Broadband Router

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 111 Experts worldwide ranked by ideXlab platform

Lan Julong - One of the best experts on this subject based on the ideXlab platform.

  • Hardware-and-software-based security architecture for Broadband Router (short paper)
    Lecture Notes in Computer Science, 2006
    Co-Authors: Gu Xiaozhuo, Li Yufeng, Yang Jian-zu, Lan Julong
    Abstract:

    Implementing IP security in Broadband Router without sacrificing the performance is main work we focused on. To meet the need of protecting wire speed forwarding data passing through fast path of the Router, security module implemented with encryption chip was adopted; to protect non real time data passing through slow path of the Router, the scheme of implementing IP security inside kernel of Master control module with software was introduced. Security architecture and several testing architectures were finely designed and depicted in the paper. Testing of security architecture was undergone in SR1880s Router, which was developed by National Digital Switching System Engineering & Technological R&D Center of China (NDSC). Testing results show that the two schemes work well together.

  • ICICS - Hardware-and-software-based security architecture for Broadband Router (short paper)
    Information and Communications Security, 2006
    Co-Authors: Gu Xiaozhuo, Li Yufeng, Yang Jian-zu, Lan Julong
    Abstract:

    Implementing IP security in Broadband Router without sacrificing the performance is main work we focused on. To meet the need of protecting wire speed forwarding data passing through fast path of the Router, security module implemented with encryption chip was adopted; to protect non real time data passing through slow path of the Router, the scheme of implementing IP security inside kernel of Master control module with software was introduced. Security architecture and several testing architectures were finely designed and depicted in the paper. Testing of security architecture was undergone in SR1880s Router, which was developed by National Digital Switching System Engineering & Technological R&D Center of China (NDSC). Testing results show that the two schemes work well together.

Shao Y - One of the best experts on this subject based on the ideXlab platform.

  • kTRxer : a portable toolkit for reliable internet probing
    IEEE, 2014
    Co-Authors: Xue L, Luo X, Shao Y
    Abstract:

    Being one of the primitives of Internet measurement and security scanning, active probing has numerous applications. While the majority of existing probing tools were designed for PCs/servers, the wide adoption of mobile devices and embedded systems bring new requirements and challenges to active probing, for example, the limited resources in those devices may affect active probing's accuracy and efficiency. However, few research studies examine such impact. In this paper, we fill the gap by investigating the effect of resource-limited devices on common packet sending/receiving techniques used by probing tools and proposing kTRxer, a toolkit that can be run in many devices to help probing tools achieve better accuracy and efficiency. kTRxer mitigates the negative effect from devices by keeping away from noise sources and achieves portability by avoiding modifying specific device drivers. We have implemented kTRxer with 5489 lines of C codes and conducted extensive evaluation on three platforms, including PC, Broadband Router, and smartphone. The experimental results show that kTRxer can achieve up to 10 times transmission rate and introduce much less delay noise than existing approaches.Department of ComputingRefereed conference pape

Jukka K Nurminen - One of the best experts on this subject based on the ideXlab platform.

  • CCNC - Energy-efficient BitTorrent downloads to mobile phones through memory-limited proxies
    2011 IEEE Consumer Communications and Networking Conference (CCNC), 2011
    Co-Authors: Imre Kelenyi, Akos Ludanyi, Jukka K Nurminen
    Abstract:

    Using proxy servers to cache and shape network traffic can significantly improve the energy efficiency of the participating mobile clients. In this paper, we analyze the implications of hosting a BitTorrent proxy on a Broadband Router, which pushes the content to a mobile phone over wireless radio (WLAN or 3G). The amount of memory in a Router is limited and therefore our interest is on how to use efficiently the memory to download the BitTorrent content as fast as possible and at the same time transfer it to the mobile phone in an energy-efficient way. We investigate these aspects via a series of measurements. The results show that the proxy-based solution outperforms the torrent client running on the phone in terms of energy and download time. We also simulate the BitTorrent operation to understand how these memory-limited devices would influence the operation of the whole community.

  • Using home Routers as proxies for energy-efficient bittorrent downloads to mobile phones
    IEEE Communications Magazine, 2011
    Co-Authors: Imre Kelenyi, Akos Ludanyi, Jukka K Nurminen
    Abstract:

    Using proxy servers to cache and shape network traffic can significantly improve the energy efficiency of the participating mobile clients. In this article, we analyze the implications of hosting a BitTorrent proxy on a Broadband Router, which pushes the content to a mobile phone over wireless radio (WLAN or 3G). The amount of memory in a Router is limited; therefore, our interest is in how to efficiently use memory to download BitTorrent content as fast as possible and at the same time transfer it to the mobile phone in an energy-efficient way. We investigate these aspects via a series of measurements. The results show that the proxy-based solution outperforms the torrent client running on the phone in terms of energy and download time. We also simulate the BitTorrent operation to understand how these memory-limited devices would influence the operation of the whole community.

  • energy efficient mobile bittorrent with Broadband Router hosted proxies
    Joint IFIP Wireless and Mobile Networking Conference, 2010
    Co-Authors: Imre Kelenyi, Akos Ludanyi, Jukka K Nurminen, Ismo Puustinen
    Abstract:

    Using proxy servers to cache and shape network traffic can significantly improve the energy efficiency of the participating mobile clients. In this paper, we analyze the implications of hosting a BitTorrent proxy on a Broadband Router, which pushes the content to a mobile phone over wireless radio (WLAN or 3G). The amount of memory in a Router is limited and therefore our interest is on how to use efficiently the memory to download the BitTorrent content as fast as possible and at the same time transfer it to the mobile phone in an energy-efficient way. We investigate these aspects via a series of measurements. We also simulate the BitTorrent operation to understand how these memory-limited devices would influence the operation of the whole community.

  • WMNC - Energy-efficient mobile bittorrent with Broadband Router hosted proxies
    WMNC2010, 2010
    Co-Authors: Imre Kelenyi, Akos Ludanyi, Jukka K Nurminen, Ismo Puustinen
    Abstract:

    Using proxy servers to cache and shape network traffic can significantly improve the energy efficiency of the participating mobile clients. In this paper, we analyze the implications of hosting a BitTorrent proxy on a Broadband Router, which pushes the content to a mobile phone over wireless radio (WLAN or 3G). The amount of memory in a Router is limited and therefore our interest is on how to use efficiently the memory to download the BitTorrent content as fast as possible and at the same time transfer it to the mobile phone in an energy-efficient way. We investigate these aspects via a series of measurements. We also simulate the BitTorrent operation to understand how these memory-limited devices would influence the operation of the whole community.

Imre Kelenyi - One of the best experts on this subject based on the ideXlab platform.

  • CCNC - Energy-efficient BitTorrent downloads to mobile phones through memory-limited proxies
    2011 IEEE Consumer Communications and Networking Conference (CCNC), 2011
    Co-Authors: Imre Kelenyi, Akos Ludanyi, Jukka K Nurminen
    Abstract:

    Using proxy servers to cache and shape network traffic can significantly improve the energy efficiency of the participating mobile clients. In this paper, we analyze the implications of hosting a BitTorrent proxy on a Broadband Router, which pushes the content to a mobile phone over wireless radio (WLAN or 3G). The amount of memory in a Router is limited and therefore our interest is on how to use efficiently the memory to download the BitTorrent content as fast as possible and at the same time transfer it to the mobile phone in an energy-efficient way. We investigate these aspects via a series of measurements. The results show that the proxy-based solution outperforms the torrent client running on the phone in terms of energy and download time. We also simulate the BitTorrent operation to understand how these memory-limited devices would influence the operation of the whole community.

  • Using home Routers as proxies for energy-efficient bittorrent downloads to mobile phones
    IEEE Communications Magazine, 2011
    Co-Authors: Imre Kelenyi, Akos Ludanyi, Jukka K Nurminen
    Abstract:

    Using proxy servers to cache and shape network traffic can significantly improve the energy efficiency of the participating mobile clients. In this article, we analyze the implications of hosting a BitTorrent proxy on a Broadband Router, which pushes the content to a mobile phone over wireless radio (WLAN or 3G). The amount of memory in a Router is limited; therefore, our interest is in how to efficiently use memory to download BitTorrent content as fast as possible and at the same time transfer it to the mobile phone in an energy-efficient way. We investigate these aspects via a series of measurements. The results show that the proxy-based solution outperforms the torrent client running on the phone in terms of energy and download time. We also simulate the BitTorrent operation to understand how these memory-limited devices would influence the operation of the whole community.

  • energy efficient mobile bittorrent with Broadband Router hosted proxies
    Joint IFIP Wireless and Mobile Networking Conference, 2010
    Co-Authors: Imre Kelenyi, Akos Ludanyi, Jukka K Nurminen, Ismo Puustinen
    Abstract:

    Using proxy servers to cache and shape network traffic can significantly improve the energy efficiency of the participating mobile clients. In this paper, we analyze the implications of hosting a BitTorrent proxy on a Broadband Router, which pushes the content to a mobile phone over wireless radio (WLAN or 3G). The amount of memory in a Router is limited and therefore our interest is on how to use efficiently the memory to download the BitTorrent content as fast as possible and at the same time transfer it to the mobile phone in an energy-efficient way. We investigate these aspects via a series of measurements. We also simulate the BitTorrent operation to understand how these memory-limited devices would influence the operation of the whole community.

  • WMNC - Energy-efficient mobile bittorrent with Broadband Router hosted proxies
    WMNC2010, 2010
    Co-Authors: Imre Kelenyi, Akos Ludanyi, Jukka K Nurminen, Ismo Puustinen
    Abstract:

    Using proxy servers to cache and shape network traffic can significantly improve the energy efficiency of the participating mobile clients. In this paper, we analyze the implications of hosting a BitTorrent proxy on a Broadband Router, which pushes the content to a mobile phone over wireless radio (WLAN or 3G). The amount of memory in a Router is limited and therefore our interest is on how to use efficiently the memory to download the BitTorrent content as fast as possible and at the same time transfer it to the mobile phone in an energy-efficient way. We investigate these aspects via a series of measurements. We also simulate the BitTorrent operation to understand how these memory-limited devices would influence the operation of the whole community.

Gu Xiaozhuo - One of the best experts on this subject based on the ideXlab platform.

  • Hardware-and-software-based security architecture for Broadband Router (short paper)
    Lecture Notes in Computer Science, 2006
    Co-Authors: Gu Xiaozhuo, Li Yufeng, Yang Jian-zu, Lan Julong
    Abstract:

    Implementing IP security in Broadband Router without sacrificing the performance is main work we focused on. To meet the need of protecting wire speed forwarding data passing through fast path of the Router, security module implemented with encryption chip was adopted; to protect non real time data passing through slow path of the Router, the scheme of implementing IP security inside kernel of Master control module with software was introduced. Security architecture and several testing architectures were finely designed and depicted in the paper. Testing of security architecture was undergone in SR1880s Router, which was developed by National Digital Switching System Engineering & Technological R&D Center of China (NDSC). Testing results show that the two schemes work well together.

  • ICICS - Hardware-and-software-based security architecture for Broadband Router (short paper)
    Information and Communications Security, 2006
    Co-Authors: Gu Xiaozhuo, Li Yufeng, Yang Jian-zu, Lan Julong
    Abstract:

    Implementing IP security in Broadband Router without sacrificing the performance is main work we focused on. To meet the need of protecting wire speed forwarding data passing through fast path of the Router, security module implemented with encryption chip was adopted; to protect non real time data passing through slow path of the Router, the scheme of implementing IP security inside kernel of Master control module with software was introduced. Security architecture and several testing architectures were finely designed and depicted in the paper. Testing of security architecture was undergone in SR1880s Router, which was developed by National Digital Switching System Engineering & Technological R&D Center of China (NDSC). Testing results show that the two schemes work well together.