18 research outputs found

    IXGAMES – Implementing Internet exchange point, exclusively for games

    Get PDF
    An ever-growing number of games is available on the market and more and more features are incorporated each day. The increase in the player base and game enhancements demand that games work on a network with reliable speed and efficient time response. This article proposes a high speed network infra-structure exclusive for games,. This network, called IXGAMES originated from experiments with shared routing through Internet Exchange Point (IXP). IXGAMES opens new business opportunities for operators/ Providers and game companies that, not only will provide financial return, but will also allow them to offer better quality service to their customersWorkshop de Arquitecturas, Redes y Sistemas Operativos (WARSO)Red de Universidades con Carreras en Informática (RedUNCI

    IXGAMES – Implementing Internet exchange point, exclusively for games

    Get PDF
    An ever-growing number of games is available on the market and more and more features are incorporated each day. The increase in the player base and game enhancements demand that games work on a network with reliable speed and efficient time response. This article proposes a high speed network infra-structure exclusive for games,. This network, called IXGAMES originated from experiments with shared routing through Internet Exchange Point (IXP). IXGAMES opens new business opportunities for operators/ Providers and game companies that, not only will provide financial return, but will also allow them to offer better quality service to their customersWorkshop de Arquitecturas, Redes y Sistemas Operativos (WARSO)Red de Universidades con Carreras en Informática (RedUNCI

    Infraestrutura escalável para análise do comportamento das botnets e a propagação por e-mail utilizando SMTP/ Scalable infrastructure for botnet behavior analysis and e-mail propagation using SMTP

    Get PDF
    Uma Botnet é uma rede formada por bots utilizando códigos maliciosos chamados malware, que compromete a segurança. Hoje em dia tem aumentado o número de pragas digitais como exemplo botnet, por isso a necessidade de estudos e análise do comportamento dessas redes de bots, a necessidade de infraestrutura escalável para análise se torna necessária, utilizando máquinas virtuais, serviços e bots em ambiente confinado sendo importante para verificar os tipos de ataque, comportamento dos bots, impacto na rede e estudar formas de conter os ataques e propagação das Botnets utilizando e-mail, protocolo SMTP e porta 25

    MODELING AND VALIDATING A SECURE INTERCONNECTION BETWEEN INDUSTRIAL CONTROL SYSTEM AND CORPORATE NETWORK USING COLORED PETRI NET

    Get PDF
    Industrial Control Systems (ICS) networks offer a high level of automation combined with high levels of control, quality and process improvement. Since network corporate users have to access the ICS environment, these networks have to be interconnected. However, this interconnection can introduce risks to the systems and manufacturing processes, which leads to the need to ensure the interconnection is done safely. The objective of this paper is to perform modeling and validation of a proposed secure interconnection between ICS and corporate networks using Colored Petri Networks (CPN). In addition to the best practices published in related works, this paper recommends some integrated features like the use of terminal server service, secure manual uplinks, and unidirectional security gateway to enhance environmental security. However, our main contribution is the validation process performed in a Colored Petri Network, which made it possible to execute queries in the state space resulting from the simulation - that works as a proof of concept. As a result, the paper presents a secure and validated model of interconnection between ICS and corporate networks, capable of being applied to any interconnection environment.As redes de sistemas de controle industrial (ICS) oferecem um alto nível de automação combinado com altos níveis de controle, qualidade e melhoria de processos. Como os usuários corporativos da rede precisam acessar o ambiente ICS, essas redes precisam ser interconectadas. No entanto, essa interconexão pode apresentar riscos aos sistemas e processos de fabricação, o que leva à necessidade de garantir que a interconexão seja feita com segurança. O objetivo deste artigo é realizar modelagem e validação de uma interconexão segura proposta entre o ICS e as redes corporativas usando as Redes de Petri Coloridas (CPN). Além das práticas recomendadas publicadas em trabalhos relacionados, esta pesquisa recomenda alguns recursos integrados, como o uso do serviço de servidor de terminal, uplinks manuais seguros e gateway de segurança unidirecional para aprimorar a segurança do ambiente computacional. Entretanto, nossa principal contribuição é o processo de validação realizado em uma Rede Petri Colorida, que possibilitou a execução de consultas no espaço de estados resultantes da simulação - que funciona como prova de conceito. Como resultado, o artigo apresenta um modelo seguro e validado de interconexão entre o ICS e as redes corporativas, capaz de ser aplicado a qualquer ambiente de interconexão

    A complete CMOS UWB timed-array transmitter with a 3D Vivaldi antenna array for electronic high-resolution beam spatial scanning

    Get PDF
    We present a new Ultra Wide Band (UWB) Timed-\ud Array Transmitter System with Beamforming capability for\ud high-resolution remote acquisition of vital signals. The system\ud consists of four identical channels, where each is formed of a\ud serial topology with three modules: programmable delay\ud circuit (PDC or τ), a novel UWB 5th Gaussian Derivative order\ud pulse generator circuit (PG), and a planar Vivaldi antenna.\ud The circuit was designed using 0.18μm CMOS standard\ud process and the planar antenna array was designed with filmconductor\ud on Rogers RO3206 substrate. Spice simulations\ud results showed the pulse generation with 104 mVpp amplitude\ud and 500 ps width. The power consumption is 543 μW, and\ud energy consumption 0.27 pJ per pulse using a 2V power\ud supply at a pulse repetition rate (PRR) of 100 MHz.\ud Electromagnetic simulations results, using CST Microwave\ud (MW) Studio 2011, showed the main lobe radiation with a\ud gain maximum of 13.2 dB, 35.5º x 36.7º angular width, and a\ud beam steering between 17º and -11º for azimuthal (θ) angles\ud and 17º and -18º for elevation (φ) angles at the center\ud frequency of 6 GH

    Performance Evaluation of the Barrier Synchronization Solutions on the AP1000

    No full text
    The aim of our research on AP1000 is to measure the overhead of some barrier algorithms and analyze how to take advantage of the AP100 architectural properties in order to obtain the best performance. We have measured the performance of various barrier algorithms on the AP1000. Our results were obtained by embedding barrier episodes inside a loop and averaging over a large number of operations. We have implemented five algorithms, two of which are centralized. Another one is a tree algorithm called U-mesh[1] that exploit the properties of the switching technologies found in machines like the AP1000. We also implemented the Dissemination barrier[2] and an algorithm with some characteristics of the U-mesh and Dissemination. The best performance was found in the last two algorithms. The barrier time was three times smaller than the barrier time of the MPI_Barrier collective routine implemented on AP1000[3]. 1 Introduction Barrier synchronization is a particular synchronization technique..

    Experiments on through-wall imaging using ultra wideband radar

    No full text
    Through-wall imaging (TWI) may provide vital information on interior environment in cases when physically entering such environment would pose danger to the person involved. The concept of ultra wideband radar (UWB radar) is an emerging technology, which offers high spatial resolution, as opposed to narrow band radars. Thus, TWI applications using UWB radar have become a growing field of research with several applications in the civil and defense areas such as rescue and surveillance. For this study, a prototype system of UWB radar to TWI has been built. Analyses and result to several kinds of experiments have been presented, that is, detection and visualization of metallic targets behind wooden board wall and concrete blocks wall. The results are encouraging and show the advantages of using UWB radar for TWI. (C) 2011 Wiley Periodicals, Inc. Microwave Opt Technol Lett, 54:339-344, 2012; View this article online at wileyonlinelibrary.com. DOI 10.1002/mop.26543PNPD/CAPESPNPDCAPE

    INTERNET OF THINGS IN EDUCATION: CASE STUDY AND PERSPECTIVES

    No full text
    With the presence of the Internet in people's lives there was a significant behavioral change. People communicate, work, relate and learn in a totally different way. Technological innovation ends up facilitating access to information through an increasing number of devices, as well as bringing with it an ever increasing demand by people with good educational background, able to generate skills and abilities of a professional with a more critical profile, flexible, dynamic and in continuous lifelong learning. The most diverse pedagogical models try to adapt to this diversity of information, devices and technologies known as Internet of Things (IoT) in order to establish new forms of knowledge and learning. This paper presents a learning experience that integrates the BYOD method into the IoT scenario. The results obtained evidenced a clear acceptance of IoT technology within the teaching process
    corecore