A Framework for the Implementation of Secure Bare-Based Web- System

Size: px
Start display at page:

Download "A Framework for the Implementation of Secure Bare-Based Web-Email System"

Transcription

1 DOI /s A Framework for the Implementation of Secure Bare-Based Web- System Patrick Appiah-Kubi, Anthony Tsetse, and Alae Loukili Received 29 Jun 2015 Accepted 27 Jul 2015 Abstract - Webmail systems have being developed for different OS-based platforms. These OS-based systems present their own benefits and treats. Framework and white papers for developing these systems are available but there is no specific framework available for the implementation of such systems on Bare PC. Implementation of such systems on a Bare PC poses daunting challenges and innovative opportunities that are revolutionary in server designs. Building such systems for security could even be more challenging. Secure Webmail systems are complex, large and require intricate components to develop. As a result, a lean system was developed for this research. The lean concept also helps to build small protocol suite, intertwining of protocols, limited requirement space, simple user interfaces and minimal design options. The paper provides a detail framework for the design and implementation, experimental setup and the results of experiments conducted. Performance is evaluated by measuring the processing time, throughput, the CPU Utilization and load distribution. The results show that the performance of the Bare PC Webmail server is significantly better than that of the OS-based servers. Keywords-Bare PC; Application Object; HTTP; PHP parser; TLS; SMTP; Operating system. I. INTRODUCTION Webmail is a web-based service that allows users to access their through a web browser instead of using desktop clients (such as Microsoft Outlook, Pegasus Mail, Mozilla Thunderbird and Eudora). It allows users to access their account from any Internet enabled device located anywhere, unlike the applicationbased system. A conventional secure webmail system uses protocols such as simple mail transfer protocol (SMTP), post office protocol (POP3) or internet message access protocol (IMAP), hypertext transfer protocol (HTTP) and transport layer security (TLS), to exchange messages. These protocols provide independent services to ensure exchanges. Figure 1 presents a pictorial illustration of exchanges between the various services. user agent HTTP/TLS Request Web server / Mail Agent SMTP/POP3 Figure 1: Conventional Exchanges mail server SQL Queries Database In situations where dynamic HTTP requests are sent to the Webmail Server for processing/parsing coupled with a secured request using static or dynamic TLS, the complexity of Webmail system increases significantly. The design of the Bare PC-based web- system was as a result of experiences gained in developing the Bare PC TLS, HTTP, SMTP and POP3 protocols. A Bare PC Web server interfaces with any commercial client adhering to the client requests and their interfaces. It does not have any control on the client user interfaces. The Bare PC webmail system developed is user friendly to Bare PC environment as the functionality and complexity can be dealt with at the server level. This is because; webmail system servers generate and serve all Web pages to the client thus allowing the designer to control the design of the system. The Bare PC webmail architecture is based on threading techniques, delay/resume lists, and task stack DOI: / _

2 mechanisms to provide efficient memory utilization and process control. It contains its own data execution knowledge and control, and does not require any other software support to run. Currently, the Bare PC Webmail system run on Intel Pentium 4 (or above) based PCs and only requires common general-purpose hardware including USB-based bootable devices, network interface cards, and USB-based persistent storage. The system is also not vulnerable to attacks targeting an underlying OS. Bare PC applications are built to be secure since all underlying OS vulnerabilities are eliminated at design level. The TLS protocol added to the design enhances security when sending and receiving messages. Since a Bare PC server application is self-supporting, it is unlike its OS-based counterpart that relies on services provided by the OS. For example, a Bare PC server application contains lean versions of the necessary protocols, manages memory, schedules tasks on the CPU, and directly accesses the underlying hardware. Furthermore, the application layer and transport layer protocol code is intertwined within the code for the server application. There is no socket interface for applications in a Bare PC server, and the intertwined parts of the code and the underlying task structure can differ from application to application. Protocol intertwining reduces inter-layer communication overhead compared to a conventional OSbased TCP/IP protocol stack, but complicates the design and implementation of the server. Bare PC applications do not use a local disk (they only require detachable mass storage). The application directly communicates with the hardware (in this case an X86-based CPU). This approach can be used to build pervasive devices, gateways, routers, or sensors that host small efficient bare PC applications. The paper is organized as follows, section I is the introduction, II covers related work, III covers architecture and design, IV covers experimental analysis and V is the conclusion. II. RELATED WORK The first attempt to minimize Operating systems (OS) functionality was proposed in the Exokernel[1][2] architecture where minimum OS functionality was used to obtain core processes such as kernel system processes. Studies such as Microkernel, OS-Kit[3], Bare-metal Linux, IO-Lite[4], Tiny OS[5] and other approaches have tried to reduce the interaction of OS or bypass OS to gain efficiency in the system. In [6], Linux is used to enable direct communication with the hardware by reducing the OS reliability. More recently, sandboxing techniques on the x86 systems[7] have extended OS kernels allowing applications to run guest plug-ins on the host OS. However none of the above proposed techniques propose a complete elimination of all OS support except for the Bare PC paradigm. The strength of Bare PC applications is derived from its simplicity, smaller code, design by obscurity, design for longevity, and inherent security. The Bare box can be used to run a variety of applications. The Application Object (AO) is self-contained and it belongs to an owner, which can be made secure at the AO level. As the AOs are application centric, it does not require all OS components as needed in today s OS. Only necessary hardware interfaces and controls are included in the AO thus making the AO small in size, simple in design and development. An AO may constitute a single application such as Webmail server or it may consist of composite applications including: Webmail server, Web Browser and a Text-editor. Applications like the Web server[8], Server[9][10] VoIP[11][12] and TLS on web server[13] have been built on Bare PC and these applications demonstrated significant improvements in performance compared to other commercial systems. These applications uncovered the unique features of the Bare PC architecture and served as the bases for the design and implementation of the Bare PC Webmail Server. Current Webmail systems such as Atmail[14], Petmail[20], MailTraq[15], Axigen[16], Afterlogic[17], Squirrelmail[18], Fac [19], icewarp[21], Hexamail[22], all focus on OS-based systems. Some of these systems are designed for high performance, while others such as Cisco s Webex[23] are designed for high reliability and availability. Techniques to improve performance of the Open Webmail system are discussed in [24]. server architecture, which is based on a spam workload and optimized with respect to concurrency, I/O and IP address lookups, is shown to significantly improve performance and throughput. The design and implementation of an pseudonym server providing anonymity to reduce server threats is capable of reducing risks due to OS-based vulnerabilities. Some performance and design details of Webmail system is described in [24]. The security aspects of Webmail systems have been studied by many authors [25][26]. Webmail systems use HTTPS/TLS protocol to protect messages in transit. However, all existing TLS-capable Webmail systems are OS based, and there is no TLS-capable Webmail system that runs on a Bare PC. There are alternate approaches to security. S/MIME [25] provides encryption, authentication, message integrity and non-repudiation for MIME messages exchanged between users (i.e., end-toend). The design and implementation of a secure 72

3 system that provides encryption and signing, and additional features such as elimination of spam and prevention of harmful attachments is described. The implementation of a secure Webmail system that uses CallerID for access is discussed in [26]. Operating System (OS-based) systems are based on some sort of centralized resource manager or controller to provide hardware abstractions to applications. The Bare PC previously referred to as dispersed Operating Systems computing (DOSC)[27] proposes an extreme end of the spectrum in OS for building computer applications where there is no centralized resource manager or controller running in the machine. Applications[28] in Bare PC directly communicate with hardware (no need for abstraction layers) and the computer is made Bare (no hard disk, no resident software, except BIOS). The Bare PC approach is application centric and provides full control to the Bare PC programmer. Bare PC applications referred to as application object (AO)[28] contain all the necessary application, data execution knowledge, and control. There is no need for the AO to depend on any other software or vendor specific products. The AO is built using a single programming language and works on a given CPU architecture base such as X86. These AOs can also be written to work with any other CPU architectures. III. A. Architecture ARCHITECTURE AND DESIGN The server architecture is supported by common general-purpose hardware including USB-based bootable devices, network interface cards, USB-based persistent storage, and Intel x86 based PCs. However, this server can be extended to run on other Intel processor architectures. The internal architectural design is based on threading techniques, delay/resume lists, and task stack mechanisms to provide efficient memory utilization and process control. However, the architecture does not make use of any components of an OS or any other vendor software. Likewise, the compilation and execution of the Bare PC application object for the Webmail server does not make use of any system or API libraries of the compiler which would require an OS. The Bare PC approach only uses few BIOS function calls to invoke the timer, and reading device addresses from the Intel Hub Controller. Eventually, these BIOS calls and direct hardware interfaces can be driven to CPU to provide an AO execution. All other interrupts are managed by the AO as software interrupts or direct hardware interfaces. POP3 Task Pool 12 Network NIC Driver 18 N I C Tasks Stacks 17 Delay List Resume List SMTP Task Pool STD RCV Task 5 6 TCP Table (TCB) (Migratory Entries) HTTP Task Pool ETH POP3 Object SMTP Object HTTP Object TLS Object Figure 2: Bare PC Webmail System Architecture Figure 2 shows the architectural design of the Bare PC Webmail server. For referencing purpose, numeric labels are assigned to items within the figure. The server is initiated on a Bare PC by a boot program (1) which is read from a USB-bootable device. The initial sector contains a bootstrap loader which loads the menu program (2), which then loads the AO. The AO starts by initializing various data structures, parameters, tasks, and objects. Control is then passed to the Main Task (3). The basic Bare PC data structures used by the Main Task include a Delayed List (16), Resume List (15) and a Multiplexor mechanism (4) that switches between Received Tasks (20) and Resume List Tasks (HTTP, SMTP, POP3, TLS) and selects a running task (13). This running task can be suspended and returned to the Delayed List (16) when it is not being run. The Main Task checks for delayed tasks, whenever it is free and place them in the resume list. When a response arrives for a Delayed List task, a Resume () brings the Delayed List task into the Resume List. A TCP Table (TCB, 17) is used to store relevant information derived from the headers of TCP, IP and Ethernet messages (21). To communicate directly with the host 14 IP TLS Task Pool 9 16 TCP 13 M U X 15 Main Task Menu / Loader Boot Program Running Task Resume 73

4 Network Interface Card (NIC, 18), a Bare PC NIC driver was written (19). Four components were created within the Bare PC Webmail application to handle all Webmail functions. These are a POP3 Object (5) to retrieve messages from an server, SMTP Object (6) to send s messages from clients to the server, TLS Object (8) to encrypt all messages being transmitted and an HTTP Object (7) to interface with web clients. At initialization, a task pool of POP3 (12), SMTP (11), TLS (9) and HTTP (10) objects are created along with their associated TCB table entries for use by the server application. When a client request arrives, one of these objects based on an HTTP, POP3 or SMTP request is placed in the Resume Task List (15), and an active status flag is set within its associated TCB entry. The TCB entry contains all of the unique data attributes associated with the object, and its executable state information. When the task is complete, it is returned to its appropriate task stack (14) so that it can be reused again. The active flag in the associated TCB entry along with associated data fields are then reset. The Bare PC architecture for Webmail systems is novel and unique in many respects. The Webmail application only performs functions that are truly intended in its design. The scheduling mechanism is optimized for its function, and it can be claimed that it is an optimal solution for this application. The RCV task (20) receives packets and processes them in a single thread of execution without any interruptions or process swapping until the status is updated in TCB. The HTTP, TLS, SMTP or POP3 tasks do the same when it is ready to run. The suspension place and time is determined by the AO programmer at the program time and it is implemented in the code. The AO programmer will only suspend a task if it is waiting for an event. When a task is complete, the same task will be reused without creating new tasks. All task pools are statically created by the AO programmer. The novelty of this server approach stems from the notion that the process execution knowledge and control are shifted from OS environment to AO programmer environment thus making the application self-controlled, self-executed, and self-managed. The system always runs a RCV task or any of the tasks thus making the scheduler simple and its mechanism first come first serve. However, if the suspended delayed task expires in the Delayed List, it moves to the Resume List and follows the first-in-firstout (FIFO) priority. There is no need to prioritize any tasks in this model as all client requests will be given equal priority as they are ordered with respect to their arrivals. The Webmail server architecture is a design for optimization rather than enhancing performance after the design. This approach can be used throughout any Bare PC applications, which are very difficult to achieve in a centralized OS based computing architecture. B. Design considerations The design of the Bare PC Webmail server was a very daunting and challenging task. The first task was to understand the functionality of the entire Webmail system and as such, one Linux-based and one windows-based servers were installed and studied carefully. The design also avoids the use of any OS-based features and kernels, and creates an application, which will run on a Bare PC. The design of the Bare PC webmail application was based on state transition diagrams. The SMTP, POP3, TLS and HTTP protocols were intertwined to allow the execution of the specified function in the message. Figure 3 illustrates the intertwining of the protocols and the message exchanges between a client and a server to establish and close a connection. As shown in the figure, when a client request a TCP connection to sever, it sends a SYN request and wait for an SYN-ACK and then sends an ACK. After the ACK is sent, the state moves into the TCP ESTAB state where protocols can send and receive messages. Figure 4 shows the state transition diagram for the TLS handshake process between a client and a server. Here the client request a TLS connection to the server after it has established TCP connection to the server. When the server receives the request, it must validate the client by sending the certificate and key information to the client. Once the client is validated and the keys for encryption are established the client and server move to the TLS-ESTB state, where encrypted messages can be exchanged. Figure 5 shows the state transition diagram for the SMTP connection establishment process. After the client and server establish TCP connection, they must move to the SMTP-WESTAB so the server can validate the client before messages can be exchanged. Figure 6 shows the state transition diagram for the POP3 connection establishment process. After the TCP connection establishment between the client and server, they must move to the POP3-WESTAB state, so that the server can validate the client before message exchanges. 74

5 Figure 6: State Transition Diagram for POP3 Connection Establishment Figure 3: State Transition Diagram for Connection Establishment and Closure IV. EXPERIMENTAL ANALYSIS A. Experimental Setup A Bare PC environmental setup was established as shown in figure 7 below. All switches used in the setup were gigabit switches. The clients ran Windows 7 with Firefox and Internet Explorer as the web clients. The OSbased servers ran Windows 2012 or Linux (CentOS / Fedora). The routers were Linux based. All machines were Dell OptiPlex GX520s. OS-based Webmail system details are as follows: Atmail Server (Linux), Icewarp Server 11.2 (XP), and Squirrelmail Server (Linux). A legacy client PC located 50 miles away with about 30 router and firewall hops from the Bare PC network was used for the WAN measurements. The Visual Trace Route tool verified the hop count during the tests, which were performed in a contiguous time period. Figure 4: State Transition Diagram TLS Handshake Figure 5: State Transition Diagram for SMTP Connection Establishment Figure 7: Experimental Setup 75

6 B. Results Analysis Different test scenarios were run and captured with Wireshark analyzer and web stress tool. The final results are analyzed in this section. Figure 8 shows the measure of CPU load over a time period, using TLS and Non-TLS enabled webmail systems on Bare PC, Windows and Linux as captured on web stress tool. As shown in the figure the Bare PC systems (i.e. Secure and non-secure webmail systems) start with high CPU utilization and linear out as the time increases. This is due to saturation of request when the times are high. The Linux based systems seem flat throughout but the windows systems increase their CPU utilization, when the time increases. The average waiting time for a user to receive a response from the server, when the server is under heavy load was captured with web stress tool and analyzed in figure 10 below. We see that the wait time for both Bare PC systems (i.e. secure and non-secure is relatively low under 100 msec as compared to the Linux systems which are about 100 msec. The Windows systems however have high wait times of 300 to 500 msec. Figure 10: Waiting time for response when servers are under stress Figure 8: Server CPU load over time The server bandwidth or throughput which is measured in bits/second was captured with web stress tool over time and analyzed in figure 9 below. As shown, the Bare PC systems increase exponentially and become flat after 5 seconds. This corresponds to the rate of usage as shown in figure 8. The Linux and Windows systems also increase exponentially to about 70Kbit/sec and become flat after 5 seconds, thus corresponding to the load on the server. Figure 11 shows the server response rate of the server. A higher response rate corresponds to lower wait time for the user. As we can see, the Bare systems have high response rates which clearly justifies the small wait time on the part of the user. The Windows systems have the lowest response rate and therefore a higher wait time for the users. The total processing time for a single complete request of 200 bytes file size is presented in figure 12 below. The Bare systems have low processing time because they take advantage of the threading techniques, single thread of execution technique, higher load distribution to process the request much quickly. The Linux systems have the second best times as compared to the Windows systems. Server Response Rate Server Response Rate Squirrelmail-Linux Atmail-Linux Cent Icewarp-Win Fedora OS No-TLS TLS-Enabled Bare PC Figure 9: Server throughput over time Figure 11: Server response rate for request 76

7 Figure 13 shows the processing times for a single inbox request over a WAN environment. Again the Bare systems show very low processing time as compared to the Linux and Windows systems. However the processing times Linux and Windows systems seem to be very close. This could be attributed to the multiple hop counts and the Linux systems inability to leverage on processing power to reduce the time. Figure 14 shows the processing times in seconds of a single 120,000 bytes attachment over a WAN for all systems. Bare PC is still lower than the other systems by a margin of about 46% average for all the other systems. Processing Time(sec) Squirrelmail-Linux Fedora Processing Time Atmail-Linux Cent Icewarp-Win OS No-TLS TLS-Enabled Bare PC Figure 14: Time to process a single 120,000 bytes message on a WAN Figure 12: Time to process a single request Figure 15: Time between the first ACK after request and first Data sent Figure 15 shows the time captured when the first ACK for the request comes in the time it takes the server to send the first data packet. Bare has low processing time as compared to the other systems. V. CONCLUSION Figure 13: Time for processing a single inbox request on a WAN In this paper we discussed a framework for the design and implementation of a secure Bare PC web-mail system. This framework can serve as fundamentals to the development of any reliable system based on the Bare PC paradigm. Results from the experimental analysis conducted indicate that Bare PC applications perform better than all the other OS-based systems in terms of throughput, processing time etc. The webmail systems does not use file system as seen in regular webmail applications. It only makes use of physical memory. A file system has been developed for Bare PC applications, but was not included in this implementation since it has not being validated. Future work on the webmail system will 77

8 include the implementation of a file system and the use of IMAP4 instead of POP3. REFERENCES [1] D. R. Engler, The Exokernel Operating System Architecture, MIT, Oct [2] D. R. Engler and M. Kaashoek, Exterminate all operating system abstractions, in 5th Workshop on Hot Topics in Operating Systems, Orcas Island, WA, [3] The OS Kit Project, The OS Kit Project. [Online]. Available: [Accessed: 15-May-2015]. [4] V. Pai, P. Druschel, and W. Zwaenepoel, IO-Lite: A Unified I/O Buffering and Caching System, Vol.18 (1), ACM, February 2000, pp , ACM Transactions on Computer Systems, vol. 18, pp , Feb [5] Tiny OS Community Forum, Tiny OS. [Online]. Available: [Accessed: 25- May-2015]. [6] B. Ford, M. Hibler, J. Lepreau, R. McGrath, and P. Tullman, Interface and execution models in the Fluke Kernel New Orleans, LA, February 1999, pp , in The third Symposium on Operating Systems Design and Implementation, New Orlean, LA, 1999, pp [7] B. Ford and R. Cox, Vx32: Lightweight User-level Sandboxing on the x86, in USENIX Annual Technical Conference, Boston MA, [8] L. He, R. K. Karne, and A. L. Wijesinha, The Design and Performance of a Bare PC Web Server, International Journal of Computers and Their Applications, vol. 15, pp , Jun [9] G. Ford Jr, R. K. Karne, A. L. Wijesinha, and P. Appiah-Kubi, The Design and Implementation of a Bare PC Server, in 33rd Annual IEEE International Computer Software and Applications Conference, [10] G. Ford, R. K. Karne, A. L. Wijesinha, and P. Appiah-Kubi, The performance of a Bare Machine server, in 21st International Symposium on Computing Architecture and High Performance Computing, [11] G. H. Khaksari, A. L. Wijesinha, R. K. Karne, L. He, and S. Girumala, A Peer-to-Peer bare PC VoIP Application, in IEEE Consumer and Communications and Networking Conference (CCNC), Las Vegas, [12] G. H. Khaksari, A. L. Wijesinha, R.. Karne, L. He, and S. Girumala, A Peer-to-Peer Bare PC VoIP Application, in IEEE Consumer and Communications and Networking Conference, Las Vegas, [13] A. Emdadi, R. K. Karne, and A. L. Wijesinha, Implementing the TLS Protocol on a Bare PC, in 2nd International Conference on Computer Research and Development (ICCRD), [14] Atmail-Linux Webmail Server. [Online]. Available: [Accessed: 05-Jun-2015]. [15] Mailtraq server-the complete server. [Online]. Available: [Accessed: 10-Jun-2015]. [16] Axigen Sevrer. [Online]. Available: [Accessed: 23-May-2015]. [17] Afterlogic Webmail Server. [Online]. Available: [Accessed: 20-May-2015]. [18] SquirrelMail Webmail. [Online]. Available: [Accessed: 15-May-2015]. [19] E. Lieberman and R.. Miller, Fac showing faces of recipients to prevent misdirected , in The 3rd symposium on Usable privacy and security, Pittsburgh, Pennsylvania. [20] Petmail Webmail Server.. [21] IceWarp Mail Server. [Online]. Available: [Accessed: 20-May-2015]. [22] Hexamail Webmail Server. [Online]. Available: [Accessed: 06-May-2015]. [23] Cisco WebEx Mail: High availability design for your most mission critical application. Tech Republic. [Online]. Available: [Accessed: 06-May- 2015]. [24] C. Tung and S. Tsai, Tuning Webmail performance-the design and implementation of Open Webmail. [Online]. Available: [Accessed: 15-May-2015]. [25] P. Noiumkar and T. Chomsiri, Top 10 Free Webmail Security Test Using Session Hijacking, in International Conference on, Convergence Information Technology, 2008, pp [26] A.. Tomar, S. Chaudhari, J. Patil, and A. Rawat, Implementation and Security Analysis of a CallerId Augmented 2FA Setup for Secure Web-mail Access pp , in The 2010 IEEE International Conference on Advances in Communication Network and Computing. (CNC), 2010., pp [27] R.. Karne, K. V. Jaganathan, and T. Ahmed, DOSC: Dispersed Operating System Computing, in 20th Annual ACM Conference on Object Oriented Programming, Systems, Languages, and Applications, Onward Track, San Diego, 2005, pp [28] R.. Karne, Application-oriented Object Architecture: A Revolutionary Approach., in 6th International Conference, HPC Asia, AUTHORS PROFILE Dr. Patrick Appiah-Kubi is an Assistant professor and IT program coordinator in the Electronics and Computer Engineering Department at Indiana State University, USA. He previously worked as a lecturer in the Computer and Information Sciences Department at Towson University. He also worked as a systems engineer and IT consultant at MVS Consulting in Washington DC before joining Towson University. He has a Doctorate in Information Technology from Towson University, Master s in Electronics and Computer Technology from Indiana State University, and a Bachelor s in 78

9 Computer Science from Kwame Nkrumah University of Science and Technology, Ghana. His research interests are in bare machine computing systems, networks, Cloud Computing, Big Data and mining, Distributed Databases and security. Dr. Anthony K. Tsetse received his B. S. Computer Science degree from the Kwame Nkrumah University of Science and Technology, Kumasi, Ghana.He earned his M.S. Communication and Media Engineering degree from the Offenburg University of Applied Sciences Germany and M.S. in Information Technology degree from the IT University of Copenhagen, Denmark. He graduated from Towson University, USA with a Doctor of Science degree in Information Technology. Anthony is currently an Assistant professor in the department of Computer Information Systems at the State University of New York Fredonia. His current research interests include Bare Machine Computing, Network Performance analysis, Cloud computing, Network security and Data Analytics. Alae Loukili holds a doctorate in Information Technology and a Masters degree in Computer Science from Towson University. He also holds a Masters degree in Electrical Engineering from l' Ecole Nationale Supérieure d'electricité et de Mécanique de Casablanca. He is currently an Assistant Professor in the Department of Mathematics and Computer Science at Ohio Dominican University. His research interests are in computer networks and data communications, wireless communications, and bare machine computing. This article is distributed under the terms of the Creative Commons Attribution License which permits any use, distribution, and reproduction in any medium, provided the original author(s) and the source are credited. 79

Design Issues in a Bare PC Web Server

Design Issues in a Bare PC Web Server Design Issues in a Bare PC Web Server Long He, Ramesh K. Karne, Alexander L. Wijesinha, Sandeep Girumala, and Gholam H. Khaksari Department of Computer & Information Sciences, Towson University, 78 York

More information

A Peer-to-Peer Bare PC VoIP Application

A Peer-to-Peer Bare PC VoIP Application A Peer-to-Peer Bare PC VoIP Application Gholam H. Khaksari, Alexander L.Wijesinha, Ramesh K. Karne, Long He, Sandeep Girumala Department of Computer and Information Sciences Towson University Towson, MD

More information

Intel DPDK Boosts Server Appliance Performance White Paper

Intel DPDK Boosts Server Appliance Performance White Paper Intel DPDK Boosts Server Appliance Performance Intel DPDK Boosts Server Appliance Performance Introduction As network speeds increase to 40G and above, both in the enterprise and data center, the bottlenecks

More information

WEB SERVER PERFORMANCE WITH CUBIC AND COMPOUND TCP

WEB SERVER PERFORMANCE WITH CUBIC AND COMPOUND TCP WEB SERVER PERFORMANCE WITH CUBIC AND COMPOUND TCP Alae Loukili, Alexander Wijesinha, Ramesh K. Karne, and Anthony K. Tsetse Towson University Department of Computer & Information Sciences Towson, MD 21252

More information

A VoIP Softphone on a Bare PC

A VoIP Softphone on a Bare PC A VoIP Softphone on a Bare PC Gholam H. Khaksari, Alexander L. Wijesinha, Ramesh K. Karne, Qi Yao, and Ketan Parikh Department of Computer & Information Sciences Towson University Towson, Md 21252 Abstract

More information

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Remote login (Telnet):

Remote login (Telnet): SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client

More information

The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology

The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology 3. The Lagopus SDN Software Switch Here we explain the capabilities of the new Lagopus software switch in detail, starting with the basics of SDN and OpenFlow. 3.1 SDN and OpenFlow Those engaged in network-related

More information

ECE 578 Term Paper Network Security through IP packet Filtering

ECE 578 Term Paper Network Security through IP packet Filtering ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon

More information

Using email over FleetBroadband

Using email over FleetBroadband Using email over FleetBroadband Version 01 20 October 2007 inmarsat.com/fleetbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure

More information

Direct Web Switch Routing with State Migration, TCP Masquerade, and Cookie Name Rewriting

Direct Web Switch Routing with State Migration, TCP Masquerade, and Cookie Name Rewriting Direct Web Switch Routing with State Migration, TCP Masquerade, and Cookie Name Rewriting Ying-Dar Lin, Ping-Tsai Tsai, Po-Ching Lin, and Ching-Ming Tien Department of Computer and Information Science,

More information

Lesson 1 Quiz. 2012 Certification Partners, LLC. All Rights Reserved. Version 2.0

Lesson 1 Quiz. 2012 Certification Partners, LLC. All Rights Reserved. Version 2.0 Quiz Answers-1 Lesson 1 Quiz 1. A server is: a. a computer connected to a mainframe. b. a computer that acts as a mainframe. c. a computer that shares resources with other computers on a network. d. a

More information

Technical White Paper BlackBerry Enterprise Server

Technical White Paper BlackBerry Enterprise Server Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table

More information

Test Equipment Depot - 800.517.8431-99 Washington Street Melrose, MA 02176 - TestEquipmentDepot.com. Application Advisor

Test Equipment Depot - 800.517.8431-99 Washington Street Melrose, MA 02176 - TestEquipmentDepot.com. Application Advisor Test Equipment Depot - 800.517.8431-99 Washington Street Melrose, MA 02176 - TestEquipmentDepot.com NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

S y s t e m A r c h i t e c t u r e

S y s t e m A r c h i t e c t u r e S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual

More information

Putting it on the NIC: A Case Study on application offloading to a Network Interface Card (NIC)

Putting it on the NIC: A Case Study on application offloading to a Network Interface Card (NIC) This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 2006 proceedings. Putting it on the NIC: A Case Study on application

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

TCP Servers: Offloading TCP Processing in Internet Servers. Design, Implementation, and Performance

TCP Servers: Offloading TCP Processing in Internet Servers. Design, Implementation, and Performance TCP Servers: Offloading TCP Processing in Internet Servers. Design, Implementation, and Performance M. Rangarajan, A. Bohra, K. Banerjee, E.V. Carrera, R. Bianchini, L. Iftode, W. Zwaenepoel. Presented

More information

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Course Description and Outline. IT Essential II: Network Operating Systems V2.0 Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Secure SCTP against DoS Attacks in Wireless Internet

Secure SCTP against DoS Attacks in Wireless Internet Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

SIP Server Implementation and Performance on a Bare PC

SIP Server Implementation and Performance on a Bare PC 82 SIP Server Implementation and Performance on a Bare PC A. Alexander, R. Yasinovskyy, A. L. Wijesinha, and R. Karne Department of Computer & Information Sciences Towson University Towson, MD 21252 USA

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information

McAfee Product Entitlement Definitions

McAfee Product Entitlement Definitions McAfee Product Entitlement Definitions McAfee. Part of Intel Security. 2821 Mission College Blvd Santa Clara, CA 95054 www.intelsecurity.com Application Server CPU CPU Core Database An Application Server

More information

Fax and Oracle Collaboration Suite. An Oracle White Paper August 2005

Fax and Oracle Collaboration Suite. An Oracle White Paper August 2005 Fax and Oracle Collaboration Suite An Oracle White Paper August 2005 Fax and Oracle Collaboration Suite Introduction... 3 Fax Support in Oracle Collaboration Suite... 4 Outbound Fax Configuration... 7

More information

Introduction. Application Performance in the QLinux Multimedia Operating System. Solution: QLinux. Introduction. Outline. QLinux Design Principles

Introduction. Application Performance in the QLinux Multimedia Operating System. Solution: QLinux. Introduction. Outline. QLinux Design Principles Application Performance in the QLinux Multimedia Operating System Sundaram, A. Chandra, P. Goyal, P. Shenoy, J. Sahni and H. Vin Umass Amherst, U of Texas Austin ACM Multimedia, 2000 Introduction General

More information

Cisco Application Networking for BEA WebLogic

Cisco Application Networking for BEA WebLogic Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Boosting Data Transfer with TCP Offload Engine Technology

Boosting Data Transfer with TCP Offload Engine Technology Boosting Data Transfer with TCP Offload Engine Technology on Ninth-Generation Dell PowerEdge Servers TCP/IP Offload Engine () technology makes its debut in the ninth generation of Dell PowerEdge servers,

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT April 2009 EXAMINERS' REPORT Network Information Systems General Comments Last year examiners report a good pass rate with

More information

The Evolution of Application Acceleration:

The Evolution of Application Acceleration: WHITE PAPER The Evolution of Application Acceleration: From Server Load Balancers to Application Delivery Controllers www.crescendonetworks.com Corporate Headquarters 6 Yoni Netanyahu Street Or-Yehuda

More information

Enabling Technologies for Distributed Computing

Enabling Technologies for Distributed Computing Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies

More information

Configuring an Email Client to Connect to CASS Mail Servers

Configuring an Email Client to Connect to CASS Mail Servers Configuring an Email Client to Connect to CASS Mail Servers Table of Contents Introduction... 2 Webmail... 2 Settings... 2 Forwarding... 2 Email Client Configuration... 3 Outlook 2003... 3 Outlook 2007...

More information

STRESS TESTING OF HOST IDENTITY PROTOCOL (HIP) IMPLEMENTATIONS

STRESS TESTING OF HOST IDENTITY PROTOCOL (HIP) IMPLEMENTATIONS STRESS TESTING OF HOST IDENTITY PROTOCOL (HIP) IMPLEMENTATIONS Oleg Ponomarev Andrei Gurtov Helsinki Institute for Information Technology HIIT, Finland Helsinki University of Technology TKK oleg.ponomarev@hiit.fi,

More information

VIA CONNECT PRO Deployment Guide

VIA CONNECT PRO Deployment Guide VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment

A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment Zahra Tavakoli, Sebastian Meier, and Alexander Vensmer Institute of Communication Networks and Computer Engineering

More information

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006 Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which

More information

TCP/IP Jumbo Frames Network Performance Evaluation on A Testbed Infrastructure

TCP/IP Jumbo Frames Network Performance Evaluation on A Testbed Infrastructure I.J. Wireless and Microwave Technologies, 2012, 6, 29-36 Published Online December 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2012.06.05 Available online at http://www.mecs-press.net/ijwmt

More information

Page 1 of 5. IS 335: Information Technology in Business Lecture Outline Operating Systems

Page 1 of 5. IS 335: Information Technology in Business Lecture Outline Operating Systems Lecture Outline Operating Systems Objectives Describe the functions and layers of an operating system List the resources allocated by the operating system and describe the allocation process Explain how

More information

Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic

Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic TESTING & INTEGRATION GROUP SOLUTION GUIDE Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic Contents INTRODUCTION... 2 RADWARE APPDIRECTOR...

More information

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). 1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).

More information

Quantifying TCP Performance for IPv6 in Linux- Based Server Operating Systems

Quantifying TCP Performance for IPv6 in Linux- Based Server Operating Systems Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), November Edition, 2013 Volume 3, Issue 11 Quantifying TCP Performance for IPv6

More information

Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture

Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts

More information

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,

More information

Cisco Application Networking for Citrix Presentation Server

Cisco Application Networking for Citrix Presentation Server Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

An Introduction to Dispersive Virtualized Networks

An Introduction to Dispersive Virtualized Networks An Introduction to Dispersive Virtualized Networks Dispersive Technologies software and cloud-based virtualized networks deliver mission-critical communications over the public Internet to help organizations

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network 10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity

More information

Virtualization for Cloud Computing

Virtualization for Cloud Computing Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources

More information

Performance Analysis of Network Subsystem on Virtual Desktop Infrastructure System utilizing SR-IOV NIC

Performance Analysis of Network Subsystem on Virtual Desktop Infrastructure System utilizing SR-IOV NIC ICSNC 13 : The Eighth International Conference on Systems and Networks Communications Performance Analysis of Network Subsystem on Virtual Desktop Infrastructure System utilizing SR-IOV NIC Soo-Cheol Oh

More information

Firewall, Mail and File server solution

Firewall, Mail and File server solution Firewall, Mail and File server solution Table of Contents Introduction......2 Overview......3 Detailed description....4 Firewall......4 Other services offered by IPCop:......4 Mail and File Server......5

More information

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 356 Lecture 27 Internet Security Protocols. Spring 2013 CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

A Packet Forwarding Method for the ISCSI Virtualization Switch

A Packet Forwarding Method for the ISCSI Virtualization Switch Fourth International Workshop on Storage Network Architecture and Parallel I/Os A Packet Forwarding Method for the ISCSI Virtualization Switch Yi-Cheng Chung a, Stanley Lee b Network & Communications Technology,

More information

Guardian: Hypervisor as Security Foothold for Personal Computers

Guardian: Hypervisor as Security Foothold for Personal Computers Guardian: Hypervisor as Security Foothold for Personal Computers Yueqiang Cheng, Xuhua Ding Singapore Management University (SMU) The International Conference on Trust & Trustworthy Computing (TRUST),

More information

Special FEATURE. By Heinrich Munz

Special FEATURE. By Heinrich Munz Special FEATURE By Heinrich Munz Heinrich Munz of KUKA Roboter discusses in this article how to bring Microsoft Windows CE and WindowsXP together on the same PC. He discusses system and application requirements,

More information

D1.2 Network Load Balancing

D1.2 Network Load Balancing D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June ronald.vanderpol@sara.nl,freek.dijkstra@sara.nl,

More information

Implementation and Performance Evaluation of M-VIA on AceNIC Gigabit Ethernet Card

Implementation and Performance Evaluation of M-VIA on AceNIC Gigabit Ethernet Card Implementation and Performance Evaluation of M-VIA on AceNIC Gigabit Ethernet Card In-Su Yoon 1, Sang-Hwa Chung 1, Ben Lee 2, and Hyuk-Chul Kwon 1 1 Pusan National University School of Electrical and Computer

More information

Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform

Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: shieyuan@cs.nctu.edu.tw

More information

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

Enabling Technologies for Distributed and Cloud Computing

Enabling Technologies for Distributed and Cloud Computing Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading

More information

Network Security. Network Packet Analysis

Network Security. Network Packet Analysis Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS kaw@cerias.purdue.edu 1 Network Packet Analysis Definition: Examining network packets to determine

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

Zeus Traffic Manager VA Performance on vsphere 4

Zeus Traffic Manager VA Performance on vsphere 4 White Paper Zeus Traffic Manager VA Performance on vsphere 4 Zeus. Why wait Contents Introduction... 2 Test Setup... 2 System Under Test... 3 Hardware... 3 Native Software... 3 Virtual Appliance... 3 Benchmarks...

More information

CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY

CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY 51 CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY Web application operations are a crucial aspect of most organizational operations. Among them business continuity is one of the main concerns. Companies

More information

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture

More information

Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02

Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02 Technical Brief DualNet with Teaming Advanced Networking October 2006 TB-02499-001_v02 Table of Contents DualNet with Teaming...3 What Is DualNet?...3 Teaming...5 TCP/IP Acceleration...7 Home Gateway...9

More information

Protecting and controlling Virtual LANs by Linux router-firewall

Protecting and controlling Virtual LANs by Linux router-firewall Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Understanding the Performance of an X550 11-User Environment

Understanding the Performance of an X550 11-User Environment Understanding the Performance of an X550 11-User Environment Overview NComputing's desktop virtualization technology enables significantly lower computing costs by letting multiple users share a single

More information

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Trunking with Microsoft Office Communication Server 2007 R2 SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain

More information

A Study of Network Security Systems

A Study of Network Security Systems A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya

More information

Comparison of Web Server Architectures: a Measurement Study

Comparison of Web Server Architectures: a Measurement Study Comparison of Web Server Architectures: a Measurement Study Enrico Gregori, IIT-CNR, enrico.gregori@iit.cnr.it Joint work with Marina Buzzi, Marco Conti and Davide Pagnin Workshop Qualità del Servizio

More information

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------

More information

Delivering Quality in Software Performance and Scalability Testing

Delivering Quality in Software Performance and Scalability Testing Delivering Quality in Software Performance and Scalability Testing Abstract Khun Ban, Robert Scott, Kingsum Chow, and Huijun Yan Software and Services Group, Intel Corporation {khun.ban, robert.l.scott,

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

Features Overview Guide About new features in WhatsUp Gold v12

Features Overview Guide About new features in WhatsUp Gold v12 Features Overview Guide About new features in WhatsUp Gold v12 Contents CHAPTER 1 Learning about new features in Ipswitch WhatsUp Gold v12 Welcome to WhatsUp Gold... 1 What's new in WhatsUp Gold v12...

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Life of a Packet CS 640, 2015-01-22

Life of a Packet CS 640, 2015-01-22 Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have

More information

PRODUCTIVITY ESTIMATION OF UNIX OPERATING SYSTEM

PRODUCTIVITY ESTIMATION OF UNIX OPERATING SYSTEM Computer Modelling & New Technologies, 2002, Volume 6, No.1, 62-68 Transport and Telecommunication Institute, Lomonosov Str.1, Riga, LV-1019, Latvia STATISTICS AND RELIABILITY PRODUCTIVITY ESTIMATION OF

More information

CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study

CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what

More information

Rackspace Cloud Databases and Container-based Virtualization

Rackspace Cloud Databases and Container-based Virtualization Rackspace Cloud Databases and Container-based Virtualization August 2012 J.R. Arredondo @jrarredondo Page 1 of 6 INTRODUCTION When Rackspace set out to build the Cloud Databases product, we asked many

More information

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls

More information

Datacenter Operating Systems

Datacenter Operating Systems Datacenter Operating Systems CSE451 Simon Peter With thanks to Timothy Roscoe (ETH Zurich) Autumn 2015 This Lecture What s a datacenter Why datacenters Types of datacenters Hyperscale datacenters Major

More information

TRACE PERFORMANCE TESTING APPROACH. Overview. Approach. Flow. Attributes

TRACE PERFORMANCE TESTING APPROACH. Overview. Approach. Flow. Attributes TRACE PERFORMANCE TESTING APPROACH Overview Approach Flow Attributes INTRODUCTION Software Testing Testing is not just finding out the defects. Testing is not just seeing the requirements are satisfied.

More information

Load Balancing for Microsoft Office Communication Server 2007 Release 2

Load Balancing for Microsoft Office Communication Server 2007 Release 2 Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information