41 |
Desenvolvimento de uma arquitetura parametrizável para processamento da pilha TCP/IP em hardware / Development of a customizable architecture to TCP/IP stack processing in hardwareHamerski, Jean Carlo January 2008 (has links)
O aumento da popularidade da Internet e a criação de novos meios de transmissão estimulam um explosivo crescimento da taxa de transmissão de dados sobre a Internet. Assim, o processamento TCP/IP baseado em software torna-se um gargalo por não processar os pacotes na velocidade das linhas de transmissão, em especial os pacotes da camada de transporte. Conseqüentemente, surge a necessidade de implementação em hardware do processamento TCP/IP, o que traria vantagens como aceleração do processamento do fluxo de dados. Neste sentido, este trabalho apresenta a arquitetura do iNetCore, descrita em VHDL, para processamento dos protocolos das camadas de rede e transporte em hardware. Duas implementações desta arquitetura foram elaboradas, buscando explorar o espaço de projeto e analisar os resultados obtidos na síntese para a tecnologia ASIC e FPGA, e o desempenho no processamento de pacotes. Uma arquitetura HW/SW contendo o iNetCore foi prototipada sobre a placa Virtex- II Pro Development System. Em conjunto com essa arquitetura, foi implementada uma interface de comunicação com o barramento OPB, tornando possível a implementação de softwares da camada de aplicação que queiram usar a pilha TCP/IP desenvolvida em hardware. Por fim, foram efetuados experimentos para avaliar o desempenho da arquitetura HW/SW no processamento de segmentos TCP. A arquitetura HW/SW em conjunto com o iNetCore alcançou um throughput de até 1,45 Gbps, possibilitando o uso da arquitetura para processamento de pacotes TCP/IP na plenitude de banda disponíveis em redes gigabit. / The advent of new transmission lines stimulates an explosive increase of the Internet data-transmission rate. Thus, the TCP/IP processing based on software became a bottleneck, because it cannot reach the transmission line speed required, specially in the transmission of transport layer packets. This limitation brings the necessity of implementation of the TCP/IP processing in hardware, what it would bring advantages in the acceleration of data flow processing. In this way, this work presents the iNetCore architecture, described in VHDL, able to process the transport and network layers protocols in hardware. Two implementations of this architecture were implemented. The objective is to explore the design space and to analyze the results in ASIC and FPGA technology synthesis. Also, a simulation environment was built to analyze the performance in the packets computation. A HW/SW architecture containing the iNetcore was prototyped on Virtex-II Pro Development System board. In conjunction with this architecture, it was implemented a communication interface with OPB bus, which makes possible the development of application layer softwares that may use the hardware TCP/IP stack developed. Finally, experiments were realized in order to evaluate the HW/SW architecture performance in the TCP segments processing. The HW/SW architecture together with the iNetCore reached a throughput of about 1.45 Gbps in the TCP/IP packets processing. It proves its potential to use available bandwidth in gigabit networks.
|
42 |
Ensuring a Valid Source and Destination for Internet TrafficEhrenkranz, Toby, Ehrenkranz, Toby January 2012 (has links)
The Internet has become an indispensable resource for today's society. It is at the center of the today's business, entertainment, and social world. However, the core of our identities on the Internet, the IP addresses that are used to send and receive data throughout the Internet, are insecure. Attackers today are able to send data purporting to be from nearly any location (IP spoofing) and to reroute data destined for victims to the attackers themselves (IP prefix hijacking). Victims of these attacks may experience denial of service, misplaced blame, and theft of their traffic. These attacks are of the utmost importance since they affect the core layer of the Internet. Although the mechanisms of the attacks are different, they are essentially different sides of the same coin; spoofing attacks forge the identity of the sender, while hijacking attacks forge the identity of the receiver. They revolve around the same underlying lack of a secure identity on the Internet. This research reviews the existing state of the art IP spoofing and IP prefix hijacking research and proposes new defenses to close the missing gaps and provide a new level of security to our identities on the Internet.
This material is based upon work supported by the National Science Foundation under Grants No. CNS-0520326 and CNS-1118101. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
This dissertation includes both previously published/unpublished and co-authored material.
|
43 |
Aplicações VoIP Utilizando o Teleporto da Rede Metropolitana da Prefeitura Municipal de ManausGuilherme de Moraes Silva, João January 2004 (has links)
Made available in DSpace on 2014-06-12T17:42:15Z (GMT). No. of bitstreams: 1
license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5)
Previous issue date: 2004 / O fenômeno da ampla disseminação da Internet na última década do século XX trouxe a popularização da tecnologia de redes de computadores e de seu protocolo padrão o TCP/IP. A telefonia convencional é uma delas. Hoje os próprios troncos das companhias telefônicas, são na realidade, backbones de redes TCP/IP sobre ATM ou Frame Relay dedicados exclusivamente ao tráfego de voz, mantendo a qualidade dos serviços em face à uniformidade do tráfego. No tema de convergência para o transporte de diversos serviços de comunicações em uma só infra-estrutura de rede, a Voz sobre IP (VoIP) tem um capítulo à parte. Os conceitos, soluções, protocolos, etc da telefonia IP são aqui representados. A presente dissertação insere-se, por sua vez, no contexto de necessidade de redução de custos operacionais da Prefeitura Municipal de Manaus com telecomunicações, uma vez que já é gasto um valor fixo com a comunicação de dados em sua rede metropolitana
|
44 |
The Strategic Migration of Telephony into an Internet Protocol World : a South African PerspectiveAdams, Pieter 25 April 2005 (has links)
Internet Protocol Telephony (IPT), also known as Voice over Internet Protocol (VoIP), has evolved from a niche technology to one that is adopted fairly well in developed countries. The aim of this research report was to determine whether IPT will also be a success in the Republic of South Africa, which is one of many developing countries. The technology was analysed and it was found that cost reduction, increased productivity and enhanced applications were the most valuable benefits the technology could offer. Particular interesting impediments of the technology were discovered and it was found that there existed both hard issues like security and quality problems, as well as softer issues like internal politics, that could hinder the global success of the technology. The adoption rate of South Africa was compared to that of industrial countries and it was found that South African organisations overall posed a wait-and-see attitude towards IPT. Various implementation models were discussed and it was found that a hybrid approach would be the most viable option for local organisations. The South African environment were analysed and it was discovered that the biggest obstacle for success in South Africa was the regulatory environment. But it was also found that the environment would soon change and that competitors, including Black Economic Empowerment companies, should use the opportunities available. Social factors like HIV/AIDS and theft as well as economic factors like the exchange rate could hamper the competitiveness of local companies using IPT. IPT technology can only be a success in South Africa if it is intensely supported by Government, implemented in the correct manner and adopted aggressively by the local market. / Dissertation (MBA)--University of Pretoria, 2006. / Graduate School of Management / unrestricted
|
45 |
Architektura pro globální distribuovanou SIP síť s využitím IPv4 anycastu / An Architecture for Global Distributed SIP Network Using IPv4 AnycastAnděl, Ladislav January 2008 (has links)
Tato diplomová práce se zabývá metodami pro výběr nejbližší RTP proxy k VoIP klientům s použitím IP anycastu. RTP proxy servery jsou umístěny v síti Internetu a přeposílají RTP data pro VoIP klienty za síťovými překladači adres(NAT). Bez zeměpisně rozmístěných RTP proxy serverů a metod pro nalezení nejbližšího RTP proxy serveru by došlo ke zbytečnému poklesu kvality přenosu médialních dat a velkému zpoždení. Tento dokument navrhuje 4 metody a jejich porovnání s podrobnějšími rozbory metod s využitím DNS resolvování a přímo SIP protokolu. Tento dokument také obsahuje měření chování IP anycastu v porovnání mezi metrikami směrování a metrikami časovými. Nakonec dokumentu je také uvedena implemetace na SIP Express Router platformě.
|
46 |
Bezpečnostní systém s využitím mobilních sítí / Security system using mobile networksSvoboda, Adam January 2015 (has links)
This master´s thesis deals with design of security system, which transmits captured video using mobile systems. There are chosen representatives of cameras and motion sensors that could be used in the construction. The thesis also deals with the theoretical design of the transmission system, which consists of a camera, a motion sensor, an USB modem and a microprocessor, that manages all operations. There is also a proposed block diagram of a communication method. The security system is designed and tested in various conditions.
|
47 |
Návrh architektury sondy pro monitorování síťových toků / Design of Probe for Flow Based MonitoringSoľanka, Lukáš Unknown Date (has links)
This thesis deals with design and implementation of a flow based monitoring probe. The monitoring task performed by the probe is divided into hardware layer, which is capable of measurement at high packet rates, and software layer, which provides large memory for flow storage. Analysis done in the work shows that this concept offers many advantages when compared to software based flow monitoring applications. The probe is designed to be used with a hardware accelerator card and offers high flexibility and performance by a way of user defined monitoring process. The designed system has been implemented and thoroughly tested and is ready for deployment for tasks such as operational monitoring, network traffic classification, anomalies and attacks detection and many others.
|
48 |
Využití SIP serveru na FIT pro IP telefonii / Deployment of SIP Server at the FIT for IP TelephonyHýbner, Lukáš January 2008 (has links)
Master's Thesis is engaged on possibilities connect SIP server to telephone network on FIT. The main reason is that employees can call to university, when they are out of faculty. For resolution we will use SIP server Asterisk, which will be serving as authorization server for users. Next Asterisk will ensure transmission numbers to SIP address with ENUM. In the practical part we will verify the functionality.
|
49 |
A NOVEL SCHEME TO PROVIDE MULTICAST OVER MOBILE-IPGOSSAIN, HRISHIKESH 17 April 2003 (has links)
No description available.
|
50 |
Implementing iNET and the Operational Issues InvolvedHodack, David 10 1900 (has links)
ITC/USA 2008 Conference Proceedings / The Forty-Fourth Annual International Telemetering Conference and Technical Exhibition / October 27-30, 2008 / Town and Country Resort & Convention Center, San Diego, California / The iNET project was launched to foster network based instrumentation and telemetry. The program is currently implementing an operational demonstration. The operational demonstration will involve installing and using a network based instrumentation system on an H-60, helicopter. This demonstration will be used as a learning exercise for the implementation of network technologies. Specifically this paper will explore the operational challenges that are expected to be encountered while performing the installation and in the use of the network based instrumentation and telemetry system.
|
Page generated in 0.0197 seconds