Performance Test Comparison of Internet Layer Protocols on CentOS and 2007 for Data, DNS and Voice Traffic
نویسندگان
چکیده
Today's era of packet switched networks demands larger bandwidth to suffice the need to integrate multimedia applications like Internet gaming, transmission of voice etc. It becomes necessary to judge the network performance with the allocated bandwidth. Network performance depends mainly on the efficiency of the protocol used in addition to load on the network, the transmission system type and the connected hardware capabilities. The performance of the two versions of Internet Protocol IPv4 and IPv6 is tested as well as compared on CentOS and windows 2007 operating systems for different voice samples, DNS traffic, data traffic and Internet gaming traffic characteristics like counterstrike and Quake III. The transport layer data traffic and the application layer DNS and voice traffic was generated using the latest version of Distributed Internet Traffic Grapher tool; D-ITG 2. 8. 0 rc1. The effect of transmitting voice over IP with compressed RTP and with and without voice activity detection is also observed.
منابع مشابه
Detecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملDetecting Active Bot Networks Based on DNS Traffic Analysis
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...
متن کاملAn Fpga-based System for Detecting Malicious Dns Network Traffic
Billions of packets traverse computer networks every day. Often, these packets have legitimate destinations such as buying a book at amazon.com or streaming a video. Unfortunately, malicious and suspicious network traffic continues to plague the Internet. One example is abusing the Domain Name System (DNS) protocol to exfiltrate sensitive data, establish backdoor tunnels, or control botnets. To...
متن کاملPerformance Improvement of Expanded Integrated Local Area Networks (RESEARCH NOTE)
In Local Area Networks (LAN) connected together by bridges, flow control and smooth traffic in the network is very important. However, congestion at bridges can cause intensive loss of received frames. In addition, the received frames are thrown away and have to be retransmitted by the source station, which causes more congestion and massive reduction in the overall network throughput. The netw...
متن کاملModeling of VANET Technology & Ad-Hoc Routing Protocols Based on High Performance Random Waypoint Models
Today, one of the new technologies in the modern era is Vehicular Ad-hoc Network which has takenenormous attention in the recent years. Because of rapid topology changing and frequent disconnectionmakes it difficult to design an efficient routing protocol for routing data between vehicles, called V2V orvehicle to vehicle communication and vehicle to roadside infrastructure, called V2I. Designin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013