The Internet of Things (IoT) is one of the most important components for the 4.0 industrial revolution. In order to implement IoT within an organization or environment, it requires deep research to ...ensure that will works properly. Among today's problems of computing is the need for high power consumption and considerable space and equipment usage. Therefore, a small-sized technology and requires only low power to operate is necessary. A study has been conducted to study the implementation of Internet of Things within the UKM network environment known as UKMNet. In order to make this research more realistic, a test bed is developed using an Arduino Uno board as the IoT Hardware. Then a scenario is created by connecting this Arduino Uno board to four sensors to measure temperature, current and voltage. After that, the reading value will be sent to the Arduino Uno board to calculate the amount of power used in watts so that these values are stored to the database server. To test the performance of the connection between the Arduino board and the server, the iPerf software is use. The metrics on performance tests are data rates, jitter and loss of data packets. As a result of this study, we found that Arduino Uno is suitable for use as the IoT hardware for this scenario. Performance tests for Arduino board that are connected to UKMNet meet the requirements for the implementation of IoT where the data transmission rate is between 3.483 Mbps up to 3.563 Mbps. The jitter value for this connection is also lower than 1.80 milliseconds to 1.85 milliseconds while the packet loss rate recorded is 0% to 0.59% for 10 seconds of data transmission. In conclusion, IoT by using Arduino Uno as an IoT hardware is suitable to implement in the UKMNet environment.
Software-Defined Networks (SDNs) are increasingly gaining prominence in the networking domain, enabling programmable control and management of network infrastructure within data centers. This ...programmability offers the advantage of dynamically adjusting the routing paths depending upon on the network’s requirements and capabilities. Computer networks have been vulnerable to denial of service attacks, particularly link flooding attacks, which have gained notoriety for their ability to isolate network segments precisely without affecting the rest of the network and evading detection. In this work, we introduce a security framework designed to prevent and mitigate link flooding attacks in Software Defined Networks. Our approach involves limiting the network reconnaissance probes used by attackers to gather knowledge about network topology. We prevent the attackers from obtaining an accurate network topology, limiting their ability to launch an attack. Our framework utilizes alternate paths and hop count manipulation to hinder the reconnaissance process. To further strengthen our claims, we evaluate our framework on real world topologies from the Topology Zoo dataset. Our analysis demonstrates that the majority of real world topologies already exhibit network path diversity and along with TTL manipulation we can hinder the mapping process, causing the attacker to infer an incorrect network topology.
•Introducing a novel security framework for Software-Defined Networks (SDNs) to counter link flooding attacks.•Leveraging the programmability of SDNs for dynamic routing path adjustments based on network requirements and capabilities.•Implementing a strategy to limit attackers’ network reconnaissance probes, preventing accurate knowledge acquisition of network topology.•Utilizing alternate paths and manipulation of hop counts to impede the reconnaissance process and enhance network security.•Highlighting the impact of Time-to-Live (TTL) manipulation in causing attackers to infer an incorrect network topology, adding an extra layer of defense.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
Jaringan komputer adalah jaringan penghubung komputer yang akan memberikan akses pada aplikasi layanan. Video Streaming merupakan layanan yang dapat mengkonsumsi bandwidth besar sehingga menyebabkan ...layanan akses lainnya tidak mendapatkan bandwidth yang cukup. Selain itu jaringan LAN sangat rentan sekali akan dimasuki oleh malware yang membuat jaringan sering down dan tidak stabil.Oleh karena itu, diperlukan adanya pengamanan jaringan dan filtering layanan. Dengan memanfaatkan router mikrotik dengan filtering port firewall dapat meminimalisir terjadinya penyebaran malware dan mengurangi penggunaan bandwidth. Metode Penelitiann yang dilakukan dengan studi literatur, perancangan, impelentasi, analisa pengujian. Hasil pengujian performansi sebelum implementasi filtering port pada jaringan LAN menunujukkan nilai bandwidth 98,04 Mbits, Jitter 0,046 ms, dan Packet loss 0,3 ms. Sedangkan pengujian nilai QoS setelah penerapan filtering port menunjukkan hasil bandwidth 364 Mbits, Jitter 0,022, dan packet loss 0,047. Performansi lebih stabil dan menunjukkan kinerja yang baik pada implementasi filteirng port video streaming. Hasil pengujian kenaikan dan penurunan nilai performansi masih dalam standart rekomendasii ITU-T.
This article discusses whether iPerf can be used as an effective tool for wired and wireless LAN throughput estimation. The potential advantages of using iPerf in comparison to FTP are discussed. ...Finally, the article presents the throughput measurement results obtained with FTP, iPerf2 and iPerf3 in a simple experimental network.
Software-defined networking (SDN) has introduced flexibility and ease of management in the network. SDN offers centralized and fine-grained control over the web it has become an industry trend and is ...adopted in various areas of communication and networking. Controllers in SDN play a pivotal role, and their performance is key to the stability and scalability of the network. This study evaluates different SDN controllers i.e., NOX, POX and RYU. The performance of the controllers is analyzed based on Quality of Service (QoS) parameters, including Flow Setup Latency, Round Trip Time (RTT), Initial Ping Delay (IPD), Jitter, Throughput, and TCP & UDP Bandwidth. Different-sized networks are simulated, by varying the number of switches in linear and tree topologies and hosts in a single topology, using Mininet SDN simulator. Our results show that the performance of RYU is very consistent and shows small variation in the performance with increasing network size and traffic loads as compared to NOX and POX.
With assistance from Software Defined Networking (SDN), networks have become more creative to build and maintain over the last few years. The inflexibility of modern network architecture is ...presenting researchers with a tough achievement. SDN replaces existing inescapable and complicated networks with a creative way of separating the control plane from the data plane and fixing those constraints, namely configurations done manually, monitoring, protection, usability, and functionality. SDN controllers (e.g., POX, RYU, ONOS, OpenDaylight, Floodlight, etc.) have therefore developed as a core for the management of these networks. The performance evaluation of the SDN controller has an outstanding effect on improving the flexibilities and abilities of a network topology of SDN infrastructures. This research summarizes the SDN controller performance tests using criteria (e.g., Bandwidth, Round-Trip Time). This study employs a Mininet emulator to enforce an SDN architecture that comprises an RYU controller with a switching part, one OpenFlow switch, and multiple nodes. The goal is to determine performance QoS (Quality of Service) including Bandwidth, Throughput using the iperf test.
In the network computing domain, mobile ad hoc networks (MANETs) have gained prominence during the recent years. These networks have been used in almost all domains of today’s life; especially in ...military and emergency operations. However, these application areas demand higher performance. It has been observed that better performance can’t be achieved without improved network management and the detailed network performance awareness. In this direction, this research work investigates the behavior of mobile ad hoc network under two transport protocols i.e. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). The work analyzes various parameters such as bandwidth, throughput, jitter and out of order delivery etc. A test-bed has been established in university campus and the data transferred over the network is analyzed using iperf performance monitoring tool.
SDN has brought a high level of programmability in networking technologies and plays a vital role for the development of 5G and beyond 5G systems. As a major novel concept associated with SDN, ...network slicing enables the creation of virtual networks with distinct control and management functions based on common infrastructure, each meeting specific requirements that are dedicated to various categories of applications. So far, the realization of network slicing based on complex frameworks like management and orchestration has been a popular approach. In this paper, we investigate a lightweight alternative method for implementing network slicing that allocates logical parts of multiple physical resources with certain QoS properties without the need for hypervisor software. The approach herein is to create slices at the SDN forwarding equipment level and a single SDN controller can configure a shared physical network infrastructure into a number of network slices. Using this method, each slice may have different properties depending on the tenant requirements. In particular, a resource reservation framework and special Linux kernel tools are used for resource reservation and allocation. This solution offers several benefits for tenants and service providers thanks to the involvement of already available kernel mechanisms for resource allocation. In our implementation, several tools such as Iperf for traffic generation, Linux Cgroup and linear rate control, Ryu controller, and Mininet are included. Through experiments performed based on our implementation, we demonstrate that performance isolation has been achieved successfully for each slice.
Evaluación de soluciones de QoS para una Red de Área Local Felipe, Marely del Rosario Cruz; Ortega, Jenmer Maricela Pinargote; Zambrano, Dannyll Michellc Zambrano
RISTI : Revista Ibérica de Sistemas e Tecnologias de Informação,
05/2020
E29
Journal Article
Peer reviewed
Open access
This article shows the evaluation of different QoS mechanisms for a local area network. For network performance analysis, analyze the quality of service parameters: througtput, latency, packet loss ...and availability. Todo ello ha obligado a la incorporación de soluciones telemáticas que permitan evaluar y mejorar los servicios que prestarán dichas redes, surgiendo la denominada calidad de servicio (QoS - Quality of Service) para las redes. Resultados Este acápite consiste en realizar un análisis de la red, para lo cual se simuló la LAN de la FCI en el programa Opnet, considerando varios escenarios para representar su desempeño actual y posteriormente implementar dispositivos que permitan configuración de QoS, como las técnicas de encolamiento FIFO (First In First Out), PQ (Priority Queuing), CQ (Custom Queuing), WFQ (Weighted Fair Queuing), además también se empleará algoritmos de evasión de congestión RED (Random Early Detection) y WRED (Weighted Random Early Detection).
This article explores opportunities to mitigate the performance impact of IOMMU on high-speed network traffic, as used in the Linux kernel. We first characterize IOTLB behavior and its effects on ...recent Intel Xeon Scalable & AMD EPYC processors at 200 Gbps, by analyzing the impact of different factors contributing to IOTLB misses and causing throughput drop (up to 20% compared to the no-IOMMU case in our experiments). Secondly, we discuss and analyze possible mitigations, including proposals and evaluation of a practical hugepage-aware memory allocator for the network device drivers to employ hugepage IOTLB entries in the Linux kernel. Our evaluation shows that using hugepage-backed buffers can completely recover the throughput drop introduced by IOMMU. Moreover, we formulate a set of guidelines that enable network developers to tune their systems to avoid the "IOTLB wall",
., the point where excessive IOTLB misses cause throughput drop. Our takeaways signify the importance of having a call to arms to rethink Linux-based I/O management at higher data rates.