Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification in an Enterprise Local Area Network
نویسندگان
چکیده
Owner identification is an important aspect of improving network visibility and enhancing network security within local area networks deploying IPv6. This paper presents a simulation study for owner identification in an enterprise local area network from their IPv6 addresses. The study is based around the reverse implementation (many-to-one mapping) of a one-to-many reversible mapping. The paper reviews the many-to-one mechanism and the associated simulation software development, followed by presentation of results obtained from required functional tests. The IPv6 address data can be obtained from the output of any network monitoring software. In addition to a text format for verification, it also uses a checksum for validation which is used during the IPv6 address generation and identification. The simulation software given here can easily identify an IPv6 address owner if the IPv6 address is properly generated by the mechanism and it can display particular verification messages.
منابع مشابه
Cognitive mapping concept of resource management for the viability of local communities
The local community is a complex socio-economic system, and its ability to function for an indefinitely long period of time (viability) is not investigated sufficiently today. The purpose of the research was, using the cognitive mapping, propose to the local community management developing their own management strategies to ensure its viability. Considering the weakly structured subject area of...
متن کاملLocal multivariate outliers as geochemical anomaly halos indicators, a case study: Hamich area, Southern Khorasan, Iran
Anomaly recognition has always been a prominent subject in preliminary geochemical explorations. Among the regional geochemical data processing, there are a range of statistical and data mining techniques as well as different mapping methods, which serve as presentations of the outputs. The outlier’s values are of interest in the investigations where data are gathered under controlled condition...
متن کاملLocal Network Protection for Ipv6 Local Network Protection for Ipv6
Although there are many perceived benefits to Network Address Translation (NAT), its primary benefit of "amplifying" available address space is not needed in IPv6. In addition to NAT’s many serious disadvantages, there is a perception that other benefits exist, such as a variety of management and security attributes that could be useful for an Internet Protocol site. IPv6 was designed with the ...
متن کاملSimulation of floodplain zones in Tehran's metropolitan watershed (case study: Kaan basin)
Simulation of floodplain zones in Tehran's metropolitan watershed (case study: Kaan basin) Ezaatollah Ghanavati, Associate prof. Geographical science faculty, Kharzmi University Ali Ahmmadabadi. Assistance prof. Geographical science faculty, Kharzmi University Negar Gholami, MA in Geomorphology, Geographical science faculty, Kharzmi University Extended abstract Floodplains and adjacent riv...
متن کاملSimulation of floodplain zones in Tehran's metropolitan watershed (case study: Kaan basin)
Simulation of floodplain zones in Tehran's metropolitan watershed (case study: Kaan basin) Ezaatollah Ghanavati, Associate prof. Geographical science faculty, Kharzmi University Ali Ahmmadabadi. Assistance prof. Geographical science faculty, Kharzmi University Negar Gholami, MA in Geomorphology, Geographical science faculty, Kharzmi University Extended abstract Floodplains and adjacent riv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 17 شماره
صفحات -
تاریخ انتشار 2015