Ipsec-protected Transport of Hdtv over 15.1 Introduction
نویسندگان
چکیده
Bandwidth-intensive applications compete directly with the operating system’s network stack for CPU cycles. This is particularly true when the stack performs security protocols such as IPsec; the additional load of complex cryptographic transforms overwhelms modern CPUs when data rates exceed 100 Mbps. This paper describes a network-processing accelerator which overcomes these bottlenecks by offloading packet processing and cryptographic transforms to an intelligent interface card. The system achieves sustained 1 Gbps host-to-host bandwidth of encrypted IPsec traffic on commodity CPUs and networks. It appears to the application developer as a normal network interface, because the hardware acceleration is transparent to the user. The system is highly programmable and can support a variety of offload functions. A sample application is described, wherein production-quality HDTV is transported over IP at nearly 900 Mbps, fully secured using IPsec with AES encryption.
منابع مشابه
IPsec-Protected Transport of HDTV over IP
Bandwidth-intensive applications compete directly with the operating system’s network stack for CPU cycles. This is particularly true when the stack performs security protocols such as IPsec; the additional load of complex cryptographic transforms overwhelms modern CPUs when data rates exceed 100 Mbps. This paper describes a network-processing accelerator which overcomes these bottlenecks by of...
متن کاملTransparent Network Security Policy Enforcement
Recent work in the area of network security, such as IPsec, provides mechanisms for securing the traÆc between any two interconnected hosts. However, it is not always possible, economical, or even practical from an administration and operational point of view to upgrade the software and con guration of all the nodes in a network to support such security protocols. One apparent solution to this ...
متن کاملSELinux Protected Paths Revisited
We revisit the notion of achieving a protected communication path for applications connected via the Internet using SELinux. Last year, we discussed the mechanism for integrating IPsec with SELinux security labels, but we did not consider the system goals for using such labels. Toward this end, we revisit early SELinux proposals for what is called a protected path. A protected path is a secure ...
متن کاملPerformance Study of COPS over TLS and IPsec Secure Session
This paper evaluates the performance of COPS over secure TLS and IPsec connections. For large size data, when we apply authentication and encryption, the throughput degrades compared with the throughput without authentication or encryption. COPS has native security mechanisms, but it also has limitations. As defined in RFC 2478, COPS includes no standard key management and no data privacy hop-b...
متن کاملAccess of Mobile IP Users to Firewall Protected VPNs
The paper describes an architecture allowing Mobile IP hosts to access to a virtual private network that is protected by a firewall from the public Internet. The implementation based on adaptation of standard protocols (IPSec and Mobile IP) and initial performance results are discussed.
متن کامل