A Storage Scheme for Fast Packet Buffers in Network Processor

2011 ◽  
Vol 403-408 ◽  
pp. 2628-2631
Author(s):  
Jiang Yi Shi ◽  
Kun Chen ◽  
Kang Li ◽  
Zhi Xiong Di

With the Internet services increased explosively, the requirement for network bandwidth is rigorous. Upon the extraordinary development of process capability, Memory access control has become a key factor that impacts the performance of network processor. The paper proposed a storage management for fast packet buffers in network processor, which can enhance the utilization of bandwidth. Experiment results shows that this approach improved the rates of accessing to memory system in network processor remarkably.

Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6471
Author(s):  
Chien-Lung Hsu ◽  
Wei-Xin Chen ◽  
Tuan-Vinh Le

As the Internet of Things (IoT) has become prevalent, a massive number of logs produced by IoT devices are transmitted and processed every day. The logs should contain important contents and private information. Moreover, these logs may be used as evidences for forensic investigations when cyber security incidents occur. However, evidence legality and internal security issues in existing works were not properly addressed. This paper proposes an autonomous log storage management protocol with blockchain mechanism and access control for the IoT. Autonomous model allows sensors to encrypt their logs before sending it to gateway and server, so that the logs are not revealed to the public during communication process. Along with blockchain, we introduce the concept “signature chain”. The integration of blockchain and signature chain provides efficient management functions with valuable security properties for the logs, including robust identity verification, data integrity, non-repudiation, data tamper resistance, and the legality. Our work also employs attribute-based encryption to achieve fine-grained access control and data confidentiality. The results of security analysis using AVSIPA toolset, GNY logic and semantic proof indicate that the proposed protocol meets various security requirements. Providing good performance with elliptic curve small key size, short BLS signature, efficient signcryption method, and single sign-on solution, our work is suitable for the IoT.


Author(s):  
A. V. Katernyuk

In all spheres business experts try to raise competitiveness of the company by different ways, for instance at the expense of more efficient redistribution of available resources (costs). Objectives connected with modeling and optimizing resources used in advertising are becoming the most topical. Deeper knowledge in planning and conducting any marketing and advertising campaigns are in demand today among many specialists. The process of searching for and finding optimum costs of advertising in the Internet as a factor of the rise in the company sustainability can be successfully shaped through universal matrix methods of solution (e.g. simplex-method). Objectives which cannot be resolved by this method can be supplemented by such economic indicators, as profitability of investment and return on one ruble. The article summarizes the instrumental base dealing with estimating the efficiency of events connected with customer attraction to such a fast growing industry as internet-services. The author proposes besides traditional ways of expense optimization to take into account economic indicators connected with profitability of each sale channel. The following tools were used in the research: modeling, induction method, investment analysis, methods of statistics and formal logics, multi-criteria optimization, specific software meant for solving similar tasks, in particular special macros for excel table.  


2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


2018 ◽  
Author(s):  
Sigit Haryadi

The method of calculating the level of equity of internet services of several cities or provinces in a country is a statistical measure showing how far the internet service speed distribution being measured is to have similarities with the reference distribution of all elements equal to one, where the determination of the level of equity is done by calculating the Index Haryadi from the relationship between internet service speed distribution as measured by reference distribution. In this case, an equalization index equal to one represents a perfect similarity between the elements of the distribution as measured by the pairs of elements of the reference distribution. Let R be the reference distribution = {0.7 Mbps; 0.8 Mbps; 0.9 Mbps; 1 Mbps; 1.1 Mbps; 1.2 Mbps; 1.3 Mbps; 1.4 Mbps} and Y is the measured internet rate = = 1.05 Mbps; 1.2 Mbps; 1.35 Mbps; 2 Mbps; 1.65 Mbps; 1.8 Mbps; 1.95 Mbps; 2.1 Mbps}, then Y has an Internet service equalization index equal to one, through the Y = 1.5R relationship function because all elements of Y are equal to 1.5 times of the pairing elements of R.


2021 ◽  
Vol 6 ◽  
pp. 102-113
Author(s):  
Alexey Gaivoronski ◽  
◽  
Vasily Gorbachuk ◽  
Maxim Dunaievskiy ◽  
◽  
...  

As computing and Internet connections become general-purpose technologies and services aimed at broad global markets, questions arise about the effectiveness of such markets in terms of public welfare, the participation of differentiated service providers and end-users. Motorola’s Iridium Global Communications project was completed in the 1990s due to similar issues, reaching the goal of technological connectivity for the first time. As Internet services are characterized by high innovation, differentiation and dynamism, they can use well-known models of differentiated products. However, the demand functions in such models are hyperbolic rather than linear. In addition, such models are stochastic and include providers with different ways of competing. In the Internet ecosystem, the links between Internet service providers (ISPs) as telecommunications operators and content service providers are important, especially high-bandwidth video content providers. As increasing bandwidth requires new investments in network capacity, both video content providers and ISPs need to be motivated to do so. In order to analyze the relationships between Internet service providers and content providers in the Internet ecosystem, computable models, based on the construction of payoff functions for all the participants in the ecosystem, are suggested. The introduction of paid content browsing will motivate Internet service providers to invest in increasing the capacity of the global network, which has a trend of exponential growth. At the same time, such a browsing will violate the principles of net neutrality, which provides grounds for the development of new tasks to minimize the violations of net neutrality and maximize the social welfare of the Internet ecosystem. The models point to the importance of the efficiency of Internet service providers, the predictability of demand and the high price elasticity of innovative services.


First Monday ◽  
2021 ◽  
Author(s):  
Michel Mersereau

This paper presents highlights of research conducted into the Internet supported household activities of residents at the Toronto Community Housing Corporation (TCHC). The routines of residents in five distinct basic needs activity areas were examined in an effort to identify the role of the Internet in supporting these undertakings. The results indicate that the Internet can be characterized as an essential technical resource that supports the stability of TCHC households by helping to multiply and interconnect the activities that constitute household routines. By providing an explanatory model of the Internet’s role in supporting the stability of TCHC households, this research advances an argument for public intercession in the provisioning of household Internet services to help redress the digital divide in Canada’s most populous city.


Sign in / Sign up

Export Citation Format

Share Document