Explore chapters and articles related to this topic
Network Framework
Published in Yi Qiu, Puxiang Xiong, Tianlong Zhu, The Design and Implementation of the RT-Thread Operating System, 2020
Yi Qiu, Puxiang Xiong, Tianlong Zhu
The subnet mask (also called netmask and address mask) is used to indicate which bits of an IP address identify the subnet where the host is located and which bits are identified as the bit mask of the host. The subnet mask cannot exist alone; it must be used in conjunction with an IP address. The subnet mask has only one effect, which is to divide an IP address into two parts: network address and host address. The subnet mask is the bit of 1, the IP address is the network address, the subnet mask is the bit of 0, and the IP address is the host address. Taking the IP address 192.168.1.10 and the subnet mask 255.255.255.0 as an example, the first 24 bits of the subnet mask (converting decimal to binary) is 1, so the first 24 bits of the IP address 192.168.1 represent the network address. The remaining 0 is the host address.
Configuring TCP/IP on a Windows NT Computer
Published in Steven F. Blanding, Enterprise Operations Management, 2020
The subnet mask represents a sequence of set bits that is logically ANDed with the IP address to determine the extended network address. Because the first or first two bit positions of an IP address indicates the type of address, it also indicates the length of the network portion of the address prior to subnetting. By subtracting the length of the IP address from the ANDed length, the device can determine the length of the subnet portion of the address and the value in the subnet portion. For example, the subnet mask of 255.255.255.0 shown in Exhibit 28.2 when ANDed with the IP address of 205.131.175.97 results in a 24-bit address. However, because the network address of 205.131.175.0 represents a Class C address that consists of a 3-byte network address and 1-byte host address, this indicates that no subnetting occurred. Thus, a subnet mask of 255.255.255.0 represents a nonsubnetted Class C address. Similarly, a subnet mask of 255.255.0 would indicate a nonsubnetted Class B address, while a subnet mask of 255.0.0.0 would represent a nonsubnetted Class A network address.
Smart energy measurement using Ethernet
Published in Rodolfo Dufo-López, Jaroslaw Krzywanski, Jai Singh, Emerging Developments in the Power and Energy Industry, 2019
Deepa Jose, B. Balaji, A. Arun Raj, S. Abdullah, T. Anbumani
A sub-network or a subnet is a logical division of a single network into two or more networks. This way numerous computers can be connected to the same network at the same time. Most often a computer connected in a sub-network will be addressed with a common, identical, most significant bit in its IP address. Let us see this with an example. The internet is a network of computers all over the world, but these computers are not connected on the same network directly (Deepa Jose, Roshini Tamil Selvan, et al. 2016). Let us assume that there is a main network and to this network only a limited number of computers can connect at any given moment, therefore in order to accommodate the large volume of devices all over the world, this network is divided into networks and these networks are further divided into more networks. Hence at the end it finally reaches “US” the end user. In order for the message to pass through the subnet, it has to pass through a gateway.
An Efficient DDoS Attack Detection Using Chaos Henry Gas Solubility Optimization Weight Initialization Based Rectified Linear Unit
Published in Cybernetics and Systems, 2023
Selvam Lakshmanan, Uma Maheswari Gnaniyan Ponnusamy, Senthilkumar Andi
To identify the distributed Domain Name System (DNS) attacks, Lyu et al. (2021) analyzed the hierarchical graph framework for tracking DNS traffic at the autonomous system (AS), subnet, and host levels. This method integrated with ML detects abnormal behaviors at the different hierarchy levels. The lab testbed collected the floods and scans related to DNS attack data. In the dynamic data structure, the anomaly detection methods were tuned or trained through the attack and benign traffic datasets. The efficiency of the method was achieved through the comparison of the method with the commercial firewall and public blacklist. Here, the widespread attack dataset containing an increased number of real networks’ volumetric DNS attacks (like distributed or direct) was not regarded in this scheme. For handling the attacks of DDoS in a Software Defined Networking (SDN)-related cloud atmosphere, on the basis of self-organizing map algorithms and SVM, Phan and Park (2019) designed the hybrid ML method for traffic classification enhancement. The speed and rate of attack detection were enhanced by employing the enhanced History-based IP Filtering (eHIPF) method. The DDoS attack defender was generated by integrating eHIPF and the hybrid ML method. The scheme utilized the CAIDA dataset. The experimental results showed that the scheme was resourceful and efficient for DDoS attack protection in an SDN-related cloud atmosphere. Moreover, the comparative analysis of this scheme is weak.
5GSS: a framework for 5G-secure-smart healthcare monitoring
Published in Connection Science, 2022
Jianqiang Hu, Wei Liang, Osama Hosam, Meng-Yen Hsieh, Xin Su
The edge cloud is composed of edge servers. Edge server node in the edge cloud acts as Sensor Mobile Access Gateway (SMAG). Packets were sent from 6LoWPAN Mobile Node to Sensor Local mobility Agent through SMAG. Each edge server node takes a built-in unified gateway as a boundary and supports switching from short-range protocols to IPv6, which allows 6LoWPAN Mobile Nodes to connect. Each 6LoWPAN Mobile Node sensor has a unique IPv6 128-bit long address, which is automatically configured by a global routing prefix, a subnet identifier, and an interface identifier. When 6LoWPAN Mobile Node moves from SMAG to another, it was always identified by its HoA (home address). Domain Mobility Agent
Genetic Algorithm-based Reliability of Computer Communication Network
Published in IETE Journal of Research, 2022
It is assumed that the network topology can be abstracted as a weighted undirected graph , where is a network node set, which can represent a switch, a router, and a host, or a subnet; is a set of edges, representing a communication link. is the number of nodes of , is the number of sides. Edge represents a straight link between the slave nodes , indicates that there is no straight link between the pair of nodes, .