Performance Evaluation of Hardware Unit for Fast IP Packet Header Parsing

Author(s):  
Danijela Efnusheva
2020 ◽  
Vol 20 (3) ◽  
pp. 147-158
Author(s):  
Mosleh M. Abualhaj ◽  
Sumaya N. Al-Khatib ◽  
Qusai Y. Shambour

AbstractVoice over IP (VoIP) wastes a valuable amount of bandwidth because of its large packet header size compared to its small packet payload. The main objective of this paper is to reduce the amount of this wasted bandwidth, by proposing a new packets coalescence method, called Payload Shrinking and Packets Coalesce (PS-PC). The proposed PS-PC method reduces the amount of the wasted bandwidth by i) coalesces a group of VoIP packets in one header instead of a separate header to each packet and ii) shrinks the VoIP packet payload to a smaller one based on a certain algorithm. The proposed PS-PC method is deployed at the sender side VoIP gateway that represents an exit point to a myriad number of simultaneous VoIP calls. The performance evaluation showed better bandwidth usage when deploying the proposed PS-PC method with ITTP protocol in comparison to the traditional ITTP protocol without the PS-PC method.


2021 ◽  
Vol 21 (1) ◽  
pp. 137-150
Author(s):  
Mosleh M. Abualhaj ◽  
Mayy M. Al-Tahrawi ◽  
Mahran Al-Zyoud

Abstract The inefficient use of the IP network bandwidth is a fundamental issue that restricts the exponential spreading of Voice over IP (VoIP). The primary reason for this is the big header size of the VoIP packet. In this paper, we propose a method, called Short Voice Frame (SVF), that addresses the big header size of the VoIP packet. The main idea of the SVF method is to make effective use of the VoIP packet header fields that are unneeded to the VoIP technology. In particular, these fields will be used for temporarily buffering the voice frame (VoIP packet payload) data. This will make the VoIP packet payload short or even zero in some cases. The performance evaluation of the proposed SVF method showed that the use of the IP network bandwidth has improved by up to 28.3% when using the G.723.1 codec.


The Packet classification method plays a significant role in most of the Network systems. These systems categories the incoming packets in various flows and takes suitable action based on the requirements. If the size of the network is vast and complexity will arise to perform the different operations, which affects the network performance and other constraints also. So there is the demand for high-speed packet classifiers to reduce the network complexity and improve the network performance. In this article, The Bit vector Packet classifier (BV-PC) Module is designed to improve the network system performance and overcome the existing limitation of Packet classification approaches on FPGA. The BV-PC Module contains Packet generation Unit (PGU) to receive the valid incoming packets, Memory Unit (MU) to store valid packets, Header Extractor Unit (HEU) extracts the IP Header address information from the Valid packets, The BV-Based Source and Destination Address (BV-SA, BV-DA) unit receives the IP packet header Information and Process with BV based rule set and aggregates the BV-SA and BV-DA outputs, Priority Encoder encodes the Highest priority BV Rule for the generation of Classified output. The BV-PC utilizes <2% Chip area (slices), works at 509.38MHz, and consumed Less 0.103 W of total Power on Artix-7 FPGA. The BV-PC operates with a latency of 5 clock cycles and works at 815.03Mpps throughput. The BV-PC is compared with existing approaches and provides Better improvements in Hardware constraints.


2013 ◽  
Vol 347-350 ◽  
pp. 3721-3723
Author(s):  
Jie Ying Lao ◽  
Zhi Lei Sun

Speedy IP Traceback method (SIPT) is deficient in monitoring and position attack sources, this paper puts forward an improvement scheme based on SIPT, it only marks two-three times for the packet on the key locations, and the propose also overload rarely used fields on IP packet header to store the checkpoint information, which can traceback the attack source use these marking information, which would help to attack path-reconstruction with a low false-positive rate as a guid.


2019 ◽  
Vol 3 (1) ◽  
pp. 76-84
Author(s):  
Gede Barkah Widagdo

This paper is the initials of DDoS mitigation, the goal of this research is to detect NTP Amplification as early as possible so that the victim have a data to do further eskalation process. We knows that the goal of the attacker using NTP Amplification Attack is to exhaust the bandwidth of the victim, in this research also simulate an NTP amplification scenario and detection method; the scenario is the attacker sends requests with spoofed IP MONLIST victim to the compromised NTP server NTP server then responds the large volumes of traffic (amplified traffic) towards Victim to consume the bandwidth so as the legitimate user could not access the services. We put DDoS detection device side of the victim, we combine several monitoring tools to detect NTP amplification i.e bandwidth gauge and netflow analyzer. Netflow analyzer (flow analysis) conduct analysis IP packet header that is sent by the router as a flow-exporter. In our experiment, we could perform early detection of the NTP amplification less than 2 minute.


Author(s):  
Carl Malings ◽  
Rebecca Tanzer ◽  
Aliaksei Hauryliuk ◽  
Provat K. Saha ◽  
Allen L. Robinson ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document