The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the widespread availability of multi-homed devices, multipath transport protocols such as MPTCP are becoming increasingly relevant to support better use of multiple connectivity through capacity aggregation and seamless failover. However, capacity aggregation over heterogeneous paths, such as offered by cellular and Wi-Fi networks, is problematic. It causes packet reordering leading to head-of-line...
In today's Internet age, web-based applications are an extremely logical way to disseminate, update, and visualize information. Our modern wired infrastructure and high-speed wireless access points make it possible to access high-bandwidth demanding applications from nearly everywhere. However, in places where infrastructure does not exist, and where information needs to be disseminated over areas...
Nowadays, most Online Judge is based on Windows of J2EE, but in this article, introducing the distributed OJ base on Linux which runs the program in the child process and controls the child process by farther process calling function pstrace. The fact is that SOJ is more efficient and secure than others before.
CUBIC TCP is an enhancement over BIC (Binary Increase Congestion Control) with a cubic window growth function. It has been optimized for high bandwidth-delay product environments and has been the default TCP implementation in Linux since kernel-2.6.18. In this paper, we conduct an experimental evaluation of CUBIC TCP in a small buffer regime; i.e. buffers of the order of a few tens of packets. The...
During the last decades TCP and the networks it is used in steadily evolved. To aid further development it is crucial to give researchers measurement tools so they can evaluate and analyze their TCP modifications in real world network environments. In this paper we introduce the new measurement tool flowgrind. Unlike existing measurement tools, flowgrind's distributed architecture allows for an easy...
In this paper, we derive an analytical model for the estimation of the overhead introduced in a file transfer procedure by three different reliable protocols, namely TCP, SCTP, and Saratoga. The model estimates the introduced overhead down to the IP layer, taking into account uncorrelated packet loss on the channel. The model distinguishes between the overhead on the forward link (server to client),...
As a current main end-to-end communication protocol there are a few vulnerabilities in TCP specification. The paper discusses the theory and vulnerability of TCP persist timer and analyzes the implementation of it in Linux. The vulnerability can lead to the infamous DOS attack. In the end of the paper we give two solutions to defense this type of DOS attack through modifying Linux kernel codes or...
With the fast growth of Internet, IPv4 address exhaustion is an imminent problem. IPv6 is proposed to resolve this issue. It is identified that the deployment of IPv6 will be progressive. This leads to the coexistence of IPv4 and IPv6 networks during the transition time. It is important to study how to enable communication between IPv4 only hosts and IPv6 only hosts. In this paper, we propose a new...
With the advent of multi- and many-core architectures, new opportunities in fault-tolerant computing have become available. In this paper we propose a novel process replication method that provides transparent failover of non-deterministic TCP services by utilizing spare CPU cores. Our method does not require any changes to the TCP protocol, does not require any changes to the client software, and...
This paper presents the performance evaluation between IPv4 and IPv6 with Linux MPLS tunnel. MPLS Linux tunneling is used to transport IPv6 data stream over IPv4 network for interoperable IPv4 and IPv6 deployment. The performance metrics such as jitter, datagram/packet loss and bandwidth were measured in both TCP and UPD traffic flow. The experiment test-bed was constructed using virtual machine tool...
IPv4 addresses are expected to globally run out by the end of 2012, but some sites are already facing address exhaustion today. With IPv6 in sight or already deployed, adding network address translation as a third addressing scheme can be avoided by introducing IPv6-only nodes. This paper gives a survey how to operate IPv6-only Unix and Windows workstations in IPv6-enabled corporate and academic networks,...
SCTP (Stream Control Transport Protocol) is a latest transport protocol, which is mainly used to transport PSTN coder over IP network. Transport performance of SCTP, TCP and UDP will be compared in generic network. These findings suggest that transport performance of SCTP is greatly inferior to one of TCP and UDP. Relationship between number of SCTP stream and transport performance of SCTP are discussed...
Different operating systems have different network share techniques or protocols. Centralizing files and printers not only simplifies administration, it helps maintain consistency of shared resources. To realize resources sharing between different network flats, we analyzed concerned protocol, such as TCP/IP protocol, SMB protocol, IPX/SPX protocol, NFS protocol and FTP protocol. We also confirmed...
Teredo is a service that enables nodes located behind one or more IPv4 Network Address Translations (NATs) to obtain IPv6 connectivity by tunneling packets over IPv4 UDP. Although Teredo is a useful protocol, it also has some weaknesses. It can not work with symmetric NAT, and it raises some security concerns, such as bypassing security controls, reducing defense in depth, and allowing unsolicited...
Utilizing multiple paths between network hosts (such as robots or sensors) will improve network performance, path availability and connection reliability. This paper presents a cross layer multiple path approach named proxy server based multipath connection. Multiple paths are set up via a set of intermediate proxy servers using IP tunneling. Packet distribution and reassembly are achieved by inserting...
The mechanism brought by NAT deserves our attention in IPv6. NAT66, IPv6-to-IPv6 network address translation, provides a new mapping mechanism to design a NAT in IPv6 and aims to avoid as many of the issues associated with NAT as possible. This paper introduces the design and implementation of NAT66 and also discusses the multi-homing solutions in NAT66 environment. As the solutions of HIP and RFC...
In this paper we evaluate the performances of recently proposed sender-side TCP enhancements designed to alleviate TCPpsilas deficiencies over wired-to-wireless paths. Our goal is to compare the performances of the legacy TCP RENO, CUBIC, HYBLA, VENO, and WESTWOOD+, which are available to researchers via pluggable congestion control algorithms in the recent Linux v2.6 kernels. We conducted experiments...
Today network intrusion detection and intrusion prevention system (NIDS/IPS) are considered as one of the hottest topics in computer security. On the other side firewalls have optimized several times and different types have been introduced. Today by integrating NIDS and firewall a new product comes to the market, which is called IPS. IPSs protect information systems from unauthorized access, damage...
Combining end-host, server and router virtualization could offer isolated and malleable virtual networks of different types, owners and protocols, all sharing one physical infrastructure. However, the virtualization of data plane may lead to performance degradation and indeterminism. These arise not only due to additional processing, but also from the sharing of physical resources like memory, CPU...
In our earlier work, the authors proposed WLAN Manager (or WM) a centralised controller for QoS management of infrastructure WLANs based on the IEEE 802.11 DCF standards. The WM approach is based on queueing and scheduling packets in a device that sits between all traffic flowing between the APs and the wireline LAN, requires no changes to the AP or the STAs, and can be viewed as implementing a ldquoSplit-MACrdquo...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.