10 research outputs found

    Quality Of Service (QOS) Improvement Using Traffic Shaping In ADTEC Batu Pahat

    Get PDF
    QoS is a requirement for ensuring the implementation of specific standard performance to avoid delays in reaching destinations and decreases number of lost packets. Also the performance of the network can be optimized indirectly. Therefore, to ensure network performance, there are a variety of QoS methods and mechanisms to manage and control packet from lost or delayed and also improve network performance. As a Cisco Networking Academy, Department of Computer and Networking has applied a range of delivery methods to provide the relevant and most effective training solution for students. However, all of these methods can quickly consume bandwidth and make the LAN network is poor or totally down for other classes. This project objective is implement traffic shaping mechanism and analyze the impact of generic traffic shaping and class-based traffic shaping on the network. We separated our experiment into three primary cases. In the first case we investigate the fixed bandwidth of 4 Mbps with no QoS applied. Second case we implement the Generic Traffic Shaping mechanism on outbound interface with three different of mean rate and burst size values. The third case, we configured the sub interface of the router that been classed with different VLANs on the network. The conclusion is that the Class based shaping can lead more efficient and give a good quality of network performance. This is because the class based shaping offered more specific traffic management such as classes the users based on the usage and application used. As from the output the average outgoing packet for sub interface in Traffic Shaping router is 99.93% which indicated a good quality in performance

    Network Traffic Analysis: A Case Study of ABU Network

    Get PDF
    The Internet is being viewed as a critical component of success by the researchers, teachers and students in the Universities and Colleges. The Objectives of thesis is to identify unproductive network based applications responsible for consuming valuable bandwidth of University network system and to enhance utility of productive applications on a University network. This research work, geared towards analysis on the internet traffic network’s of Ahmadu Bello University (ABU), Zaria as a case study. the monitoring of network traffic was conducted by bandwidth monitoring software, a packet sniffer (using Wireshark Version 165, SVR Rev 40429) configured as a gateway between the University network system and the internet over a 90-day monitoring period in a schedule of 15 minutes daily, 30 minutes weekly and 2 hours monthly. The data (packets) captures was further analysed using MATLAB which is a tool for graphing network data from which conclusions from the graphs was drawn that ABU’s current network traffic is underutilized and far from optimal in terms of Internet Inbound/Outbound traffic generated by its users (staff/students). It has also been observed that defensive bandwidth management is insufficient in respect to the institution’s aims and objectives on its network usage. This emphasises the need for improved bandwidth management and optimization. Keyword: Network monitoring traffic, Monitoring software (packet sniffer), Packet capture and Traffic analysis.

    Improvising Safety and Energy Efficiency of IoT based Networks Data Routing

    Get PDF
    The Internet of Things is also referred to as IoT, outlines the physical object networking which is comprised of sensors, software and other associated technologies and technical tools in order to connect and exchange data over the internet with other devices and systems. The IoT devices range from household to industrial tools. Over the years, one of the most emerging technologies of the 21st century is IoT as it plays a huge role in sophisticated industries to smart application such as cars, household appliances and many more. With the implementation of IoT, people can take an advantage of seamless communication between other people, processes as well as things. Without human intervention, data having key information can be gathered by different means such as computing, cloud, big data, and associated mobile technologies. This paper focuses on making an IOT based network’s data routine safer and more energy efficient

    The Performance of Distributed Applications: A Traffic Shaping Perspective

    Get PDF
    Widely used in datacenters and clouds, network traffic shaping is a performance influencing factor that is often overlooked when benchmarking or simply deploying distributed applications. While in theory traffic shaping should allow for a fairer sharing of network resources, in practice it also introduces new problems: performance (measurement) inconsistency and long tails. In this paper we investigate the effects of traffic shaping mechanisms on common distributed applications. We characterize the performance of a distributed key-value store, big data workloads, and high-performance computing under state-of-the-art benchmarks, while the underlying network's traffic is shaped using state-of-the-art mechanisms such as token-buckets or priority queues. Our results show that the impact of traffic shaping needs to be taken into account when benchmarking or deploying distributed applications. To help researchers, practitioners, and application developers we uncover several practical implications and make recommendations on how certain applications are to be deployed so that performance is least impacted by the shaping protocols

    TorSH: Obfuscating consumer Internet-of-Things traffic with a collaborative smart-home router network

    Get PDF
    When consumers install Internet-connected smart devices in their homes, metadata arising from the communications between these devices and their cloud-based service providers enables adversaries privy to this traffic to profile users, even when adequate encryption is used. Internet service providers (ISPs) are one potential adversary privy to users’ incom- ing and outgoing Internet traffic and either currently use this insight to assemble and sell consumer advertising profiles or may in the future do so. With existing defenses against such profiling falling short of meeting user preferences and abilities, there is a need for a novel solution that empowers consumers to defend themselves against profiling by ISP-like actors and that is more in tune with their wishes. In this thesis, we present The Onion Router for Smart Homes (TorSH), a network of smart-home routers working collaboratively to defend smart-device traffic from analysis by ISP-like adversaries. We demonstrate that TorSH succeeds in deterring such profiling while preserving smart-device experiences and without encumbering latency-sensitive, non-smart-device experiences like web browsing

    SkypeMorph: Protocol Obfuscation for Censorship Resistance

    Get PDF
    The Tor network is designed to provide users with low-latency anonymous communication. Tor clients build circuits with publicly listed relays to anonymously reach their destinations. Low-latency anonymous communication is also an essential property required by censorship circumvention tools and thus Tor has been widely used as a censorship resistance tool. However, since the Tor relays are publicly listed, they can be easily blocked by censoring adversaries. Consequently, the Tor project envisioned the possibility of unlisted entry points to the Tor network, commonly known as bridges. In recent years, there have been attempts to achieve fast and real-time methods to discover Tor, and specifically bridge, connections. In this thesis we address the issue of preventing censors from detecting a certain type of traffic, for instance Tor connections, by observing the communications between a remote node and nodes in their network. We propose a generic model in which the client obfuscates its messages to the bridge in a widely used protocol over the Internet. We investigate using Skype video calls as our target protocol and our goal is to make it difficult for the censoring adversary to distinguish between the obfuscated bridge connections and actual Skype calls using statistical comparisons. Although our method is generic and can be used by any censorship resistance application, we present it for Tor, which has well-studied anonymity properties. We have implemented our model as a proof-of-concept proxy that can be extended to a pluggable transport for Tor, and it is available under an open-source licence. Using this implementation we observed the obfuscated bridge communications and showed their characteristics match those of Skype calls. We also compared two methods for traffic shaping and concluded that they perform almost equally in terms of overhead; however, the simpler method makes fewer assumptions about the characteristics of the censorship resistance application’s network traffic, and so this is the one we recommend

    A Comprehensive Security Framework for Securing Sensors in Smart Devices and Applications

    Get PDF
    This doctoral dissertation introduces novel security frameworks to detect sensor-based threats on smart devices and applications in smart settings such as smart home, smart office, etc. First, we present a formal taxonomy and in-depth impact analysis of existing sensor-based threats to smart devices and applications based on attack characteristics, targeted components, and capabilities. Then, we design a novel context-aware intrusion detection system, 6thSense, to detect sensor-based threats in standalone smart devices (e.g., smartphone, smart watch, etc.). 6thSense considers user activity-sensor co-dependence in standalone smart devices to learn the ongoing user activity contexts and builds a context-aware model to distinguish malicious sensor activities from benign user behavior. Further, we develop a platform-independent context-aware security framework, Aegis, to detect the behavior of malicious sensors and devices in a connected smart environment (e.g., smart home, offices, etc.). Aegis observes the changing patterns of the states of smart sensors and devices for user activities in a smart environment and builds a contextual model to detect malicious activities considering sensor-device-user interactions and multi-platform correlation. Then, to limit unauthorized and malicious sensor and device access, we present, kratos, a multi-user multi-device-aware access control system for smart environment and devices. kratos introduces a formal policy language to understand diverse user demands in smart environment and implements a novel policy negotiation algorithm to automatically detect and resolve conflicting user demands and limit unauthorized access. For each contribution, this dissertation presents novel security mechanisms and techniques that can be implemented independently or collectively to secure sensors in real-life smart devices, systems, and applications. Moreover, each contribution is supported by several user and usability studies we performed to understand the needs of the users in terms of sensor security and access control in smart devices and improve the user experience in these real-time systems

    How to accelerate your internet : a practical guide to bandwidth management and optimisation using open source software

    Get PDF
    xiii, 298 p. : ill. ; 24 cm.Libro ElectrónicoAccess to sufficient Internet bandwidth enables worldwide electronic collaboration, access to informational resources, rapid and effective communication, and grants membership to a global community. Therefore, bandwidth is probably the single most critical resource at the disposal of a modern organisation. The goal of this book is to provide practical information on how to gain the largest possible benefit from your connection to the Internet. By applying the monitoring and optimisation techniques discussed here, the effectiveness of your network can be significantly improved

    1 On the Necessity of Traffic Shaping for PMU Measurement Data Streams ∗

    Get PDF
    We study the communication network of an on-campus active distribution network (ADN) that comprises phasor measurement units (PMUs) connected to medium-voltage transformers. Within stringent time delays and with minimal loss the PMUs periodically transfer fresh measurements through a phasor data concentrator (PDC) to a centralized electrical network state estimator (control point). Due to strict operational constraints, a dedicated robust communication infrastructure that withstands power shortages is needed. We use DSL technology (SHDSL) over existing telephone cables. We investigate the operating region of the system. In our experimental setup, we measure the achieved goodput (application layer throughput) for various measurement frequencies and frame sizes. We observe that goodput drops catastrophically, in some scenarios for which the PDC data transmission rate slightly exceeds the capacity of the SHDSL link for a short period of time. Specifically, when the offered traffic exceeds channel capacity by 20%, we observe up to 90% of lost packets. We explain this surprising phenomenon by the combination of IP fragmentation that splits each frame in two IP packets of significantly different sizes and the FIFO/tail-drop queuing discipline implemented within line terminal devices at the source end. We conclude that the guidelines of the C37.118.2-2011 standard are not sufficient for designing a PMU data transfer layer. Implementing traffic shaping within PMUs is essential for avoiding excessive packet losses. 1
    corecore