1,827 Hits in 3.7 sec

Hardware acceleration of a software-based VPN

Furkan Turan, Ruan de Clercq, Pieter Maene, Oscar Reparaz, Ingrid Verbauwhede
2016 2016 26th International Conference on Field Programmable Logic and Applications (FPL)  
The hardware-software codesign of this work is implemented on a Xilinx Zynq-7000 SoC, showing a 93% reduction in the execution time of encrypting a 1024-byte frame, and this improved the TCP and UDP communication  ...  This work presents a coprocessor designed to offer hardware acceleration for these encryption and decryption operations.  ...  Our work introduces a VPN device based on a VPN software named SigmaVPN, in contrast to providing another hardware accelerator for IPsec VPN.  ... 
doi:10.1109/fpl.2016.7577321 dblp:conf/fpl/TuranCMRV16 fatcat:2bbv5t5hhbdinik2kcbco4l7q4

Making the gigabit IPsec VPN architecture secure

R. Friend
2004 Computer  
Current software-based VPNs cannot operate cost-efficiently at gigabit speeds, so developers use security coprocessors to accelerate critical portions of IPsec processing.  ...  Since VPN functionality is the most compute-intensive operation, especially at gigabit speeds, adding VPN hardware acceleration to a router or appliance with a firewall and NAT occurs first.  ... 
doi:10.1109/mc.2004.30 fatcat:wbd7coplxrfm5aqnuuuqr5fxcy

A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec VPNs [chapter]

Pan-Lung Tsai, Chun-Ying Huang, Yun-Yin Huang, Chia-Chang Hsu, Chin-Laung Lei
2005 Lecture Notes in Computer Science  
As the bandwidth of WAN links keeps growing, the bottleneck in a typical deployment of CPE-based IPsec VPNs has moved from the last-mile connections to the customer-edge security gateways.  ...  In this paper, we propose a clustering scheme to scale the throughput as required by CPE-based IPsec VPNs.  ...  In this section, we first introduce a relatively new type of VPNs, the network-based IP VPNs, which gains much market interest, and then discuss hardware-assisted acceleration technologies for IPsec processing  ... 
doi:10.1007/11602569_45 fatcat:qx7pt6qfdbhu3peu3sbbus25ty

Current Status of Network Processors

Neha Jain, Manoj Kumar Jain
2014 International Journal of Computer Applications  
Number of internet users is increasing day by day. Demands for new application are also increasing. It is possible to create a network processor based on user's demands.  ...  This paper shows some details about softwares which help in writing code for NPs. Some brief information about NPs is also shown in this paper, which is currently in market.  ...  The entire VPN packet protocol is implemented in hardware of Au1550. It supports DES, 3DES, AES, ARC-4, SHA-I, MD5.  ... 
doi:10.5120/17239-7573 fatcat:m224btgssjakxfi5y6qagvasom

Network Function Virtualization based on FPGAs:A Framework for all-Programmable network devices [article]

Christoforos Kachris, Georgios Sirakoulis, Dimitrios Soudris
2014 arXiv   pre-print
In this paper we propose the use of FPGAs as an ideal platform for NFV that can be used to provide both the flexibility of virtualizations and the high performance of the specialized hardware.  ...  Network Function Virtualization (NFV) refers to the use of commodity hardware resources as the basic platform to perform specialized network functions as opposed to specialized hardware devices.  ...  Furthermore, the proposed platform can change the number of hardware acceleration units that are based tightly coupled and loose coupled (through a bus) to the processor based on the average size of the  ... 
arXiv:1406.0309v1 fatcat:nw5tdei4rnhmdfehcjscqp2y6i

Deployment of OpenFlow/SDN Technologies to Carrier Services

Yoichi SATO, Ichiro FUKUDA, Tomonori FUJITA
2013 IEICE transactions on communications  
OpenFlow/Software-Defined Networking (SDN) is drawing attention as a method to control network virtualization for the cloud computing services and other carrier services.  ...  The use of computing resources on network is becoming active in the Internet and private networks.  ...  As an intermediate solution between software and hardware a switch using Network Processor Unit (NPU) is a candidate.  ... 
doi:10.1587/transcom.e96.b.2946 fatcat:n37axgpwvrhpzjhe5ccxrru5vm

Network security metrics and performance for healthcare systems management

Vicky Liu, Aklilu Daniel Tesfamicael, William Caelli, Tony Sahama
2015 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)  
While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances.  ...  Based on our performance experiments, this research has indicated a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or  ...  ACKNOWLEDGMENT Our IPSec implementation and performance testing has been conducted in a university network laboratory with student teams.  ... 
doi:10.1109/healthcom.2015.7454496 dblp:conf/healthcom/LiuTCS15 fatcat:uwvls7eqbvcx7knejbuq7h5wiu

Hardware-assisted security mechanism: The acceleration of cryptographic operations with low hardware cost

Jed Kao-Tung Chang, Shaoshan Liu, Jean-Luc Gaudiot, Chen Liu
2010 International Performance Computing and Communications Conference  
SHA1 is often used in firewall, VPN, and IPsecurity. III. HARDWARE ACCELERATION Our approach consists of two steps. The first step is to identify the hotspot functions.  ...  Thus a hotspot function with high execution rate and low hardware cost will be suitable for hardware acceleration.  ... 
doi:10.1109/pccc.2010.5682293 dblp:conf/ipccc/ChangLGL10 fatcat:oa5osuwduncu5gopijnmb3f4x4


Abhijith M S, K. Senthilvadivu
2020 International Journal of Engineering Applied Sciences and Technology  
The disease has been also declared as a global pandemic by the world health organization. COVID-19 has a huge impact on every industry.  ...  This paper talks about various VPN technologies, VPN providers and how IT companies used them effectively during the pandemic.  ...  Backup hardware is always a part of every SLA.  ... 
doi:10.33564/ijeast.2020.v05i05.027 fatcat:4o36nmnvubezlf4xrn7wtbekyq

Enabling NFV Services on Resource-Constrained CPEs

Roberto Bonafiglia, Sebastiano Miano, Sergio Nuccio, Fulvio Risso, Amedeo Sapio
2016 2016 5th IEEE International Conference on Cloud Networking (Cloudnet)  
However, such hardware often runs a Linux-based operating system that supports several software modules (e.g., iptables) that can be used to implement network functions (e.g., a firewall), which can be  ...  point of view.  ...  This allow to replace a generic virtual switch implementation with an hardware-accelerated one, without impacting on the rest of the software. B.  ... 
doi:10.1109/cloudnet.2016.24 dblp:conf/cloudnet/BonafigliaMNRS16 fatcat:tts7p5q5ffgv5f5ebbu36nrnry

Virtual Enterprise Network based on IPSec VPN Solutions and Management

Sebastian Mariu, Marius Marian, George Dragoi, Ioana Raluca
2012 International Journal of Advanced Computer Science and Applications  
Network management represents the activities, methods, procedures, and tools (software and hardware) that pertain to the operation, administration, maintenance, and provisioning of networked systems.  ...  In addition, the paper presents a network management solution for a large enterprise using open source software implemented in the PREMINV Research Center, at the University "Politehnica" of Bucharest.  ...  [26]: local VPN based on VLAN (Virtual Local Area Network), local VPN based on IPSec (Internet Protocol Security), VPN wide area based on IPSec, VPN wide area based on MPLS (Multi-Protocol Label Switching  ... 
doi:10.14569/ijacsa.2012.031105 fatcat:6cobltyjkbbtfpcmpsanozf5wy

An adaptive system-on-chip for network applications

R. Koch, T. Pionteck, C. Albrecht, E. Maehle
2006 Proceedings 20th IEEE International Parallel & Distributed Processing Symposium  
The system-onchip architecture is based on an adaptable network-onchip which allows the dynamic replacement of hardware modules as well as the adaptation of the on-chip communication structure.  ...  This paper presents the hardware architecture of Dy-naCORE, a dynamically reconfigurable system-on-chip for network applications.  ...  FPGA based hardware accelerators are promising candidates for applications where high computational power is required in combination with flexibility.  ... 
doi:10.1109/ipdps.2006.1639445 dblp:conf/ipps/KochPAM06 fatcat:bumorkprabcenkrm6i55udaqpu

A QoS-enabled packet scheduling algorithm for IPSec multi-accelerator based systems

Alberto Ferrante, Vincenzo Piuri, Fabien Castanier
2005 Proceedings of the 2nd conference on Computing frontiers - CF '05  
In this paper we discuss a scheduling algorithm for distributing IPSec packet processing over the CPU with a software implementation of the cryptographic algorithms considered and multiple cryptographic  ...  Since these algorithms are computationally very intensive, some hardware acceleration is needed to support high throughput.  ...  A secure gateway is a router or a router/firewall also running a VPN-enabled software (e.g., an IPSec implementation).  ... 
doi:10.1145/1062261.1062298 dblp:conf/cf/FerrantePC05 fatcat:z5xr3wu7lffj5nn7z3fslox43m

Architectures of flexible symmetric key crypto engines—a survey

Lilian Bossuet, Michael Grand, Lubos Gaspar, Viktor Fischer, Guy Gogniat
2013 ACM Computing Surveys  
Nevertheless, a few authors propose original processor architectures based on multi-crypto-processor structures and reconfigurable cryptographic arrays.  ...  The flexibility of cryptographic systems plays a very important role in their practical application.  ...  The authors used two models: a performance macromodel based on functions that express the number of cycles incurred by a software library, and a hardware model.  ... 
doi:10.1145/2501654.2501655 fatcat:h5pccigb35hfvinkrpn7s75gl4

The Design and Application of FEU: Automation Monitoring Unit for 5G base stations

Hong Li, Huazhao Liu, Baiyi Yan
2019 Journal of Physics, Conference Series  
It effectively solves the normalized monitoring of heterogeneous FSU and massive sites, constructs the intensive operation maintenance capability for China Tower and lays a solid foundation for the tower-based  ...  In order to realize the co-construction, sharing and intensive management of millions of stations across the network, supporting 5G go into operation efficiently, China Tower Group has developed a new  ...  It is independent of the application dependent on hardware and highly compatible. It is benefit to use model design for the development of power supply environment monitoring standard.  ... 
doi:10.1088/1742-6596/1267/1/012066 fatcat:znrdesw37rdtbjf4udc46qr3iq
« Previous Showing results 1 — 15 out of 1,827 results