首页 | 本学科首页   官方微博 | 高级检索  
     


Zero Configuration Networking: Implementation, performance, and security
Authors:Farhan SiddiquiAuthor VitaeSherali ZeadallyAuthor Vitae  Thabet KacemAuthor VitaeScott FowlerAuthor Vitae
Affiliation:a School of Information Systems and Technology, Walden University, MN, USA
b Department of Computer Science and Information Technology, University of the District of Columbia, Washington, DC, USA
c Department of Science and Technology, Linkoping University, Sweden
Abstract:The ubiquitous access to wired and wireless networks is making information access possible from anywhere, anytime, and any device. Today, end-users are also highly mobile, often equipped with a range of portable devices, and they expect service availability when they require it. In addition, they do not want to be burdened by complex configurations before they can discover and use services. The Zero Configuration (Zeroconf) Networking technology promises to alleviate this configuration burden by allowing users to discover services and devices with little end-user intervention. We compare two popular implementations of Zeroconf namely, Avahi and Mono.Zeroconf running on Linux and Windows XP operating systems, respectively. We evaluate their performance using service discovery time as the performance metric. Our empirical results show that Linux Avahi yields almost 99% improvements in service discovery time over Windows Mono.Zeroconf. We also discuss security solutions that can be deployed to enhance the security of Zeroconf networks. We further investigate the performance of the IP Security (IPSec) protocol when used by our Mono.Zeroconf implementation running on the Windows XP platform. With IPSec, service discovery time increases by almost 45% with our prototype implementation.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号