Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification in an Enterprise Local Area Network

نویسندگان

  • Nashrul Hakiem
  • Mohammad Umar Siddiqi
  • Hashum Mohamed Rafiq
چکیده

Owner identification is an important aspect of improving network visibility and enhancing network security within local area networks deploying IPv6. This paper presents a simulation study for owner identification in an enterprise local area network from their IPv6 addresses. The study is based around the reverse implementation (many-to-one mapping) of a one-to-many reversible mapping. The paper reviews the many-to-one mechanism and the associated simulation software development, followed by presentation of results obtained from required functional tests. The IPv6 address data can be obtained from the output of any network monitoring software. In addition to a text format for verification, it also uses a checksum for validation which is used during the IPv6 address generation and identification. The simulation software given here can easily identify an IPv6 address owner if the IPv6 address is properly generated by the mechanism and it can display particular verification messages.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cognitive mapping concept of resource management for the viability of local communities

The local community is a complex socio-economic system, and its ability to function for an indefinitely long period of time (viability) is not investigated sufficiently today. The purpose of the research was, using the cognitive mapping, propose to the local community management developing their own management strategies to ensure its viability. Considering the weakly structured subject area of...

متن کامل

Local multivariate outliers as geochemical anomaly halos indicators, a case study: Hamich area, Southern Khorasan, Iran

Anomaly recognition has always been a prominent subject in preliminary geochemical explorations. Among the regional geochemical data processing, there are a range of statistical and data mining techniques as well as different mapping methods, which serve as presentations of the outputs. The outlier’s values are of interest in the investigations where data are gathered under controlled condition...

متن کامل

Local Network Protection for Ipv6 Local Network Protection for Ipv6

Although there are many perceived benefits to Network Address Translation (NAT), its primary benefit of "amplifying" available address space is not needed in IPv6. In addition to NAT’s many serious disadvantages, there is a perception that other benefits exist, such as a variety of management and security attributes that could be useful for an Internet Protocol site. IPv6 was designed with the ...

متن کامل

Simulation of floodplain zones in Tehran's metropolitan watershed (case study: Kaan basin)

Simulation of floodplain zones in Tehran's metropolitan watershed (case study: Kaan basin) Ezaatollah Ghanavati, Associate prof. Geographical science faculty, Kharzmi University Ali Ahmmadabadi. Assistance prof. Geographical science faculty, Kharzmi University Negar Gholami, MA in Geomorphology, Geographical science faculty, Kharzmi University Extended abstract Floodplains and adjacent riv...

متن کامل

Simulation of floodplain zones in Tehran's metropolitan watershed (case study: Kaan basin)

Simulation of floodplain zones in Tehran's metropolitan watershed (case study: Kaan basin) Ezaatollah Ghanavati, Associate prof. Geographical science faculty, Kharzmi University Ali Ahmmadabadi. Assistance prof. Geographical science faculty, Kharzmi University Negar Gholami, MA in Geomorphology, Geographical science faculty, Kharzmi University Extended abstract Floodplains and adjacent riv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 17  شماره 

صفحات  -

تاریخ انتشار 2015