{"title":"Multi-wavelength Optical Switch Fabric for Next-Generation Optical Switches","authors":"I. Ashry, I. Kandas, M. Eltoweissy","doi":"10.1109/EMERGING.2009.24","DOIUrl":"https://doi.org/10.1109/EMERGING.2009.24","url":null,"abstract":"Next-generation switches and routers in optical networks will rely on optical switch fabrics (OSFs) to overcome the problem of the unnecessary optical-electrical-optical conversions and signal processing. In this paper, we propose a new architecture of an OSF based on tunable fiber Bragg gratings (FBGs). The main feature of the architecture is its ability to be used for both packet and circuit switching networks. Furthermore, the use of FBG endows the proposed design with simplicity, low insertion loss and low cost. In addition, the new architecture fits the operations of equally and unequally spaced channels and provides wavelength modularity. Finally, contention resolution is suggested using a multi-wavelength converter.","PeriodicalId":340950,"journal":{"name":"2009 First International Conference on Emerging Network Intelligence","volume":"1015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123118029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Models for Pheromone Evaluation in Ant Systems for Mobile Ad-hoc Networks","authors":"Fernando Correia, T. Vazão, Victor J. Lobo","doi":"10.1109/EMERGING.2009.16","DOIUrl":"https://doi.org/10.1109/EMERGING.2009.16","url":null,"abstract":"On a mobile ad-hoc network environment, where the resources are scarce, the knowledge about the network's link state is essential to optimize the routing procedures. This paper presents a study about different pheromone evaluation models and how they react to possible changes in traffic rate. Observing how the pheromone value on a link changes, it could be possible to identify certain patterns which can indicate the path status. For this study, the behavior of the Ant System evaluation model was compared with a Temporal Active Pheromone model (a biological approach) and a Progressive Pheromone Reduction model with and without a maximum pheromone limit.","PeriodicalId":340950,"journal":{"name":"2009 First International Conference on Emerging Network Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122708074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Tools and Standards in the Web 2.0 Era for Activities Dissemination","authors":"S. Pastore","doi":"10.1109/EMERGING.2009.12","DOIUrl":"https://doi.org/10.1109/EMERGING.2009.12","url":null,"abstract":"Working with the web as a platform to disseminate information about projects or activities pursued by organizations and institutions requires a throughout knowledge of web technologies, standards and software platforms to ensure the best solutions for specific situations are enacted. The paper describes practical examples of this selection process by analyzing the technologies, methods and tools available to disseminate projects results or to implement specific web activities pursued within a specific group of a research institute. The aim is to stress on the difficult of choosing a solution and the necessity of adhering to web standards in order guarantee accessibility and in some way a future device-independence and to ensure a long-term life-cycle for the web applications. The adopted solutions range over single web applications or services developed by using different programming languages to specific packages like content management systems according to the kind of complexity of the requests. The work shows as different languages and interfaces could be introduced for developing web-based applications according different context, and their adoption strictly depends on specific project requests.","PeriodicalId":340950,"journal":{"name":"2009 First International Conference on Emerging Network Intelligence","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128320543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Coding for Efficient Error Recovery in Wireless Sensor Networks for Medical Applications","authors":"S. Marinkovic, E. Popovici","doi":"10.1109/EMERGING.2009.22","DOIUrl":"https://doi.org/10.1109/EMERGING.2009.22","url":null,"abstract":"Modern medical wireless systems present a challenge where communication reliability is crucial, but the resources are limited, since medical devices carried on a patient need to be small. We propose, simulate and analyze one relay network, and show that network coding along with redundancy can be used as a very efficient error recovery mechanism that greatly improves network reliability at very low computational and hardware cost. Thus, network coding can be an interesting method for reliability improvement in medical systems such as Wireless Body Area Networks (WBAN). A network coding scheme is proposed and simulated, and the optimal method according to that scheme is analyzed. Practical and fast decoding algorithm is presented. We then simulate the proposed network and the optimal method and compare it with the regular redundant network. Simulations show great improvement compared to regular redundant transfer, for very small computational cost. Finally, we simulate and show that the proposed network is still functional and operational even in case where one relay point is off.","PeriodicalId":340950,"journal":{"name":"2009 First International Conference on Emerging Network Intelligence","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131236679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Castro, V. M. Gulías, Henrique Ferreiro, C. Abalde
{"title":"Resource Discovery Approach to Support a QoS-aware DHT-Based Caching Architecture","authors":"David Castro, V. M. Gulías, Henrique Ferreiro, C. Abalde","doi":"10.1109/EMERGING.2009.19","DOIUrl":"https://doi.org/10.1109/EMERGING.2009.19","url":null,"abstract":"Though widely accepted as a key building block for next-generation large scale decentralized systems, the lack of flexibility of DHTs on efficient non identifier-based lookups is a well-known problem. In this paper, a resource discovery service that tackles the issues identified in a decentralized and distributed DHT-based caching architecture for media content distribution is presented. In the proposed approach, complex queries on dynamic peer resources can be performed. This discovery service is layered over an underlying DHT overlay network which connects all the peers, based on the combination of a spanningtree built bottom-up by mapping DHT peers to their parents, and routing indices which allow peers to efficiently lookup other peers, matching some resource constraints. Measures from simulation as well as from a real implementation are analyzed.","PeriodicalId":340950,"journal":{"name":"2009 First International Conference on Emerging Network Intelligence","volume":"1989 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125493312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Key Management for Router Updates","authors":"J. Atwood","doi":"10.1109/EMERGING.2009.23","DOIUrl":"https://doi.org/10.1109/EMERGING.2009.23","url":null,"abstract":"Security is assuming increasing importance in emerging networks. To ensure application security, the routing protocols are assumed to be trusted. Correct forwarding of packets requires the prior exchange of information among routers, using the appropriate routing protocol. Valid construction of the routes requires that the exchanged information be received from a legitimate neighbor, and that it not be altered en route, i.e., the inter-router communication has to be secure. This requires, in turn, an architecture for managing the necessary security associations and keying material within an administrative region. After reviewing current work and existing security tools, a proposal is made for a novel architecture to manage the router updates. The operations within this architecture are detailed, and its advantages are explained.","PeriodicalId":340950,"journal":{"name":"2009 First International Conference on Emerging Network Intelligence","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114777489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Deussen, M. Baumgarten, M. Mulvenna, A. Manzalini, C. Moiso
{"title":"Autonomic Re-configuration of Pervasive Supervision Services","authors":"P. Deussen, M. Baumgarten, M. Mulvenna, A. Manzalini, C. Moiso","doi":"10.1109/EMERGING.2009.18","DOIUrl":"https://doi.org/10.1109/EMERGING.2009.18","url":null,"abstract":"This paper describes a supervision system for autonomic distributed systems (e.g., a cloud computing environment). It is designed as a supplementary service and is structured as an ensemble of components that implement an autonomic control loop, which does not require any a priori knowledge on the structure of the supervised system. The architecture devised is highly modular and can be configured towards individual needs. In particular, the supervision system is able to re-configure itself according to the changes of the supervised system and the environment it is operating in.","PeriodicalId":340950,"journal":{"name":"2009 First International Conference on Emerging Network Intelligence","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125587632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Enhanced QoS-enabled Dynamic Bandwidth Allocation Mechanism for Ethernet PON","authors":"T. Nguyen, T. Eido, T. Atmaca","doi":"10.1109/EMERGING.2009.20","DOIUrl":"https://doi.org/10.1109/EMERGING.2009.20","url":null,"abstract":"The Ethernet Passive Optical Network (EPON) combines both inexpensive Ethernet equipments and the large bandwidth offered by the optical fiber. Therefore, EPON has been considered as an attractive solution for the next generation broadband access network. In this paper, we present an enhanced Dynamic Bandwidth Allocation (eDBA) algorithm for EPON network. Our mechanism allocates effectively and fairly the transmission bandwidth to ONUs. Some other algorithms, such as the Dynamic Bandwidth Allocation (DBA), introduce an idle period during the time that the Optical Line Terminal (OLT) is executing the bandwidth assignment procedure. During this idle time, no data are sent by any ONU node to OLT. In order to exploit this wasted bandwidth, the proposed algorithm calculates a vector of complementary bandwidth amounts to assign to the ONUs during the idle time. Finally, we simulate a multiservice-based EPON network configured with the eDBA mechanism. Obtained results are compared to the ones obtained with two other algorithms: Dynamic Bandwidth Allocation (DBA) and the Interleaved Polling with Adaptive Cycle Time (IPACT). We show that eDBA can significantly improve the network performance in term of packet access delay and packet loss rate as compared with other algorithms.","PeriodicalId":340950,"journal":{"name":"2009 First International Conference on Emerging Network Intelligence","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131817361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Quality Degradation Detection Method by Using Network Specification","authors":"N. Nakamura, Satoshi Ikada","doi":"10.1109/EMERGING.2009.15","DOIUrl":"https://doi.org/10.1109/EMERGING.2009.15","url":null,"abstract":"The authors propose a framework and a detection method for network quality degradation. The framework has three functions. The first function is making a topology tree and selecting flows by watching network traffic at a single point probe. The second function is inferring a network specification, whether a flow has wireless link or not, by frequency analysis. The third function is the network quality anomaly detection by frequency analysis, then inferring the bad links. In this paper, the authors discuss the useful flows in the next generation networks for first function, and the use of the second and the third function under the condition of intermingled wireless and wired links.","PeriodicalId":340950,"journal":{"name":"2009 First International Conference on Emerging Network Intelligence","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114476517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Lupu, S. Obreja, E. Borcoci, G. Martufi, M. Taglieri
{"title":"Authorization Subsystem for WiMAX Access in a Multidomain End to End QoS Enabled Architecture","authors":"R. Lupu, S. Obreja, E. Borcoci, G. Martufi, M. Taglieri","doi":"10.1109/EMERGING.2009.21","DOIUrl":"https://doi.org/10.1109/EMERGING.2009.21","url":null,"abstract":"In IP end to end QoS enabled multidomain communications with guarantees and limited resources, the access control functionality is required. This paper proposes an AAA-based network authorization subsystem for granting authorized end-users access to the end to end QoS services running over the WiMAX access networks. The solution relies on the WiMAX Forum AAA Framework specification. Whereas, several QoS authorization models have been considered in the design phase, this paper focus on the functionality of the QoS assured model with no-precondition.","PeriodicalId":340950,"journal":{"name":"2009 First International Conference on Emerging Network Intelligence","volume":"3 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123730472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}