The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the case of network applications become more common and computer network security issues become more prominent, intercepting and analyzing network packets is important. However, network environment traffic is large. How to intercept and analyze network packet effectively is a crucial issue. This paper research the process of NDIS intermediate driver capture packets in the Windows platform and propose...
An architecture of WinPcap based virtual NIC driver is proposed for developing embedded network applications. It makes it possible to develop applications with real network traffic using simulation environment in PC rather than the embedded hardware, reduce development cycles while keeping the cost down. A test method with the tool of Iperf is proposed to test the throughput, packet loss rate for...
Various large-scale network applications demand different levels of stable bandwidth to perform bulk data movement, which is not adequately supported by current transport methods. We propose a novel end-to-end transport control protocol, (TCP_SDF), which achieves smooth data flow at a stable good put level. TCP_SDF dynamically adjusts the congestion window based on the estimate of the current sending...
Multi-task concurrent execution and resource sharing based on preemptive scheduling strategy may cause priority inversion phenomenon in real-time systems. Priority inversion phenomenon is the significant reason of unpredictable errors in real-time system, serious continuous priority inversion phenomenon will lead to real-time system collapse. The paper analyzes the phenomenon and the cause of the...
Cloud networking imposes new requirements in terms of connection resiliency and throughput among virtual machines, hypervisors and users. A promising direction is to exploit multipath communications, yet existing protocols have a so limited scope that performance improvements are often unreachable. Generally, multipathing adds signaling overhead and in certain conditions may in fact decrease throughput...
We describe a pilot project for the use of GPUs (Graphics Processing Units) in online triggering applications for high energy physics experiments. Two major trends can be identified in the development of trigger and DAQ systems for particle physics experiments: the massive use of general-purpose commodity systems for data acquisition, such as commercial multicore PC farms, and the reduction of trigger...
Firewall, as one kind of network security device, is widely used in all kinds of networks and personal computers. This paper focus on the package filter technology of firewall in kernel layer, an intensive study of Windows operating system architecture and NDIS intermediate driver operating principle also has been made. On this basis, an scheme of personal firewall system based on NDIS intermediate...
The TCP incast problem attracts a lot of attention due to its wide existence in cloud services and catastrophic performance degradation. Some effort has been made to solve it. However, the industry is still struggling with it, such as Facebook. Based on the investigation that the TCP incast problem is mainly caused by the TimeOuts (TOs) occurring at the boundary of the stripe units, this paper presents...
This paper introduces method for implementing NFS protocol for larger block/network packets transfer over to NAS [Network Attached Storage] from Highly Available clients. NAS storage scalability is habitually inadequate to the volume of the appliance. Addition of an appliance is reasonably easy, but access to the pooled contents as a mono entity is not. In this approach, NAS supports file sharing...
This paper outlines a new architecture for an automation system logically oriented to web technologies. Essential components of the architecture model are described. These include, in particular, the system kernel, automation services and device integration via virtual devices. An implementation variant as a demonstration example is revealed and initial test results are evaluated. The application...
Direct memory access is one of the techniques used in forensic analysis and rootkit detection. Unfortunately, it can also be misused in various attacks. E.g., the firewire attack enabled bypassing of Windows authorization by reading the user password stored in memory. Thus, for security reasons, firewire port is usually disabled in many computers. This motivates a search for a new ways of enabling...
In this paper, we take a new approach of thinking about programming Wireless Sensor Networks (WSNs) and introduce OSone, a distributed operating system (OS) for sensor transparency. Our philosophy is to make the network look like an ordinary computer, where each sensor of the network can be thought of one or multiple applications. Such a system allows software developers to abstract away from networking...
We investigate the feasibility of systematic speculative processing in the context of Optimistic Atomic Broadcast (OAB) based replication of database systems. Specifically, we present the design and prototypal implementation of a fully speculative version of the Postgre SQL open source relational database, together with experimental results showing performance advantages over non-speculative replication.
Mechanisms for fault-tolerance in MPSoCs are mandatory to cope with faults during fabrication or product lifetime. For instance, permanent faults on the interconnect network can stall or crash applications even though the network has alternative fault-free paths to a given destination. This PhD work presents a fault-tolerant communication protocol that takes advantage of the NoC routing method to...
The ratio between the number of cores and memory subsystems (i.e. banks and controllers) in many-core platforms is constantly increasing, leading to non-negligible latencies of memory operations. Thus, in order to study the worst-case execution time of an application, it is no longer sufficient to only take into account its computational requirements, but also have to be considered latencies related...
Network protocol developers typically go through a tedious and error-prone process of testing and debugging their protocol implementation for various settings. They perform a number of tasks manually such as configuration of numerous network settings, controlled reproduction of unexpected protocol behavior, and traffic capture and analysis. We present a Protocol Testing and Evaluation System (PTES)...
The normal file operations (read, write, and so on) do not make sense when applied to network interfaces, so it is not possible to apply the UNIX “everything is a file” approach to them. Thus, network interfaces exist in their own namespace and export a different set of operations. With the widely application of network in Linux platform, In this paper, the design of network device driver for RTL8139C...
Omitting resource-release operations in systems error handling code can lead to memory leaks, crashes, and deadlocks. Finding omission faults is challenging due to the difficulty of reproducing system errors, the diversity of system resources, and the lack of appropriate abstractions in the C language. To address these issues, numerous approaches have been proposed that globally scan a code base for...
The growing number of applications that use the Session Initiation Protocol (SIP) to manage media sessions over IP is placing increasing demands on the SIP proxy servers (SPS) that make up the core of the SIP network. In this work we investigate the performance of OpenSIPS, an open source SPS. We have collected a large set of experimental data to characterize the performance of the SPS under various...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.