Academic literature on the topic 'Comparison of Linux Firewalls'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Comparison of Linux Firewalls.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Comparison of Linux Firewalls"

1

Rafamantanantsoa, Fontaine, and Haja Louis Rabetafika. "Performance Comparison and Simulink Model of Firewall Free BSD and Linux." Communications and Network 10, no. 04 (2018): 180–95. http://dx.doi.org/10.4236/cn.2018.104015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhu, Yao Qin. "Structural Analysis and Preparation of the Netfilter." Advanced Materials Research 926-930 (May 2014): 2418–21. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2418.

Full text
Abstract:
As an open-source Linux system, firewall security and defense capability is very strong. In the whole process of network firewalls,and multiple monitoring points are based on netfilter. This paper analyzes the structure of the netfilter and ipt_entry store,look in everyday applications, Linux modular system can be better integrated,so that the speed and stability of the system is improved more.
APA, Harvard, Vancouver, ISO, and other styles
3

Filippov, M. V., N. Yu Ryazanova, and B. I. Ryazantsev. "The Outgoing and Incoming Network Packets Intercepting Method." Mechanical Engineering and Computer Science, no. 12 (January 4, 2018): 45–56. http://dx.doi.org/10.24108/1217.0001344.

Full text
Abstract:
In connexion with the rapidly growing computer network information capacities, information security of local networks connected with global networks becomes a critical challenge. One of the information security aspects is to control and filter the network traffic by intercepting the incoming and outgoing network packets. This is accomplished owing to firewalls. The Linux kernel 2.4.x included the Netfilter firewall and the iptables utility, which allow us to analyse only the packets headers and their pertaining to specific network connections. In addition, the practice of rewriting the Linux kernel codes complicates the maintenance of the software targeting for this firewall.The article proposes a network packet intercepting method based directly on the structures and functions of the kernel, so it has no restrictions associated with the inherent Netfilter/iptables functionality. To provide intercepting, are used the struct net_device structure of the kernel that describes a network device and the struct net_device_ops structure that lists operations possible on the network device and two functions: ndo_start_xmit and rx_handler used to process outgoing and incoming packets, respectively. These functions are rewritten in order to include new functionality into the kernel to meet the users’ requests. The use of the structures and functions of the kernel provides desirable stability, versatility, and adaptive capability of the developed software for users’ requests such as content analysis of data transmitted in packets, their encryption and decryption. The proposed method can be used to create firewalls of the next-generation to implement technology of deep packet inspection, as well as a complement to the available firewalls.
APA, Harvard, Vancouver, ISO, and other styles
4

Stočka, Vitauts. "DEVELOPMENT OF LINUX-BASED NETWORK ADMINISTRATION AND CONTROL SYSTEM." Environment. Technology. Resources. Proceedings of the International Scientific and Practical Conference 1 (June 20, 2001): 284. http://dx.doi.org/10.17770/etr2001vol1.1955.

Full text
Abstract:
Administration and control of medium-sized and large computer networks is one o f the most important tasks for any organization. Existing solutions are either too expensive for educational institutions or consists of many separate programs with little or no centralized managements. This work describes system in development based on "Linux” operational system and popular open standards. The central part of the system is LDAP database for information about servers, computers, users etc. This database is used by many less or more independent modules, including mail, proxy and other Internet servers. Access to these services is controlled by firewalls and specialized client/server authorization system, which is needed to prevent password sniffing and other methods of unauthorized access. System is managed from a centralized web-based administration interface. System is under development and will be implemented in several stages, module by module.
APA, Harvard, Vancouver, ISO, and other styles
5

Prajapati, Gourishankar, and Nilay Khare. "A Comparative Study of Software Firewall on Windows and Linux Platform." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 8 (June 2, 2015): 5967–78. http://dx.doi.org/10.24297/ijct.v14i8.1868.

Full text
Abstract:
Nowadays, the communication through World Wide Web (WWW) is growing rapidly. All the gadgets, computer and handheld devices are connected via wire or wireless media and communicated to each others. Thus, network security is the essential requirement of an organization or individuals. Organizations are protecting their communication from unauthorized access by introducing network firewalls. A Firewall is an application program which runs on any platform such as windows, Linux, Solaris, Macintosh etc and protected the networks or systems via implementing policies and rules. In this paper, the performance of firewall is measured and compared on Windows and Linux platform individual. To evaluate the performance, a private network has been setup in which three machines are connected via a switch; one Windows machine running windows firewall, one Linux machine running Linux firewall (IPTable) and one more machine that acting as a client. On both the platforms, the performance is measured in two situations: first when network is traffic free and second network with traffic. When network is traffic free then both the platforms reflect the common normal processing behavior in context of time and packet received per second; and when packets are pumped at a very high speed in the network then the processing time and packet received per second increases exponentially in both the platforms.
APA, Harvard, Vancouver, ISO, and other styles
6

Mohammed, Raya Kahtan, and Yoichiro UENO. "An FPGA-based Network Firewall with Expandable Rule Description." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 3 (June 1, 2018): 1310. http://dx.doi.org/10.11591/ijeecs.v10.i3.pp1310-1318.

Full text
Abstract:
<p>With the rapid growth of communications via the Internet, the need for an effective firewall system which has not badly affect the overall network performances has been increased. In this paper, a Field Programmable Gate Array (FPGA) -based firewall system with high performance has been implemented using Network FPGA (NetFPGA) with Xilinx Kintex-7 XC7K325T FPGA. Based on NetFPGA reference router project, a NetFPGA-based firewall system was implemented. The hardware module performs rule matching operation using content addressable memory (CAM) for higher speed data processing. To evaluate system performance, throughput, latency, and memory utilization were measured for different cases using different tools, also the number of rules that an incoming packet is subjected to was varied to get more readings using both software and hardware features. The results showed that the designed firewall system provides better performance than traditional firewalls. System throughput was doubled times of the one with Linux-Iptables firewalls.</p>
APA, Harvard, Vancouver, ISO, and other styles
7

PETRICĂ, Gabriel. "A Study on Password Strength in Wireless Encryption Protocols." International Journal of Information Security and Cybercrime 8, no. 2 (December 27, 2019): 21–26. http://dx.doi.org/10.19107/ijisc.2019.02.02.

Full text
Abstract:
Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.
APA, Harvard, Vancouver, ISO, and other styles
8

Cho, Sung-Ho, Sung-Uk Choi, and . "A Study on Comparison of Network Location Efficiency of Web Application Firewall." International Journal of Engineering & Technology 7, no. 3.33 (August 29, 2018): 183. http://dx.doi.org/10.14419/ijet.v7i3.33.21009.

Full text
Abstract:
This paper proposes a method to optimize the performance of web application firewalls according to their positions in large scale networks. Since ports for web services are always open and vulnerable in security, the introduction of web application firewalls is essential. Methods to configure web application firewalls in existing networks are largely divided into two types. There is an in-line type where a web application firewall is located between the network and the web server to be protected. This is mostly used in small scale single networks and is vulnerable to the physical obstruction of web application firewalls. The port redirection type configured with the help of peripheral network equipment such as routers or L4 switches can maintain web services even when physical obstruction of the web application firewall occurs and is suitable for large scale networks where several web services are mixed. In this study, port redirection type web application firewalls were configured in large-scale networks and there was a problem in that the performance of routers was degraded due to the IP-based VLAN when a policy was set for the ports on the routers for web security. In order to solve this problem, only those agencies and enterprises that provide web services of networks were separated and in-line type web application firewalls were configured for them. Internet service providers (ISPs) or central line-concentration agencies can apply the foregoing to configure systems for web security for unit small enterprises or small scale agencies at low costs.
APA, Harvard, Vancouver, ISO, and other styles
9

Satrya, Gandeva Bayu, Faiizal Eko Nugroho, and Tri Brotoharsono. "Improving Network Security - A Comparison of Open Source DPI Software." International Journal on Information and Communication Technology (IJoICT) 2, no. 2 (July 25, 2017): 11. http://dx.doi.org/10.21108/ijoict.2016.22.77.

Full text
Abstract:
<p>The classification of data traffic in a firewall using parameters such as port number, IP address, and MAC address is not sufficient. For example, currently, many applications can be used without a port number meaning they can easily circumvent a firewall. Firewalls inspecting up to only layer four could allow malicious data to pass. Next-generation deep packet inspection (DPI) is a method that can be used for firewalls as a method of classification up to layer seven in data traffic control.</p><p>This research recommends the use of nDPI and L7-filter by network administrators on existing open source firewalls. Eleven internet applications were used to test and analyze nDPI and L7-filter which are capable of detecting traffic based on the data signature. nDPI and L7-filter were tested for accuracy and speed. We conclude that the development of next-generation deep packet inspection is important for the future of system and network security.</p>
APA, Harvard, Vancouver, ISO, and other styles
10

Sheth, Chirag, and Rajesh Thakker. "Performance Evaluation and Comparison of Network Firewalls under DDoS Attack." International Journal of Computer Network and Information Security 5, no. 12 (October 1, 2013): 60–67. http://dx.doi.org/10.5815/ijcnis.2013.12.08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Comparison of Linux Firewalls"

1

AHMAD, MUHAMMAD ZEESHAN. "Comparative Analysis of Iptables and Shorewall." Thesis, Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6181.

Full text
Abstract:
The use of internet has increased over the past years. Many users may not have good intentions. Some people use the internet to gain access to the unauthorized information. Although absolute security of information is not possible for any network connected to the Internet however, firewalls make an important contribution to the network security. A firewall is a barrier placed between the network and the outside world to prevent the unwanted and potentially damaging intrusion of the network. This thesis compares the performance of Linux packet filtering firewalls, i.e. iptables and shorewall. The firewall performance testing helps in selecting the right firewall as needed. In addition, it highlights the strength and weakness of each firewall. Both firewalls were tested by using the identical parameters. During the experiments, recommended benchmarking methodology for firewall performance testing is taken into account as described in RFC 3511. The comparison process includes experiments which are performed by using different tools. To validate the effectiveness of firewalls, several performance metrics such as throughput, latency, connection establishment and teardown rate, HTTP transfer rate and system resource consumption are used. The experimental results indicate that the performance of Iptables firewall decreases as compared to shorewall in all the aspects taken into account. All the selected metrics show that large numbers of filtering rules have a negative impact on the performance of both firewalls. However, UDP throughput is not affected by the number of filtering rules. The experimental results also indicate that traffic sent with different packet sizes do not affect the performance of firewalls.
Muhammad Zeeshan Ahmad: +46-700228942
APA, Harvard, Vancouver, ISO, and other styles
2

Elnerud, Albin. "Comparison of hardware firewalls in a network environment." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-35608.

Full text
Abstract:
Today’s market offers a wide range of available firewalls, there are many manufacturers andeach of them has at least several series of possible solutions. As organisations and companiesseek to protect their assets against current and new hostile threats, the demands for networksecurity increases and drives the development of firewalls forward. With new firewalltechnologies emerging from a wide variety of firewall vendors, choosing the right firewall canbe both costly and time consuming. Requirements for a concrete network are needed to becorrelated with security functionalities, i.e., metrics for firewalls. Incorrect requirementsformulation or their incorrect mapping to metrics can lead to a financial loss or a firewallfailure in providing desired security functionalities. In this thesis, firewalls from three differentmanufacturers are investigated. Firewalls are compared and evaluated by using requirementsderived for Eskilstuna municipals network. To identify solutions fulfilling the requirements,metrics related to the requirements are identified. Two different placements for firewalldeployment are considered separately, as they have different requirements. The firewallcomparison consists of two steps. The first step of the comparison is done by evaluatingfirewalls from each manufacturer separately. After the best suited firewall from eachmanufacturer has been identified, the second step in the comparison is performed. The steptwo consists of comparing the best solution from each manufacturer between each other. Theoutcome of the comparison is a firewall solution that fulfills all requirements and can beconsidered as optimal choice for the investigated network environment.
APA, Harvard, Vancouver, ISO, and other styles
3

Shakoori, Gustafsson David. "Linux CPU Schedulers: CFS and MuQSS Comparison." Thesis, Umeå universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-184495.

Full text
Abstract:
The goal of this thesis is to compare two process schedulers for the Linux operating system. In order to provide a responsive and interactive user experience, an efficient process scheduling algorithm is important. This thesis seeks to explain the potential performance differences by analysing the schedulers' respective designs. The two schedulers that are tested and compared are Con Kolivas's MuQSS and Linux's default scheduler, CFS. They are tested with respect to three main aspects: latency, turn-around time and interactivity. Latency is tested by using benchmarking software, the turn-around time by timing software compilation, and interactivity by measuring video frame drop percentages under various background loads. These tests are performed on a desktop PC running Linux OpenSUSE Leap 15.2, using kernel version 5.11.18. The test results show that CFS manages to keep a generally lower latency, while turn-around times differs little between the two. Running the turn-around time test's compilation using a single process gives MuQSS a small advantage, while dividing the compilation evenly among the available logical cores yields little difference. However, CFS clearly outperforms MuQSS in the interactivity test, where it manages to keep frame drop percentages considerably lower under each tested background load. As is apparent by the results, Linux's current default scheduler provides a more responsive and interactive experience within the testing conditions, than the alternative MuQSS. However, MuQSS's slightly superior performance using single process compilation may suggest that it is compatible with machines with a lower amount of logical cores.
APA, Harvard, Vancouver, ISO, and other styles
4

Sulaman, Sardar Muhammad. "An Analysis and Comparison of The Security Features of Firewalls and IDSs." Thesis, Linköpings universitet, Institutionen för systemteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-72934.

Full text
Abstract:
In last few years we have observed a significant increase in the usage of computing devices and their capabilities to communicate with each other. With the increase in usage and communicating capabilities the higher level of network security is also required. Today the main devices used for the network security are the firewalls and IDS/IPS that provide perimeter defense. Both devices provide many overlapping security features but they have different aims, different protection potential and need to be used together. A firewall is an active device that implements ACLs and restricts unauthorized access to protected resources. An IDS only provides information for further necessary actions, not necessarily perimeter related, but some of these needed actions can be automated, such as automatic blocking in the firewall of attacking sites, which creates an IPS. This thesis report analyzed some common firewall and IDS products, and described their security features, functionalities, and limitations in detail. It also contains the comparison of the security features of the both devices. The firewall and IDS perform different functions for the network security, so they should be used in layered defense architecture. The passwords, firewalls, IDSs/IPSs and physical security all together provide a layered defense and complement each other. The firewall and IDS alone cannot offer sufficient network protection against the network attacks, and they should be used together to enhance the defense-in-depth or layered approach.
APA, Harvard, Vancouver, ISO, and other styles
5

Lundholm, Anders. "A performance comparison of ZFS and Btrfs on Linux." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-10989.

Full text
Abstract:
In this thesis, the average throughput of Btrfs and ZFS on Linux is compared by conducting a set of experiments. Btrfs and ZFS are two enterprise-grade file systems that are designed with data integrity and scalability in mind and they bring numerous of other useful features as well. Btrfs is a relatively young file system whereas ZFS is more mature. However, the implementation of ZFS on the Linux platform was released only recently. The main conclusions that can be drawn from the analysis of the gathered data is that Btrfs has improved greatly in recent years and is today showing great throughput whereas ZFS on Linux is performing considerably worse than Btrfs.
APA, Harvard, Vancouver, ISO, and other styles
6

Thiruvallur, Vangeepuram Reventh. "Performance Comparison of Cassandra in LXC and Bare metal : Container Virtualization case study." Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-13451.

Full text
Abstract:
Big data is a developing term that describes any large amount of structured and unstructured data that has the potential to be mined for information. To store this type of large amounts of data, cloud storage systems are necessary. These cloud storage systems are developed such that they are capable of keeping the data accessible and available to the users over a network. To store big data new platforms are required. Some of the popular big data platforms are Mongo, Cassandra and Hadoop. In this thesis we used Cassandra database system because it is a distributed database and also open source. Cassandra’s architecture is master less ring design that is easy to setup and easy to maintain. Apache Cassandra is a highly scalable distributed database designed to handle big data management with linear scalable and seamless multiple data center deployment. It is a NoSQL database system which allow schema free tables so that a data item could have a variable set of columns unlike in relational databases. Cassandra provides with high scalability with no single point of failure. For the past few years’ container based virtualization has been evolving rapidly. Container based virtualization such as LXC have been focused here. Linux Containers (LXC) is an operating system level virtualization method for running multiple isolated Linux systems on a single control host. It does not resemble a virtual machine, but provides a virtual environment that has its own CPU, memory, network, etc. space and the resource control mechanism. In this thesis work performance of Apache Cassandra database has been analyzed between bare metal and Linux Containers(LXC). A three node Cassandra cluster has been created on both bare metal and Linux container. Assuming one node as seed and Cassandra stress utility tool has been used to test the load of Cassandra cluster. The performance of Cassandra cluster database has been evaluated in bare metal and Linux Container which is the goal of this thesis work. Linux containers (LXC) are deployed in all the servers. A three node Cassandra database cluster has been created in these servers and also in Linux Container(LXC). Port forwarding is the technique used here for making communication between Cassandra in LXC which is the goal of this thesis work. The performance metrics which determine the performance of Cassandra cluster database are selected according to it. The network configuration parameters are changed according to the behavior of Cassandra. By doing changes in these parameters Cassandra starts running according to the required configuration, after this Cassandra cluster performance will be analyzed. This is done with different write, read and mixed load operations and compared with Cassandra cluster performance on bare metal. The results of the thesis show an analysis of measurements of performance metrics like CPU utilization, Disk throughput and latency while running on Cassandra cluster in both bare metal and Linux Containers. A quantitative and statistical analysis of performance of Cassandra cluster is compared. The physical resources utilized by the Cassandra database on native bare metal and Linux Containers (LXC) is similar. According to the results, CPU utilization is more for Cassandra database in Linux Containers. Disk throughput is also more in Linux Containers except in the case of 66% load write operation. Bare metal has less latency compared to Linux Containers in all the scenarios.
APA, Harvard, Vancouver, ISO, and other styles
7

Indukuri, Pavan Sutha Varma. "Performance comparison of Linux containers(LXC) and OpenVZ during live migration : An experiment." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-13540.

Full text
Abstract:
Context: Cloud computing is one of the most widely used technologies all over the world that provides numerous products and IT services. Virtualization is one of the innovative technologies in cloud computing which has advantages of improved resource utilisation and management. Live migration is an innovative feature of virtualization that allows a virtual machine or container to be transferred from one physical server to another.  Live migration is a complex process which can have a significant impact on cloud computing when used by the cloud-based software.  Objectives: In this study, live migration of LXC and OpenVZ containers has been performed.  Later the performance of LXC and OpenVZ has been conducted in terms of total migration time and downtime. Further CPU utilisation, disk utilisation and an average load of the servers is also evaluated during the process of live migration. The main aim of this research is to compare the performance of LXC and OpenVZ during live migration of containers.  Methods: A literature study has been done to gain knowledge about the process of live migration and the metrics that are required to compare the performance of LXC and OpenVZ during live migration of containers. Further an experiment has been conducted to compute and evaluate the performance metrics that have been identified in the literature study. The experiment was done to investigate and evaluate migration process for both LXC and OpenVZ. Experiments were designed and conducted based on the objectives which were to be met. Results:  The results of the experiments include the migration performance of both LXC and OpenVZ. The performance metrics identified in the literature review, total migration time and downtime, were evaluated for LXC and OpenVZ. Further graphs were plotted for the CPU utilisation, disk utilisation, and average load during the live migration of containers. The results were analysed to compare the performance differences between OpenVZ and LXC during live migration of containers. Conclusions.  The conclusions that can be drawn from the experiment. LXC has shown higher utilisation, thus lower performance when compared with OpenVZ. However, LXC has less migration time and downtime when compared to OpenVZ.
APA, Harvard, Vancouver, ISO, and other styles
8

Ryding, Christian, and Rickard Johansson. "Jails vs Docker : A performance comparison of different container technologies." Thesis, Mittuniversitetet, Institutionen för data- och systemvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-39517.

Full text
Abstract:
Virtualization is used extensively by Enterprise IT architecture and cloud computing, it is used to provide customers a part of their hardware resources as a service. Container technology is the new generation of virtualization and provides performance benefits due to less overhead. Earlier research has compared different container technologies regarding their performance, including Docker which is the most popular container technology. Most of this research has been focusing on Linux based container technologies. Even though there is interest in knowing how other container technologies under different operating systems perform. In this study we explore the performance of Docker in contrast to the performance of a contending container technology named Jails. We present how well each container technology performs running one or multiple containers, in the areas of CPU, memory, read from disk, write to disk, network and startup time efficiency. The comparison was done using collected statistics from different benchmarking tools. Results from this study have shown that Docker is utilizing shared resources and has better stability compared to Jails. We also discuss what unexplored benefits Docker and Jails can have by implementing each other’s unique features. Future work could consist of writing to disk or reading from disk performance tests under one common filesystem, e.g., ZFS file system.
Virtualisering används i stor utsträckning av Enterprise IT-arkitektur och molntjänster, den används för att kunna erbjuda sina kunder en del av sina hårdvaruresurser som en tjänst. Containerteknologi är den nya generationen virtualisering och ger prestandafördelar på grund av mindre omkostnader. Tidigare forskning har jämfört olika containerteknologier angående deras prestanda, inklusive Docker, som är den mest populära containertekniken. Merparten av tidigare forskning har fokuserat på Linuxbaserade containerteknologier, även om det finns intresse för att veta hur andra containerteknologier under olika operativsystem fungerar. I denna studie undersöker vi Dockers prestanda jämfört med prestandan till containerteknologin med namnet Jails. Vi presenterar hur bra varje containerteknologi fungerar med att köra en eller flera containrar inom områdena CPU, minne, läsa från disk, skriva till disk, nätverkshastighet och starttid. Jämförelsen gjordes med insamlad statistik från olika referensverktyg. Resultat från denna studie har visat att Docker använder delade resurser på ett effektivare sätt och har bättre stabilitet jämfört med Jails. Vi diskuterar också vilka outforskade fördelar Docker och Jails kan ha genom att implementera varandras unika funktioner. Framtida arbete kan bestå av att skriva till disk eller läsa från diskprestanda under ett gemensamt filsystem, t.ex. ZFS-filsystem.
APA, Harvard, Vancouver, ISO, and other styles
9

Skopal, Miroslav. "Univerzální hardwarová platforma podporující operační systém Linux." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218709.

Full text
Abstract:
This thesis deals with the development problems and creating of the multi- purpose hardware platform, which supports operating system Linux. It is focused on the microprocessors using ARM architecture with architecture ARM7, ARM9 and ARM11. The scope of the first part of this thesis was searching the sales of available 32 bit ARM microprocessors. The second part is attended to a particular Mini2440 development kit, its animation and the subsequent development of the kernel drivers for OS Linux platform. One of this thesis details was also the development of my own expansive hardware module and a capacity keypad for a usage with Mini2440 developmental kit.
APA, Harvard, Vancouver, ISO, and other styles
10

Nyberg, Angelica, and Jonas Hartman. "Evaluation of EDF scheduling for Ericsson LTE system : A comparison between EDF, FIFO and RR." Thesis, Linköpings universitet, Programvara och system, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131551.

Full text
Abstract:
Scheduling is extremely important for modern real-time systems. It enables several programs to run in parallel and succeed with their tasks. Many systems today are real-time systems, which means that good scheduling is highly needed. This thesis aims to evaluate the real-time scheduling algorithm earliest deadline first, newly introduced into the Linux kernel, and compare it to the already existing real-time scheduling algorithms first in, first out and round robin in the context of firm tasks. By creating a test program that can create pthreads and set their scheduling characteristics, the performance of earliest deadline first can be evaluated and compared to the others.
Schemaläggning är extremt viktigt för dagens realtidssystem. Det tillåter att flera program körs parallellt samtidigt som deras processer inte misslyckas med sina uppgifter. Idag är många system realtidssystem, vilket innebär att det finns ett ytterst stort behov för en bra schemaläggningsalgoritm. Målet med det här examensarbetet är att utvärdera schema-läggningsalgoritmen earliest deadline first som nyligen introducerats i operativsystemet Linux. Målet är även att jämföra algoritmen med två andra schemaläggningsalgoritmer (first in, first out och round robin), vilka redan är väletablerade i Linux kärnan. Det här görs med avseende på processer klassificerade som firm. Genom att skapa ett program som kan skapa pthreads med önskvärda egenskaper kan prestandan av earliest deadline first algoritmen utvärderas, samt jämföras med de andra algoritmerna.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Comparison of Linux Firewalls"

1

B, Constantine Carl, ed. Linux firewalls. 2nd ed. Indianapolis, IN: New Riders, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ziegler, Robert L. Linux Firewalls. Indianapolis, Ind: New Riders, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Scott, Shinn, ed. Troubleshooting Linux firewalls. Upper Saddle River, NJ: Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Red Hat Linux firewalls. Indianapolis, IN: Wiley Publishing, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sonnenreich, Wes. Building Linux and OpenBSD firewalls. New York: Wiley, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ziegler, Robert L. Linux firewalls: Konzeption und Implementierung für kleine Netzwerke und PCs. München/Germany: Markt-und-Technik-Verl., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Spenneberg, Ralf. Linux-Firewalls mit iptables & Co: Sicherheit mit Kernel 2.4 und 2.6 für Linux-Server und -netzwerke. München [u.a.]: Addison-Wesley, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmed, Faisal. A comparison of Microsoft Windows XP Professional and Redhat Linux 8.0 Personal. London: University of East London, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Suehring, Robert Ziegler Steve. Linux Firewalls. Pearson Education, Limited, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ziegler, Robert. Linux Firewalls. Sams, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Comparison of Linux Firewalls"

1

Vazquez, Antonio. "Firewalls." In Learn CentOS Linux Network Services, 289–304. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2379-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Matotek, Dennis. "Networking and Firewalls." In Pro Linux System Administration, 175–266. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-1913-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Matotek, Dennis, James Turnbull, and Peter Lieverdink. "Networking and Firewalls." In Pro Linux System Administration, 217–95. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2008-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Both, David. "Routing and Firewalls." In Using and Administering Linux: Volume 3, 87–123. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5485-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hardy, Alexandre, and Martin S. Olivier. "A Comparison Between ConSA and Current Linux Security Implementations." In Database and Application Security XV, 211–24. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35587-0_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ha, Jong-Shik, Sang-Tae Kim, and Seok J. Koh. "Performance Comparison of SCTP and TCP over Linux Platform." In Lecture Notes in Computer Science, 396–404. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11538356_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Duarte, Diogo, Sérgio Silva, João M. Rodrigues, Salviano Pinto Soares, and António Valente. "Comparison of Embedded Linux Development Tools for the WiiPiiDo Distribution Development." In Advances in Intelligent Systems and Computing, 42–53. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52249-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thubaasini, P., R. Rusnida, and S. M. Rohani. "Efficient Comparison between Windows and Linux Platform Applicable in a Virtual Architectural Walkthrough Application." In Innovations in Computing Sciences and Software Engineering, 337–42. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-9112-3_57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Maintaining Firewalls." In Hack Proofing Linux, 543–98. Elsevier, 2001. http://dx.doi.org/10.1016/b978-192899434-3/50014-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"The Comparison: Linux vs. Mac OS X." In Mac for Linux Geeks, 17–39. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-1651-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Comparison of Linux Firewalls"

1

Melkov, Dmitrij, Arunas Saltis, and Sarunas Paulikas. "Performance Testing of Linux Firewalls." In 2020 IEEE Open Conference of Electrical, Electronic and Information Sciences (eStream). IEEE, 2020. http://dx.doi.org/10.1109/estream50540.2020.9108868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kovacs, Akos. "Comparison of different Linux containers." In 2017 40th International Conference on Telecommunications and Signal Processing (TSP). IEEE, 2017. http://dx.doi.org/10.1109/tsp.2017.8075934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Joy, Ann Mary. "Performance comparison between Linux containers and virtual machines." In 2015 International Conference on Advances in Computer Engineering and Applications (ICACEA). IEEE, 2015. http://dx.doi.org/10.1109/icacea.2015.7164727.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jiang, Zexin. "A Linux Server Operating System's Performance Comparison Using Lmbench." In 2016 International Conference on Network and Information Systems for Computers (ICNISC). IEEE, 2016. http://dx.doi.org/10.1109/icnisc.2016.043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brightwell, Riesen, Underwood, Hudson, Bridges, and Maccabe. "A performance comparison of Linux and a lightweight kernel." In Proceedings IEEE International Conference on Cluster Computing CLUSTR-03. IEEE, 2003. http://dx.doi.org/10.1109/clustr.2003.1253322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sojka, Michal, Pavel Pisa, Martin Petera, Ondrej Spinka, and Zdenek Hanzalek. "A comparison of Linux CAN drivers and their applications." In 2010 International Symposium on Industrial Embedded Systems (SIES). IEEE, 2010. http://dx.doi.org/10.1109/sies.2010.5551367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Surana, Ramit. "Flavours of Linux And its Intensive Comparison With Windows." In Computer Science, Communication and Instrumentation Devices. Singapore: Research Publishing Services, 2014. http://dx.doi.org/10.3850/978-981-09-5247-1_002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cho, Seungkwon, and Youngil Kim. "Linux BYTEmark Benchmarks: A Performance Comparison of Embedded Mobile Processors." In The 9th International Conference on Advanced Communication Technology. IEEE, 2007. http://dx.doi.org/10.1109/icact.2007.358320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Felter, Wes, Alexandre Ferreira, Ram Rajamony, and Juan Rubio. "An updated performance comparison of virtual machines and Linux containers." In 2015 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). IEEE, 2015. http://dx.doi.org/10.1109/ispass.2015.7095802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Blazek, Petr, Tomas Gerlich, Zdenek Martinasek, and Jakub Frolka. "Comparison of Linux Filtering Tools for Mitigation of DDoS Attacks." In 2018 41st International Conference on Telecommunications and Signal Processing (TSP). IEEE, 2018. http://dx.doi.org/10.1109/tsp.2018.8441309.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Comparison of Linux Firewalls"

1

Bayless, Paul David. RELAP5-3D Developmental Assessment. Comparison of Version 4.3.4i on Linux and Windows. Office of Scientific and Technical Information (OSTI), October 2015. http://dx.doi.org/10.2172/1237321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bayless, Paul D. RELAP5-3D developmental assessment: Comparison of version 4.2.1i on Linux and Windows. Office of Scientific and Technical Information (OSTI), June 2014. http://dx.doi.org/10.2172/1167551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography