36 research outputs found

    Performance Evaluation of IPv6 Jumbogram Packets Transmission using Jumbo Frames

    Get PDF
    IPv6 is an ultimate solution to the Internet address exhaustion. It is believed, the protocol will be requested by not only human but also everything on the earth surface. Furthermore, the improvement on the protocol is important to achieve IP packets transmission efficiently. Processing technology has been improved to become very fast packet processing both in host as well as intermediate systems. The lower layer technologies have supported to transmit Gigabits data per second. However, there is a limitation on transferring large data due to the current MTU on the widely used link layer technology which is Ethernet is still 1500 bytes. This research aims to evaluate performance of IPv6 packets transmission using jumbo frames. The evaluation was done by transmitting IPv6 packets larger than 1500 bytes in Windows  operating  systems.  The  results  show,  transmitting larger packets size using jumbo frame can increase the network throughput by up to 117%

    Performance comparison of transmitting jumbo frame on Windows and Linux System

    Get PDF
    IPv6 is the successor of IPv4, the current Internet Protocol that runs out its address. It offers some improvements including simpler header format and extension header resulting in faster transmission of IP packets. However, IPv6 is a network layer protocol that requires lower layer services. IP packets from the network layer pass to data link layer to be encapsulated by layer 2 headers and trailer to become frames. Ethernet is the most widely used data link layer protocol in the current network devices. The technology is always improved to support high speed transmission. However, from standard Ethernet until ten gigabit Ethernet, the size of MTU remains unchanged at 1500 Bytes. This prevents the network from gaining an optimum performance on transmitting IP packets and operating systems cannot take full advantage of the high-speed performance of Gigabit Ethernet. This research aims to implement the transmission of IPv6 packets using jumbo frame on a test-bed environment. The implementation can be used to justify the impact of jumbo frame on the network as well as operating systems performance. The results prove that the OS used on implementation of jumbo frame affects on the network performance. The highest percentage of increasing throughput is 33.6% when both sender and receiver are running Windows. The decreasing delay by 54.36% was happened when using Linux in sender and Windows in receiver

    Challenges with Petabyte-Scale Flows and Beyond (White Paper)

    Get PDF

    DIP: Disruption-Tolerance for IP

    Full text link
    Disruption Tolerant Networks (DTN) have been a popular subject of recent research and development. These networks are characterized by frequent, lengthy outages and a lack of contemporaneous end-to-end paths. In this work we discuss techniques for extending IP to operate more effectively in DTN scenarios. Our scheme, Disruption Tolerant IP (DIP) uses existing IP packet headers, uses the existing socket API for applications, is compatible with IPsec, and uses familiar Policy-Based Routing techniques for network management

    Authentication Key Recovery on Galois Counter Mode (GCM)

    Get PDF
    GCM is used in a vast amount of security protocols and is quickly becoming the de facto mode of operation for block ciphers due to its exceptional performance. In this paper we analyze the NIST stan- dardized version (SP 800-38D) of GCM, and in particular the use of short tag lengths. We show that feedback of successful or unsuccessful forgery attempt is almost always possible, contradicting the NIST assumptions for short tags. We also provide a complexity estimation of Ferguson’s authentication key recovery method on short tags, and suggest several novel improvements to Fergusons’s attacks that significantly reduce the security level for short tags. We show that for many truncated tag sizes; the security levels are far below, not only the current NIST requirement of 112-bit security, but also the old NIST requirement of 80-bit security. We therefore strongly recommend NIST to revise SP 800-38D

    Unicast UDP Usage Guidelines for Application Designers

    Get PDF
    Publisher PD

    Network-Coded Multiple Access

    Full text link
    This paper proposes and experimentally demonstrates a first wireless local area network (WLAN) system that jointly exploits physical-layer network coding (PNC) and multiuser decoding (MUD) to boost system throughput. We refer to this multiple access mode as Network-Coded Multiple Access (NCMA). Prior studies on PNC mostly focused on relay networks. NCMA is the first realized multiple access scheme that establishes the usefulness of PNC in a non-relay setting. NCMA allows multiple nodes to transmit simultaneously to the access point (AP) to boost throughput. In the non-relay setting, when two nodes A and B transmit to the AP simultaneously, the AP aims to obtain both packet A and packet B rather than their network-coded packet. An interesting question is whether network coding, specifically PNC which extracts packet (A XOR B), can still be useful in such a setting. We provide an affirmative answer to this question with a novel two-layer decoding approach amenable to real-time implementation. Our USRP prototype indicates that NCMA can boost throughput by 100% in the medium-high SNR regime (>=10dB). We believe further throughput enhancement is possible by allowing more than two users to transmit together

    Implementation of a distributed control system using real-time operating system

    Get PDF
    In a typical distributed control system, computer nodes communicate through a common communication channel that introduces data loss and random delays. Supplying a generic solution to these constraints is hard due to the complexity and large variety of possibilities that may affect these constraints in real life applications. In a modern communication network, if data is corrupted during transmission, it can be resent. However, it is not feasible to retransmit in control applications; if the packet contents correspond to measured plant outputs, then the most recent data should be measured and sent instead, or if the packet contents correspond to a control signal and the retransmission would cause the control signal to be applied late to the plant, it would be better to recalculate the signal and send it again. This thesis is an attempt to implement a distributed control system design method, Model Based Predictive Networked Control System (MBPNCS), which accepts the fact that arbitrary delay and data loss may happen. The MBPNCS method approaches the problem by using a plant model to predict a predefined number of future states of the plant and respective control signal for each, to compensate for the possible delay and data loss that can take place during the communication between nodes. In this work, after previous works have been examined, predictive control method that is used in the implementation is introduced. Design and implementation of the methodology is explained in detail and results of the tests are presented

    Protokół IP wersja 6. Telekomunikacja i Techniki Informacyjne, 2002, nr 1-2

    Get PDF
    Opisano budowę protokołu IPv6, a zwłaszcza nagłówek IPv6 i nagłówki rozszerzające. Ponadto wskazano sposób podziału adresów IP na podsieci
    corecore