To see the other types of publications on this topic, follow the link: Network Address Translation (NAT).

Journal articles on the topic 'Network Address Translation (NAT)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Network Address Translation (NAT).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Francis, Paul. "Network Address Translation (NAT)." ACM SIGCOMM Computer Communication Review 45, no. 2 (April 22, 2015): 50. http://dx.doi.org/10.1145/2766330.2766340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Natali, Juwanda, Fajrillah Fajrillah, and T. M. Diansyah. "IMPLEMENTASI STATIC NAT TERHADAP JARINGAN VLAN MENGGUNAKAN IP DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP)." Jurnal Ilmiah Informatika 1, no. 1 (June 26, 2016): 51–58. http://dx.doi.org/10.35316/jimi.v1i1.444.

Full text
Abstract:
To build a network interconnect Local Area Network (LAN) that will be needed in the form of Virtual groups Local Area Network (LAN). DHCP IP address given by the router to the PC located in the network. NAT (Network Address Translation) is one method that is used as an IP translation to gain entrance into a different network. NAT (Network Address Translation) can allow a host to go into different networks without allowing the host intended to tap into their networks using VLAN With the two different networks into a single switch can be connected. Giving DHCP IP will allow the network administrator to provide the IP address to a PC for IP assigned automatically by the router. An IP host is forwarded in a network with NAT.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhen, Zhen, and Srinivas Sampalli. "Mobile IP Address Efficiency." Journal of Communications Software and Systems 2, no. 1 (April 6, 2017): 30. http://dx.doi.org/10.24138/jcomss.v2i1.303.

Full text
Abstract:
In future wireless networks, Mobile IP will be widely deployed as a general mobility protocol. Currently, in theprotocol each mobile node (MN) should have one public home address to identify itself when it is away from home. Unlike the stationary host, the MN cannot simply use private addresses when NAT (Network Address Translation) is enabled. How to assign public addresses among mobile nodes is important to save the already limited IPv4 addresses. Even though Mobile IPv6 can provide a large address space, when communicating with IPv4 based hosts, the MN still needs to use one public IPv4 address. Protocol translation can map between IPv6 and IPv4 addresses;however, it is a NAT-based approach and breaks end-to-endcommunications. From a new perspective, we propose anaddress-sharing mechanism that allows a large number of MNs to share only one IPv4 public address while avoiding most of the drawbacks of NAT.
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Zhao Li. "The Special Treatment of NAT." Applied Mechanics and Materials 687-691 (November 2014): 2689–92. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2689.

Full text
Abstract:
NAT (Network Address Translation) is the process of transforming one IP address in the datagram header into another. In practical applications, NAT is mainly used to realize the function of the access of private network to public network. The method of using a small number of public IP addresses representing a large quantity of private IP addresses will help to slow down the depletion of the IP address space available. As the Network Architecture is becoming more complex, the way, under such context, the NAT technology functions is of great importance. This dissertation will mainly analyze the special treatment of NAT in the following aspects like unified address management ,the priority level of address pool ,NAT mapping in PING Operation ,the treatment of ICMP err packet ,the NAT transformation of fragmented packet as well as the infinitive connection of multi –core products.
APA, Harvard, Vancouver, ISO, and other styles
5

Bansal, Anchit, and Priyanka Goel. "Simulation and Analysis of Network Address Translation (NAT) & Port Address Translation (PAT) Techniques." International Journal of Engineering Research and Applications 07, no. 07 (July 2017): 50–56. http://dx.doi.org/10.9790/9622-0707025056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Moon-Sang, Chiyoung Lee, Wootae Kim, and Young-Woo Lee. "Design and Implementation of Carrier-Grade Network Address Translation (NAT)." Journal of Korean Institute of Communications and Information Sciences 41, no. 10 (October 31, 2016): 1290–300. http://dx.doi.org/10.7840/kics.2016.41.10.1290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jung, Younchan, and Ronnel Agulto. "Integrated Management of Network Address Translation, Mobility and Security on the Blockchain Control Plane." Sensors 20, no. 1 (December 21, 2019): 69. http://dx.doi.org/10.3390/s20010069.

Full text
Abstract:
Currently, the dual use of IPv4 and IPv6 is becoming a problem. In particular, Network Address Translation (NAT) is an important issue to be solved because of traversal problems in end-to-end applications for lots of mobile IoT devices connected to different private networks. The vertical model is typically used to solve NAT, mobility and security issues for them. However, the existing vertical model has limitations because it handles NAT, mobility and security management one by one. This paper proposes a Blockchain-based Integrated Network Function Management (BINFM) scheme where the NAT, mobility, and security management are handled at once. The proposed scheme is advantageous in that by using blockchain and the Query/Reply mechanism, each peer can easily obtain the necessary parameters required to handle the NAT, mobility, and security management in a batch. In addition, this paper explains how our proposed scheme guarantees secure end-to-end data transfers with the use of one time session key. Finally, it is proved that the proposed scheme improves performance on latency from the viewpoints of mobility and security compared to the existing vertical model.
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Seungwoon, Si Jung Kim, Jungtae Lee, and Byeong-hee Roh. "Supervised Learning-Based Fast, Stealthy, and Active NAT Device Identification Using Port Response Patterns." Symmetry 12, no. 9 (September 2, 2020): 1444. http://dx.doi.org/10.3390/sym12091444.

Full text
Abstract:
Although network address translation (NAT) provides various advantages, it may cause potential threats to network operations. For network administrators to operate networks effectively and securely, it may be necessary to verify whether an assigned IP address is using NAT or not. In this paper, we propose a supervised learning-based active NAT device (NATD) identification using port response patterns. The proposed model utilizes the asymmetric port response patterns between NATD and non-NATD. In addition, to reduce the time and to solve the security issue that supervised learning approaches exhibit, we propose a fast and stealthy NATD identification method. The proposed method can perform the identification remotely, unlike conventional methods that should operate in the same network as the targets. The experimental results demonstrate that the proposed method is effective, exhibiting a F1 score of over 90%. With the efficient features of the proposed methods, we recommend some practical use cases that can contribute to managing networks securely and effectively.
APA, Harvard, Vancouver, ISO, and other styles
9

Veeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network." Electronics 9, no. 9 (September 14, 2020): 1510. http://dx.doi.org/10.3390/electronics9091510.

Full text
Abstract:
The Internet Protocol (IP) version 4 (IPv4) has several known vulnerabilities. One of the important vulnerabilities is that the protocol does not validate the correctness of the source address carried in an IP packet. Users with malicious intentions may take advantage of this vulnerability and launch various attacks against a target host or a network. These attacks are popularly known as IP Address Spoofing attacks. One of the classical IP-spoofing attacks that cost several million dollars worldwide is the DNS-amplification attack. Currently, the availability of solutions is limited, proprietary, expensive, and requires expertise. The Internet is subjected to several other forms of amplification attacks happening every day. Even though IP-Spoofing is one of the well-researched areas since 2005, there is no holistic solution available to solve this problem from the gross-root. Also, every solution assumes that the attackers are always from outside networks. In this paper, we provide an efficient and scalable solution to solve the IP-Spoofing problem that arises from malicious or compromised inside hosts. We use a modified form of Network Address Translation (NAT) to build our solution framework. We call our framework as NAT++. The proposed infrastructure is robust, crypto-free, and easy to implement. Our simulation results have shown that the proposed NAT++ infrastructure does not consume more than the resources required by a simple NAT.
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Kuan Lin, Shaw Hwa Hwang, and Cheng Yu Yeh. "Symmetric NAT Traversal Method for Session Initial Protocol (SIP)." Applied Mechanics and Materials 284-287 (January 2013): 2835–39. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.2835.

Full text
Abstract:
Although the integration of SIP-based systems with a network address translation (NAT) environment has been investigated extensively, SIP-based system operation in symmetric model NAT remains relatively unexplored. This paper studies the application of symmetric NAT traversal techniques to SIP-based systems. This study focuses on following the SIP process, a non-additive service server, and employs standard SIP commands such as “REGISTER,” “INVITE,” and “200 OK” to predict and deliver the IP addresses and port numbers of the local NAT. This study also implements RTP streaming in the client-to-client (C2C) mode. The symmetric NAT traversal method for the SIP increases the direct peer-to-peer connection rate. This approach also avoids the STUN and RTP-Relay server. Experimental results with 50 types of NAT indicate that symmetric NAT traversal performs better than the STUN solution. The RTP-Relay server bandwidth cost is likewise superior to the TURN solution. These finding have important implications for SIP-based system developers and carrier providers.
APA, Harvard, Vancouver, ISO, and other styles
11

Wintolo, Hero, Salam Aryanto, and Muhamad Hafish. "Analisis Pengaruh Konfigurasi Network Address Translator (NAT) Statik Berbasis Web Menggunakan Wire Shark." Jurnal Informatika 8, no. 1 (April 4, 2021): 93–98. http://dx.doi.org/10.31294/ji.v8i1.10166.

Full text
Abstract:
Konfigurasi peralatan jaringan computer yang digunakan untuk mengelola sebuah jaringan computer banyak yang menggunakan command line atau berbasis teks meski ada beberapa merk dari peralatan jaringan computer sudah menawarkan perangkat lunak untuk konfigurasi yang berbasis Graphical User Interface(GUI) dengan fungsi yang terbatas. Hal ini menjadi inspirasi untuk membuat perangkat lunak berbasis web untuk fungsi konfigurasi NAT statik dan dinamik. Hasil perancangan perangkat lunak diujikan dalam Local Area Network(LAN) dan jaringan internet untuk layanan server. Perangkat lunak yang dibuat pada peneltian ini terbukti dapat bekerja untuk pembuatan NAT statik dan dinamik melalui perangkat lunak wireshark yang memperlihatkan proses penyalinan alamat IP source menjadi alamat IP router yang ada NAT statik dan dinamik sehingga dapat mengakses web server yang ada. Sebanyak 30 komputer dalam LAN dan computer dari jaringan internet 100% dapat mengkases web server melalui NAT static yang dikonfigurasi menggunakan keyboard dan mouse.
APA, Harvard, Vancouver, ISO, and other styles
12

Tutang, Tutang. "IMPLEMENTASI NETWORK ADDRESS TRANSLATION (NAT) MENGGUNAKAN KERIO CONTROL VERSI 7.4.1 DI PUSAT PENELITIAN BIOTEKNOLOGI – LIPI." BACA: JURNAL DOKUMENTASI DAN INFORMASI 36, no. 1 (March 3, 2016): 97. http://dx.doi.org/10.14203/j.baca.v36i1.205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Tian, Hong Cheng, Hong Wang, and Jin Kui Ma. "Domain Name System during the Transition from IPv4 to IPv6." Applied Mechanics and Materials 687-691 (November 2014): 1912–15. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1912.

Full text
Abstract:
IPv4 and IPv6 will coexist for a long time, due to ISPes’ inertia in the transition from IPv4 to IPv6. Domain Name System (DNS) is a very important functional unit in the Internet. This paper describres the hierarchy and operating process of IPv6 DNS, IPv6 DNS resolver, and presents the DNS transition from IPv4 to IPv6 in particular. We suggest two methods to implement DNS service during the transition period: DNS-Application Level Gateway (DNS-ALG) with Network Address Translation-Protocol Translation (NAT-PT), and dual stacks. And we also propose their respective operational principles. This paper is of valuable reference for network engineers to construct DNS in the transition phase.
APA, Harvard, Vancouver, ISO, and other styles
14

Punithavathani, D. Shalini, and Sheryl Radley. "Performance Analysis for Wireless Networks: An Analytical Approach by Multifarious Sym Teredo." Scientific World Journal 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/304914.

Full text
Abstract:
IPv4-IPv6 transition rolls out numerous challenges to the world of Internet as the Internet is drifting from IPv4 to IPv6. IETF recommends few transition techniques which includes dual stack and translation and tunneling. By means of tunneling the IPv6 packets over IPv4 UDP, Teredo maintains IPv4/IPv6 dual stack node in isolated IPv4 networks behindhand network address translation (NAT). However, the proposed tunneling protocol works with the symmetric and asymmetric NATs. In order to make a Teredo support several symmetric NATs along with several asymmetric NATs, we propose multifarious Sym Teredo (MTS), which is an extension of Teredo with a capability of navigating through several symmetric NATs. The work preserves the Teredo architecture and also offers a backward compatibility with the original Teredo protocol.
APA, Harvard, Vancouver, ISO, and other styles
15

Fawaid, Ibnu Haris, Diah Risqiwati, and Denar Regata Akbi. "Rancang Bangun Mirror Repository Linux Menggunakan Load-Balanced Mirror Service System (LMSS) Pada Private Cloud." Jurnal Repositor 2, no. 1 (January 4, 2020): 35. http://dx.doi.org/10.22219/repositor.v2i1.327.

Full text
Abstract:
Abstrak Meningkatnya permintaan pembaharuan aplikasi berbasis open source karena seiring meningkatnya jumlah pengguna sistem operasi Linux, oleh karenanya ketika banyak pengguna linux yang melakukan permintaan pembaharuan aplikasi menyebabkan lambatnya kecepatan unduh dan membutuhkan waktu lama. Salah satu solusinya yaitu dengan membuat mirror repository linux agar memudahkan dan menawarkan koneksi pengguna yang lebih baik. Namun demikian, suatu saat ketika semakin bertambah jumlah pengguna mirror tersebut akan mengalami penurunan kualitas download hingga dapat mengalami down, sehingga tidak dapat melayani permintaan pembaharuan pengguna dengan baik. Penelitian ini bertujuan untuk merancang dan membangun Mirror Repository Linux dengan menggunakan Load-balanced Mirror Service System (LMSS) dengan mengintegrasikan beberapa MIrror Server yang dibangun secara generate melalui Manage Large Network (MLN), dengan pembagian beban menggunakan Linux Virtual Server (LVS) pada metode Network Address Translation (NAT). Sehingga beban permintaan dari client dapat ditangani Mirror Server secara bersama – sama. Dengan demikian, rata – rata waktu download dapat berkurang sebanyak 17,2 % daripada menggunakan Single Server.AbstractThe increasing demand for open source-based application updates is due to the increasing number of users of Linux operating systems, therefore when many Linux users who request an application update cause slow download speed and takes a long time. One solution is to create Mirror Repository Linux in order to facilitate and offer better user connections. However, a time when the number of mirror users will decrease the quality of download until it can down, so it can not serve user renewal request well. This research aims to design and build linux mirror repositories by using Load-balanced Mirror Service System (LMSS) by integrating multiple Mirror Server generated via Manage Large Network (MLN), with load sharing using Linux Virtual Server (LVS) Network Address Translation (NAT). LMSS there is a Director Server as a counter / load manager that passes on the server, which will be forwarded to the destination server. So that the request load from the client can be handled Mirror Server together. Thus, the average download time can be reduced by 17.2% rather than using a single server.
APA, Harvard, Vancouver, ISO, and other styles
16

Fakis, Alexandros, Georgios Karopoulos, and Georgios Kambourakis. "Neither Denied nor Exposed: Fixing WebRTC Privacy Leaks." Future Internet 12, no. 5 (May 22, 2020): 92. http://dx.doi.org/10.3390/fi12050092.

Full text
Abstract:
To establish peer-to-peer connections and achieve real-time web-based communication, the Web Real-Time Communication (WebRTC) framework requires address information of the communicating peers. This means that users behind, say, Network Address Translation (NAT) or firewalls normally rely on the Interactive Connectivity Establishment (ICE) framework for the sake of negotiating information about the connection and media transferring. This typically involves Session Traversal Utilities for NAT (STUN)/Traversal using Relays around NAT (TURN) servers, which assist the peers with discovering each other’s private and public IP:port, and relay traffic if direct connection fails. Nevertheless, these IP:port pieces of data can be easily captured by anyone who controls the corresponding STUN/TURN server, and even more become readily available to the JavaScript application running on the webpage. While this is acceptable for a user that deliberately initiates a WebRTC connection, it becomes a worrisome privacy issue for those being unaware that such a connection is attempted. Furthermore, the application acquires more information about the local network architecture compared to what is exposed in usual HTTP interactions, where only the public IP is visible. Even though this problem is well-known in the related literature, no practical solution has been proposed so far. To this end, and for the sake of detecting and preventing in real time the execution of STUN/TURN clandestine, privacy-invading requests, we introduce two different kinds of solutions: (a) a browser extension, and (b) an HTTP gateway, implemented in C++ as well as in Golang. Both solutions detect any WebRTC API call before it happens and inform accordingly the end-user about the webpage’s intentions. We meticulously evaluate the proposed schemes in terms of performance and demonstrate that, even in the worst case, the latency introduced is tolerable.
APA, Harvard, Vancouver, ISO, and other styles
17

Wang, Yiren, Fei Tian, Di He, Tao Qin, ChengXiang Zhai, and Tie-Yan Liu. "Non-Autoregressive Machine Translation with Auxiliary Regularization." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 5377–84. http://dx.doi.org/10.1609/aaai.v33i01.33015377.

Full text
Abstract:
As a new neural machine translation approach, NonAutoregressive machine Translation (NAT) has attracted attention recently due to its high efficiency in inference. However, the high efficiency has come at the cost of not capturing the sequential dependency on the target side of translation, which causes NAT to suffer from two kinds of translation errors: 1) repeated translations (due to indistinguishable adjacent decoder hidden states), and 2) incomplete translations (due to incomplete transfer of source side information via the decoder hidden states). In this paper, we propose to address these two problems by improving the quality of decoder hidden representations via two auxiliary regularization terms in the training process of an NAT model. First, to make the hidden states more distinguishable, we regularize the similarity between consecutive hidden states based on the corresponding target tokens. Second, to force the hidden states to contain all the information in the source sentence, we leverage the dual nature of translation tasks (e.g., English to German and German to English) and minimize a backward reconstruction error to ensure that the hidden states of the NAT decoder are able to recover the source side sentence. Extensive experiments conducted on several benchmark datasets show that both regularization strategies are effective and can alleviate the issues of repeated translations and incomplete translations in NAT models. The accuracy of NAT models is therefore improved significantly over the state-of-the-art NAT models with even better efficiency for inference.
APA, Harvard, Vancouver, ISO, and other styles
18

Michalski, John T. "Network security mechanisms utilising network address translation." International Journal of Critical Infrastructures 2, no. 1 (2006): 10. http://dx.doi.org/10.1504/ijcis.2006.008497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Wing, Dan. "Network Address Translation: Extending the Internet Address Space." IEEE Internet Computing 14, no. 4 (July 2010): 66–70. http://dx.doi.org/10.1109/mic.2010.96.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Hayes, David A., Jason But, and Grenville Armitage. "Issues with network address translation for SCTP." ACM SIGCOMM Computer Communication Review 39, no. 1 (December 31, 2008): 23–33. http://dx.doi.org/10.1145/1496091.1496095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Lixia Zhang. "A retrospective view of network address translation." IEEE Network 22, no. 5 (September 2008): 8–12. http://dx.doi.org/10.1109/mnet.2008.4626226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Moulya D M et al.,, Moulya D. M. et al ,. "Access Control Lists and Network Address Translation in Network Security." International Journal of Computer Science Engineering and Information Technology Research 11, no. 2 (2021): 1–8. http://dx.doi.org/10.24247/ijcseitrdec20211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Wang, Rong, Bo Ping Zhang, and Ai Min Sun. "Based on Cisco 7603 Routers Achievement IPv4/IPv6 in Campus Network." Applied Mechanics and Materials 568-570 (June 2014): 1355–59. http://dx.doi.org/10.4028/www.scientific.net/amm.568-570.1355.

Full text
Abstract:
Three common transitional technologies are analyzed ,that is, the tunnel technique, the dual protocol stack, and the translation technique (NAT-PT).An updating technology solution of IPv6 for the campus network are proposed,especially for the routing technology of IPv6 using the Cisco 7603 router, finally, the installation and configuration of IPv6 are introduced Briefly.
APA, Harvard, Vancouver, ISO, and other styles
24

Nishida, Mikiyo, Hiroyuki Kusumoto, and Jun Murai. "Network architecture using network address translation mechanism for network with unidirectional links." Electronics and Communications in Japan (Part I: Communications) 83, no. 12 (2000): 93–103. http://dx.doi.org/10.1002/1520-6424(200012)83:12<93::aid-ecja9>3.0.co;2-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Yao, Bing-Jhih, Shaw-Hwa Hwang, and Cheng-Yu Yeh. "Mathematical Model of Network Address Translation Port Mapping." AASRI Procedia 8 (2014): 105–11. http://dx.doi.org/10.1016/j.aasri.2014.08.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hwang, Soonkyu, Namil Lee, Yujin Jeong, Yongjae Lee, Woori Kim, Suhyung Cho, Bernhard O. Palsson, and Byung-Kwan Cho. "Primary transcriptome and translatome analysis determines transcriptional and translational regulatory elements encoded in the Streptomyces clavuligerus genome." Nucleic Acids Research 47, no. 12 (May 27, 2019): 6114–29. http://dx.doi.org/10.1093/nar/gkz471.

Full text
Abstract:
AbstractDetermining transcriptional and translational regulatory elements in GC-rich Streptomyces genomes is essential to elucidating the complex regulatory networks that govern secondary metabolite biosynthetic gene cluster (BGC) expression. However, information about such regulatory elements has been limited for Streptomyces genomes. To address this limitation, a high-quality genome sequence of β-lactam antibiotic-producing Streptomyces clavuligerus ATCC 27 064 is completed, which contains 7163 newly annotated genes. This provides a fundamental reference genome sequence to integrate multiple genome-scale data types, including dRNA-Seq, RNA-Seq and ribosome profiling. Data integration results in the precise determination of 2659 transcription start sites which reveal transcriptional and translational regulatory elements, including −10 and −35 promoter components specific to sigma (σ) factors, and 5′-untranslated region as a determinant for translation efficiency regulation. Particularly, sequence analysis of a wide diversity of the −35 components enables us to predict potential σ-factor regulons, along with various spacer lengths between the −10 and −35 elements. At last, the primary transcriptome landscape of the β-lactam biosynthetic pathway is analyzed, suggesting temporal changes in metabolism for the synthesis of secondary metabolites driven by transcriptional regulation. This comprehensive genetic information provides a versatile genetic resource for rational engineering of secondary metabolite BGCs in Streptomyces.
APA, Harvard, Vancouver, ISO, and other styles
27

Sun, Wei, Hao Zhang, Li-jun Cai, Ai-min Yu, Jin-qiao Shi, and Jian-guo Jiang. "A Novel Device Identification Method Based on Passive Measurement." Security and Communication Networks 2019 (June 23, 2019): 1–11. http://dx.doi.org/10.1155/2019/6045251.

Full text
Abstract:
Nowadays, with the continuous integration of production network and business network, more and more Industrial Internet of Things and Internal Office Network have been interconnected and evolved into a large-scale enterprise-level intraindustry network. Terminal devices are the basic units of internal network. Accurate identification of the type of device corresponding to the IP address and detailed description of the communication behavior of the device are of great significance for conducting network security risk assessment, hidden danger investigation, and threat warning. Traditional cyberspace surveying and mapping techniques take the form of active measurement, but they cannot be transplanted to large-scale intranet. Resources or specific targets in internal networks are often protected by firewalls, VPNs, gateways, and other technologies, so they are difficult to analyze and determine by active measurement. In this paper, a passive measurement method is proposed to identify and characterize devices in the network through real traffic data. Firstly, a new graph structure mining method is used to determine the server-like devices and host-like devices; then, the NAT-like devices are determined by quantitative analysis of traffic; finally, by qualitative analysis of the NAT-like device traffic, it is determined whether there are server-like devices behind the NAT-like device. This method will prove to be useful in identifying all kinds of devices in network data traffic, detecting unauthorized NAT-like devices and whether there are server-like devices behind the NAT-like devices.
APA, Harvard, Vancouver, ISO, and other styles
28

Tuxen, M., I. Rungeler, R. Stewart, and E. Rathgeb. "Network Address Translation for the Stream Control Transmission Protocol." IEEE Network 22, no. 5 (September 2008): 26–32. http://dx.doi.org/10.1109/mnet.2008.4626229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Xiang, Zheng, and Zheng Ming Ma. "Research on Mobility Management Based on MIP Table in Mixed IPv4/v6 Networks." Applied Mechanics and Materials 347-350 (August 2013): 2038–42. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2038.

Full text
Abstract:
IETF has specified Mobile IPv4 and Mobile IPv6 in RFC3344 and RFC3775 respectively, but not yet discussed Mobile IPv4/v6 in any published RFC. This paper proposes a scheme to solve one of Mobile IPv4/v6 problems which Home Agent (HA) locates in IPv6 network, and Correspondent Node (CN) locates in IPv4 network, while Mobile Node (MN) moves within IPv4 network. In the solution, a gateway called Mobile IPv4/v6 translation gateway (MIPv4/v6-TG) is introduced to bridge between IPv4 network and IPv6 network, which is made up of a traditional NAT-PT gateway and a Mobile IP application level gateway (MIP-ALG) built upon the NAT-PT gateway. MIP-ALG maintains a MIP table, a data structure, which is formed by entries. We use the MIP table to realize the communication between the IPv4 entities and the IPv6 entities. The creation, usage and update processes of MIP table are described in this paper. And it can work compatibly with RFC3344 and RFC3775.
APA, Harvard, Vancouver, ISO, and other styles
30

Xia, Fu Yang. "The Solution of P-Teredo Service Traversing Symmetric NAT." Advanced Materials Research 989-994 (July 2014): 4346–49. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4346.

Full text
Abstract:
P-Teredo is a service that enables IPv4 nodes behind of the symmetric NAT to acquire the IPv6 connection by the arithmetic of port prediction and tunnel technology. The theory of Teredo service and classes of NAT was introduced in this paper. It describes the structure of P-Teredo service and the method of acquiring the client’s address which applies the algorithm of port prediction. Some methods which can improve the success rate of port prediction were proposed. Finally, the success rate of network connectivity and the analysis of performance were given.
APA, Harvard, Vancouver, ISO, and other styles
31

Yeh, Chun-Chao, Chung-Wei Huang, and Ting-Hsiang Lin. "A New Network Address Translation Traversal Mechanism Design and Implementation." Advanced Science Letters 20, no. 2 (February 1, 2014): 496–500. http://dx.doi.org/10.1166/asl.2014.5339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Okazaki, Naonobu, Yoshimasa Baba, Tetsuo Ideguchi, Ken-ichi Nakata, Mi Rang Park, and Shoichiro Seno. "An Efficient Method for Private Network Management Using IP Address Translation." IEEJ Transactions on Electronics, Information and Systems 121, no. 10 (2001): 1562–69. http://dx.doi.org/10.1541/ieejeiss1987.121.10_1562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

KOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (June 9, 2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.

Full text
Abstract:
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part of the application of various IP protocols is also compared VoIP communication with a video stream on a local basis. The conclusion of the paper is devoted to the graphical evaluation of these observations and to draw conclusions based on them.
APA, Harvard, Vancouver, ISO, and other styles
34

HSIEH, M. D., H. C. CHANG, C. C. TSENG, and T. P. WANG. "A Network Address Translation Approach to the Inbound Session Problem in Private Networks." IEICE Transactions on Information and Systems E90-D, no. 2 (February 1, 2007): 482–89. http://dx.doi.org/10.1093/ietisy/e90-d.2.482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Chang, Le, Yangyang Liu, Zhonghua Wei, and Jianping Pan. "Optimizing BitTorrent-like peer-to-peer systems in the presence of network address translation devices." Peer-to-Peer Networking and Applications 4, no. 3 (June 29, 2010): 274–88. http://dx.doi.org/10.1007/s12083-010-0083-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Ammendola, Roberto, Andrea Biagioni, Ottorino Frezza, Werner Geurts, Gert Goossens, Francesca Lo Cicero, Alessandro Lonardo, et al. "ASIP acceleration for virtual-to-physical address translation on RDMA-enabled FPGA-based network interfaces." Future Generation Computer Systems 53 (December 2015): 109–18. http://dx.doi.org/10.1016/j.future.2014.12.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Mead, Emma J., Rosalyn J. Masterton, Tobias von der Haar, Mick F. Tuite, and C. Mark Smales. "Control and regulation of mRNA translation." Biochemical Society Transactions 42, no. 1 (January 23, 2014): 151–54. http://dx.doi.org/10.1042/bst20130259.

Full text
Abstract:
Translational control is central to the gene expression pathway and was the focus of the 2013 annual Translation UK meeting held at the University of Kent. The meeting brought together scientists at all career stages to present and discuss research in the mRNA translation field, with an emphasis on the presentations on the research of early career scientists. The diverse nature of this field was represented by the broad range of papers presented at the meeting. The complexity of mRNA translation and its control is emphasized by the interdisciplinary research approaches required to address this area with speakers highlighting emerging systems biology techniques and their application to understanding mRNA translation and the network of pathways controlling it.
APA, Harvard, Vancouver, ISO, and other styles
38

Lin, Shao Feng, Wei Feng Sun, Lin Na Fan, and Hua Wang. "Design and Implementation of LAN-Sensitive Information Interception and Analysis System." Applied Mechanics and Materials 347-350 (August 2013): 2881–84. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2881.

Full text
Abstract:
The LAN usually hides internal network structure by NAT to share a public IP address in the internal network, and thus it is hard to locate the source host precisely distributing sensitive information for a large-scale information monitoring system by analyzing the intercepted packets. So it is hard to fulfill monitoring work efficiently. This paper puts forward a scheme to intercept and analyze the sensitive information in the LAN environment. It studies the ARP spoofing principle and the sniffer technology based on WINPCAP. The scheme includes 7 modules named NIC capture module, packet filtering module and so on. And it achieves sensitive information filtering and matching by the configured rules, such as "keywords", "URL", "QQ number" and so on. The scheme provides a solution for tracking the source host leaking sensitive information within the LAN.
APA, Harvard, Vancouver, ISO, and other styles
39

Teng, Long, ZhongLiang Fu, Qian Ma, Yu Yao, Bing Zhang, Kai Zhu, and Ping Li. "Interactive Echocardiography Translation Using Few-Shot GAN Transfer Learning." Computational and Mathematical Methods in Medicine 2020 (March 19, 2020): 1–9. http://dx.doi.org/10.1155/2020/1487035.

Full text
Abstract:
Background. Interactive echocardiography translation is an efficient educational function to master cardiac anatomy. It strengthens the student’s understanding by pixel-level translation between echocardiography and theoretically sketch images. Previous research studies split it into two aspects of image segmentation and synthesis. This split makes it hard to achieve pixel-level corresponding translation. Besides, it is also challenging to leverage deep-learning-based methods in each phase where a handful of annotations are available. Methods. To address interactive translation with limited annotations, we present a two-step transfer learning approach. Firstly, we train two independent parent networks, the ultrasound to sketch (U2S) parent network and the sketch to ultrasound (S2U) parent network. U2S translation is similar to a segmentation task with sector boundary inference. Therefore, the U2S parent network is trained with the U-Net network on the public segmentation dataset of VOC2012. S2U aims at recovering ultrasound texture. So, the S2U parent network is decoder networks that generate ultrasound data from random input. After pretraining the parent networks, an encoder network is attached to the S2U parent network to translate ultrasound images into sketch images. We jointly transfer learning U2S and S2U within the CGAN framework. Results and conclusion. Quantitative and qualitative contrast from 1-shot, 5-shot, and 10-shot transfer learning show the effectiveness of the proposed algorithm. The interactive translation is achieved with few-shot transfer learning. Thus, the development of new applications from scratch is accelerated. Our few-shot transfer learning has great potential in the biomedical computer-aided image translation field, where annotation data are extremely precious.
APA, Harvard, Vancouver, ISO, and other styles
40

Gong, Wen Tao. "The Design of Multi-Protocol Network Based on Point-to-Point Protocol and Frame Relay." Advanced Materials Research 936 (June 2014): 2293–97. http://dx.doi.org/10.4028/www.scientific.net/amr.936.2293.

Full text
Abstract:
Local area network and wide area network are different network protocols, small and medium enterprises due to the geographical distribution of discrete and interface diversity, leading to its needs to be compatible with different network protocols, it is difficult to use a single network protocol to realize network architecture, and due to the ipv4 address scarcity, making its application or maintenance cost greatly increased, based on this, this paper presents the design of multi-protocol network architecture based on point-to-point protocol and frame relay, and with the advantages of the router is compatible with a variety of interfaces and protocols to connect different network interfaces, the paper also gives the configuration of routing information protocol and static routing through local area network, the paper presents the core information of frame relay and point-to-point protocol among the routers, and the paper gives the realization of the network address translation in the end.
APA, Harvard, Vancouver, ISO, and other styles
41

Ouyang, Kewei, Yi Hou, Shilin Zhou, and Ye Zhang. "Convolutional Neural Network with an Elastic Matching Mechanism for Time Series Classification." Algorithms 14, no. 7 (June 25, 2021): 192. http://dx.doi.org/10.3390/a14070192.

Full text
Abstract:
Recently, some researchers adopted the convolutional neural network (CNN) for time series classification (TSC) and have achieved better performance than most hand-crafted methods in the University of California, Riverside (UCR) archive. The secret to the success of the CNN is weight sharing, which is robust to the global translation of the time series. However, global translation invariance is not the only case considered for TSC. Temporal distortion is another common phenomenon besides global translation in time series. The scale and phase changes due to temporal distortion bring significant challenges to TSC, which is out of the scope of conventional CNNs. In this paper, a CNN architecture with an elastic matching mechanism, which is named Elastic Matching CNN (short for EM-CNN), is proposed to address this challenge. Compared with the conventional CNN, EM-CNN allows local time shifting between the time series and convolutional kernels, and a matching matrix is exploited to learn the nonlinear alignment between time series and convolutional kernels of the CNN. Several EM-CNN models are proposed in this paper based on diverse CNN models. The results for 85 UCR datasets demonstrate that the elastic matching mechanism effectively improves CNN performance.
APA, Harvard, Vancouver, ISO, and other styles
42

Cameron, Jacqui, Cathy Humphreys, Anita Kothari, and Kelsey Hegarty. "Creating an action plan to advance knowledge translation in a domestic violence research network: a deliberative dialogue." Evidence & Policy: A Journal of Research, Debate and Practice 17, no. 3 (August 1, 2021): 467–85. http://dx.doi.org/10.1332/174426421x16106634806152.

Full text
Abstract:
Background: There is limited research on how knowledge translation of a domestic violence (DV) research network is shared. This lack of research is problematic because of the complexity of establishing a research network, encompassing diverse disciplines, methods, and focus of study potentially impacting how knowledge translation functions.Aims and objectives: To address the limited research, we completed a deliberative dialogue with the following questions: Is there a consensus regarding a coherent knowledge translation framework for a domestic violence research network? What are the key actions that a domestic violence research network could take to enhance knowledge translation?Methods: Deliberative dialogue is a group process that blends research and practice to identify potential actions. In total, 16 participants attended three deliberative dialogue meetings. We applied a qualitative analysis to the data to identify the key actions.Findings: The deliberative dialogue facilitated mutual agreement regarding four key actions: (1) agreement on a knowledge translation approach; (2) active promotion of dedicated leadership within an authorising environment; (3) development of sustainable partnerships through capacity building and collaboration, particularly with DV survivors; and (4) employment of multiple strategies applying different kinds of evidence for diverse purposes and emerging populations.Discussion and conclusions: The use of the deliberative dialogue has uncovered specific factors required for the successful knowledge translation of domestic violence research. These factors have been added to the Integrated Knowledge Translation (IKT) capacity framework to enhance its application for domestic violence research. Future research could explore these organisational, professional and individual factors further by evaluating them in practice.
APA, Harvard, Vancouver, ISO, and other styles
43

Guo, Lian Zhi, Guang Ming Han, and Guo An Zhang. "Research of Implementing Strategies of IPv6 on Edge of Multimedia Communication Networks." Advanced Materials Research 433-440 (January 2012): 3703–7. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.3703.

Full text
Abstract:
Multimedia communication networks are charac-terized with links of a lot of communication hosts or digital devices and support more class of business. IPv4 addresses are being used up, IPv6 addresses is imminent. It is a solution to the serious shortage of current IPv4 addresses that taking the existing network as the bearing network, to carry IPv6 on the edge network. In order to achieve compatibility of IPv4 to IPv6 business services, 6to4 and differentiated services are used to solve the QoS problem caused by translation of two types of address.
APA, Harvard, Vancouver, ISO, and other styles
44

Xu, Mingye, Zhipeng Zhou, and Yu Qiao. "Geometry Sharing Network for 3D Point Cloud Classification and Segmentation." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (April 3, 2020): 12500–12507. http://dx.doi.org/10.1609/aaai.v34i07.6938.

Full text
Abstract:
In spite of the recent progresses on classifying 3D point cloud with deep CNNs, large geometric transformations like rotation and translation remain challenging problem and harm the final classification performance. To address this challenge, we propose Geometry Sharing Network (GS-Net) which effectively learns point descriptors with holistic context to enhance the robustness to geometric transformations. Compared with previous 3D point CNNs which perform convolution on nearby points, GS-Net can aggregate point features in a more global way. Specially, GS-Net consists of Geometry Similarity Connection (GSC) modules which exploit Eigen-Graph to group distant points with similar and relevant geometric information, and aggregate features from nearest neighbors in both Euclidean space and Eigenvalue space. This design allows GS-Net to efficiently capture both local and holistic geometric features such as symmetry, curvature, convexity and connectivity. Theoretically, we show the nearest neighbors of each point in Eigenvalue space are invariant to rotation and translation. We conduct extensive experiments on public datasets, ModelNet40, ShapeNet Part. Experiments demonstrate that GS-Net achieves the state-of-the-art performances on major datasets, 93.3% on ModelNet40, and are more robust to geometric transformations.
APA, Harvard, Vancouver, ISO, and other styles
45

Obiniyi, Afolayan A., Ezugwu E. Absalom, and Mohammed Dikko. "Network Security and Firewall Technology." International Journal of Dependable and Trustworthy Information Systems 2, no. 2 (April 2011): 40–60. http://dx.doi.org/10.4018/jdtis.2011040103.

Full text
Abstract:
With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Network Address Translation and packet filtering where the key features configured to make the network hidden for unauthorized users and filter unwanted traffics that might reflect malicious acts. The configuration and test were carried out at Iya Abubakar Computer Center, Ahamdu Bello University, Zaria, Nigeria. At the onset, the targeted network was full of virus, worms, Trojan horses, spyware, and vulnerable to unauthorized users. The signal strength of the network was usually very poor due to the effect from the threats affecting the bandwidth. The firewall was configured to filter out inherently dangerous services, exposing the network to fewer risks. After the research, the performance and efficiency of the network was improved tremendously.
APA, Harvard, Vancouver, ISO, and other styles
46

Jian, Luo. "A Zigbee and Sip-Based Smart Home System Design and Implementation." International Journal of Online Engineering (iJOE) 13, no. 01 (January 18, 2017): 42. http://dx.doi.org/10.3991/ijoe.v13i01.6258.

Full text
Abstract:
This investigation presents a Zigbee and Sip based smart home system(ZSS) that automates home-service operations and remote access. The ZSS home system comprises five subsystems,namely home automation network,home IP netework,home gateway,remote access unit, and cloud service unit. The home automation network is a wireless sensor network , responsible to sample sensors data and control actuators by Zigbee instructions. Security system adopts IP network technology to transmit videos from IP cameras to remote units. A home gateway middleware is designed to extract atomic service provied by a single device, then customize service rules which can meet variable user demands.Peer to peer transparent data channels between remote mobile phones and home devices are set up by Sip framework to overcome connection issues due to network address translation and dymaic public IP address. A novel data stream algorithm named GCOKDE is exploited to get probability density distribution of environmental parameters which can be uesd for the condition value of service rule.At the end,this study constructes a prototype to reveal the procedure of realization.
APA, Harvard, Vancouver, ISO, and other styles
47

Ullah, Ihsan, Philip Chikontwe, Hongsoo Choi, Chang Hwan Yoon, and Sang Hyun Park. "Synthesize and Segment: Towards Improved Catheter Segmentation via Adversarial Augmentation." Applied Sciences 11, no. 4 (February 11, 2021): 1638. http://dx.doi.org/10.3390/app11041638.

Full text
Abstract:
Automatic catheter and guidewire segmentation plays an important role in robot-assisted interventions that are guided by fluoroscopy. Existing learning based methods addressing the task of segmentation or tracking are often limited by the scarcity of annotated samples and difficulty in data collection. In the case of deep learning based methods, the demand for large amounts of labeled data further impedes successful application. We propose a synthesize and segment approach with plug in possibilities for segmentation to address this. We show that an adversarially learned image-to-image translation network can synthesize catheters in X-ray fluoroscopy enabling data augmentation in order to alleviate a low data regime. To make realistic synthesized images, we train the translation network via a perceptual loss coupled with similarity constraints. Then existing segmentation networks are used to learn accurate localization of catheters in a semi-supervised setting with the generated images. The empirical results on collected medical datasets show the value of our approach with significant improvements over existing translation baseline methods.
APA, Harvard, Vancouver, ISO, and other styles
48

Zhu, Shaolin, Yong Yang, and Chun Xu. "Extracting Parallel Sentences from Nonparallel Corpora Using Parallel Hierarchical Attention Network." Computational Intelligence and Neuroscience 2020 (September 1, 2020): 1–9. http://dx.doi.org/10.1155/2020/8823906.

Full text
Abstract:
Collecting parallel sentences from nonparallel data is a long-standing natural language processing research problem. In particular, parallel training sentences are very important for the quality of machine translation systems. While many existing methods have shown encouraging results, they cannot learn various alignment weights in parallel sentences. To address this issue, we propose a novel parallel hierarchical attention neural network which encodes monolingual sentences versus bilingual sentences and construct a classifier to extract parallel sentences. In particular, our attention mechanism structure can learn different alignment weights of words in parallel sentences. Experimental results show that our model can obtain state-of-the-art performance on the English-French, English-German, and English-Chinese dataset of BUCC 2017 shared task about parallel sentences’ extraction.
APA, Harvard, Vancouver, ISO, and other styles
49

Rahman, Taufik, Sumarna Sumarna, and Hafis Nurdin. "Analisis Performa RouterOS MikroTik pada Jaringan Internet." INOVTEK Polbeng - Seri Informatika 5, no. 1 (June 15, 2020): 178. http://dx.doi.org/10.35314/isi.v5i1.1308.

Full text
Abstract:
The internet network enters various sectors and is used in various activities, especially in the automation, industry 4.0 trend. Where almost all applications, ranging from desktops, websites, mobile (android and ios) that are used in various fields of education, transportation, banks, logistics, services, of course use high complexity internet networks that need to be analyzed so that high performance can be obtained. Analyzing the performance of MikroTik on the internet is the aim of this research. Research by configuring includes ip route, firewall filter, NAT, Mangle for packet tagging, Queue (bandwidth management), bridge wireless, DHCP and ip cloud DDNS on MikroTik. The results concluded that moving the configuration center point on the modem (giving the IP address down) to the MikroTik router can be done well, it can also translate company, institutional, school and even parent policies to the home internet when children access the internet, such as when it is allowed to access the internet can be arranged, things that may or may not be arranged in order to educate children to use the internet positively, use MikroTik to analyze internet network performance. As for the further research by looking at problems that exist after MikroTik is configured.
APA, Harvard, Vancouver, ISO, and other styles
50

Glas, Gerrit. "Translatie als filosofisch programma." Algemeen Nederlands Tijdschrift voor Wijsbegeerte 111, no. 3 (October 1, 2019): 453–76. http://dx.doi.org/10.5117/antw2019.3.009.glas.

Full text
Abstract:
Abstract Translation as philosophical program: An explorative reviewWhat does the concept of translation mean in the expression ‘translational neuroscience’? What are the different steps, or components, in the translation of neuroscientific findings to psychiatry? There are serious concerns about the validity and productivity of the traditional idea of a translational pipeline, starting in the fundamental sciences (chemistry, molecular and cellular biology) and ending in the practice of clinical medicine, including psychiatry. The article defends the thesis that the difficulties in the traditional approach result, at least partially, from insufficient reflection on the philosophical premises upon which the concept of translation is based. The linear pipeline model is strongly determined by the traditional biomedical approach to disease. The translation crisis signifies some of the limitations of this approach, especially in the realm of clinical practice and patient experience. The biomedical model suggests that illness manifestations should be conceived as causally determined expressions of an underlying biological derailment or dysfunction. This model lacks the language and conceptual tools to address the role of contextual and person-bound factors in the manifestation of illness. It is only recently that personalized and context-sensitive approaches to psychopathology have gained scientific attention. In the wake of this conceptual and practical reform, network-like approaches to translation have emerged. These network approaches are based on a different conception of transdisciplinarity. They address all stakeholders, by asking them what kind of translation they need. Stakeholders are not only scientists and clinicians, but also patient- and family support groups; and parties that are responsible for the institutional embedding, the financial and logistic infrastructure, and the legal frameworks that support psychiatric care. It is the interaction between science (as producer of knowledge) and the contexts that are supposed to benefit from this knowledge, that should be put at the centre of conceptual reflection. The degree and fruitfulness of this interaction will be decisive for the future of both psychiatry and clinical neuroscience. Philosophy can play an important role in this interaction, by making explicit underlying logical and practical tensions and ambiguities in this interaction.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography