Evaluation and Comparison of Real-time Network Latency

Slides:



Advertisements
Similar presentations
H.323 Recommended by ITU-T for implementing packet-based multimedia conferencing over LAN that cannot guarantee QoS. Specifying protocols, methods and.
Advertisements

Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Network Certification Preparation. Module - 1 Communication methods OSI reference model and layered communication TCP/IP model TCP and UDP IP addressing.
Csc333 Data communication & Networking Credit: 2.
Implementing a Highly Available Network
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
By: Christopher Henderson.  What is VoIP?  How is it being used?  VoIP’s main Security Threats.  Availability of Service  Integrity of Service 
Network Simulation Internet Technologies and Applications.
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
The Saigon CTT Semester 1 CHAPTER 12 – 13 – 14 Le Chi Trung.
Presentation on Osi & TCP/IP MODEL
CHIEF EXECUTIVE OFFICER KoolSpan, The Trust Company.
Our Last Class!!  summary  what does the future look like?
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Field Trip #28 Securing a VNC Connection with Java By Keith Lynn.
TCP/IP (Transmission Control Protocol / Internet Protocol)
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Networks Part 2: Infrastructure + Protocols NYU-Poly: HSWP Instructor: Mandy Galante.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
UDP & TCP BS IT 4 th Semester By: Muhammad Hanif User Datagram Protocol & Transmission Control Protocol.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
K. Salah1 Security Protocols in the Internet IPSec.
Evaluation and Comparison of Real-time Network Latency Phillip Marlow KoolSpan Inc. TJHSST Computer Systems Lab.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Chapter 1: Explore the Network
MOBILE COMMUNICATION SYSTEM
Networking Using the OSI Model.
Computing Fundamentals Module Lesson 1 — Introducing Computers
Application layer tcp/ip
Virtual Private Network
Instructor Materials Chapter 6 Building a Home Network
Pass Your Cisco Exam with 100% Passing Guarantee by Exams4sure
Chapter 1 Communication Networks and Services
100% Exam Passing Guarantee & Money Back Assurance
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
ITIS 3110 IT Infrastructure II
M-COMMERCE.
Radius, LDAP, Radius used in Authenticating Users
ISO/OSI Model and Collision Domain
100% Exam Passing Guarantee & Money Back Assurance
© 2003, Cisco Systems, Inc. All rights reserved.
Chapter 14 User Datagram Program (UDP)
PART 5 Transport Layer Computer Networks.
8 Network Layer Part V Computer Networks Tutun Juhana
Introduction to Networking
Introduction to Computers
Net431:advanced net services
Evaluation and Comparison of Real-time Network Latency
Process-to-Process Delivery:
CCNA Exam Dumps Questions
Mentors: Christine Lisetti and Ugan Yasavur
GPRS GPRS stands for General Packet Radio System. GPRS provides packet radio access for mobile Global System for Mobile Communications (GSM) and time-division.
Thor: The Hybrid Online Repository
DIFFERENT TYPES OF INTERNET CONNECTIONS.
Process-to-Process Delivery:
Internet and Modern Life
Lecture 1 Overview of Communication Networks and Services
Evaluation and Comparison of Real-time Network Latency
PREPARED BY: RIDDHI PATEL (09CE085)
Chapter 2 Network Models
Performance Evaluation of Computer Networks
Performance Evaluation of Computer Networks
Computing Fundamentals Module Lesson 1 — Introducing Computers
Process-to-Process Delivery: UDP, TCP
Cellular and mobile communications (GSM, 3G and 4G (LTE))
Chapter 8 – Data switching and routing
Presentation transcript:

Evaluation and Comparison of Real-time Network Latency Special Thanks to Anthony Fascenda, CEO KoolSpan Inc. Mobile applications are an essential part of modern society and they are becoming critical to society everyday. In fact in parts of the world, mobile applications have replaced money and credit cards for paying for everything from sodas to restaurant bills. You can trade stock, access your bank, order movies - virtually anything from your mobile application. All of this requires security and the more critical the application the stronger security that is needed. However, for security to work, security needs to be as invisible as possible to the user. One of the most critical factors to this usable security is the time it takes to provide security. The time it takes to provide security and communication is its latency and this project aims to quantify and evaluate these latencies. Conclusion Based on all the data collected, it was found that the addition of security was not nearly as big a factor in determining latency as protocol or network choices. The GPRS network displayed the most latency, to the point where a voice conversation could not realistically be held. However, this is an older network, and it is likely that any new programs would operate exclusively over 3G networks instead. All other networks that were tested showed round trip latencies that were more than adequate for a voice conversation. Using TCP caused more latency than UDP, presumably due to multiple retry attempts that didn't occur using UDP. This only became significant over the cellular network however as retries required more trips over the slower network. By Phillip Marlow

Cellular Interceptors SYN/ACK Method Using this method, round trip latency can be calculated without the need to synchronize the clocks of each computer. This allows the program to give latencies which are accurate to within a few microseconds. Two computers establish a connection. Intercept units start at $500 and can cost well over $1,000,000 depending on form and functionality. Depending on the country, intercepted cellular audio can be purchased for less than $5/minute or on a per day rate. SYN The first message is a SYN packet, encoding a start time and requesting a response. ACK The returned message, or ACK packet, contains the original start time, which can be used to calculate round trip latency. These interceptors work across all cellular carriers, and many work passively, meaning that they cannot be detected and don’t interfere with the network. Some also provide triangulation features allowing the interceptor to output a person’s location to within a few meters. KoolSpan TrustChip Peer-to-Peer Authentication Streaming Encryption Engine Industry Standard Interface to Host Device Hardened FPGA On-chip Crypto Tamper resistant