A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hardware acceleration of a software-based VPN
2016
2016 26th International Conference on Field Programmable Logic and Applications (FPL)
The hardware-software codesign of this work is implemented on a Xilinx Zynq-7000 SoC, showing a 93% reduction in the execution time of encrypting a 1024-byte frame, and this improved the TCP and UDP communication ...
This work presents a coprocessor designed to offer hardware acceleration for these encryption and decryption operations. ...
Our work introduces a VPN device based on a VPN software named SigmaVPN, in contrast to providing another hardware accelerator for IPsec VPN. ...
doi:10.1109/fpl.2016.7577321
dblp:conf/fpl/TuranCMRV16
fatcat:2bbv5t5hhbdinik2kcbco4l7q4
Making the gigabit IPsec VPN architecture secure
2004
Computer
Current software-based VPNs cannot operate cost-efficiently at gigabit speeds, so developers use security coprocessors to accelerate critical portions of IPsec processing. ...
Since VPN functionality is the most compute-intensive operation, especially at gigabit speeds, adding VPN hardware acceleration to a router or appliance with a firewall and NAT occurs first. ...
doi:10.1109/mc.2004.30
fatcat:wbd7coplxrfm5aqnuuuqr5fxcy
A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec VPNs
[chapter]
2005
Lecture Notes in Computer Science
As the bandwidth of WAN links keeps growing, the bottleneck in a typical deployment of CPE-based IPsec VPNs has moved from the last-mile connections to the customer-edge security gateways. ...
In this paper, we propose a clustering scheme to scale the throughput as required by CPE-based IPsec VPNs. ...
In this section, we first introduce a relatively new type of VPNs, the network-based IP VPNs, which gains much market interest, and then discuss hardware-assisted acceleration technologies for IPsec processing ...
doi:10.1007/11602569_45
fatcat:qx7pt6qfdbhu3peu3sbbus25ty
Current Status of Network Processors
2014
International Journal of Computer Applications
Number of internet users is increasing day by day. Demands for new application are also increasing. It is possible to create a network processor based on user's demands. ...
This paper shows some details about softwares which help in writing code for NPs. Some brief information about NPs is also shown in this paper, which is currently in market. ...
The entire VPN packet protocol is implemented in hardware of Au1550. It supports DES, 3DES, AES, ARC-4, SHA-I, MD5. ...
doi:10.5120/17239-7573
fatcat:m224btgssjakxfi5y6qagvasom
Network Function Virtualization based on FPGAs:A Framework for all-Programmable network devices
[article]
2014
arXiv
pre-print
In this paper we propose the use of FPGAs as an ideal platform for NFV that can be used to provide both the flexibility of virtualizations and the high performance of the specialized hardware. ...
Network Function Virtualization (NFV) refers to the use of commodity hardware resources as the basic platform to perform specialized network functions as opposed to specialized hardware devices. ...
Furthermore, the proposed platform can change the number of hardware acceleration units that are based tightly coupled and loose coupled (through a bus) to the processor based on the average size of the ...
arXiv:1406.0309v1
fatcat:nw5tdei4rnhmdfehcjscqp2y6i
Deployment of OpenFlow/SDN Technologies to Carrier Services
2013
IEICE transactions on communications
OpenFlow/Software-Defined Networking (SDN) is drawing attention as a method to control network virtualization for the cloud computing services and other carrier services. ...
The use of computing resources on network is becoming active in the Internet and private networks. ...
As an intermediate solution between software and hardware a switch using Network Processor Unit (NPU) is a candidate. ...
doi:10.1587/transcom.e96.b.2946
fatcat:n37axgpwvrhpzjhe5ccxrru5vm
Network security metrics and performance for healthcare systems management
2015
2015 17th International Conference on E-health Networking, Application & Services (HealthCom)
While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. ...
Based on our performance experiments, this research has indicated a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or ...
ACKNOWLEDGMENT Our IPSec implementation and performance testing has been conducted in a university network laboratory with student teams. ...
doi:10.1109/healthcom.2015.7454496
dblp:conf/healthcom/LiuTCS15
fatcat:uwvls7eqbvcx7knejbuq7h5wiu
Hardware-assisted security mechanism: The acceleration of cryptographic operations with low hardware cost
2010
International Performance Computing and Communications Conference
SHA1 is often used in firewall, VPN, and IPsecurity.
III. HARDWARE ACCELERATION Our approach consists of two steps. The first step is to identify the hotspot functions. ...
Thus a hotspot function with high execution rate and low hardware cost will be suitable for hardware acceleration. ...
doi:10.1109/pccc.2010.5682293
dblp:conf/ipccc/ChangLGL10
fatcat:oa5osuwduncu5gopijnmb3f4x4
IMPACT OF VPN TECHNOLOGY ON IT INDUSTRY DURING COVID-19 PANDEMIC
2020
International Journal of Engineering Applied Sciences and Technology
The disease has been also declared as a global pandemic by the world health organization. COVID-19 has a huge impact on every industry. ...
This paper talks about various VPN technologies, VPN providers and how IT companies used them effectively during the pandemic. ...
Backup hardware is always a part of every SLA. ...
doi:10.33564/ijeast.2020.v05i05.027
fatcat:4o36nmnvubezlf4xrn7wtbekyq
Enabling NFV Services on Resource-Constrained CPEs
2016
2016 5th IEEE International Conference on Cloud Networking (Cloudnet)
However, such hardware often runs a Linux-based operating system that supports several software modules (e.g., iptables) that can be used to implement network functions (e.g., a firewall), which can be ...
point of view. ...
This allow to replace a generic virtual switch implementation with an hardware-accelerated one, without impacting on the rest of the software.
B. ...
doi:10.1109/cloudnet.2016.24
dblp:conf/cloudnet/BonafigliaMNRS16
fatcat:tts7p5q5ffgv5f5ebbu36nrnry
Virtual Enterprise Network based on IPSec VPN Solutions and Management
2012
International Journal of Advanced Computer Science and Applications
Network management represents the activities, methods, procedures, and tools (software and hardware) that pertain to the operation, administration, maintenance, and provisioning of networked systems. ...
In addition, the paper presents a network management solution for a large enterprise using open source software implemented in the PREMINV Research Center, at the University "Politehnica" of Bucharest. ...
[26]: local VPN based on VLAN (Virtual Local Area Network), local VPN based on IPSec (Internet Protocol Security), VPN wide area based on IPSec, VPN wide area based on MPLS (Multi-Protocol Label Switching ...
doi:10.14569/ijacsa.2012.031105
fatcat:6cobltyjkbbtfpcmpsanozf5wy
An adaptive system-on-chip for network applications
2006
Proceedings 20th IEEE International Parallel & Distributed Processing Symposium
The system-onchip architecture is based on an adaptable network-onchip which allows the dynamic replacement of hardware modules as well as the adaptation of the on-chip communication structure. ...
This paper presents the hardware architecture of Dy-naCORE, a dynamically reconfigurable system-on-chip for network applications. ...
FPGA based hardware accelerators are promising candidates for applications where high computational power is required in combination with flexibility. ...
doi:10.1109/ipdps.2006.1639445
dblp:conf/ipps/KochPAM06
fatcat:bumorkprabcenkrm6i55udaqpu
A QoS-enabled packet scheduling algorithm for IPSec multi-accelerator based systems
2005
Proceedings of the 2nd conference on Computing frontiers - CF '05
In this paper we discuss a scheduling algorithm for distributing IPSec packet processing over the CPU with a software implementation of the cryptographic algorithms considered and multiple cryptographic ...
Since these algorithms are computationally very intensive, some hardware acceleration is needed to support high throughput. ...
A secure gateway is a router or a router/firewall also running a VPN-enabled software (e.g., an IPSec implementation). ...
doi:10.1145/1062261.1062298
dblp:conf/cf/FerrantePC05
fatcat:z5xr3wu7lffj5nn7z3fslox43m
Architectures of flexible symmetric key crypto engines—a survey
2013
ACM Computing Surveys
Nevertheless, a few authors propose original processor architectures based on multi-crypto-processor structures and reconfigurable cryptographic arrays. ...
The flexibility of cryptographic systems plays a very important role in their practical application. ...
The authors used two models: a performance macromodel based on functions that express the number of cycles incurred by a software library, and a hardware model. ...
doi:10.1145/2501654.2501655
fatcat:h5pccigb35hfvinkrpn7s75gl4
The Design and Application of FEU: Automation Monitoring Unit for 5G base stations
2019
Journal of Physics, Conference Series
It effectively solves the normalized monitoring of heterogeneous FSU and massive sites, constructs the intensive operation maintenance capability for China Tower and lays a solid foundation for the tower-based ...
In order to realize the co-construction, sharing and intensive management of millions of stations across the network, supporting 5G go into operation efficiently, China Tower Group has developed a new ...
It is independent of the application dependent on hardware and highly compatible. It is benefit to use model design for the development of power supply environment monitoring standard. ...
doi:10.1088/1742-6596/1267/1/012066
fatcat:znrdesw37rdtbjf4udc46qr3iq
« Previous
Showing results 1 — 15 out of 1,827 results