ATM Virtual Private Networks for the Internet Data Traffic

Author(s):  
Carlos M. D. Pazos ◽  
Mario Gerla
EDPACS ◽  
1999 ◽  
Vol 27 (2) ◽  
pp. 16-16 ◽  
Author(s):  
Charlie Scott ◽  
Paul Wolfe ◽  
Mike Erwin

2020 ◽  
Vol 8 (6) ◽  
pp. 5643-5646

Since last decade, the exponential growth of the internet users and the size of data over the internet is increasing day by day, which lead to increase the complexity of the systems by implementing policies and security to avoid attacks on systems and networks. It is very important to understand and analyses the real time data traffic of the communication systems. The purpose of this paper to design a customized Java based application which enables analysts to capture the traffic at the bottleneck under the mean field communication environment where a large number of devices are communicating with each other. The sending data for further processing for analysis the trend to overcome vulnerabilities or to manage the effectiveness of the communication systems. The proposed application enables to capture 8 different types of protocol traffic such as HTTP, HTTPS, SMTP, UDP, TCP, ICMP and POP3. The application allows for analysis of the incoming/outgoing traffic in the visual to understand the nature of communication networks which lead to improve the performance of the networks with respect to hardware, software, data storage, security and reliability.


Author(s):  
Ravindra Kumar Singh Rajput ◽  
Dinesh Goyal

Every software application has its own minimum set of requirements like CPU, storage, memory, networking, and power. These have to be integrated into a specific configuration to allow the smooth functioning of the software application. When data traffic becomes higher than expected, higher resources are required. There may not be enough time to provision new resources manually; in such cases, an auto-scaling system is required for managing these situations. Cloud computing means using data, programs, and other resources pooled in the data center and accessed through the internet instead of the user's computer. In the chapter, the authors discussed some aspects related to cloud computing like cloud workload, load balancing, load balancing algorithms, scaling techniques, and auto-scaling to fulfill cloud workload balancing requirements.


Computer ◽  
1997 ◽  
Vol 30 (11) ◽  
pp. 18-20 ◽  
Author(s):  
S. Ortiz

2008 ◽  
Vol 22 (4) ◽  
pp. 519-536 ◽  
Author(s):  
Kostia Avrachenkov ◽  
Uri Yechiali

Data on the Internet is sent by packets that go through a network of routers. A router drops packets either when its buffer is full or when it uses the Active Queue Management. Currently, the majority of the Internet routers use a simple Drop Tail strategy. The rate at which a user injects the data into the network is determined by transmission control protocol (TCP). However, most connections in the Internet consist only of few packets, and TCP does not really have an opportunity to adjust the sending rate. Thus, the data flow generated by short TCP connections appears to be some uncontrolled stochastic process. In the present work we try to describe the interaction of the data flow generated by short TCP connections with a network of finite buffers. The framework of retrial queues and networks seems to be an adequate approach for this problem. The effect of packet retransmission becomes essential when the network congestion level is high. We consider several benchmark retrial network models. In some particular cases, an explicit analytic solution is possible. If the analytic solution is not available or too entangled, we suggest using a fixed-point approximation scheme. In particular, we consider a network of one or two tandem M/M/1/K-type queues with blocking and with an M/M/1/∞-type retrial (orbit) queue. We explicitly solve the models with particular choices of K, derive stability conditions for K≥1, and present several graphs based on numerical results.


Respati ◽  
2020 ◽  
Vol 15 (1) ◽  
pp. 1
Author(s):  
Lukman Lukman ◽  
Wahyu Adi Pratomo

INTISARIMengakses internet adalah kegiatan yang tidak lepas dari kebutuhan masyarakat setiap hari pada saat ini. Hal tersebut dapat dilihat dari banyaknya kegiatan yang menggunakan akses internet sebagai sumber informasi dan sebagai lalu lintas data antara satu perangkat ke perangkat lainnya. Seiring berjalannya waktu semakin banyak perangkat yang membutuhkan akses internet untuk identifikasi dan definisi lokasi. Namun apakah alamat ip yang tersedia pada saat ini dapat mencukupi kebutuhan alamat ip yang semakin lama semakin bertambah akibat banyaknya perangkat yang membutuhkan alamat ip untuk mengakses internet. Jika dilihat di masa yang akan datang IPv4 yang sekarang masih kita gunakan tidak akan mencukupi kebutuhan alamat ip oleh perangkat yang digunakan. Oleh karena itu perpindahan untuk mulai menggunakan IPv6 sangatlah penting karena alamat ip IPv6 yang dihitung hampir tak terbatas dapat mencukupi kebutuhan alamat ip untuk digunakan oleh banyak perangkat. Untuk mengatasi permasalahan transisi dari IPv4 ke IPv6, Hurricane Electric ada dengan keunggulan seperti menyediakan IPv6 untuk pengguna, tanpa dipungut biaya, serta memberikan materi dan konfigurasi yang dapat digunakan oleh pengguna untuk melakukan proses transisi. Dalam proses transisi IPv4 ke IPv6 mekanisme transisi yang digunakan adalah menggunakan Tunneling, yang secara tidak langsung juga menggunakan Dual Stack karena IPv6 akan diterapkan kedalam Jaringan IPv4 yang sudah ada. Mikrotik router digunakan sebagai penghubung antara klien ke Tunnel Server dan pendelegasi IPv6 yang didapatkan dari Tunnel.Dengan pengimplementasian IPv6 ini didapatkan Hurricane Electric akan menyediakan alamat IPv6 yang bisa digunakan oleh pengguna untuk melakukan transisi Tunneling pada infrastruktur Jaringan IPv4 dan menghubungkan ke Jaringan IPv6 di internet, diharapkan banyak orang dan instasi yang akan mengerti dan memahami penggunaan dari IPv6 secara keseluruhan. Selain itu diharapkan penggunaan IPv6 juga semakin meningkat untuk menggantikan IPv4 yang sudah mulai kehabisan alamat ip untuk digunakan.Kata kunci: IPv4, IPv6, Transisi, Tunnel Broker, Hurricane Electric, Mikrotik.  ABSTRACTAccessing the internet is an activity that can not be separated from the needs of the community every day at this time. This can be seen from the many activities that use internet access as a source of information and as data traffic between one device to another. Over time more and more devices need internet access for location identification and definition. But whether the available IP address at this time can meet the need for an IP address that is increasingly growing due to the number of devices that require an IP address to access the internet. When viewed in the future, the IPv4 that we still use today will not meet the needs of the IP address of the device being used. Therefore the move to start using IPv6 is very important because the IPv6 IP address that is counted is almost unlimited can meet the needs of the IP address to be used by many devices.To overcome the problem of the transition from IPv4 to IPv6, Hurricane Electric comes with advantages such as providing IPv6 to users, free of charge, as well as providing material and configuration that can be used by users to make the transition process. In the process of transitioning from IPv4 to IPv6 the transition mechanism used is to use Tunneling, which indirectly also uses Dual Stack because IPv6 will be applied to the existing IPv4 Network. Mikrotik router is used as a liaison between the client to the Tunnel Server and IPv6 delegation obtained from the Tunnel.With the implementation of IPv6, Hurricane Electric will provide an IPv6 address that can be used by users to transition Tunneling on IPv4 Network infrastructure and connect to the IPv6 Network on the internet, it is hoped that many people and institutions will understand and understand the use of IPv6 as a whole. In addition it is expected that the use of IPv6 will also increase to replace IPv4 which has started to run out of ip addresses for use.Keywords: IPv4, IPv6, Transition, Tunnel Broker, Hurricane Electric, Mikrotik.


2021 ◽  
Vol 10 (1) ◽  
pp. 8-11
Author(s):  
Michael Schapira

Combatting internet time shifters Arguably, the internet’s biggest security hole is the Border Gateway Protocol (BGP), which establishes routes between the organisational networks that make up the internet (e.g. Google, Facebook, Bank of England, Deutsche Telekom, AT&T). The insecurity of the internet’s routing system is constantly exploited to steal, monitor, and tamper with data traffic. Yet, despite many years of Herculean efforts, internet routing security remains a distant dream. The goal of the SIREN project is to propose and investigate novel paradigms for closing this security hole.


2021 ◽  
Vol 229 ◽  
pp. 01050
Author(s):  
Hassan Ouahi ◽  
Abdenbi Mazoul

Since the 2000s, the idea that the Internet could be used for machine-to-machine communication and process automation has emerged. Together with the development of electronic objects capable of communicating with IP protocols, this idea led to the concept of the Internet of Things (IoT Internet of Things). Nowadays, the evolution of networks is very intense. New networks are appearing, “all-optical” solutions in the heart of networks, “wireless” solutions to facilitate access to users or to implant sensors / actors in places difficult to access, or finally the Internet of communicating objects. In this evolution, new scientific issues and challenges are emerging. Some of the problems are related to the optimization of generated traffic as well as the improvement of the performance of tools and techniques. Often, these optimization problems lead to models using graphs. The analysis of optimization problems in networks is an important activity. IOT networks create more data traffic that is difficult to control within the operator’s network. The method given in this paper will help network operators optimize their networks and assist developers in improving hardware and software interactions to reduce data traffic in the network.


Author(s):  
Bagus Aji Saputro

Computer network users have to spend a lot of money to use the Internet. The Internet has given a very big change in the dissemination of information, so that many people are using data through the Internet. This problem can be solved by MikroTik as a regulator of Internet data traffic and limiting bandwidth that can interfere with computer network activities in accordance with the regulations that have been applied. As a result of not being limited in bandwidth, it causes an overload on a network which has an impact on disrupting internet traffic on that network. Each agency should implement bandwidth restrictions according to the needs of users using the internet. Result from this research is not being limited in bandwidth, it causes an overload on a network which has an impact on disrupting internet traffic on that network. Each agency should implement bandwidth restrictions according to the needs of users using the internet.


Sign in / Sign up

Export Citation Format

Share Document