Explore chapters and articles related to this topic
Network Framework
Published in Yi Qiu, Puxiang Xiong, Tianlong Zhu, The Design and Implementation of the RT-Thread Operating System, 2020
Yi Qiu, Puxiang Xiong, Tianlong Zhu
The subnet mask (also called netmask and address mask) is used to indicate which bits of an IP address identify the subnet where the host is located and which bits are identified as the bit mask of the host. The subnet mask cannot exist alone; it must be used in conjunction with an IP address. The subnet mask has only one effect, which is to divide an IP address into two parts: network address and host address. The subnet mask is the bit of 1, the IP address is the network address, the subnet mask is the bit of 0, and the IP address is the host address. Taking the IP address 192.168.1.10 and the subnet mask 255.255.255.0 as an example, the first 24 bits of the subnet mask (converting decimal to binary) is 1, so the first 24 bits of the IP address 192.168.1 represent the network address. The remaining 0 is the host address.
Configuring TCP/IP on a Windows NT Computer
Published in Steven F. Blanding, Enterprise Operations Management, 2020
The subnet mask represents a sequence of set bits that is logically ANDed with the IP address to determine the extended network address. Because the first or first two bit positions of an IP address indicates the type of address, it also indicates the length of the network portion of the address prior to subnetting. By subtracting the length of the IP address from the ANDed length, the device can determine the length of the subnet portion of the address and the value in the subnet portion. For example, the subnet mask of 255.255.255.0 shown in Exhibit 28.2 when ANDed with the IP address of 205.131.175.97 results in a 24-bit address. However, because the network address of 205.131.175.0 represents a Class C address that consists of a 3-byte network address and 1-byte host address, this indicates that no subnetting occurred. Thus, a subnet mask of 255.255.255.0 represents a nonsubnetted Class C address. Similarly, a subnet mask of 255.255.0 would indicate a nonsubnetted Class B address, while a subnet mask of 255.0.0.0 would represent a nonsubnetted Class A network address.
The Space System
Published in Ron Burch, Resilient Space Systems Design: An Introduction, 2019
The network segment includes a conventional terrestrial network that connects all ground components and can also be considered part of the ground segment, although more frequently this functionality is treated as a separate segment as parts of it are shared by multiple space systems as with the command and control sites. Network management is performed via the network operations center (NOC). This function can be housed in the same location as the SOC and maintains network connectivity. The NOC can also provide control of network-centric user terminals for SATCOM systems, which must log into the network prior to operating over the SATCOM system. Modern networks are generally Internet Protocol (IP)-based and sometimes use the Internet as part of the transport path using a virtual private network (VPN) to provide secure communications between network nodes.
An IoT-based Framework of Vehicle Accident Detection for Smart City
Published in IETE Journal of Research, 2023
Pankaj P. Tasgaonkar, Rahul Dev Garg, Pradeep Kumar Garg
The sensors information acquired from ultrasonic, accelerometer is stored on the ThingSpeak Cloud. It can integrate, visualize, and analyze real-time data. A channel is created that can store the data from the sensors. Message Queuing Telemetry Transport (MQTT) is a publish/subscribe communication protocol that uses Transmission Control Protocol/Internet Protocol (TCP/IP) sockets or WebSockets. MQTT over WebSockets can be secured with SSL. It assures that communication is with the intended sensors only. It can work efficiently even with the minimum bandwidth of the network. After having proper analysis from the cloud, it is necessary to react to the data with the necessary action that is required. A channel was created with the Application Peripheral Interface (API) keys and a field was assigned for each output of the sensor. The field shows the real-time output on the cloud.
An Optimal Reinforced Deep Belief Network for Detection of Malicious Network Traffic
Published in IETE Journal of Research, 2023
A block of the payload for a packet, a packet header field, or a packet header byte can all be considered fields in a packet. A first trial trims a packet to n = 54 bytes, a defined length by treating a field in the packet header as a word. The word size change depending on how long the fields are in the packet. The generated sentence follows a grammar rule that is created by the packet structure’s strict adherence to the field order. The resource usage is extremely effective because the extracting field step is carried out concurrently with packet decoding or reading which is data pre-processing. As well, the packet will be padded by means of zeros if its size is less than n bytes. Because most Transmission Control Protocol (TCP) packets have a 20-byte Internet Protocol (IP) header, a 20-byte TCP header, and a 14-byte Media Access Control (MAC) header, 54 bytes are the reason to look at them.
A Stateless Spatial IPv6 Address Configuration Scheme for Internet of Things
Published in IETE Journal of Research, 2021
However, it is assumed that all nodes or sensor nodes in the IoT network are location-aware. But in some specific situations, such as when two or more sensors can be housed in a device, thus having duplicate spatiotemporal characteristics. The following three cases may be considered to deal with this situation. Multiple sensors without a microcontroller – Sensors without a microcontroller, such as temperature, proximity, and other environmental sensors, just perceive ambient stimuli and report them to the device or gateway; they do not require an IP address. For internet connectivity, only the gateway or device requires an IP address.Multiple sensor nodes with microcontroller and without location awareness – In this case, the device will act as the gateway or coordinator and the sensors housed in the device will act as the sensor nodes. These sensor nodes will derive their location from the relative position of the device. Several well-developed mechanisms are available to estimate the relative position of the known location of another device based on the angle of arrival and the signal strength indicator [24,42].Multiple sensor nodes with microcontroller and location-aware – In this case, sensor nodes will identify their location independently.