traffic generator
Recently Published Documents


TOTAL DOCUMENTS

106
(FIVE YEARS 20)

H-INDEX

8
(FIVE YEARS 2)

Author(s):  
Yahya Hidayatullah ◽  
Arief Marwanto ◽  
Imam Much Ibnu Subroto

The validation and accuracy of internet protocol version 6 (IPv6) performance using jumbo frames is still not perfect, due to peer-to-peer connections testing within the same operating system and between operating systems. Therefore, inaccurate data test results. To mitigated, testing with a wider platform is recommended, a medium-scale network connection is proposed such as metropolitan area networks. In this works, a connection between computer devices connected by three proxy routers are made, with different IPv6 segments on each port. Then each computer device sends traffic data to each other using a traffic-generator application. The first test through three routers without tunnel connection is carried out as the first scenario to compare performance with tunnel-based testing. Three parameters have been used in this test, such as maximum transfer unit (MTU) 1500 bytes, MTU 400 bytes and MTU 9000 bytes. The results of the tests conducted show that the use of jumbo frames using a proxy is less effective, even though it produces a larger throughput when using the MTU 4000, but there is fragmentation in the packet passing through the proxy because the packet passing through the proxy is split into 1500 byte sizes.


IoT ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 140-162
Author(s):  
Hung Nguyen-An ◽  
Thomas Silverston ◽  
Taku Yamazaki ◽  
Takumi Miyoshi

We now use the Internet of things (IoT) in our everyday lives. The novel IoT devices collect cyber–physical data and provide information on the environment. Hence, IoT traffic will count for a major part of Internet traffic; however, its impact on the network is still widely unknown. IoT devices are prone to cyberattacks because of constrained resources or misconfigurations. It is essential to characterize IoT traffic and identify each device to monitor the IoT network and discriminate among legitimate and anomalous IoT traffic. In this study, we deployed a smart-home testbed comprising several IoT devices to study IoT traffic. We performed extensive measurement experiments using a novel IoT traffic generator tool called IoTTGen. This tool can generate traffic from multiple devices, emulating large-scale scenarios with different devices under different network conditions. We analyzed the IoT traffic properties by computing the entropy value of traffic parameters and visually observing the traffic on behavior shape graphs. We propose a new method for identifying traffic entropy-based devices, computing the entropy values of traffic features. The method relies on machine learning to classify the traffic. The proposed method succeeded in identifying devices with a performance accuracy up to 94% and is robust with unpredictable network behavior with traffic anomalies spreading in the network.


2021 ◽  
Vol 34 (4) ◽  
pp. 525-546
Author(s):  
Nadja Gavrilovic ◽  
Vladimir Ciric

Due to the increasing amount of spam email traffic, email users are in increasing danger, while email server resources are becoming overloaded. Therefore, it is necessary to protect email users, but also to prevent SMTP system overload during spam attacks. The aim of this paper is to design and implement an autoscalable distributed anti-spam SMTP system based on a Proof of work concept. The proposed solution extends SMTP protocol in order to enable the evaluation of the client?s credibility using the Proof of work algorithm. In order to prevent resource overload during spam attacks, the anti-spam SMTP system is implemented in a distributed environment, as a group of multiple anti-spam SMTP server instances. Kubernetes architecture is used for system distribution, configured with the possibility of autoscaling the number of antispam SMTP server instances depending on the system load. The implemented system is evaluated during a distributed spam attempt, simulated by a custom-made traffic generator tool. Various performance tests are given: (1) The proposed system?s impact on client?s behaviour and the overall amount of spam messages, (2) The performance of the undistributed anti-spam SMTP server during spam attack, in terms of resource load analysis (3) Autoscaling demonstration and evaluation of proposed distributed system?s performance during a spam attack. It is shown that the proposed solution has the possibility of reducing the amount of spam traffic, while processing tens of thousands of simultaneous SMTP client requests in a distributed environment.


Sensors ◽  
2020 ◽  
Vol 20 (15) ◽  
pp. 4123 ◽  
Author(s):  
Alexandru Lavric ◽  
Adrian I. Petrariu ◽  
Eugen Coca ◽  
Valentin Popa

The digital revolution has changed the way we implement and use connected devices and systems by offering Internet communication capabilities to simple objects around us. The growth of information technologies, together with the concept of the Internet of Things (IoT), exponentially amplified the connectivity capabilities of devices. Up to this moment, the Long Range (LoRa) communication technology has been regarded as the perfect candidate, created to solve the issues of the IoT concept, such as scalability and the possibility of integrating a large number of sensors. The goal of this paper is to present an analysis of the communication collisions that occur through the evaluation of performance level in various scenarios for the LoRa technology. The first part addresses an empirical evaluation and the second part presents the development and validation of a LoRa traffic generator. The findings suggest that even if the packet payload increases, the communication resistance to interferences is not drastically affected, as one may expect. These results are analyzed by using a novel Software Defined Radio (SDR) technology LoRa traffic generator, that ensures a high-performance level in terms of generating a large LoRa traffic volume. Despite the use of orthogonal variable spreading factor technique, within the same communication channel, the collisions between LoRa packets may dramatically decrease the communication performance level.


A software defined network (SDN) is combined with centralized management by providing separation of the network, data and control planes. Different cloud computing environments, enterprise data centers and service providers are using this important feature. By implementing software defined data centers. Here in this paper we have used Mininet to demonstrate the applicability of SDN for different scalability. We study the performance of two SDN controllers – RYU and POX, that are implemented in Python using Mininet and D-ITG, Distributed Internet Traffic Generator. During this study we have used two network topologies, single and linear. The performance parameters used are maximum delay, average jitter, average bitrate. Experimental results demonstrated that the linear topology with RYU controller performs better as compared to single topology with POX controller for different network sizes


Sign in / Sign up

Export Citation Format

Share Document