62 research outputs found

    Effect of Path QoS on Throughput Aggregation Capability of the MPT Network Layer Multipath Communication Library

    Get PDF
    An increase in the use of smart and portable devices like smartphones, laptops, and tablets has led to a rise in the number of network interfaces and thus the number of possible channels for communication. However, the current approach over the Internet only employs a single path for a communication session. As an innovative and promising method for real-time transmission based on GRE-in-UDP encapsulation, which provides an IPv4 or IPv6 tunneling mechanism, this paper presents multipath throughput testing for the MPT network layer multipath communication library. We investigated the effectiveness of MPT's channel capacity aggregation while dealing with wired channels and examined scenarios in symmetric and asymmetric paths. Our network throughput measurements showed that MPT can efficiently aggregate the capacities of both symmetric and asymmetric paths. In this paper, we established a network topology that included a server, which we used for generating various quality of service (QoS) metrics. We measured how latency, transmission speed, packet loss rate, jitter, and the setting of the path weights influence throughput aggregation capability of the MPT communication library

    Throughput Performance Comparison of MPT-GRE and MPTCP in the Fast Ethernet IPv4/IPv6 Environment, Journal of Telecommunications and Information Technology, 2018, nr 2

    Get PDF
    This paper presents the MPT-GRE software, a novel multipath communication technology founded on the Generic Routing Encapsulation (GRE) protocol in UDP tunneling RFC specification. It enables the creation of a GRE protocolbased UDP tunnel built on several communication channels. On the other hand, MPTCP is one of the most typical representatives among multipath communication technologies, basing its operation on the utilization of TCP subflows. The authors compare the path-aggregation capabilities of these two technologies using four Fast Ethernet channels. The tests were carried out with the iperf3 network bandwidth measurement tool, and while transferring data using the FTP protocol over both IPv4 and IPv6

    Acta Technica Jaurinensis 2022

    Get PDF

    Optimasi Keamanan Jaringan Point to Point Menggunakan VPN IPSec dan GRE

    Get PDF
    Abstract At this time, where the development of technology and information is growing very fast. This has an impact on the security of data traffic on computer networks is very important, especially if it involves sensitive data. However, data security is still considered less important and attracts less attention from computer users. This is because it is still difficult to implement data security for both individual and corporate computer users. Virtual Private Network (VPN), is a network created to conduct encrypted data transactions between two or more authorized network users. VPN networks all use the internet so the security factor is very important. Some of the attacks that may occur on the internet network are Denial of Service (DoS) attacks, sniffing, spoofing, session hijacking, and many more. Researchers try to simulate network security using the GNS3 simulator to run two methods for point-to-point network security, namely by using IPSec VPN and GRE which functions to encrypt data traffic sent over public networks. At the time of uploading a file of 50 Megabytes from computer 2 and computer 3 to the FTP Server with a throughput of 0.878 Mbps with the IPSec method, the average ping is 75ms; and 1,060 Mbps throughput with the GRE method ping an average of 78ms; traffic is still normal, no problems on the network or request time out (RTO).   Keywords— VPN, IPSec, GRE, Point to Point, GNS3.Abstrak   Pada masa sekarang ini, dimana perkembangan teknologi dan informasi berkembang sangat cepat. Hal ini berdampak pada keamanan lalu lintas data di jaringan komputer sangat penting, terutama jika melibatkan data sensitif. Namun, keamanan data masih dianggap kurang penting dan kurang menarik perhatian pengguna komputer. Hal ini dikarenakan masih sulitnya penerapan keamanan data baik bagi pengguna komputer individu maupun perusahaan. Virtual Private Network (VPN), merupakan sebuah jaringan yang dibuat untuk melakukan transaksi data yang telah dienkripsi antara dua atau lebih pengguna jaringan yang resmi. Jaringan VPN seluruhnya menggunakan internet sehingga faktor keamanan menjadi sangat penting. Beberapa serangan yang mungkin terjadi di jaringan internet adalah Denial of Service (DoS) attack, sniffing, spoofing, session hijacking, dan masih banyak lagi. Peneliti mencoba mensimulasikan keamanan jaringan menggunakan simulator GNS3 untuk menjalankan dua metode untuk keamanan jaringan point to point yaitu dengan menggunakan VPN IPSec dan GRE yang berfungsi mengenkripsi tarfik data yang dikirim melalui jaringan publik. Pada saat dilakukan upload file sebesar 50 Megabyte dari komputer 2 dan komputer 3 ke FTP Server dengan throughput 0,878 Mbps dengan metode IPSec ping rata-rata 75ms; dan throughput 1,060 Mbps dengan metode GRE ping rata-rata 78ms; trafik masih normal tidak mengalami kendala pada jaringan atau request time out (RTO).   Kata kunci—VPN, IPSec, GRE, Point to Point, GNS3

    Video over DSL with LDGM Codes for Interactive Applications

    Get PDF
    Digital Subscriber Line (DSL) network access is subject to error bursts, which, for interactive video, can introduce unacceptable latencies if video packets need to be re-sent. If the video packets are protected against errors with Forward Error Correction (FEC), calculation of the application-layer channel codes themselves may also introduce additional latency. This paper proposes Low-Density Generator Matrix (LDGM) codes rather than other popular codes because they are more suitable for interactive video streaming, not only for their computational simplicity but also for their licensing advantage. The paper demonstrates that a reduction of up to 4 dB in video distortion is achievable with LDGM Application Layer (AL) FEC. In addition, an extension to the LDGM scheme is demonstrated, which works by rearranging the columns of the parity check matrix so as to make it even more resilient to burst errors. Telemedicine and video conferencing are typical target applications

    MMBnet 2017 - Proceedings of the 9th GI/ITG Workshop „Leistungs-, Verlässlichkeits- und Zuverlässigkeitsbewertung von Kommunikationsnetzen und Verteilten Systemen“

    Get PDF
    Nowadays, mathematical methods of systems and network monitoring, modeling, simulation, and performance, dependability and reliability analysis constitute the foundation of quantitative evaluation methods with regard to software-defined next-generation networks and advanced cloud computing systems. Considering the application of the underlying methodologies in engineering practice, these sophisticated techniques provide the basis in many different areas. The GI/ITG Technical Committee “Measurement, Modelling and Evaluation of Computing Systems“ (MMB) and its members have investigated corresponding research topics and initiated a series of MMB conferences and workshops over the last decades. Its 9th GI/ITG Workshop MMBnet 2017 „Leistungs-, Verlässlichkeits- und Zuverlässigkeitsbewertung von Kommunikationsnetzen und Verteilten Systemen“ was held at Hamburg University of Technology (TUHH), Germany, on September 14, 2017. The proceedings of MMBnet 2017 summarize the contributions of one invited talk and four contributed papers of young researchers. They deal with current research issues in next-generation networks, IP-based real-time communication systems, and new application architectures and intend to stimulate the reader‘s future research in these vital areas of modern information society

    End-to-End Resilience Mechanisms for Network Transport Protocols

    Get PDF
    The universal reliance on and hence the need for resilience in network communications has been well established. Current transport protocols are designed to provide fixed mechanisms for error remediation (if any), using techniques such as ARQ, and offer little or no adaptability to underlying network conditions, or to different sets of application requirements. The ubiquitous TCP transport protocol makes too many assumptions about underlying layers to provide resilient end-to-end service in all network scenarios, especially those which include significant heterogeneity. Additionally the properties of reliability, performability, availability, dependability, and survivability are not explicitly addressed in the design, so there is no support for resilience. This dissertation presents considerations which must be taken in designing new resilience mechanisms for future transport protocols to meet service requirements in the face of various attacks and challenges. The primary mechanisms addressed include diverse end-to-end paths, and multi-mode operation for changing network conditions
    corecore