74 research outputs found

    Quantifying the performance degradation of IPv6 for TCP in Windows and Linux Networking

    Get PDF
    Implementing IPv6 in modern client/server operating systems (OS) will have drawbacks of lower throughput as a result of its larger address space. In this paper we quantify the performance degradation of IPv6 for TCP when implementing in modern MS Windows and Linux operating systems (OSs). We consider Windows Server 2008 and Red Hat Enterprise Server 5.5 in the study. We measure TCP throughput and round trip time (RTT) using a customized testbed setting and record the results by observing OS kernel reactions. Our findings reported in this paper provide some insights into IPv6 performance with respect to the impact of modern Windows and Linux OS on system performance. This study may help network researchers and engineers in selecting better OS in the deployment of IPv6 on corporate networks

    Experimental Evaluation of Desktop Operating Systems Networking Performance

    Get PDF
    The rapid advancement of network, communication and Internet technology resulted with always-on, always-connected, device-independent and remote online working, business, education and entertainment environment. Consequently, users are searching for solutions and technologies that enable fast and reliable wide area network connection and the typical solution is through using personal computers connected with ethernet cable to network equipment and infrastructure that supports gigabit ethernet connection. Besides the complex network infrastructure that can influence performance, the bottleneck can also be caused by insufficient hardware, operating system and software resources on clients’ machines. Therefore, in this paper a networking performance evaluation of three globally most common and most used versions of Windows operating systems; namely Windows 7TM, Windows 8.1TM and Windows 10TM, on two identical computer systems, is conducted. Networking performance measurements are performed with three different benchmarks: namely iPerf, D-ITG and NetStress. Performance evaluation results showed that a newer versions of an operating system bring certain networking performance improvements but by sacrificing other performances

    Measuring IPv6 performance in a newly deployed IPv6 campus network

    Get PDF
    The implementation of IPv6 in dual-stack environment at Universiti Utara Malaysia campus network has been done successfully but how it performs compared to IPv4 has yet to be measured.A study on the performance of IPv6 network has been done to measure this performance.The study employed a simple performance measurement/testing using ping to a number of IPv6 enabled web servers.The RTT of the ping packets for both IPv4 and IPv6 is compared to see the performance of IPv6 network compared to IPv4 in a dual-stack environment. The study has found that the IPv6 network performance is slightly worse than IPv4 due to some reasons.This paper discusses some of the findings

    IPv6: a new security challenge

    Get PDF
    Tese de mestrado em Segurança Informática, apresentada à Universidade de Lisboa, através da Faculdade de Ciências, 2011O Protocolo de Internet versão 6 (IPv6) foi desenvolvido com o intuito de resolver alguns dos problemas não endereçados pelo seu antecessor, o Protocolo de Internet versão 4 (IPv4), nomeadamente questões relacionadas com segurança e com o espaço de endereçamento disponível. São muitos os que na última década têm desenvolvido estudos sobre os investimentos necessários à sua adoção e sobre qual o momento certo para que o mesmo seja adotado por todos os players no mercado. Recentemente, o problema da extinção de endereçamentos públicos a ser disponibilizado pelas diversas Region Internet registry – RIRs - despertou o conjunto de entidades envolvidas para que se agilizasse o processo de migração do IPv4 para o IPv6. Ao contrário do IPv4, esta nova versão considera a segurança como um objetivo fundamental na sua implementação, nesse sentido é recomendado o uso do protocolo IPsec ao nível da camada de rede. No entanto, e devido à imaturidade do protocolo e à complexidade que este período de transição comporta, existem inúmeras implicações de segurança que devem ser consideradas neste período de migração. O objetivo principal deste trabalho é definir um conjunto de boas práticas no âmbito da segurança na implementação do IPv6 que possa ser utilizado pelos administradores de redes de dados e pelas equipas de segurança dos diversos players no mercado. Nesta fase de transição, é de todo útil e conveniente contribuir de forma eficiente na interpretação dos pontos fortes deste novo protocolo assim como nas vulnerabilidades a ele associadas.IPv6 was developed to address the exhaustion of IPv4 addresses, but has not yet seen global deployment. Recent trends are now finally changing this picture and IPv6 is expected to take off soon. Contrary to the original, this new version of the Internet Protocol has security as a design goal, for example with its mandatory support for network layer security. However, due to the immaturity of the protocol and the complexity of the transition period, there are several security implications that have to be considered when deploying IPv6. In this project, our goal is to define a set of best practices for IPv6 Security that could be used by IT staff and network administrators within an Internet Service Provider. To this end, an assessment of some of the available security techniques for IPv6 will be made by means of a set of laboratory experiments using real equipment from an Internet Service Provider in Portugal. As the transition for IPv6 seems inevitable this work can help ISPs in understanding the threats that exist in IPv6 networks and some of the prophylactic measures available, by offering recommendations to protect internal as well as customers’ networks

    Computer Systems and Networks Fundamentals. Laboratory Work Tutorial

    Get PDF
    Навчальний посібник розроблений для ознайомлення студентів з основами теорії та практичними методами налаштування компонентів комп’ютерної мережі. Навчальний посібник містить вступ і 4 розділи, присвячені певній лабораторній роботі. До кожного лабораторного завдання є мета роботи, опис завдання, теоретичні відомості та методичні вказівки; питання для самоконтролю та список рекомендованої літератури. Навчальний посібник розрахований на студентів спеціальності 121 «Інженерія програмного забезпечення» освітньої програми «Інженерія програмного забезпечення мультимедійних та інформаційно-пошукових систем» факультету прикладної математики КПІ ім. Ігоря Сікорського.This tutorial is developed for familiarizing students with basic theory and practical methods of computer network components configuration. The tutorial includes the introduction and 4 sections devoted to a certain laboratory work. There are a work objective, a description of the task, theoretical information, and methodological instructions for every laboratory task; questions for self-assessment and a list of recommended literature. The tutorial is aimed at students of the speciality 121 “Software Engineering”, educational program “Software Engineering of Multimedia and Information Retrieval Systems” of the Faculty of Applied Mathematics of Igor Sikorsky Kyiv Polytechnic Institute

    Jaringan dasar kelas X semester 2

    Get PDF
    Penyajian buku teks untuk disusun dengan tujuan agar peserta didik dapat melakukan proses pencarian pengetahuan berkenaan dengan materi pelajaran melalui berbagai aktivitas para ilmuwan dalam melakukan eksperimen, dengan demikian peserta didik diarahkan untuk menemukan sendiri berbagai fakta, membangun konsep, dan nilai-nilai baru secara mandiri

    Traffic measurement and analysis of Wide Area Network (WAN) link usage: a case study of UiTM Perlis campus network / Abidah Mat Taib, Rafiza Ruslan and Abdul Hadi Kamel Abdullah

    Get PDF
    Network users normally will start complaining when the response time for the network access is intolerable or their network access is intermittently interrupted due to unclear reasons. Knowing how the network bandwidth is being utilized by the users will give the administrator some ideas of possible reasons for the network access problems and how to alleviate the problems. Some users may just use the network for running non bandwidth intensive applications like email and telnet and some users may use the network for running bandwidth intensive application such as video streaming and downloading big files using ftp application. Many users may visit popular web sites that are not related to their work during office hours. The above information about bandwidth utilization on a network link can be acquired through measurement and analysis of the network traffic that pass through the link. This paper discuss real time passive measurement of the network traffic on the WAN link that connects UiTM Perlis campus network to the main campus of UiTM in Shah Alam. The analysis of the traffic helped us to know some aspects of the WAN link utilization. This includes the average bandwidth utilization, popular application layer protocols and popular websites among different user segments and also some anomalies found in the captured trace

    Installation of Zentyal; LINUX Small Business Server

    Get PDF
    This project work is about setting up a server for the Electronics and computer Lab of the ECET department. The current server used in this lab runs OpenBSD 3.3. OpenBSD is a Unix-like operating system which offers services such as mail server, web server, ftp server, DNS server, router, firewall, or NFS file server. However this version of openBSD is obsolete and several versions has been developed over the years, the recent version is openBSD 5.6. Furthermore, openBSD has no graphic user interface (GUI). It accepts and processes command through the command line interface. Hence, it can be defined as not being so user friendly. Zentyal is a variant of Linux operating system. It is to be used in this project as a server for the ECET lab. Zentyal offers same functions as OpenBSD and much more. This variant of Linux was chosen because it is free and more user friendly. It has a graphic user interface and also has a well-integrated management tools. It will serve as a gateway between the computers in the lab and the BGSU wireless network and also as a file server for the ECET lab. The Zentyal server hardware also uses a wireless network interface card to connect to the BGSU network, thereby providing more flexibility in connection. The phases of this project involve obtaining the needed hardware and installation of the Zentyal operation system. Putting all the computers of the ECET lab on one network (LAN network) and connecting to the server. The server will serve as a gateway (router) to the internet through the BGSU network. Other functionalities Zentyal operating system offers is going to be explored such as Network address translation (NAT) and Firewall

    Eine Netzwerkarchitektur zum Einsatz des Material Exchange Formats für Live-Produktionen im professionellen Fernsehstudio

    Get PDF
    Der Bereich der Liveproduktion im Fernsehstudio ist geprägt von hohen Anforderungen an Qualität, Zeitverhalten und Zuverlässigkeit bei der Erstellung von Audio- und Videomaterial zur Distribution über Broadcastkanäle. In der Vergangenheit konnten diese Anforderungen nur mit spezieller und damit kostenintensiver Gerätetechnik bewältigt werden. Mit der Entwicklung auf dem Elektroniksektor ist heute einerseits eine Vielzahl von zusätzlichen Distributionswegen mit Inhalten zu versorgen. Andererseits stehen leistungsfähige Geräte auf Basis von Standard-IT-Technologien zur Verfügung, die senderseitig zur Produktion von Material eingesetzt werden können und zusätzlich Datenverarbeitung leisten, welche Produktionsabläufe effizienter gestaltet.Die vorliegende Dissertation beschäftigt sich vor diesem Hintergrund mit der Anwendung von Standard-IT-Technologien im echtzeitkritischen Bereich der Fernsehstudioproduktion. Dabei besteht insbesondere das Ziel der Integration von Metadatenverarbeitung. Die Arbeit kombiniert dazu Standard-IT-Technologien und ergänzt diese um Konzepte, die die besonderen Anforderungen einer Liveproduktion im Fernsehproduktionsstudio berücksichtigen. Im Rahmen dieser Arbeit wird eine Übertragungstechnologie zum Datenaustausch im Studio aus Standardkomponenten modelliert. Parameter zur Bewertung der Netzwerkleistung und Strategien zur Ressourcenteilung werden diskutiert. Im weiteren Verlauf der Arbeit werden Prozessoren zur Verarbeitung von Essenzdaten verglichen und über die PC-Plattform in eine universelle Einheit zur Datenverarbeitung integriert. Die Analyse von Komponenten und Abläufen führt zu einer feingranularen Latenzbetrachtung, die eine Grundlage für Optimierungsstrategien mit dem Ziel einer latenzarmen Implementierung darstellt. Das Ziel der Metadatenintegration wird mit dem Einbinden des Material Exchange Formats erreicht, das die synchronisierte Übertragung von Essenz- und Metadaten erlaubt. Die Arbeit identifiziert weiterhin Anwendungsszenarien, in denen Metadaten auch in echtzeitkritischen Live-Produktionen genutzt werden können. Eine prototypische Implementierung bildet abschließend die Grundlage zur Verifikation getroffener Aussagen

    Evaluation of the IEC 61850 Communication Solutions

    Get PDF
    Initially, when the IEC 61850 standard was prepared, it was intended to be used within the limits of a substation for information exchange between devices. In the course of time and due to the standard’s advantages, its concepts are nowadays used as well in other application areas of the power utility system. The IEC 61850 is based to the maximum extent on other existing communication standards (IEC/IEEE/ISO/OSI), offering among others: visualization of the real applications through the ASCI interface, standardized messages to be exchanged (GOOSE, SV), one configuration language regardless of the device (IED) type/brand, and mapping to already implemented computing protocols (MMS, TCP/IP, Ethernet). The features mentioned above lead to cost reduction, reliability, and interoperability, making the IEC61850 the dominant standard for intra- and inter-substation communication. The parts 90-1 and 90-5 of the IEC 61850 standard concern the application of the tunneling and routing method in order to extend the communication beyond the substation’s limits. Although they establish the theoretical background, it can be mentioned a lack of information regarding real applications. So, the objective of this thesis was at first to establish the communication link which will allow the communication of devices belonging to different LANs and second, the acquiring of the round trip times from the exchanged messages. The experiments were conducted by a combination of software (Hamachi) and embedded platform (BeagleBone) pinging to each other first via tunneling and next via 4G mobile network. The acquired round-trip times were used to evaluate and compare the tunneling and the 4G routing method, estimating in parallel what are the perspectives of these methods to be used for inter-substation communication.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format
    corecore