ext Length P Reserved
Prefix[1]
Prefix[2]
.
.
.
Prefix[n]
Fig. 2. Multi-Prefix extension for CGA
bits are equal to the interface ID, the new address belongs to
the HBA set and it can be accepted as a valid locator.
The bruce-force attack complexity is the same as in CGA
approach and a Sec parameter is also used to improve the
security.
C. Solution based on HBA and CGA
The use of HBA has several advantages over CGA: public
key cryptography is not needed, so a great amount of compu-
tational complexity is avoided and it is not needed to check
any signature of the locators. However, the HBA approach
has a drawback, recalculation of the HBA set is necessary if a
new subnet prefix wants to be added. Usually, a host knows a
priori the prefixes which must be managed by it, but in some
environments, such as in mobility, prefixes are only known a
posteriori.
Nevertheless, HBA and CGA can use a common format for
compatibility reasons [5]. This can be done including each
assigned Prefix/64 as an extension of the CGA Parameters
Data Structure; this is done using an extension for CGA and
it is called Multi-Prefix extension (see Fig.2). The public key
field of the CGA Parameters Data Structure can be a random
number or a public key; so, if the HBA includes a public key,
asymmetric cryptography can be used for the exchange of new
locators as occurs for CGA.
III. API PROPOSAL FOR MULTIHOMING IN IPV6
Nowadays, there are hundreds of applications running on the
Internet and it is not desirable to change them if a new network
service is introduced. So, the Multihoming Layer should be
transparent to legacy applications while providing extended
functions to the IPv6 API. An approach to provide the needed
transparency could be to rely on predetermined parameters
for old applications and allow new applications to use the
Multihoming API to get enhanced features.
A scheme of the proposal is shown in Fig.3. This scheme
allows new applications to make use of new features provided
by the Multihoming Layer. This approach is inspired in [13].
A. API Scheme
The API scheme proposed can be seen in Fig.4. In the figure
we can see the different HBAs, CGAs and HBAs+CGAs which
are managed by the Multihoming Layer. The HBA can only
Applications
IPv6 API Multihoming API
TCP Layer UDP Layer SCTP Layer
Multihoming Layer
IP Layer
MAC Layer
PHY Layer
Fig. 3. Proposed Multihoming API scheme
manage subnet prefixes due to the fact that the authentication is
always performed doing the hash test from the extended CGA
Parameters Data Structure and comparing the result with the
interface ID of the HBA. CGAs and CGAs+HBAs can manage
locators, not only prefixes as consequence of the signature used
for the exchange of locators. Also there are a Failure Detection
Engine, a Reachability Engine, a Re-homing Engine and a
Exchange Engine.
The socket interface is usually used in Operative Systems to
manage ongoing connections; so, the Multihoming API should
provide most of its features through this socket interface.
B. Address Generation
First of all, it is needed the generation of HBAs and
CGAs. These functions are not related with any outgoing
communication, so socket interface can not be used and an
external library must be provided. The proposed functions are:
1) void ∗create cga(uint64 t prefix, void ∗extfields, int
extlength, uint8 t sec, void ∗pk, int pklength): This function
creates a CGA and its input parameters are:
• prefix: The subnet prefix associated with the CGA which
is introduced in the CGA Parameters Data Structure.
• extfields: Optional extension fields can be passed with
this parameter.
• extlength: Length of the extension fields
• sec: This parameter specifies the value of the Sec param-
eter in the CGA which sets the level of security against
bruce force attacks for impersonating a given interface
identifier.
• pk: With this parameter, public key of the CGA Parame-
ters Data Structure is specified. If pk is equal to zero, an
asymmetric key pair must be generated.
• pklength: Length in bytes of the public key.
This function selects a random number for the modifier, cre-
ate the CGA Parameters Data Structure and finally generates
the CGA according to the requirements of the Sec parameter.
So, the output parameters will be the CGA Parameters Data
Structure, the CGA itself and the private key if pk was equal
to zero.
4. Fig. 4. Multihoming API Scheme
2) void ∗create hba(void ∗multiprefix, int multilenght,
void ∗extfields, int extlength, uint8 t sec, void ∗pk, int
pklength): This function creates a set of HBAs which are
generated with the same extended CGA Parameters Data
Structure. Input parameters are:
• multiprefix: it is the Multi-Prefix extension for CGA. It
contains the different subnet prefixes which will be used
to generate the HBA set.
• multilength: Length in bytes of the Multi-prefix exten-
sion.
• extfields: extensions fields can be included which are
different from the Multi-Prefix extension.
• extlength: Length in bytes of the extension fields.
• sec: Again, the level of security is selected with this
parameter.
• pk: the public key of the HBA if it wants to be used the
functionality of CGA+HBA.
• pklength: Length in bytes of the public key.
The function must select a random number for the modifier
and another random number if the pk parameter is equal to
zero. Finally, a set of HBAs must be generated according to
the proposed generation process in [5] which implies that the
hash2 must apply with the Sec parameter. A subnet prefix
is not needed because a subnet prefix from the Multi-prefix-
extension is used for each HBA. The output parameters will
be the set of CGAs and the extended CGA Parameters Data
Structure.
C. Management Engine
Applications can benefit from the identifiers and locators
could be needed for applications. The selection of an address-
ing model, if several are available in a host, implies how the
alternative locators are communicated to other hosts. There are
four possibilities:
• CGA: Exchange of locators protected by asymmetric
key. A large computational complexity is needed to
perform this approach. The authenticity of the public key
is checked with two Hash operations. Locators can be
notified to other hosts at any time.
• HBA: Exchange of locators is based on Hash operations.
Only the generated set of HBA allows re-homing proce-
dures.
• HBA+CGA: HBAs Data structure is an extension of
the CGA data structure, so both functionalities can be
provided at the same time.
• None: The host is upgraded with Multihoming support
but HBAs or CGAs are not available. Only Multihoming
functions will be performed if the other host of the
communication can manage HBAs and/or CGAs.
A mobile node should select CGA or HBA+CGA, or a web
server should select HBA because it needs to perform a lot
of tasks per minute and the use of CGA with asymmetric
cryptography operations to sign the locators would reduce its
performance.
Actual IPv6 API allows to obtain the different IPv6 ad-
dresses which have been assigned to the different interfaces
in a host. Nevertheless, it is impossible to know if an IPv6
address is a HBA or a CGA by simple inspection. The
Multihoming Layer knows this information, so the Multihom-
ing API could provide selection mechanisms and ways to
access to the type of addresses that is being used by a given
communication. The functions which provide these features
5. will be:
1) void *get hbacga(int typeaddr): This function allows
applications to retrieve the addresses managed by the Multi-
homing Layer. The typeaddr parameter indicates the type of
wanted addresses (HBA, CGA or HBA + CGA). The output
will be a list of different addresses with the selected type if
they exists.
It could be thought that an address selection mechanism is
needed, but this is not necessary because the IPv6 API already
supports this feature with the function bind [14].
Furthermore, it is needed to inform at the Mutlihoming
Layer about the different available HBAs and CGAs in the
host which must be managed by it:
2) int set hbacga(void ∗hbacga, int typeaddr): This func-
tion should be used by a superuser program to configure the
HBAs and CGAs at the Multihoming Layer. This function
could be executed in the starting sequence of a host. Input
parameters are:
• ∗hbacga: A pointer to a list with the HBAs, CGAs or
HBAs+CGAs.
• typeaddr: Type of addresses in the list.
The output value will be an integer and if it equals to zero,
the function will have finished successfully.
Locators are managed by the Multihoming Layer and they
are not all known a priori; nevertheless, it could be useful to
know the available locators for a connection in some situations
such as debugging, administration and management or getting
traces:
3) void *get own locators(int fdsocket): This function ob-
tains the locators that the host can manage with the socket
fdsocket. This is necessary because locators can change if
the host is in a mobile environment. The input parameter is
fdsocket which is the file descriptor of the socket used for
the communication. The output parameter will be the list of
locators.
D. Exchange Engine
Short connections could not benefit from re-homing capa-
bilities; for instance, a request-reply communication in HTTP
1.0. Thus, a timer is defined and when this timer expires,
locators are exchanged. This exchange is necessary before a
failure interrupts the communication, because if locators are
not exchanged, re-homing can not be done. Nevertheless, the
application could know in advance the time which will be
employed in the communication; so, it will be interesting to
force a exchange of locators if a large connection is going to
be used, or to prevent the exchange if the communication is
going to be short:
1) int exchsol(int fdsocket, int time): This function of
the proposed Multihoming API allows to force a exchange
of locator. It has the time parameter and there are three
possibilities:
• minus than zero: the exchange is prevented.
Fig. 5. Actions performed due to a exchsol() call
• equals to zero: The exchange of locators is done imme-
diately.
• minor than internal timer: The internal timer is set to the
value of time.
Due to the fact that this engine manages the exchange of
locators with the other side of the communication, it should
provide this information to upper layers:
2) void *get end locators(int fdsocket): This function
shows the locators of the other host in the communication
and its parameters are the same as that the getownlocators
function.
In Fig.5 we have a basic example where two hosts are
connected to Internet and they have two providers. An ex-
change of locators is done between the hosts along the ongoing
connection if a exchsol() is submitted by one of the hosts.
E. Failure Detection Engine
A Failure Detection Engine is necessary for detecting fail-
ures in communications. Three mechanisms are under study
in the IETF multi6 Working Group: a failure may exists if an
ICMP Destination Unreachable message is received, packets
are not received in the interval of an inactivity TCP timer or
applications notify about problems in their communications.
So, it is necessary that the Multihoming API provides a
function to inform the Multihoming layer about problems in
upper layers:
1) int failure detected(int fdsocket): This function allows
upper layers to notify about problems in the communication
and a reachability test must be requested (reachreq()). The
output parameter will be an integer and if it equals to zero,
the function will have finished successfully.
If a failure is detected, the Failure Detection Engine has to
send a notification to the Re-homing Engine (rehomreq()).
6. Fig. 6. Reachability tests that can be performed
F. Reachability Engine
The Reachability Engine performs reachability tests. If a
notification is received, it verifies the communication with a
reachability test that consists of sending a probe packet with
a particular locator pair to confirm that a path is valid if a
response is received.
1) int reachtest(int fdsocket, struct sockaddr my addr,
struct sockaddr end addr, socklen t addrlen): This function
performs a reachability test and its parameters are:
• fdsocket: File descriptor of the socket used for the com-
munication.
• my loc: Source locator.
• end loc: Destination locator.
• loclen: Length of locator.
The locators used for the reachability test are my loc and
end loc. The output parameter will be an integer and if it
equals to zero, the function will have finished successfully.
Fig.6 shows the different paths which can be tested taking
into account the pair of locators that can be formed. Only it
is needed that one path provides connectivity.
G. Re-homing Engine
The Re-homing Engine manages re-homing procedures. It
could be interesting for applications to obtain information
about the occurrence of re-homing procedures. For instance,
if an UDP application implements a slow-start algorithm as
TCP, it could be interesting for the application to perform a
slow-start algorithm after a re-homing procedure and try to
obtain a fast adaptation to the new bandwidth.
1) rehomsuc(): A signal is sent to applications to inform
that a re-homing procedure has been performed by the other
side of the communication.
2) int get pairlocators(int fdsocket, struct sockaddr
∗my loc, struct sockaddr ∗end loc, socklen t ∗loclen): This
function obtains the pair of locators used in the ongoing
communication. This request is solved by the Re-homing
because last pair of locators used in a communication are
always known after a re-homing procedure. Input parameters
are:
• fdsocket: File descriptor of the socket used for the com-
munication.
• ∗my loc: Pointer where the source locator will be saved.
• ∗end loc: Pointer where the destination will be saved.
• ∗loclen: Pointer with space reserved to the locators. The
function modifies its value to the length of locators.
The output parameter will be an integer and if it equals to
zero, the function will have finished successfully.
3) int set pair locator(int fdsocket, struct sockaddr
my addr, struct sockaddr end addr, socklen t addrlen): This
function sets the locators for the ongoing communication; so,
it is like a re-homing solicitation. Its structure is the same as
the reachtest function. If my loc and end loc are equal to zero
the locators will be selected by the Re-homing Engine. It must
be noted that a reachability test should be performed before
a re-homing procedure; thus, the Re-homing Engine has to
submit a solicitation for a reachability test to the Reachability
Engine (reachreq()). This function can be used to force a re-
homing if, for example, the QoS obtained by an application
is not enough; an example could be a videoconference where
many frames are dropped.
Fig.7 illustrates a rehoming procedure. After the locators
have been exchanged and a new pair of locators has been
selected after performing a reachability test. Then, the com-
Fig. 7. Rehoming of the communication between path A and B
7. Fig. 8. Basic organizational chart of Multihoming Layer
munication path A can be changed to path B without breaking
the established connection.
H. Organizational chart of Multihoming Layer
In Fig.8 a basic organizational chart of the Multihoming
Layer is shown. The figure shows the basic functions that must
be performed to obtain Multihoming support. First of all, it is
necessary the exchange of locators. If other locators are not
known, it is impossible to find an alternative path. A rehoming
procedure can be performed if the ongoing communication has
some type of problem (lost of connectivity, low quality, ...).
At this point a new path must be found, so a reachability test
is used to allow us to test the connectivity between locators
of different hosts. Finally, if an alternative pair of locators is
found, a rehoming procedure can be tried.
All the proposed functions in this section are necessary to
provide a enhanced Multihoming Service to the applications
and the needed tools for administration and management.
IV. FUTURE WORK
Different tasks can be performed in the future taking into
account the proposal of this paper. It is necessary a deep
study of the default parameters which must be configured
in the Multihoming Layer to provide reliable Multihoming
support to legacy applications. Also, it should be interesting a
comparation of the performance between legacy applications,
legacy applications making use of Multihoming in transparent
mode and applications using the Multihoming API.
Furthermore, a large work in close relation with the multi6
Working Group should be done until an Multihoming API can
be provided in the future.
V. CONCLUSIONS
HBA and CGA provide a secure mapping between identi-
fiers and locators. In this way, stable identifiers are shown to
the Transport Layers while the locators used in the IP data-
grams can be changed without disrupting the communication.
CGA has a much bigger computational complexity due to the
fact that asymmetric key operations are needed. Conversely,
HBAs have a low computational cost due to the fact that they
only use hash operations. Nevertheless, in HBA the different
prefixes which would be used by a host must be known in
advance because this information is included in the interface
ID of IPv6 addresses through a hash operation. CGA has not
this limitation because the locator is authenticated through an
asymmetric cryptographic scheme. New locators which are not
known a priori can be sent because they are signed with the
private key of the Host.
HBA and CGA have different features which can be used
at the same time by different applications. The API proposed
in this paper manages the mapping method between identifiers
and locators. Because of this feature, applications can select
HBA, CGA or CGA + HBA depending on their needs.
Furthermore, other functions are added to improve the
failure detection and the re-homing procedure. With these
functions, applications can inform about failures in the com-
munications or a re-homing procedure can be requested by
the application (for example, if the received QoS is not
enough). These mechanisms can provide faster response if
applications detect failures sooner than lower layers. Other
functionalities are also added, such as the solicitation of an
exchange of locators or the possibility for applications to
be informed about changes of the locators related with the
ongoing communication.
Legacy applications can obtain Multihoming support if there
exists a default configuration which configures the minimal
needed parameters.
8. ACKNOWLEDGEMENT
The authors would like to thank to Carlos J. Bernardos for
the ideas provided.
This work has been partly supported by the European Union
under the E-Next Project FP6506869 and by OPTINET6
project TIC-2003-09042-C03-01
REFERENCES
[1] S. Yin and K. Twist, “The coming era of absolute availability,” 2003.
[Online]. Available: RHK
[2] G. Huston, RFC 3221: Commentary on Inter-Domain Routing in the
Internet, December 2001.
[3] F. Guo, J. Chen, W. Li, and T. Chiueh, “Experiences in building a
multihoming load balancing system,” in IEEE INFOCOM ’04, Hong
Kong, China. Volume: 2, April 2004, pp. 1241–1251.
[4] J. Abley, B. Black, and V. Gill, RFC 3582: Goals for IPv6 Site-
Multihoming Architectures, August 2003.
[5] M. Bagnulo, Hash Based Addresses (HBA), December 2004, internet
Draft draft-ietf-multi6-hba-00.txt (work in progress).
[6] T. Aura, Cryptographically Generated Addresses (CGA), April 2004,
internet Draft draft-ietf-send-cga-06.txt (work in progress).
[7] E. Nordmark, Multi6 Application Referral Issues, October 2004, internet
Draft draft-nordmark-multi6dt-refer-00.txt (work in progress).
[8] E. Nordmark and M. Bagnulo, Multihoming L3 Shim Approach, January
2005, internet Draft draft-ietf-multi6-l3shim-00.txt (work in progress).
[9] E. Nordmark and T. Li, Threats relating to IPv6 multihoming solutions,
January 2005, internet Draft draft-ietf-multi6-multihoming-threats-03.txt
(work in progress).
[10] J. Arkko, Failure Detection and Locator Selection in Multi6, October
2004, internet Draft draft-arkko-multi6dt-failure detection-00.txt (work
in progress).
[11] R. Hinden and S. Deering, RFC 3513: Internet Protocol Version 6 (IPv6)
Addressing Architecture, April 2003.
[12] Secure Hash Standard, Federal Information Processing Standards, April
1995, publication 180-1.
[13] M. Komu, “Application programming interfaces for the host identity pro-
tocol,” Master’s thesis, Helsinky Universitiy of Technology, September
2004.
[14] W. Stevens and M. Thomas, RFC 2292: Advanced Sockets API for IPv6,
February 1998.