To see the other types of publications on this topic, follow the link: Comparison of Linux Firewalls.

Journal articles on the topic 'Comparison of Linux Firewalls'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Comparison of Linux Firewalls.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rafamantanantsoa, Fontaine, and Haja Louis Rabetafika. "Performance Comparison and Simulink Model of Firewall Free BSD and Linux." Communications and Network 10, no. 04 (2018): 180–95. http://dx.doi.org/10.4236/cn.2018.104015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhu, Yao Qin. "Structural Analysis and Preparation of the Netfilter." Advanced Materials Research 926-930 (May 2014): 2418–21. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2418.

Full text
Abstract:
As an open-source Linux system, firewall security and defense capability is very strong. In the whole process of network firewalls,and multiple monitoring points are based on netfilter. This paper analyzes the structure of the netfilter and ipt_entry store,look in everyday applications, Linux modular system can be better integrated,so that the speed and stability of the system is improved more.
APA, Harvard, Vancouver, ISO, and other styles
3

Filippov, M. V., N. Yu Ryazanova, and B. I. Ryazantsev. "The Outgoing and Incoming Network Packets Intercepting Method." Mechanical Engineering and Computer Science, no. 12 (January 4, 2018): 45–56. http://dx.doi.org/10.24108/1217.0001344.

Full text
Abstract:
In connexion with the rapidly growing computer network information capacities, information security of local networks connected with global networks becomes a critical challenge. One of the information security aspects is to control and filter the network traffic by intercepting the incoming and outgoing network packets. This is accomplished owing to firewalls. The Linux kernel 2.4.x included the Netfilter firewall and the iptables utility, which allow us to analyse only the packets headers and their pertaining to specific network connections. In addition, the practice of rewriting the Linux kernel codes complicates the maintenance of the software targeting for this firewall.The article proposes a network packet intercepting method based directly on the structures and functions of the kernel, so it has no restrictions associated with the inherent Netfilter/iptables functionality. To provide intercepting, are used the struct net_device structure of the kernel that describes a network device and the struct net_device_ops structure that lists operations possible on the network device and two functions: ndo_start_xmit and rx_handler used to process outgoing and incoming packets, respectively. These functions are rewritten in order to include new functionality into the kernel to meet the users’ requests. The use of the structures and functions of the kernel provides desirable stability, versatility, and adaptive capability of the developed software for users’ requests such as content analysis of data transmitted in packets, their encryption and decryption. The proposed method can be used to create firewalls of the next-generation to implement technology of deep packet inspection, as well as a complement to the available firewalls.
APA, Harvard, Vancouver, ISO, and other styles
4

Stočka, Vitauts. "DEVELOPMENT OF LINUX-BASED NETWORK ADMINISTRATION AND CONTROL SYSTEM." Environment. Technology. Resources. Proceedings of the International Scientific and Practical Conference 1 (June 20, 2001): 284. http://dx.doi.org/10.17770/etr2001vol1.1955.

Full text
Abstract:
Administration and control of medium-sized and large computer networks is one o f the most important tasks for any organization. Existing solutions are either too expensive for educational institutions or consists of many separate programs with little or no centralized managements. This work describes system in development based on "Linux” operational system and popular open standards. The central part of the system is LDAP database for information about servers, computers, users etc. This database is used by many less or more independent modules, including mail, proxy and other Internet servers. Access to these services is controlled by firewalls and specialized client/server authorization system, which is needed to prevent password sniffing and other methods of unauthorized access. System is managed from a centralized web-based administration interface. System is under development and will be implemented in several stages, module by module.
APA, Harvard, Vancouver, ISO, and other styles
5

Prajapati, Gourishankar, and Nilay Khare. "A Comparative Study of Software Firewall on Windows and Linux Platform." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 8 (June 2, 2015): 5967–78. http://dx.doi.org/10.24297/ijct.v14i8.1868.

Full text
Abstract:
Nowadays, the communication through World Wide Web (WWW) is growing rapidly. All the gadgets, computer and handheld devices are connected via wire or wireless media and communicated to each others. Thus, network security is the essential requirement of an organization or individuals. Organizations are protecting their communication from unauthorized access by introducing network firewalls. A Firewall is an application program which runs on any platform such as windows, Linux, Solaris, Macintosh etc and protected the networks or systems via implementing policies and rules. In this paper, the performance of firewall is measured and compared on Windows and Linux platform individual. To evaluate the performance, a private network has been setup in which three machines are connected via a switch; one Windows machine running windows firewall, one Linux machine running Linux firewall (IPTable) and one more machine that acting as a client. On both the platforms, the performance is measured in two situations: first when network is traffic free and second network with traffic. When network is traffic free then both the platforms reflect the common normal processing behavior in context of time and packet received per second; and when packets are pumped at a very high speed in the network then the processing time and packet received per second increases exponentially in both the platforms.
APA, Harvard, Vancouver, ISO, and other styles
6

Mohammed, Raya Kahtan, and Yoichiro UENO. "An FPGA-based Network Firewall with Expandable Rule Description." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 3 (June 1, 2018): 1310. http://dx.doi.org/10.11591/ijeecs.v10.i3.pp1310-1318.

Full text
Abstract:
<p>With the rapid growth of communications via the Internet, the need for an effective firewall system which has not badly affect the overall network performances has been increased. In this paper, a Field Programmable Gate Array (FPGA) -based firewall system with high performance has been implemented using Network FPGA (NetFPGA) with Xilinx Kintex-7 XC7K325T FPGA. Based on NetFPGA reference router project, a NetFPGA-based firewall system was implemented. The hardware module performs rule matching operation using content addressable memory (CAM) for higher speed data processing. To evaluate system performance, throughput, latency, and memory utilization were measured for different cases using different tools, also the number of rules that an incoming packet is subjected to was varied to get more readings using both software and hardware features. The results showed that the designed firewall system provides better performance than traditional firewalls. System throughput was doubled times of the one with Linux-Iptables firewalls.</p>
APA, Harvard, Vancouver, ISO, and other styles
7

PETRICĂ, Gabriel. "A Study on Password Strength in Wireless Encryption Protocols." International Journal of Information Security and Cybercrime 8, no. 2 (December 27, 2019): 21–26. http://dx.doi.org/10.19107/ijisc.2019.02.02.

Full text
Abstract:
Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.
APA, Harvard, Vancouver, ISO, and other styles
8

Cho, Sung-Ho, Sung-Uk Choi, and . "A Study on Comparison of Network Location Efficiency of Web Application Firewall." International Journal of Engineering & Technology 7, no. 3.33 (August 29, 2018): 183. http://dx.doi.org/10.14419/ijet.v7i3.33.21009.

Full text
Abstract:
This paper proposes a method to optimize the performance of web application firewalls according to their positions in large scale networks. Since ports for web services are always open and vulnerable in security, the introduction of web application firewalls is essential. Methods to configure web application firewalls in existing networks are largely divided into two types. There is an in-line type where a web application firewall is located between the network and the web server to be protected. This is mostly used in small scale single networks and is vulnerable to the physical obstruction of web application firewalls. The port redirection type configured with the help of peripheral network equipment such as routers or L4 switches can maintain web services even when physical obstruction of the web application firewall occurs and is suitable for large scale networks where several web services are mixed. In this study, port redirection type web application firewalls were configured in large-scale networks and there was a problem in that the performance of routers was degraded due to the IP-based VLAN when a policy was set for the ports on the routers for web security. In order to solve this problem, only those agencies and enterprises that provide web services of networks were separated and in-line type web application firewalls were configured for them. Internet service providers (ISPs) or central line-concentration agencies can apply the foregoing to configure systems for web security for unit small enterprises or small scale agencies at low costs.
APA, Harvard, Vancouver, ISO, and other styles
9

Satrya, Gandeva Bayu, Faiizal Eko Nugroho, and Tri Brotoharsono. "Improving Network Security - A Comparison of Open Source DPI Software." International Journal on Information and Communication Technology (IJoICT) 2, no. 2 (July 25, 2017): 11. http://dx.doi.org/10.21108/ijoict.2016.22.77.

Full text
Abstract:
<p>The classification of data traffic in a firewall using parameters such as port number, IP address, and MAC address is not sufficient. For example, currently, many applications can be used without a port number meaning they can easily circumvent a firewall. Firewalls inspecting up to only layer four could allow malicious data to pass. Next-generation deep packet inspection (DPI) is a method that can be used for firewalls as a method of classification up to layer seven in data traffic control.</p><p>This research recommends the use of nDPI and L7-filter by network administrators on existing open source firewalls. Eleven internet applications were used to test and analyze nDPI and L7-filter which are capable of detecting traffic based on the data signature. nDPI and L7-filter were tested for accuracy and speed. We conclude that the development of next-generation deep packet inspection is important for the future of system and network security.</p>
APA, Harvard, Vancouver, ISO, and other styles
10

Sheth, Chirag, and Rajesh Thakker. "Performance Evaluation and Comparison of Network Firewalls under DDoS Attack." International Journal of Computer Network and Information Security 5, no. 12 (October 1, 2013): 60–67. http://dx.doi.org/10.5815/ijcnis.2013.12.08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kossak, Bartłomiej, and Maciej Pańczyk. "Comparison of features and capabilities of modern Linux file systems ext4, XFS, Btrfs." Journal of Computer Sciences Institute 4 (September 30, 2017): 131–36. http://dx.doi.org/10.35784/jcsi.610.

Full text
Abstract:
This article compares three modern Linux file systems: ext4, Btrfs and XFS. Their construction and functional features were discussed. File systems were compared in terms of performance. Additionally modern SSD drives were included in discussion. Ubuntu 15.10 distribution was used to test functionality and performance of these three Linux file systems.
APA, Harvard, Vancouver, ISO, and other styles
12

Terentyev, Alexander, Yevhenii Gorbatyuk, Tamara Lyashchenko, and Oleh Kuzminskyi. "NEW GENERATION FIREWORKS: A STUDY OF THE HISTORY OF DEVELOPMENT." Management of Development of Complex Systems, no. 45 (March 1, 2021): 102–6. http://dx.doi.org/10.32347/2412-9933.2021.45.102-106.

Full text
Abstract:
Attempts at unauthorized intrusion occur quite often, even after the adoption of the necessary security policies and practices for the information network. These are attacks in which an attacker gains access to the system using various hacking techniques. A firewall is a hardware and software-based network security system that uses certain rules to manage incoming and outgoing network packets. The firewall controls access to network resources through a positive management model. There are various traditional firewalls, such as packet filters, program-level gateways, and chip-level gateways, which have their pros and cons. To overcome the shortcomings of the traditional firewall, a new generation of firewalls is introduced. The article presents the study of traditional firewalls and their evolution to a new generation firewall and its benefits. New firewalls still belong to the third generation, but are often referred to as the "next generation" or NGFW. This type combines all previously used approaches with an in-depth review of filtered content and its comparison with a database to identify potentially dangerous traffic. Modern firewalls often have built-in additional security systems: virtual private networks (VPNs), intrusion prevention and detection systems (IPS / IDS), authentication management, application management, and web filtering. Their state-of-the-art technology can filter outbound traffic. This helps reduce the likelihood of data theft by attackers. In addition, an important function of the firewall is to reduce the risk of devices becoming part of a botnet (a malicious network with a large group of devices controlled by cybercriminals).
APA, Harvard, Vancouver, ISO, and other styles
13

Wang, Jian Qiang, and Fei Yun Yuan. "Research and Implementation of Embedded Linux System Power Optimization." Applied Mechanics and Materials 416-417 (September 2013): 1538–41. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1538.

Full text
Abstract:
This paper firstly discusses the techniques to optimize power consumption of the embedded operating system, and then optimizes power consumption of embedded Linux by adding DVS (dynamic voltage scaling) module and modifies the scheduling function in the standard Linux kernel. Finally, take a comparison test on arm920 platform. The test results show that: the power optimized Linux can effectively reduce the power consumption of the whole embedded system.
APA, Harvard, Vancouver, ISO, and other styles
14

Kim, Hee-Woong, Hock Chuan Chan, and So-Hyun Lee. "User Resistance to Software Migration." Journal of Database Management 25, no. 1 (January 2014): 59–79. http://dx.doi.org/10.4018/jdm.2014010103.

Full text
Abstract:
The demand for software has increased rapidly in the global industrial environment. Open source software (OSS) has exerted significant impact on the software industry. Large amounts of resources and effort have been devoted to the development of OSS such as Linux. Based on the technology adoption model (TAM), the development of Linux as the most well-known OSS with a graphical user interface designed for ease of use and a wide range of functionalities is expected to result in high levels of Linux adoption by individual users. Linux, however, currently controls about 1% of the operating system market for personal computers. The resistance of users to switch to a new operating system remains one of the major obstacles to widespread adoption of Linux among individual users. Based on the integration of the equity implementation model and the TAM, this study examines the formation of user resistance, as well as the effects of user resistance, on the migration to Linux for personal computers. This study discusses the role and effect of user resistance based on the equity implementation model in comparison with the two main determinants in the TAM. This study contributes to the advancement of theoretical understanding of Linux migration and user resistance. The findings also offer suggestions for software communities and practitioners, of OSS in particular, to promote the use of new software by individual users.
APA, Harvard, Vancouver, ISO, and other styles
15

Tsegaye, Melekam, and Richard Foss. "A comparison of the Linux and Windows device driver architectures." ACM SIGOPS Operating Systems Review 38, no. 2 (April 2004): 8–33. http://dx.doi.org/10.1145/991130.991132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Mathew, Lani Rachel, Ancy S. Anselam, and Sakuntala S. Pillai. "Performance Comparison of Linear Prediction based Vocoders in Linux Platform." International Journal of Engineering Trends and Technology 10, no. 11 (April 25, 2014): 554–58. http://dx.doi.org/10.14445/22315381/ijett-v10p310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Zhang, Yin Pu. "Bluetooth Transmission System Based on Embedded Linux." Applied Mechanics and Materials 340 (July 2013): 778–82. http://dx.doi.org/10.4028/www.scientific.net/amm.340.778.

Full text
Abstract:
By analyzing the principles of blue tooth transmission, it turns out that the Four-Hierarchy Bluetooth Transmission System can be made by applying the embedded Linux technology. Comparison analysis showed that the data transmission between multiple Bluetooth devices is available through a system created upon the Bluez protocol and openobex protocol. Besides, this also proofed that a combination of Linux and Bluetooth can make it possible to create a fair stable data transmission system, which could be used as a reference for the application in other areas.
APA, Harvard, Vancouver, ISO, and other styles
18

Salah, K., and A. Kahtani. "Performance evaluation comparison of Snort NIDS under Linux and Windows Server." Journal of Network and Computer Applications 33, no. 1 (January 2010): 6–15. http://dx.doi.org/10.1016/j.jnca.2009.07.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Praptodiyono, Supriyanto, Rian Sofhan, Anggoro S. Pramudyo, Teguh Firmansyah, and Azlan Osman. "Performance comparison of transmitting jumbo frame on Windows and Linux System." TELKOMNIKA (Telecommunication Computing Electronics and Control) 17, no. 1 (February 1, 2019): 68. http://dx.doi.org/10.12928/telkomnika.v17i1.11627.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Viduka, Dejan, and Vladimir Kraguljac. "Comparison of human computer interaction on Windows and Linux operations systems." Trendovi u poslovanju 7, no. 2 (2019): 95–101. http://dx.doi.org/10.5937/trendpos1902095v.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Pandey, Nirved, and G. K. Sharma. "Startup comparison for message passing libraries with DTM on linux clusters." Journal of Supercomputing 39, no. 1 (January 2007): 59–72. http://dx.doi.org/10.1007/s11227-006-0004-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Wang, Xue Chun, and Quan Lu Zheng. "Research and Application of Parallel Computing under Linux." Advanced Materials Research 756-759 (September 2013): 2825–28. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2825.

Full text
Abstract:
Parallel computing is in parallel computer system for parallel processing of data and information, often also known as the high performance computing or super computing. The content of parallel computing were introduced, the realization of parallel computing and MPI parallel programming under Linux environment were described. The parallel algorithm based on divide and conquer method to solve rectangle placemen problem was designed and implemented with two processors. Finally, Through the performance testing and comparison, we verified the efficiency of parallel computing.
APA, Harvard, Vancouver, ISO, and other styles
23

Shetty, Nisha P., Jayashree Shetty, Rohil Narula, and Kushagra Tandona. "Comparison study of machine learning classifiers to detect anomalies." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (October 1, 2020): 5445. http://dx.doi.org/10.11591/ijece.v10i5.pp5445-5452.

Full text
Abstract:
In this era of Internet ensuring the confidentiality, authentication and integrity of any resource exchanged over the net is the imperative. Presence of intrusion prevention techniques like strong password, firewalls etc. are not sufficient to monitor such voluminous network traffic as they can be breached easily. Existing signature based detection techniques like antivirus only offers protection against known attacks whose signatures are stored in the database.Thus, the need for real-time detection of aberrations is observed. Existing signature based detection techniques like antivirus only offers protection against known attacks whose signatures are stored in the database. Machine learning classifiers are implemented here to learn how the values of various fields like source bytes, destination bytes etc. in a network packet decides if the packet is compromised or not . Finally the accuracy of their detection is compared to choose the best suited classifier for this purpose. The outcome thus produced may be useful to offer real time detection while exchanging sensitive information such as credit card details.
APA, Harvard, Vancouver, ISO, and other styles
24

., Saranya S. Devan. "WINDOWS 8 V/S LINUX UBUNTU 12.10 – COMPARISON OF THE NETWORK PERFORMANCE." International Journal of Research in Engineering and Technology 02, no. 09 (September 25, 2013): 577–80. http://dx.doi.org/10.15623/ijret.2013.0209089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Torrey, Lisa A., Joyce Coleman, and Barton P. Miller. "A comparison of interactivity in the Linux 2.6 scheduler and an MLFQ scheduler." Software: Practice and Experience 37, no. 4 (2007): 347–64. http://dx.doi.org/10.1002/spe.772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Chae, MinSu, HwaMin Lee, and Kiyeol Lee. "A performance comparison of linux containers and virtual machines using Docker and KVM." Cluster Computing 22, S1 (December 20, 2017): 1765–75. http://dx.doi.org/10.1007/s10586-017-1511-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Simic, Dragan, Srecko Ristic, and Slobodan Obradovic. "Measurement of the achieved performance levels of the web applications with distributed relational database." Facta universitatis - series: Electronics and Energetics 20, no. 1 (2007): 31–43. http://dx.doi.org/10.2298/fuee0701031s.

Full text
Abstract:
This paper describes the methods and means used for creating a computer cluster using ordinary PCs. The cluster is running a replicated relational database, and two custom Web applications, used as the database clients. Operating system running all this is Linux 2.4, with Linux Virtual Server (LVS) used as the load-balancing solution, MySQL 4.0 as the replicated database (supporting transactions and referential integrity), and Apache 1.3 as the Web server. PHP4 is used for Web applications development. Additionally, a High Performance Computing (HPC) cluster is implemented using OpenMOSIX. Measurement and comparison of achieved performance levels is done as the final aim, using two custom applications developed for that purpose, acting as clients of two deployed Web applications. Performance-measurement applications are running under Microsoft Windows, and are developed using Borland Delphi 7.
APA, Harvard, Vancouver, ISO, and other styles
28

HAYASHI, HIDEAKI. "Diffusion Tensor Imaging Analysis Using PC Version Dr.View/LINUX(The Performance Comparison of Workstation)." Japanese Journal of Radiological Technology 58, no. 12 (2002): 1710. http://dx.doi.org/10.6009/jjrt.kj00000921559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Barbalace, A., A. Luchetta, G. Manduchi, M. Moro, A. Soppelsa, and C. Taliercio. "Performance Comparison of VxWorks, Linux, RTAI, and Xenomai in a Hard Real-Time Application." IEEE Transactions on Nuclear Science 55, no. 1 (2008): 435–39. http://dx.doi.org/10.1109/tns.2007.905231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Toresa, Dafwen. "Perbandingan proxy pada linux dan windows untuk mempercepat browsing website." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 8, no. 1 (March 11, 2017): 50–57. http://dx.doi.org/10.31849/digitalzone.v8i1.628.

Full text
Abstract:
Abstrak- Pada saat ini sangat banyak organisasi, baik pendidikan, pemerintahan, maupun perusahaan swasta berusaha membatasi akses para pengguna ke internet dengan alasan bandwidth yang dimiliki mulai terasa lambat ketika para penggunanya mulai banyak yang melakukan browsing ke internet. Mempercepat akses browsing menjadi perhatian utama dengan memanfaatkan teknologi Proxy server. Penggunaan proxy server perlu mempertimbangkan sistem operasi pada server dan tool yang digunakan belum diketahui performansi terbaiknya pada sistem operasi apa. Untuk itu dirasa perlu untuk menganalisis performan Proxy server pada sistem operasi berbeda yaitu Sistem Operasi Linux dengan tools Squid dan Sistem Operasi Windows dengan tool Winroute. Kajian ini dilakukan untuk mengetahui perbandingan kecepatan browsing dari komputer pengguna (client). Browser yang digunakan di komputer pengguna adalah Mozilla Firefox. Penelitian ini menggunakan 2 komputer klien dengan pengujian masing-masingnya 5 kali pengujian pengaksesan/browsing web yang dituju melalui proxy server. Dari hasil pengujian yang dilakukan, diperoleh kesimpulan bahwa penerapan proxy server di sistem operasi linux dengan tools squid lebih cepat browsing dari klien menggunakan web browser yang sama dan komputer klien yang berbeda dari pada proxy server sistem operasi windows dengan tools winroute. Kata kunci: Proxy, Bandwidth, Browsing, Squid, Winroute Abstract- At this time very many organizations, both education, government, and private companies try to limit the access of users to the internet on the grounds that the bandwidth owned began to feel slow when the users began to do a lot of browsing to the internet. Speed up browsing access is a major concern by utilizing Proxy server technology. The use of proxy servers need to consider the operating system on the server and the tool used is not yet known the best performance on what operating system. For that it is necessary to analyze Performance Proxy server on different operating system that is Linux Operating System with Squid tools and Windows Operating System with Winroute tool. This study was conducted to determine the comparison of browsing speed of the user's computer (client). The browser used on the user's computer is Mozilla Firefox. This study uses two client computers with each test 5 times accessing web browsing / destination testing via proxy server. From the results of tests conducted, it can be concluded that the application of proxy server in linux operating system with squid tools faster browsing from client using the same web browser and client computer different from the proxy server windows operating system with winroute tools. Keywords: Proxy Server, Linux, Windows, Squid, Winroute
APA, Harvard, Vancouver, ISO, and other styles
31

Gillani, Khasa, and Jong-Hyouk Lee. "Comparison of Linux virtual machines and containers for a service migration in 5G multi-access edge computing." ICT Express 6, no. 1 (March 2020): 1–2. http://dx.doi.org/10.1016/j.icte.2018.12.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Lopes, Raul H. C., Virginia N. L. Franqueira, and Duncan Rand. "Integration and Evaluation of QUIC and TCP-BBR in longhaul Science Data Transfers." EPJ Web of Conferences 214 (2019): 08026. http://dx.doi.org/10.1051/epjconf/201921408026.

Full text
Abstract:
Two recent and promising additions to the internet protocols are TCP-BBR and QUIC. BBR defines a congestion policy that promises a better control in TCP bottlenecks on long haul transfers and can also be used in the QUIC protocol. TCP-BBR is implemented in the Linux kernels above 4.9. It has been shown, however, to demand careful fine tuning in the interaction, for example, with the Linux Fair Queue. QUIC, on the other hand, replaces HTTP and TLS with a protocol on the top of UDP and thin layer to serve HTTP. It has been reported to account today for 7% of Google’s traffic. It has not been used in server-to-server transfers even if its creators see that as a real possibility. Our work evaluates the applicability and tuning of TCP-BBR and QUIC for data science transfers. We describe the deployment and performance evaluation of TCP-BBR and comparison with CUBIC and H-TCP in transfers through the TEIN link to Singaren (Singapore). Also described is the deployment and initial evaluation of a QUIC server. We argue that QUIC might be a perfect match in security and connectivity to base services that are today performed by the Xroot redirectors.
APA, Harvard, Vancouver, ISO, and other styles
33

Yu, Liguo, Stephen R. Schach, Kai Chen, Gillian Z. Heller, and Jeff Offutt. "Maintainability of the kernels of open-source operating systems: A comparison of Linux with FreeBSD, NetBSD, and OpenBSD." Journal of Systems and Software 79, no. 6 (June 2006): 807–15. http://dx.doi.org/10.1016/j.jss.2005.08.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Zhang, Zheng, Hai Bo He, and Hao Liang Lu. "The Analysis and Realization of Interpreter Language in Nuclear Industry." Advanced Materials Research 989-994 (July 2014): 2097–100. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.2097.

Full text
Abstract:
In order to satisfy the calculation requirements of nuclear power plant operating in different conditions, the integration and combination of reactor core computation modules have been proposed. By writing logical language instructions, and then read by interpreter, the engineering designers can make grammatical analysis, lexical analysis, semantic analysis and information extraction. In Linux system environment, the interpreter can fulfill computational tasks based on the actual operating parameters of nuclear power plant. The comparison results indicate that the calculated results obtained by the interpreter language are correct. Therefore, it also demonstrates that the interpreter language is valid.
APA, Harvard, Vancouver, ISO, and other styles
35

Lencse, Gábor. "Checking the Accuracy of Siitperf." Infocommunications journal 13, no. 2 (2021): 2–9. http://dx.doi.org/10.36244/icj.2021.2.1.

Full text
Abstract:
Siitperf is the world’s first free software RFC 8219 compliant SIIT (Stateless IP/ICMP Translation, also called as Stateless NAT64) tester, which implements throughput, frame loss rate, latency and packet delay variation tests. In this paper, we show that the reliability of its results mainly depends on the accuracy of the timing of its frame sender algorithm. We also investigate the effect of Ethernet flow control on the measurement results. Siitperf is calibrated by the comparison of its results with that of a commercial network performance tester, when both of them are used for determining the throughput of the IPv4 routing of the Linux kernel.
APA, Harvard, Vancouver, ISO, and other styles
36

Karlovits, Igor, Urška Kavčič, Špela Trafela, and Kristina Žužek Rožman. "Comparison of cyclic voltammetry measurements of paper-based screen printed electrodes via proprietary and open source potentiostat." BioResources 16, no. 2 (April 15, 2021): 3916–33. http://dx.doi.org/10.15376/biores.16.2.3916-3933.

Full text
Abstract:
The use of screen-printed electrodes in different monitoring applications, e.g., polluted water, biotechnology, agriculture, industrial process control, and other applications, are continuously being developed. New cheap and open-source potentiostats have been recently emerging, in addition to the commercial and proprietary solutions on the market. In this study, paper-based, screen-printed electrodes were utilised as an alternative solution for ceramic-based electrodes and were tested with two potentiostats (proprietary and low-cost open-source running on wireless 64 bit Linux system installed on Raspberry Pi 3+). Unique paper substrates made from invasive plant papers and one commercial product were used for screen electrode printing. Ink layer thicknesses variations and mechanical grinding were applied, and cyclic voltammetry measurements were conducted. The variation in cyclic voltammetry measurements could be attributed to two sources: the potentiostats showed differences in their sensibility and signal values, and paper surface and structure also contributed to differences. Simultaneously, the additional processing steps, e.g., mechanical grinding, introduced additional measurement variations and differences in the measurement process.
APA, Harvard, Vancouver, ISO, and other styles
37

Spirin, Oleg M., and Olena S. Holovnia. "ЗАСТОСУВАННЯ ТЕХНОЛОГІЙ ВІРТУАЛІЗАЦІЇ UNIX-ПОДІБНИХ ОПЕРАЦІЙНИХ СИСТЕМ У ПІДГОТОВЦІ БАКАЛАВРІВ ІНФОРМАТИКИ." Information Technologies and Learning Tools 65, no. 3 (July 1, 2018): 201. http://dx.doi.org/10.33407/itlt.v65i3.2055.

Full text
Abstract:
Despite the widespread use of virtualization technologies in education the problem of individual selection of virtualization tools for teaching certain courses, including teaching operating systems to Bachelors of Computer Science, remains scarcely studied. Research of operating systems teaching process to Bachelors of Computer Science found a range of issues in using virtualization technologies. These are as listed: hardware and software failures; low performance of virtualized operating systems; lack of adapted instructions; dependence on specific computer laboratories; unequal conditions of independent work with virtualized operating systems. Comparison of Bachelors of Computer Science scores in Operating Systems course which included studying Linux and Windows operating systems and also Fundamentals of Operating Systems Theory, resulted in general lower level of learning outcomes in Linux compared to the ones of the entire academic subject. A survey of Ukrainian teachers of Operating Systems course shows a number of differences in teaching process. It includes differences in teachers’ experience of using virtualization technologies, variety of virtualization technologies applied during the course, factors estimation for selecting virtualization tools. The article proposes the methodology of using unix-like operating systems virtualization technologies in professional training of Bachelors of Computer Science based on the variable approach to using mentioned technologies. The approach involves combining several virtualization tools in the frames of one course of Operating Systems to meet specific features of teaching the course as well as individual students’ needs and ensures hardware and software fault tolerance. Didactic model underlying the proposed methodology is described in the article. Experimental results on methodology effectiveness are provided.
APA, Harvard, Vancouver, ISO, and other styles
38

Phoomikiattisak, Ditchaphong, and Saleem N. Bhatti. "End-To-End Mobility for the Internet Using ILNP." Wireless Communications and Mobile Computing 2019 (April 16, 2019): 1–29. http://dx.doi.org/10.1155/2019/7464179.

Full text
Abstract:
As the use of mobile devices and methods of wireless connectivity continue to increase, seamless mobility becomes more desirable and important. The current IETF Mobile IP standard relies on additional network entities for mobility management, can have poor performance, and has seen little deployment in real networks. We present a host-based mobility solution with a true end-to-end architecture using the Identifier-Locator Network Protocol (ILNP). We show how the TCP code in the Linux kernel can be extended allowing legacy TCP applications that use the standard C sockets API to operate over ILNP without requiring changes or recompilation. Our direct testbed performance comparison shows that ILNP provides better host mobility support than Mobile IPv6 in terms of session continuity, packet loss, and handoff delay for TCP.
APA, Harvard, Vancouver, ISO, and other styles
39

Chernov, Ilya A., Evgeny Ivashko, Dmitry Kositsyn, Vadim Ponomarev, Alexander Rumyantsev, and Anton Shabaev. "Flash-Based Storage Deduplication Techniques." International Journal of Embedded and Real-Time Communication Systems 10, no. 3 (July 2019): 32–48. http://dx.doi.org/10.4018/ijertcs.2019070103.

Full text
Abstract:
Exponential growth of the amount of data stored worldwide together with high level of data redundancy motivates the active development of data deduplication techniques. The overall increasing popularity of solid-state drives (SSDs) as primary storage devices forces the adaptation of deduplication techniques to technical peculiarities of this type of storage (such as write amplification and wearout), implying active research in SSD-equipped storage data deduplication subdomain. In this survey paper the authors summarize the recent results on deduplication in SSD-enhanced storage, providing a novel taxonomy of the techniques. They classify the techniques on the basis of storage device complexity, starting from a sub-device level up to the storage network. Linux deduplication implementations are discussed, and the results of experimental comparison of several widely used tools are presented. Finally, the authors briefly outline open problems in the field and possible points of future research.
APA, Harvard, Vancouver, ISO, and other styles
40

Pomaska, G., and N. Dementiev. "Towards Image Documentation of Grave Coverings and Epitaphs for Exhibition Purposes." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XL-5/W7 (August 13, 2015): 353–58. http://dx.doi.org/10.5194/isprsarchives-xl-5-w7-353-2015.

Full text
Abstract:
Epitaphs and memorials as immovable items in sacred spaces provide with their inscriptions valuable documents of history. Today not only photography or photos are suitable as presentation material for cultural assets in museums. Computer vision and photogrammetry provide methods for recording, 3D modelling, rendering under artificial light conditions as well as further options for analysis and investigation of artistry. For exhibition purposes epitaphs have been recorded by the structure from motion method. A comparison of different kinds of SFM software distributions could be worked out. The suitability of open source software in the mesh processing chain from modelling up to displaying on computer monitors should be answered. Raspberry Pi, a computer in SoC technology works as a media server under Linux applying Python scripts. Will the little computer meet the requirements for a museum and is the handling comfortable enough for staff and visitors? This contribution reports about the case study.
APA, Harvard, Vancouver, ISO, and other styles
41

Yu, Lie Bin. "A Research on KVM I/O Performance." Applied Mechanics and Materials 385-386 (August 2013): 1790–96. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1790.

Full text
Abstract:
With open source, stable performance, simple structure, integrated in Linux kernel, and good performance, KVM (Kernel-based Virtual Machine) gets wide attention from major IT vendors and academia circles. However, virtualization technology will introduce additional overhead, especially in the I/O virtualization. The current researches about KVM have been carried out mostly focused on the performance comparison and analysis between virtualization solutions. There is no systematic study of the KVM I/O performance. In this paper, the I/O architecture in KVM is firstly studied, and then the disk and network performance of fully virtualization KVM and Para-virtualization KVM with all the different configurations are systemically tested and analyzed. Both the KVM I/O performance and the influences of the different configuration options on the performance are figured out in this paper. These are quite important and useful for the users and designers.
APA, Harvard, Vancouver, ISO, and other styles
42

Azzam, Ahmad Thoriq, Rendy Munadi, and Ratna Mayasari. "Performance Analysis Of Firewall As Virtualized Network Function On VMware ESXi Hypervisor." JURNAL INFOTEL 11, no. 1 (March 25, 2019): 29. http://dx.doi.org/10.20895/infotel.v11i1.425.

Full text
Abstract:
Virtualization technology is slowly being used to build network infrastructure called Network Function Virtualization (NFV). It takes network functions such as firewall, load balancer, IPS out of its hardware then use its software to be run on high specification server. It helps reduce vendor lock-in and help create a multiplatform network function environment. It has a lot of benefits compared to a traditional network. One of them is it can reduce the number of hardware that is used in the telecom industry. This technology runs on the hypervisor that is used for the management of hardware. One of the important components from NFV is Virtualized Network Function (VNF). In NFV, network devices are run on a server so that a firewall is needed because if an attack occurs on the network it will interfere with existing network components. This paper focuses on analyzing the performance of two firewall system, pfSense, and FortiGate. Both firewalls will run on the VMware ESXi hypervisor. It aims to determine the firewall performance comparison in normal conditions without attacks and under SYN DoS attacks. We also evaluate firewall failover capabilities. Based on the results of testing obtained that overall FortiGate has better performance. It has better ability in handling DoS SYN attack because it has lower throughput performance degradation and better FTP performance compare to pfSense. We conclude that FortiGate has best performance compare with pfSense
APA, Harvard, Vancouver, ISO, and other styles
43

Carter, Karen K., and Carolynn Thomas Jones. "4197 A Landscape Analysis of CTSA websites for Clinical Research Professional Training Opportunities." Journal of Clinical and Translational Science 4, s1 (June 2020): 56. http://dx.doi.org/10.1017/cts.2020.198.

Full text
Abstract:
OBJECTIVES/GOALS: We conducted a review of CTSA websites to understand the current landscape for CRP institutional professional development and training revealed in the CTSA hub websites. METHODS/STUDY POPULATION: We accessed and reviewed 59 currently funded CTSA hub websites for evidence of CRP training opportunities. Parameters reviewed included: 1) opportunities were specified for CRPs versus K and T trainees; 2) mandated training; 3) leveling; 4) delivery methods/resources; 5) public accessibility; 6) unique features. The website reviews informed a REDCap survey sent to the CTSA Administrators (n = 149) and the Coordinator Taskforce (n = 105) listservs to gain additional knowledge of CRP training available at the institution. A subsequent repeat review of the CTSA hub websites will be conducted to determine evolving trends. RESULTS/ANTICIPATED RESULTS: A total of 40 responded to the survey from 59 CTSA hubs. Survey results are being analyzed. Website review data are being tabulated and the subsequent review of websites will be collected in February. Those findings are pending and will include a comparison of prior findings. 42% of CRP hubs list CRP training within the CTSA hub website. Required onboarding training (beyond CITI certificates) is revealed for some hubs (15%). DISCUSSION/SIGNIFICANCE OF IMPACT: On our initial website review less than half of the CTSA hub websites list specific CRP training on their website. Many were hidden behind firewalls and could not be reviewed for content. The REDCap Survey will provide more granular descriptions of programs. Data from a second website review will be collected for comparison. Based on a preliminary re-review of sites, there is a suggestion of increasing CRP workforce development information. CTSAs are well-positioned to be a central hub for promoting educational excellence of the institutional workforce, for medical centers and in other venues where clinical research is performed.
APA, Harvard, Vancouver, ISO, and other styles
44

Parimucha, Š., M. Vaňko, and P. Mikloš. "SPHOTOM – Package for an Automatic Multicolour Photometry." Proceedings of the International Astronomical Union 7, S282 (July 2011): 81–82. http://dx.doi.org/10.1017/s1743921311026998.

Full text
Abstract:
AbstractWe present basic information about package SPHOTOM for an automatic multicolour photometry. This package is in development for the creation of a photometric pipe-line, which we plan to use in the near future with our new instruments. It could operate in two independent modes, (i) GUI mode, in which the user can select images and control functions of package through interface and (ii) command line mode, in which all processes are controlled using a main parameter file. SPHOTOM is developed as a universal package for Linux based systems with easy implementation for different observatories. The photometric part of the package is based on the Sextractor code, which allows us to detect all objects on the images and perform their photometry with different apertures. We can also perform astrometric solutions for all images for a correct cross-identification of the stars on the images. The result is a catalogue of all objects with their instrumental photometric measurements which are consequently used for a differential magnitudes calculations with one or more comparison stars, transformations to an international system, and determinations of colour indices.
APA, Harvard, Vancouver, ISO, and other styles
45

Hussain, Mohammed Abdulridha, Hai Jin, Zaid Alaa Hussien, Zaid Ameen Abduljabbar, Salah H. Abbdal, and Ayad Ibrahim. "Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/9479476.

Full text
Abstract:
Online information security is a major concern for both users and companies, since data transferred via the Internet is becoming increasingly sensitive. The World Wide Web uses Hypertext Transfer Protocol (HTTP) to transfer information and Secure Sockets Layer (SSL) to secure the connection between clients and servers. However, Hypertext Transfer Protocol Secure (HTTPS) is vulnerable to attacks that threaten the privacy of information sent between clients and servers. In this paper, we propose Enc-DNS-HTTP for securing client requests, protecting server responses, and withstanding HTTPS attacks. Enc-DNS-HTTP is based on the distribution of a web server public key, which is transferred via a secure communication between client and a Domain Name System (DNS) server. This key is used to encrypt client-server communication. The scheme is implemented in the C programming language and tested on a Linux platform. In comparison with Apache HTTPS, this scheme is shown to have more effective resistance to attacks and improved performance since it does not involve a high number of time-consuming operations.
APA, Harvard, Vancouver, ISO, and other styles
46

Sakthivelmurugan, E., G. Senthilkumar, K. G. Prithiviraj, and K. R. Tinu Devraj. "Foraging behavior analysis of swarm robotics system." MATEC Web of Conferences 144 (2018): 01013. http://dx.doi.org/10.1051/matecconf/201814401013.

Full text
Abstract:
Swarm robotics is a number of small robots that are synchronically works together to accomplish a given task. Swarm robotics faces many problems in performing a given task. The problems are pattern formation, aggregation, Chain formation, self-assembly, coordinated movement, hole avoidance, foraging and self-deployment. Foraging is most essential part in swarm robotics. Foraging is the task to discover the item and get back into the shell. The researchers conducted foraging experiments with random-movement of robots and they have end up with unique solutions. Most of the researchers have conducted experiments using the circular arena. The shell is placed at the centre of the arena and environment boundary is well known. In this study, an attempt is made to different strategic movements like straight line approach, parallel line approach, divider approach, expanding square approach, and parallel sweep approach. All these approaches are to be simulated by using player/stage open-source simulation software based on C and C++ programming language in Linux operating system. Finally statistical comparison will be done with task completion time of all these strategies using ANOVA to identify the significant searching strategy.
APA, Harvard, Vancouver, ISO, and other styles
47

Saudi, Madihah Mohd, Nurzi Juana Mohd Zaizi, Khaled Juma Ahmed Sweese, and Azreena Abu Bakar. "Spatial Signature Method (SSM) Against XML Signature Wrapping Attacks." MATEC Web of Conferences 255 (2019): 02016. http://dx.doi.org/10.1051/matecconf/201925502016.

Full text
Abstract:
Living in cyber world with revolutionizes of Industrial 4.0, most of the users and organisations prefer to sell and buy products or services via website online transaction. This online transaction is done through a messaging protocol (SOAP) and signing entire SOAP (SESOAP) using Extensible Markup Language (XML). XML is implemented to secure the SOAP contents by applying the signing method called as XML Digital signature. However, the XML digital signature has issues related to XML signature wrapping (XSW) attacks specifically on Sibling Value Context and Sibling Order Context attacks. Therefore, this paper proposes an enhanced method called as Spatial Signature Method (SSM) which aims to resolve the limitation of SESOAP from the aspect of XSW attacks. It proposes new parameters for XML digital signature inspired by the concept of ratio and space in biotechnology to detect the XSW attacks. The experiment was conducted in a controlled lab by using the Ubuntu Linux system and PHP programming. Based on the comparison made with SESOAP and ID Referencing method (IDR), SSM has proven to defend against the XSW attacks. For the future work, the spatial signature method can be forged with more extensive spatial information for the digital signature and to integrate it with web services.
APA, Harvard, Vancouver, ISO, and other styles
48

Vilardell, Mireia, Genis Parra, and Sergi Civit. "WISCOD: A Statistical Web-Enabled Tool for the Identification of Significant Protein Coding Regions." BioMed Research International 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/282343.

Full text
Abstract:
Classically, gene prediction programs are based on detecting signals such as boundary sites (splice sites, starts, and stops) and coding regions in the DNA sequence in order to build potential exons and join them into a gene structure. Although nowadays it is possible to improve their performance with additional information from related species or/and cDNA databases, further improvement at any step could help to obtain better predictions. Here, we present WISCOD, a web-enabled tool for the identification of significant protein coding regions, a novel software tool that tackles the exon prediction problem in eukaryotic genomes. WISCOD has the capacity to detect real exons from large lists of potential exons, and it provides an easy way to use globalPvalue called expected probability of being a false exon (EPFE) that is useful for ranking potential exons in a probabilistic framework, without additional computational costs. The advantage of our approach is that it significantly increases the specificity and sensitivity (both between 80% and 90%) in comparison to other ab initio methods (where they are in the range of 70–75%). WISCOD is written in JAVA and R and is available to download and to run in a local mode on Linux and Windows platforms.
APA, Harvard, Vancouver, ISO, and other styles
49

Xu, Kun, Ming Yan Jiang, and Dong Feng Yuan. "Parallel Artificial Bee Colony Algorithm for the Traveling Salesman Problem." Advanced Materials Research 756-759 (September 2013): 3254–59. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3254.

Full text
Abstract:
Artificial Bee Colony Algorithm (ABCA) is a novel swarm intelligence algorithm which a colony of artificial bees cooperate in finding good solutions for numerical optimization problems and combinatorial optimization problems. Traveling Salesman Problem (TSP) is a famous combinatorial optimization problem which has been used in many fields such as network communication, transportation, manufacturing and logistics. However, it requires a considerably large amount of computational time and resources for solving TSP. To dealing with this problem, we present a Parallel Artificial Bee Colony Algorithm (PABCA) in several computers which operation system is Linux based on the Message Passing Interface (MPI). The entire artificial bee colony is divided into several subgroups by PABCA equally. Each subgroup performs an ABCA for TSP on each processor node, respectively. Each sub-colony on every processor node communicates the current best fitness function and parameters of current best fitness function according to ring topological structure during calculation process. Some well-known benchmark problems in TSP are used to evaluate the performance of ABCA and PABCA. Meanwhile, the performance of PABCA is compared with Genetic Algorithm (GA) and Particle Swarm Optimization (PSO). Experimental results show that the PABCA can obtain solutions with equal precision and reduce the time of computation obviously in comparison with serial ABCA. And PABCA have much better performance in contrast with GA and PSO.
APA, Harvard, Vancouver, ISO, and other styles
50

Espinoza, Renzo, Yuri Molina, and Maria Tavares. "PC Implementation of a Real-Time Simulator Using ATP Foreign Models and a Sound Card." Energies 11, no. 8 (August 16, 2018): 2140. http://dx.doi.org/10.3390/en11082140.

Full text
Abstract:
This work reports the personal computer implementation of a real-time simulator based on the widely used Electromagnetic Transients Program, version Alternative Transients Program (EMTP-ATP) software for testing protection and control devices. The proposed simulator was implemented on a conventional PC with a GNU/Linux operative system including a real-time kernel. Using foreign models programmed in C, ATP was recompiled with the PortAudio (sound card I/O library) with tools for writing and reading the parallel port. In this way, the sound card was used as a digital-to-analog converter to generate voltage waveform outputs at each simulation time step of the ATP, and the parallel port was used for digital inputs and outputs, resulting in a real-time simulator that can interact with protection and control devices by means of hardware-in-the-loop tests. This work uses the minimum possible hardware requirements to try to implement a real-time simulator. Due to the limitation of two channels, this simulator was used mainly to demonstrate the implementation methodology concept at this stage; this concept could potentially be expanded with more powerful hardware to improve its performance. The performance of the implemented simulator was analyzed through interactions with a real intelligent electronic device (IED). Furthermore, a comparison with the results obtained by means of the well-known real-time digital simulator (RTDS) was presented and discussed.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography