Stateless security filtering of optical data signals: an approach based on code words

Size: px
Start display at page:

Download "Stateless security filtering of optical data signals: an approach based on code words"

Transcription

1 Stateless security filtering of optical data signals: an approach based on code words Maha Sliti, Noureddine Boudriga Communication Networks and Security Research Lab. University of Carthage, Tunisia Abstract In this paper, we propose an optical stateless filtering architecture which allows the traffic filtering at the optical layer. Indeed, each traffic stream will be identified by a unique identifier composed of a set of code words. In the core node, a set of optical filtering rules will be applied to this traffic stream based on its corresponding identifier in order to accept or reject the traffic stream. The stateless filtering process is based on the logical comparison between the received traffic identifier and the optical filtering signal which are composed of a set of code words. The proposed architecture is composed by two main components. The first component is an encoder implemented in the edge node, which generates traffic stream identifiers. And, the second component is the optical stateless filtering module which is implemented in the core node. Index Terms all-optical network, optical stateless filtering, code words, optical traffic identifier, optical logic gates, SOA. I. INTRODUCTION The amount of research being done in the area of optical communications has dramatically increased over the last years. A large proportion of the telecommunications functionalities including switching, flow control, and buffering are nowadays possible to be performed on the optical layer. As a consequence, many applications and services rely on the large bandwidth and high Quality of Service (QoS) provided by optical infrastructures. Due to the sensitivity of the aforementioned applications, more security requirements for optical networks are necessary. Indeed, some optical networks features can be used by an attacker to analyze traffic, eavesdrop, deny service, etc. Several approaches have been proposed in the literature to address the protection of optical networks [1], [2] and [3]. In [4], [5], authors propose filtering functionalities in optical networks. In [4], a filtering approach was developed in the frame of the WISDOM (WIrespeed Security Domains using Optical Monitoring) project which considers algorithms directly at high-speed optical data communication rates. One major drawback of these methods is that they do not take into consideration the specific features of optical networks. They just translate traditional security mechanisms to optical architectures. In [5], the authors propose an optical firewall architecture which filters a new category of attacks against optical networks that aims at exhausting the capabilities of the core nodes. This approach is limited to filtering attacks based on the BHP packets and allows only the BHP DOS attack filtering. In this paper, we propose an all optical stateless filtering architecture which allows the traffic filtering at the optical layer. Indeed, each traffic stream will be identified by a unique identifier composed of a set of code words. In the core node, a set of optical filtering rules will be applied to this traffic stream based on its corresponding identifier in order to accept or reject the traffic stream. The stateless filtering process is based on the logical comparison between the received traffic identifier and the optical filtering signal which are composed of a set of code words. This work improves the idea presented by the authors in [6] which presents a stateless optical filtering approach based on optical code words and considers an electronic security policy. The key contributions with respect to the previously published research are: 1) To the best of our knowledge, our work includes the first study of the stateless filtering process at the optical layer based on optical filtering rules and code words. This allows the filtering process, based on traffic identifiers, to be performed at very high bit rates. 2) The design of the optical stateless filtering architecture is based on optical logic gates AND/XOR which allows greater flexibility and variety in optical filtering rules. 3) Different types of optical filtering rules are considered according to the type of protocols. By optimizing the number of optical filtering rules applied to each traffic stream, the filtering process is more optimized in terms of filtering delay and quality of the transmitted signal. 4) The filtering architecture is built upon components available by current technology. Therefore, the architecture is effectively implementable. The rest of the paper is organized as follows. Section 2 presents the all-optical signal processing. Section 3 describes the mapping between packets and filtering rules. The design of all optical filtering operations is presented in Section 4. The proposed optical stateless firewall architecture is described in Section 5. Simulations and experimental results are given in Section 6. Finally, Section 7 concludes the paper. II. ALL-OPTICAL SIGNAL PROCESSING For optical signal processing and ultra-high-speed telecommunication, all-optical logic operations are required in order to avoid the electronic-optical conversion. All-optical logic gates are indispensable to critical networking functions, such as pattern matching, all-optical switching, signal regeneration, header recognition, pseudorandom number generation, and parity checking. All optical logic gates can be realized 118

2 by nonlinear optical signal materials that enable different light beams to interact. In the literature, many approaches have been proposed to achieve all-optical logic operations, based on the nonlinear effects either in optical fiber or in semiconductor optical amplifier (SOA) [7]. Compared with optical fiber based logic gates, SOAs based logic gates are promising because of their power efficiency and their potential for photonic integration. SOA is characterized by several nonlinearity effects, such as four wave mixing (FWM), crossphase modulation (XPM), and cross-gain modulation (XGM). In order to implement the all optical logic gates, AND and XOR, used to implement the proposed all optical filtering operations, we consider the XGM effect in the SOA. The cross modulation gain (XGM) consists on the gain modulation induced by a control signal that affects the gain of the signal propagating simultaneously in the SOA. A. Basic all-optical signal processing operations In this section, we present some basic operations of alloptical signal processing which are: 1) the all optical matching operation Matchop (S in,r) verifies the matching between two fields in the input optical signals. 2) the all optical greater operation Supop (S in,r) verifies whether a field in the first optical signal is greater than a field in the second optical signal. B. Design of all-optical signal processing operations In this section, we present the design of the proposed all optical filtering operations which is based on the use of all optical logic gates (AND, XOR). 1) Design of all optical logic gates and/xor: a) All optical logic gate AND: The all-optical AND gate structure is designed using two SOAs by considering crossgain modulation (XGM), as illustrated in Figure 1 [8]. With proper manipulation of pump and probe signals, the truth table is verified. Figure 2. Optical XOR gate design. the signal R. The all optical operations Matchop(S in,r) and Supop(S in,r) are achieved by an all-optical N-bit comparator based on SOAs exploiting XGM between two counterpropagating signals [10]. The N-bit all-optical comparator allows the comparison of two signals A and B by computing the functions A > B and A = B. The functiona = B performs the all optical matching operation Matchop(S in,r) and the function A > B performs the all optical greater operation Supop(S in,r). The all optical N-bit comparator [10], illustrated in Figure 3, compares two N-bit signals A and B. The comparison is performed sequentially starting from the Most Significant Bit (MSB). At the output of the XOR gate, a Serial to Parallel Conversion (SPC) is performed. The AND (AND1) is performed between the i th bit of the XOR output and the preceding inverted (i 1) bits. The AND1 output is a sequence of N bits that represents the function A = B. At the AND1 output, whether the input signals A and B match, the N bits are 0. Infact, the XOR output is 0 for each compared bit. Otherwise, the AND1 will be equal to 1 when the first mismatch is found. The AND (AND2), between the AND1 output and the input signal A, performs the function A > B. When the input signals A and B match, AND1 output is 0, consequently A > B is 0. When the first mismatch occurs, AND1 output becomes 1. If the corresponding bit of A is 1, thus A > B is 1. Otherwise, A > B is 0. In the same manner, AND (AND3), between the AND1 output and B, represents the function A < B. Figure 1. Optical AND gate design. b) All optical logic gate XOR: Figure 2 presents the design of the all-optical XOR gate by using cross-gain modulation (XGM). The design [9] does not require additional input beam such as a clock signal or continuous wave light, which is required in other all-optical XOR gates. The alloptical XOR gate structure is designed using two SOAs. With proper manipulation of pump and probe signals, the truth table is verified. 2) Design of all optical operations: The all optical operation Matchop(S in,r) verifies that a field in a signal S in (the received signal) matches a field in a signal R in the optical domain. And, the all optical operation Supop(S in,r) verifies whether a field in the signal S in is greater than a field in Figure 3. Optical comparator design. III. ALL OPTICAL STATELESS FIREWALL ARCHITECTURE The proposed optical stateless filtering architecture, illustrated in Figure 4, allows the data signal filtering at the optical layer. In the edge node, each traffic stream will be identified 119

3 by a unique identifier composed of a set of code words which are a sequence of optical pulses. At the reception of a traffic stream at the core node, a set of optical filtering rules is applied to its corresponding identifier, in order to accept or reject the traffic stream. The proposed architecture is mainly composed by two components. The first component is the traffic identifier generation module which is implemented in the edge node and ensures the mapping between traffic streams and optical code words. And, the second component is the optical stateless filtering module which is implemented in the core node and based on the mapping between optical filtering rules and optical code words. At the reception of the traffic stream composed by the payload, the traffic identifier and the label, these fields are extracted and processed as follows: the payload is stored in an optical virtual memory (VOM) during the filtering delay, based on the label, the traffic identifier will be switched to the corresponding filtering sub-module by using an Optical Switch Gate (OSG). The proposed stateless filtering module implements optical filtering rules based on all optical filtering operations achieved by all optical logic gates AND/XOR. The stateless filtering module is composed of a set of optical filtering rules. Each optical filtering rule is based on one or several optical filtering operations. The payload will be sent to the next node only if it verifies at least a filtering rule. Indeed, we consider a "default deny" optical filtering policy known as where the filtering rules specify only traffics which are authorized to be forwarded by the optical filter. Traffic streams which do not match any configured rule will be denied by default. The stateless filtering module is subdivided to a set of submodules allowing the filtering of different types of protocols depending on the received Label. IV. MAPPING PACKETS AND FILTERING RULES In this section, we explain the traffic identifier generation in the edge node which insures the mapping between traffic streams and optical code words and the mapping between filtering rules and code words in the firewall core node. Indeed, each traffic stream will be identified by a unique identifier composed of a set of code words. In the core node, packets can be accepted or rejected based on their traffic identifiers. In order to perform the proposed filtering process, it is necessary to define a first mapping between traffic streams and traffic identifiers and a second mapping between optical filtering rules and code words. A. Traffic identifier generation A received traffic data <P>, in the edge node, contains a set of fields < F 1,F 2,...,F n > which uniquely identifies the traffic (Source IP address, source port, destination IP address, destination port, type of transport protocol, flag, etc). Therefore, the Traffic Identifier is generated for each traffic data <P> based on the fields < F 1,F 2,...,F n > by proceeding as follows: For each field < F i > formed by a sequence of s bits, a set of 2 s code words are generated and ordered starting from the smallest to the largest code word value. Therefore, if d 1 and d 2 are two different values of the field < F i > with d 1 < d 2, cd 1 and cd 2 are two code words with cd 1 < cd 2, then cd 1 is mapped to d 1 and cd 2 is mapped to d 2. The traffic identifier will be composed by a sequence of code words < cd 1,cd 2,...,cd n > representing the set of fields < F 1,F 2,...,F n > in a predefined order. The code words order in the Traffic Identifier is important and must be respected by the traffic generator module since the same order will be considered by the filtering module in the core node. Therefore, the optical filtering rules consider this order to verify whether a traffic stream matches a rule or not. The generated traffic identifier < cd 1,cd 2,...,cd n > is associated to the beginning of each traffic data <P>: <P><trafficidentifier>. The skilled reader will understand that the traffic identifier will be treated in the optical layer since it is not associated to the Header which requires the conversion of the optical signal into an electronic signal as an intermediate step. This allows the filtering process, based on traffic identifiers, to be performed at very high bit rates. Figure 4. All optical stateless firewall architecture. B. Mapping filtering rules and code words The all optical filtering process insures the access control security service of the traffic streams at the optical layer. The access control service consists in discriminating the traffic streams to be forwarded by the firewall core node according to an all optical security policy. The all optical security policy is formed by a set of filtering rules represented by optical signals generated by the filtering module depending on the protocol to be filtered. 120

4 The proposed all optical filtering process, performed in the firewall core node, is based on the mapping between filtering rules and code words. In this objective, each filtering rule is traduced to one or several optical filtering operations. In the following, we present the main types of all optical filtering rules which traduce the main electronic filtering rules to the optical domain: 1) All optical filtering of a unique field value: We consider the following filtering rule: If field = a then drop. In order to obtain an all optical filtering policy and to perform an all optical filtering process, an optical signal R, containing the code word corresponding to the field value a, is generated based on the same ordered set of code words considered for the traffic identifier generation. In order to verify that a received traffic data matches or not this rule, we define an all optical filtering operation noted Match op (S in,r) which have as inputs : S in (the traffic identifier) and R (the optical generated signal). Therefore, the rule in electronic domain is traduced to the optical layer as follows: if Match op (S in,r) then drop. 2) All optical filtering of interval of values: We consider the following filtering rule: If field > a then drop. The generated optical signal R is composed of the code word corresponding to the field value a. In order to verify that a received traffic data matches or not this rule, we define an all optical filtering operation noted Sup op (S in,r) which have as inputs : S in and R. Therefore, the rule is traduced to the optical domain as follows: if Sup op (S in,r) then drop. 3) All optical filtering of intervals of values: We consider the following filtering rule: If field G then drop with G = [a 1,a 2 ] [a 3,a 4 ]... [a n 1,a n ]. In this case, n optical signals will be generated and each optical signal contains the code word cd i (with 1 < i < n) corresponding to a field value in the range < a 1,a 2,a 3,a 4,...,a n 1,a n >. Therefore, the rule is traduced to the optical domain as follows: if Or ((Sup op (S in,r cd1 ) and Sup op (S in,r cd2 )), (Sup op (S in,r cdn 1 ) and Sup op (S in,r cdn )) ) then drop. V. DESIGN OF ALL OPTICAL FILTERING OPERATIONS The presented all optical filtering rules allowing to perform traffic stream filtering in the optical domain, are based on the presented all optical signal processing operations: All optical matching operation Match op (S in,r) which verifies that a code word in the signal S in matches a code word in the signal R, All optical comparison operation Sup op (S in,r) which verifies that a code word in the signal Sin is greater than a code word in the signal R. With S in and R are two optical signals such as S in corresponds to the received traffic identifier and R is the generated optical signal based on the considered filtering policy. The presented all optical signal processing operations perform the main types of all optical filtering operations: filtering of a unique field value, filtering of an interval of values, filtering of intervals of values. In this section, we present the design of the proposed all optical filtering operations. The traffic identifier signal, extracted from the received payload, is composed of a sequence of code words corresponding to field values. The order of these code words is indispensable since the optical signal R contains the code words to be verified by a filtering rule, by considering the same order of code words. If the generated signal R verifies the code word cd 1 for example and does not verify other code words in the traffic identifier, its structure will be as follows: cd 1, padding 2,...,padding n, where padding i is a sequence of pulses that allows the traffic identifier and the signal R to have the same length. Figure 5 illustrates the all optical filtering process based on the filtering operations Match op (S in,r) and Sup op (S in,r) performed by the N-bit comparator. Therefore, the extracted traffic identifier S in and the rule signal R are compared by the presented all-optical N-bit comparator. Then, the result of the comparison will be passed to a set of optical delay lines (ODLs) in order to delay pulses having as indexes i <= length cd1 to the L+1 index with length cd1 is the length of the cd 1 and L is the length of the signal R. At the output of the set of optical delay lines, a threshold detector detects a pulse in the L + 1 index of the output signal in the case of non matching of the optical signals S in and R. In the contrary case, the threshold detector does not detect a pulse. Figure 5. Optical filtering operation design. VI. SIMULATIONS AND EXPERIMENTAL RESULTS In this section, we evaluate the performance of the proposed stateless filtering approach based on code words. As simulation environment, we have considered Matlab For simulation purpose, we consider: a network connected in an arbitrary topology, each link has a fixed number of wavelengths and link loads are mutually independent. In order to analyze the security efficiency of the proposed filtering approach, as described by Figure 6, we compute the true positive rate in function of the false positive rate. We consider the following parameters: the erroneous load probability, the legitime load probability, the firewall node density in the network (the firewall node number in the network relatively to the total core node number in the network), the number of filtering rules for each firewall node and the filtering delay for each filtering rule. The true positive rate measures the proportion of erroneous packets which are correctly filtered by the firewall node. The false positive rate measures the proportion of legitime packets which are filtered by the firewall node. We consider the Receiver Operating Characteristic (ROC) curve as a tool to assess the performance of the optical layer 121

5 Figure 6. True positive rate in function of false positive rate. Figure 7. Filtering delay in function of firewall node density. filtering mechanism. Indeed, this curve is the plot of the true positive rate in function of the false positive rate. The closer the ROC plot is to the upper left corner, the higher the overall accuracy of the test. The area under the ROC curve (AUC) is a scalar measure. If the AUC is equal to 1, it reflects perfect forecasts. As illustrated in Figure 6, we notice that the true positive rate increases in function of the firewall node density in the network. Thus, the detection of erroneous and legitimate traffic streams can be assured only by nodes that implement the filtering module. The AUC in the case of the highest firewall node density value is greater than the AUC in the case of the lowest firewall node density. Therefore, the variation of the firewall node density in the network have a critical effect on the global performance of the firewall nodes. Furthermore, we analyze the effect of the proposed filtering approach on the global network performances and we fix the following parameters: the firewall node density, the number of filtering rules for each firewall node, the filtering delay for each filtering rule, the delay of one turn of the optical signal in the Virtual Optical Memory (VOM, [11]) and the degradation of the optical signal resulting of one turn in the VOM. The following parameters are assessed: the global delay spent by the traffic data in firewall nodes in function of the firewall node density in the network as illustrated in Figure 7. the global optical signal quality degradation which results from the traffic data delay in the VOM during the filtering process. This degradation depends on the firewall node density in the network as illustrated in Figure 8. In Figure 7, we notice that the global filtering delay increases in function of the firewall node density. Indeed, the traffic data is delayed in the VOM during the filtering delay in each firewall node which increases the global delay in the network. The accumulated delay in the VOM implies the Figure 8. Optical signal degradation in function of firewall node density. degradation of the optical signal quality depending on the number of turns in the VOM. Therefore, the turn number cannot exceed a maximum number of times n to preserve from unacceptable degradation of SNR. The envelope of the signal can experience severe changes with loss of information due to the effect of attenuation and dispersion. The threshold n is evaluated to 120 turns when the standard components are considered [11]. In Figure 8, we notice that the global degradation increases in function of the firewall node density in the network. And, finally, the following parameters are considered: the number of filtering rules for each firewall node, the number of code words filtered by each rule, the delay of one code word filtering and the delay of one turn of the optical signal in the VOM, in order to evaluate the firewall node performance 122

6 by assessing the effect of filtered code word number on the optical signal degradation during the filtering process. Figure 9. Optical signal degradation in function of filtered code word number. In Figure 9, we notice that the optical signal degradation depends on the maximum number of filtered code words by a rule. Indeed, the total delay required to filter several code words implies to delay the traffic data in the VOM which results on the degradation of the optical signal quality depending on the number of turns of the signal in the VOM. Therefore, the number of filtered code words cannot exceed a maximum value because of unacceptable degradation of SNR. The equation 1, established in [11], gives the logarithmic Q factor expression after i turns in the loop, which is deduced from the SNR i, and where B 0 is the optical bandwidth of the photodetector and B c is the electrical bandwidth of the receiver filter. The equation 2, established in [11], gives the SNR expression after i turns in the loop, where P in is the input signal power, SNR SSB is the SSB signal to noise ratio, η SP is the ratio of electrons in higher and lower states, h is the Plank s constant, f is the bandwidth that measures the noise figure and G EDFA is the EDFA gain. B 0 Q i (db) = 20log( SNR i ) (1) B c SNR i = P insnr SSB C i (2) where C i = iη SP hsnr SSB f(g EDFA 1)(2λ 0 λ(i+ 1))+iP in. This limit can be improved by extracting the different code words to be checked by a filtering rule, then check them in parallel instead of serial verification. This solution presents a constraint when extracting the code words from the traffic identifier however it can increase the number of filtered code words by decreasing the signal degradation caused by the number of turns in the VOM. VII. CONCLUSIONS AND PROSPECTS In this work, we have proposed an optical stateless filtering architecture which allows the traffic filtering at the optical layer. Each traffic stream is identified by a unique identifier composed of a set of code words. In the core node, a set of optical filtering rules will be applied to this traffic stream based on its corresponding identifier in order to accept or reject the traffic stream. Our work includes the first study of the stateless filtering process at the optical layer based on optical filtering rules and code words which allows the filtering process to be performed at very high bit rates. Furthermore, the design of the optical stateless filtering architecture is based on optical logic gates AND/XOR which allows greater flexibility and variety in optical filtering rules. The proposed filtering architecture is built upon SOAs in order to implement the all optical logic gates. Therefore, the architecture is effectively implementable. In future works, the proposed stateless filtering architecture will be extended to a stateful filtering architecture based on code words in order to allow the filtering of connection-oriented protocols in addition to non connectionoriented protocols. REFERENCES [1] T. Wu and A. Somani, "Cross-talk attack monitoring and localization in all-optical networks," IEEE/ACM Trans. Networking, vol. 13, no. 6, pp , Dec [2] C. Mas, I. Tomkos, and O. Tonguz, "Failure location algorithm for transparent optical networks," IEEE J. Select. Areas Commun., vol. 23, no. 8, pp , Aug [3] M. Sivakumar, R. K. Shenai, and K. Sivalingam, "A survey of survivabilty techniques for optical WDM networks," in Emerging Optical Network Technologies: Architectures, Protocols and Performance, A. Sivalingam and S. Subramaniam, Eds. New York, USA: Springer Science+Media, Inc., 2005, ch. 3, pp [4] R.J. Manning, R. Giller, X. Yang, R.P. Webb, D. Cotter, "Faster Switching with Semiconductor Optical Amplifiers," Proceedings of the International Conference on Photonics in Switching, pp , Aug [5] M. Sliti, M. Hamdi, N. Boudriga, "A novel optical firewall architecture for burst switched networks," International Conference on Transparent Optical Networks, Munich, Germany, [6] N. Boudriga, M. Sliti, W. Abdallah, "Optical code-based filtering architecture for providing access control to all-optical networks (Invited)," International Conference on Transparent Optical Networks, Coventry, England, [7] A. Rostami, H. Baghban, R. Maram, "Nanostructure Semiconductor Optical Amplifiers: Building Blocks for All-Optical Processing (Engineering Materials)," Springer, ISBN , [8] Kim, S.H. Kim, J.H. Son, C.W. Kim, G. Byun, Y.T. Jhon, Y.M. Lee, S. Woo, D.H., "Implementation of All-Optical Logic and Using Xgm Based on Semiconductor Optical Amplifiers," Optical Internet and Next Generation Network, COIN-NGNCON 2006, 9-13 July [9] V. K. Srivastava and V. Priye, "All optical half adder design using equations governing XGM and FWM effect in semiconductor optical amplifier," Int. J. Appl. Eng. Res. 1(3), (2010). [10] M. Scaffardi, P. Ghelfi, E. Lazzeri, L. Poti, A. Bogoni, "Photonic processing for digital comparison and full addition based on semiconductor optical amplifiers," IEEE J. of Select. Topics in Quantum Electron, 14, 3, 1-8, May/June, [11] S. Batti,. M. Zghal, N. Boudriga, "A New All-Optical Switching Node Including Virtual Memory and Synchronizer," JNW 5(2): (2010). 123

Optical Multicast Protocol for LEO Satellite Networks

Optical Multicast Protocol for LEO Satellite Networks Optical Multicast Protocol for LEO Satellite Networks Maha Sliti, Walid Abdallah, Noureddine Boudriga Communication Networks and Security Research Lab, University of Carthage Ariana, Tunisia e-mail: maha.sliti@supcom.tn,

More information

A Novel Optical Firewall Architecture for Burst Switched Networks

A Novel Optical Firewall Architecture for Burst Switched Networks A Novel Optical Firewall Architecture for Burst Switched Networks Maha Sliti, Mohamed Hamdi, Noureddine Boudriga Communication Networks and Security Research Lab. University of Carthage, Tunisia ABSTRACT

More information

Suppression of Four Wave Mixing in 8 Channel DWDM System Using Hybrid Modulation Technique

Suppression of Four Wave Mixing in 8 Channel DWDM System Using Hybrid Modulation Technique International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 2 (2014), pp. 97-108 International Research Publication House http://www.irphouse.com Suppression of Four

More information

Optical Network Traffic Control Algorithm under Variable Loop Delay: A Simulation Approach

Optical Network Traffic Control Algorithm under Variable Loop Delay: A Simulation Approach Int. J. Communications, Network and System Sciences, 2009, 7, 652-656 doi:10.4236/icns.2009.27074 Published Online October 2009 (http://www.scirp.org/ournal/icns/). Optical Network Traffic Control Algorithm

More information

Multiple Layer Traffic Engineering in NTT Network Service

Multiple Layer Traffic Engineering in NTT Network Service Multi-layer traffic engineering in photonic-gmpls-router networks Naoaki Yamanaka, Masaru Katayama, Kohei Shiomoto, Eiji Oki and Nobuaki Matsuura * NTT Network Innovation Laboratories * NTT Network Service

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

A Quality of Service Scheduling Technique for Optical LANs

A Quality of Service Scheduling Technique for Optical LANs A Quality of Service Scheduling Technique for Optical LANs Panagiotis G. Sarigiannidis, Member, IEEE, Sophia G. Petridou, Member, IEEE, Georgios I. Papadimitriou, Senior Member, IEEE Department of Informatics

More information

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: suvarna_jadhav@rediffmail.com

More information

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

Modeling and Performance Analysis of DWDM Based 100 Gbps Low Power Inter-satellite Optical Wireless Communication (LP-IsOWC) System

Modeling and Performance Analysis of DWDM Based 100 Gbps Low Power Inter-satellite Optical Wireless Communication (LP-IsOWC) System ISSN(Print): 2377-0538 ISSN(Online): 2377-0546 DOI: 10.15764/STSP.2015.01001 Volume 2, Number 1, January 2015 SOP TRANSACTIONS ON SIGNAL PROCESSING Modeling and Performance Analysis of DWDM Based 100 Gbps

More information

Four Wave Mixing in Closely Spaced DWDM Optical Channels

Four Wave Mixing in Closely Spaced DWDM Optical Channels 544 VOL. 1, NO. 2, AUGUST 2006 Four Wave Mixing in Closely Spaced DWDM Optical Channels Moncef Tayahi *, Sivakumar Lanka, and Banmali Rawat Advanced Photonics Research lab, Department of Electrical Engineering

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

SDH and WDM: a look at the physical layer

SDH and WDM: a look at the physical layer SDH and WDM: a look at the physical SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and

More information

Abstract. Cycle Domain Simulator for Phase-Locked Loops

Abstract. Cycle Domain Simulator for Phase-Locked Loops Abstract Cycle Domain Simulator for Phase-Locked Loops Norman James December 1999 As computers become faster and more complex, clock synthesis becomes critical. Due to the relatively slower bus clocks

More information

SDH and WDM A look at the physical layer

SDH and WDM A look at the physical layer SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Copyright This

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration

A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 5, pp. 862-870 A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran hyaghmae@ferdowsi.um.ac.ir

More information

Solution of Exercise Sheet 5

Solution of Exercise Sheet 5 Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????

More information

Providing Deterministic Quality-of-Service Guarantees on WDM Optical Networks

Providing Deterministic Quality-of-Service Guarantees on WDM Optical Networks 2072 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 10, OCTOBER 2000 Providing Deterministic Quality-of-Service Guarantees on WDM Optical Networks Maode Ma and Mounir Hamdi, Member, IEEE

More information

Performance advantages of resource sharing in polymorphic optical networks

Performance advantages of resource sharing in polymorphic optical networks R. J. Durán, I. de Miguel, N. Merayo, P. Fernández, R. M. Lorenzo, E. J. Abril, I. Tafur Monroy, Performance advantages of resource sharing in polymorphic optical networks, Proc. of the 0th European Conference

More information

Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks

Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks By Galen Udell Belden CDT Networking 2006 Category 6 vs Category 5e Cabling Systems and Implications

More information

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors 2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,

More information

Limiting factors in fiber optic transmissions

Limiting factors in fiber optic transmissions Limiting factors in fiber optic transmissions Sergiusz Patela, Dr Sc Room I/48, Th. 13:00-16:20, Fri. 9:20-10:50 sergiusz.patela@pwr.wroc.pl eportal.pwr.wroc.pl Copying and processing permitted for noncommercial

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of

More information

Efficient Detection of Ddos Attacks by Entropy Variation

Efficient Detection of Ddos Attacks by Entropy Variation IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,

More information

Duobinary Modulation For Optical Systems

Duobinary Modulation For Optical Systems Introduction Duobinary Modulation For Optical Systems Hari Shanar Inphi Corporation Optical systems by and large use NRZ modulation. While NRZ modulation is suitable for long haul systems in which the

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

Performance Management and Fault Management. 1 Dept. of ECE, SRM University

Performance Management and Fault Management. 1 Dept. of ECE, SRM University Performance Management and Fault Management 1 Dept. of ECE, SRM University Performance Management Performance management requires monitoring of the performance parameters for all the connections supported

More information

An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation

An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,

More information

DoS: Attack and Defense

DoS: Attack and Defense DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Index Terms Domain name, Firewall, Packet, Phishing, URL.

Index Terms Domain name, Firewall, Packet, Phishing, URL. BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet

More information

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits. Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic

More information

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29. Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

MULTISTAGE INTERCONNECTION NETWORKS: A TRANSITION TO OPTICAL

MULTISTAGE INTERCONNECTION NETWORKS: A TRANSITION TO OPTICAL MULTISTAGE INTERCONNECTION NETWORKS: A TRANSITION TO OPTICAL Sandeep Kumar 1, Arpit Kumar 2 1 Sekhawati Engg. College, Dundlod, Dist. - Jhunjhunu (Raj.), 1987san@gmail.com, 2 KIIT, Gurgaon (HR.), Abstract

More information

PUMPED Nd:YAG LASER. Last Revision: August 21, 2007

PUMPED Nd:YAG LASER. Last Revision: August 21, 2007 PUMPED Nd:YAG LASER Last Revision: August 21, 2007 QUESTION TO BE INVESTIGATED: How can an efficient atomic transition laser be constructed and characterized? INTRODUCTION: This lab exercise will allow

More information

Efficient Alarm Management in Optical Networks

Efficient Alarm Management in Optical Networks Efficient Alarm Management in Optical Networks Sava Stanic, Suresh Subramaniam, Hongsik Choi, Gokhan Sahin, and Hyeong-Ah Choi Department of Electrical & Computer Engineering Department of Computer Science

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009

More information

Course 12 Synchronous transmission multiplexing systems used in digital telephone networks

Course 12 Synchronous transmission multiplexing systems used in digital telephone networks Course 12 Synchronous transmission multiplexing systems used in digital telephone networks o Disadvantages of the PDH transmission multiplexing system PDH: no unitary international standardization of the

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

Analog vs. Digital Transmission

Analog vs. Digital Transmission Analog vs. Digital Transmission Compare at two levels: 1. Data continuous (audio) vs. discrete (text) 2. Signaling continuously varying electromagnetic wave vs. sequence of voltage pulses. Also Transmission

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

ΕΠΛ 674: Εργαστήριο 5 Firewalls

ΕΠΛ 674: Εργαστήριο 5 Firewalls ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

Network Intrusion Simulation Using OPNET

Network Intrusion Simulation Using OPNET Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,

More information

Smart Queue Scheduling for QoS Spring 2001 Final Report

Smart Queue Scheduling for QoS Spring 2001 Final Report ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)

More information

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

8 Gbps CMOS interface for parallel fiber-optic interconnects

8 Gbps CMOS interface for parallel fiber-optic interconnects 8 Gbps CMOS interface for parallel fiberoptic interconnects Barton Sano, Bindu Madhavan and A. F. J. Levi Department of Electrical Engineering University of Southern California Los Angeles, California

More information

Introduction to Machine Learning and Data Mining. Prof. Dr. Igor Trajkovski trajkovski@nyus.edu.mk

Introduction to Machine Learning and Data Mining. Prof. Dr. Igor Trajkovski trajkovski@nyus.edu.mk Introduction to Machine Learning and Data Mining Prof. Dr. Igor Trakovski trakovski@nyus.edu.mk Neural Networks 2 Neural Networks Analogy to biological neural systems, the most robust learning systems

More information

PART II. OPS-based metro area networks

PART II. OPS-based metro area networks PART II OPS-based metro area networks Chapter 3 Introduction to the OPS-based metro area networks Some traffic estimates for the UK network over the next few years [39] indicate that when access is primarily

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

Testing Network Security Using OPNET

Testing Network Security Using OPNET Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:

More information

ARTIFICIAL NEURAL NETWORKS IN THE SCOPE OF OPTICAL PERFORMANCE MONITORING

ARTIFICIAL NEURAL NETWORKS IN THE SCOPE OF OPTICAL PERFORMANCE MONITORING 1 th Portuguese Conference on Automatic Control 16-18 July 212 CONTROLO 212 Funchal, Portugal ARTIFICIAL NEURAL NETWORKS IN THE SCOPE OF OPTICAL PERFORMANCE MONITORING Vítor Ribeiro,?? Mário Lima, António

More information

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National

More information

Implementation of Digital Signal Processing: Some Background on GFSK Modulation

Implementation of Digital Signal Processing: Some Background on GFSK Modulation Implementation of Digital Signal Processing: Some Background on GFSK Modulation Sabih H. Gerez University of Twente, Department of Electrical Engineering s.h.gerez@utwente.nl Version 4 (February 7, 2013)

More information

FIBER OPTIC COMMUNICATIONS. Optical Fibers

FIBER OPTIC COMMUNICATIONS. Optical Fibers FIBER OPTIC COMMUNICATIONS Optical Fibers Fiber optics (optical fibers) are long, thin strands of very pure glass about the size of a human hair. They are arranged in bundles called optical cables and

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

ACL Based Dynamic Network Reachability in Cross Domain

ACL Based Dynamic Network Reachability in Cross Domain South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer

More information

FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router*

FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 399-407 UDK: 004.738.5.057.4 FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router* Marko Carević 1,a,

More information

Introduction to Optical Networks

Introduction to Optical Networks Yatindra Nath Singh Assistant Professor Electrical Engineering Department Indian Institute of Technology, Kanpur Email: ynsingh@ieee.org http://home.iitk.ac.in/~ynsingh 1 What are optical network? Telecomm

More information

Chapter 3 ATM and Multimedia Traffic

Chapter 3 ATM and Multimedia Traffic In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

More information

A Study of Network Security Systems

A Study of Network Security Systems A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya

More information

Voice Over IP Per Call Bandwidth Consumption

Voice Over IP Per Call Bandwidth Consumption Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before

More information

Traffic Characterization and Perceptual Quality Assessment for VoIP at Pakistan Internet Exchange-PIE. M. Amir Mehmood

Traffic Characterization and Perceptual Quality Assessment for VoIP at Pakistan Internet Exchange-PIE. M. Amir Mehmood Traffic Characterization and Perceptual Quality Assessment for VoIP at Pakistan Internet Exchange-PIE M. Amir Mehmood Outline Background Pakistan Internet Exchange - PIE Motivation Preliminaries Our Work

More information

APPLICATION NOTE 209 QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS. Quality of Service Drivers. Why Test Quality of Service?

APPLICATION NOTE 209 QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS. Quality of Service Drivers. Why Test Quality of Service? QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS By Thierno Diallo, Product Specialist With the increasing demand for advanced voice and video services, the traditional best-effort delivery model is

More information

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3 Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is

More information

Large-Capacity Optical Transmission Technologies Supporting the Optical Submarine Cable System

Large-Capacity Optical Transmission Technologies Supporting the Optical Submarine Cable System Large-Capacity Optical Transmission Technologies Supporting the Optical Submarine Cable System INOUE Takanori Abstract As one of the foundations of the global network, the submarine cable system is required

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

A Systemfor Scanning Traffic Detection in 3G WCDMA Network

A Systemfor Scanning Traffic Detection in 3G WCDMA Network 2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology

More information

Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks

Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Distributed Eplicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Sherif Ibrahim Mohamed shf_ibrahim@yahoo.com Khaled M. F. Elsayed, senior member IEEE khaled@ieee.org Department

More information

Three Key Design Considerations of IP Video Surveillance Systems

Three Key Design Considerations of IP Video Surveillance Systems Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All

More information

Non-Data Aided Carrier Offset Compensation for SDR Implementation

Non-Data Aided Carrier Offset Compensation for SDR Implementation Non-Data Aided Carrier Offset Compensation for SDR Implementation Anders Riis Jensen 1, Niels Terp Kjeldgaard Jørgensen 1 Kim Laugesen 1, Yannick Le Moullec 1,2 1 Department of Electronic Systems, 2 Center

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

Design of a SIP Outbound Edge Proxy (EPSIP)

Design of a SIP Outbound Edge Proxy (EPSIP) Design of a SIP Outbound Edge Proxy (EPSIP) Sergio Lembo Dept. of Communications and Networking Helsinki University of Technology (TKK) P.O. Box 3000, FI-02015 TKK, Finland Jani Heikkinen, Sasu Tarkoma

More information

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of

More information

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users

More information

A Policy-Based Admission Control Scheme for Voice over IP Networks

A Policy-Based Admission Control Scheme for Voice over IP Networks Journal of Computer Science 5 (11): 817-821, 2009 ISSN 1549-3636 2009 Science Publications A Policy-Based Admission Control Scheme for Voice over IP Networks Sami Alwakeel and Agung Prasetijo Department

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

VoIP QoS on low speed links

VoIP QoS on low speed links Ivana Pezelj Croatian Academic and Research Network - CARNet J. Marohni a bb 0 Zagreb, Croatia Ivana.Pezelj@CARNet.hr QoS on low speed links Julije Ožegovi Faculty of Electrical Engineering, Mechanical

More information

Monitoring VoIP Call Quality Using Improved Simplified E-model

Monitoring VoIP Call Quality Using Improved Simplified E-model Monitoring VoIP Call Quality Using Improved Simplified E-model Haytham Assem, David Malone Hamilton Institute, National University of Ireland, Maynooth Hitham.Salama.2012, David.Malone@nuim.ie Jonathan

More information

Contents. Connection Guide. What is Dante?... 2. Connections... 4. Network Set Up... 6. System Examples... 9. Copyright 2015 ROLAND CORPORATION

Contents. Connection Guide. What is Dante?... 2. Connections... 4. Network Set Up... 6. System Examples... 9. Copyright 2015 ROLAND CORPORATION Contents What is Dante?............................................. 2 Outline.................................................. 2 Fundamental............................................ 3 Required Network

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

Voice over IP: RTP/RTCP The transport layer

Voice over IP: RTP/RTCP The transport layer Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input

More information

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems

More information