L. Battestilli, A. Hutanu, G. Karmous-Edwards, D. Katz, J. MacLaren, J. Mambretti, J. Moore, Seung-Jong Park, H. Perros, S. Sundar, S. Tanwir, S. Thorpe, Yufeng Xin
{"title":"EnLIGHTened Computing: An architecture for co-allocating network, compute, and other grid resources for high-end applications","authors":"L. Battestilli, A. Hutanu, G. Karmous-Edwards, D. Katz, J. MacLaren, J. Mambretti, J. Moore, Seung-Jong Park, H. Perros, S. Sundar, S. Tanwir, S. Thorpe, Yufeng Xin","doi":"10.1109/HONET.2007.4600261","DOIUrl":"https://doi.org/10.1109/HONET.2007.4600261","url":null,"abstract":"Many emerging high performance applications require distributed infrastructure that is significantly more powerful and flexible than traditional grids. Such applications require the optimization, close integration, and control of all grid resources, including networks. The EnLIGHTened (ENL) computing project has designed an architectural framework that allows grid applications to dynamically request (in-advance or on-demand) any type of grid resource: computers, storage, instruments, and deterministic, high-bandwidth network paths, including lightpaths. Based on application requirements, the ENL middleware communicates with grid resource managers and, when availability is verified, co-allocates all the necessary resources. ENLpsilas domain network manager controls all network resource allocations to dynamically setup and delete dedicated circuits using generalized multiprotocol label switching (GMPLS) control plane signaling. In order to make optimal brokering decisions, the ENL middleware uses near-real-time performance information about grid resources. A prototype of this architectural framework on a national-scale testbed implementation has been used to demonstrate a small number of applications. Based on this, a set of changes for the middleware have been laid out and are being implemented.","PeriodicalId":441667,"journal":{"name":"2007 International Symposium on High Capacity Optical Networks and Enabling Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121351455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Iqbal, A. Mehmood, A. Ghafoor, H. F. Ahmed, A. Shibli
{"title":"Authenticated service interaction protocol for Multi-Agent System","authors":"Z. Iqbal, A. Mehmood, A. Ghafoor, H. F. Ahmed, A. Shibli","doi":"10.1109/HONET.2007.4600276","DOIUrl":"https://doi.org/10.1109/HONET.2007.4600276","url":null,"abstract":"Expert are more focusing on the autonomy of processing, being able to provide solution intelligently. Distributed computing provides us with the facility of autonomy of sites. Multi-agent system (MAS) are also a branch of distributed computing. In a MAS distributed system, agent is able to work with other agents and to make reasoning about the environment in which it is currently working. Agent works on different platform open network i.e. LAN, WAN, Internet, which increases the malicious behavior in the environment. With this open environment one can not trust with surety as there is no one accountable for this misbehavior. There should be some security measures which enhance the security and trust for agent to defend themselves against attack of other agents and humans activities. To promote interoperability among agents there should be some trust between agents to migrate freely and without risk. Providing security services in the open environment is quite challenging and attractive. Agents mainly trust on two main component of FIPA reference model i.e. directory facilitator (DF) & agent management system (AMS). These two components must be enough trust worthy to gain trust of various agents. This research will be based on authentication of agents with DF to provide the secure environment e.g. if agent A register itself with DF, any other Agent B cannot delete or modify the Agent A services or the agent A itself. In future we will be working with AMS authentication. Authentication between application agent & DF uses simple authentication security layer (SASL) protocol includes a series of steps before agent can be authenticated at DF.","PeriodicalId":441667,"journal":{"name":"2007 International Symposium on High Capacity Optical Networks and Enabling Technologies","volume":"344 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115452209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Faaiz Hussain, Ali Haider, Moin-ud-din, S. H. Zaidi, H. Perros
{"title":"Extended bimodal burst switching architecture","authors":"Faaiz Hussain, Ali Haider, Moin-ud-din, S. H. Zaidi, H. Perros","doi":"10.1109/HONET.2007.5595102","DOIUrl":"https://doi.org/10.1109/HONET.2007.5595102","url":null,"abstract":"In optical switching paradigm, there are three approaches; optical circuit switching, optical packet switching, and optical burst switching (OBS). OBS is a technology that takes the best features of packet switching and circuit switching by providing a flexible infrastructure for carrying IP traffic and at the same time ensuring efficient utilization of the fiber link. In this paper we propose an effective contention resolution scheme to achieve minimum burst loss at core nodes. Algorithm of zero burst loss for bimodal burst switching is extended from single node star network topology to two node star topology. Scheduling at the core node, typically an optical cross connect (OXC), is performed in two modes i.e., Mode 0 & Mode 1. Mode 0 is for burst transmission between all directly connected edge nodes whereas Mode 1 is for burst transmission through remote core node to a particular destination edge node. Synchronization of the reservation request between the core nodes is a critical task in such a topology. In order to achieve minimum burst loss, using a small length of fiber delay line in recirculation mode results in an effective strategy.","PeriodicalId":441667,"journal":{"name":"2007 International Symposium on High Capacity Optical Networks and Enabling Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124276907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User relationship modeling in networks","authors":"Q. Ali","doi":"10.1109/HONET.2007.4600243","DOIUrl":"https://doi.org/10.1109/HONET.2007.4600243","url":null,"abstract":"Efficiently self organizing the network databases with respect to relationships amongst users or between a user and a data object is an important and a challenging problem. A layer of abstraction by describing relationship patterns is defined to model user relationships and to develop group clusters. This information along with attributes of involved users is used to extract and monitor existing and growing relationships. Such analysis is also used to explore how it can help generate alerts in advance, resulting from internal users, or through collaboration of internal as well as external users.","PeriodicalId":441667,"journal":{"name":"2007 International Symposium on High Capacity Optical Networks and Enabling Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116489082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grid Services Architecture for Archiving and Presentation of medical images","authors":"S. Ahmed","doi":"10.1109/HONET.2007.4600275","DOIUrl":"https://doi.org/10.1109/HONET.2007.4600275","url":null,"abstract":"Grid computing is being used to provide medical image library services both for large data / picture archives and the diagnostic support through information sharing between hospitals and physicians. These images are hetrogeneously scattered and often have in compatible formats of storage. The size of the archives, data transport requirements and additional security concerns due to personal ownership are some of the issues that require special services over the grid arcitectures. The mechanisms for resource sharing, management, and image servicing in the grid architecture have been reviwed to support telemedicine activities. The paper focusses on four main issues i.e. large disk storage, efficient services over broad band networks with intelligent disks, security concerns in handling medical data and workflow requirements for global connectivity of hospitals in virtual organisations. A set of functional modules for Service Architecture for Archiving and Presentation (SAAP) has been suggested to provide medical imaging services efficiently over the grid.","PeriodicalId":441667,"journal":{"name":"2007 International Symposium on High Capacity Optical Networks and Enabling Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128999162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Haider Raza, S. Zaidi, K. Zaidi, M. Ramzan, S. Abidi, M. Yasin Akhtar Raja
{"title":"Bi-directional Radio-over-Fiber architecture based on up- and down-Conversion","authors":"M. Haider Raza, S. Zaidi, K. Zaidi, M. Ramzan, S. Abidi, M. Yasin Akhtar Raja","doi":"10.1109/HONET.2007.4600250","DOIUrl":"https://doi.org/10.1109/HONET.2007.4600250","url":null,"abstract":"Radio-over-fiber (RoF) is a promising technology with a number of benefits including huge bandwidth, high reliability, transparency and flexibility that makes it attractive to fulfill future broadband application requirements. Such dasiaoptical-wireless networkpsila architectures have potential to support broadband wireless access over 1 Gbps. Developing a cost-effective bi-directional solution that supports uplink and downlink data transmission between Control Station (CS) and Base Stations (BSs) is one of the research issues in RoF. We present a bi-directional RoF solution, where downlink scheme is based on photonic frequency upconversion. SOA-MZI is used to mix IF and LO signals and all-optically up-convert IF signal. Signals in intermediate frequency (IF) band (2.5 GHz) along with LO (37.5 GHz) are generated in CS. IF signals are up-converted to RF (40 GHz) at remote node (RN). An additional un-modulated carrier at 6.5 GHz is sent along with downlink data and is also up-converted to 44 GHz at RN, this is used as a LO for down conversion of uplink data. Uplink down-converts RF signal (36 GHz) to IF (8 GHz) at BS. As downlink optical carrier at output of SOA-MZI is in double side band format, optical carrier is extracted and re-used for uplink data transmission. Down- and up-link radio signals are DPSK modulated at 155 Mbps. In this paper, we present proposed solution and simulation results for uplink and downlink. Signals at BS and CS, for downlink and uplink respectively are de-modulated with acceptable BER, with BER < 10-9. By deploying the proposed system, a cost-effective RoF architecture can be implemented.","PeriodicalId":441667,"journal":{"name":"2007 International Symposium on High Capacity Optical Networks and Enabling Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128197706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A security solution for Wireless Local Area Network (WLAN)","authors":"M. Ahmadi, M. M. Satti","doi":"10.1109/HONET.2007.4600239","DOIUrl":"https://doi.org/10.1109/HONET.2007.4600239","url":null,"abstract":"Confidence in the use of the wireless local area network (WLAN) for internal, external or corporate business communications relies on effective security, and intruder detection processes. Regrettably, the triumph of the WLANpsilas design for corporate and government agencies as a ubiquitous open authentication environment is at risk of being tarnished by unscrupulous and vindictive attacks. Despite the risks WLAN installation is in rise and estimated over 85.9 millions nodes by the year 2008, representing a $6.5 billion market. The scope of this paper is to focus on the identification of security flaws in the current protocol model and to suggest a better implementation method that includes additional security as an add-on to improve corporate confidence in wireless LAN security.","PeriodicalId":441667,"journal":{"name":"2007 International Symposium on High Capacity Optical Networks and Enabling Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131870552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sadri, Y.N. Harandi, M. Pirhadi, M. Waskasi, A.I. Tabrizipoor, M. Mirzabaghi
{"title":"Test strategy for DSL broadband IP access services","authors":"S. Sadri, Y.N. Harandi, M. Pirhadi, M. Waskasi, A.I. Tabrizipoor, M. Mirzabaghi","doi":"10.1109/HONET.2007.4600272","DOIUrl":"https://doi.org/10.1109/HONET.2007.4600272","url":null,"abstract":"In this paper the test methodology has been expanded for evaluation of DSL broadband services. This is a new strategy for testing and considering different aspects of test. This strategy can precisely test various features of DSL broadband equipment and services which can be delivered by them in terms of different aspects of testing such as functionality, performance, conformance, etc. It was practically executed over a designed testbed in Iran Telecommunications Research Center (ITRC) where a lab named NGN Pilot exists. The introduced strategy has a hierarchical structure from the topmost level of testing including different categories to the bottommost level including detailed test topics and test cases. This paper elaborates how the strategy was designed and how it can be applied to a desired environment to compare different DSL scenarios with each other. The strategy can then be used by a service provider to help deciding which solutions can achieve the best outcome.","PeriodicalId":441667,"journal":{"name":"2007 International Symposium on High Capacity Optical Networks and Enabling Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115491189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for network reliability through QoS mapping between lower and upper layers","authors":"M. Al-Kuwaiti, N. Kyriakopoulos, S. Hussein","doi":"10.1109/HONET.2007.4600257","DOIUrl":"https://doi.org/10.1109/HONET.2007.4600257","url":null,"abstract":"The majority of todaypsilas infrastructures are vulnerable to various disruptions that affect their essential services. Consequently, different research programs have been aiming at lowering such disruptions. In fact, the problem of designing systems with dependability, reliability, or security characteristics has long been acknowledged as an area for further research, and has received a substantial amount of attentions in the last few years by many different organizations and institutes. However, there are various inconsistent concepts and terminologies that are commonly used to describe the performance of systems (e.g., high-confidence, survivable, trustworthy, and robust). Some of these concepts are quantitative while others are qualitative, and it is a challenge to analyze and evaluate the performance of systems subjectively. Therefore, in this research, we are relating the various subjective concepts to a simple measurable concept which is the reliability concept, and based on analyzing this concept in the high-speed IP-based network environment, the reliability concept is further expressed by the quality of service (QoS). A QoS mapping between the lower and upper layers loss rate performance parameter has been developed. Further, the impact of the lower layer packets loss on the upper layer frames quality has been investigated. This mapping allows better understanding of the technical network parameters from the applicationpsilas perspective of the service level agreement (SLA) and it balances the reservations of the right resources.","PeriodicalId":441667,"journal":{"name":"2007 International Symposium on High Capacity Optical Networks and Enabling Technologies","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124625913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance improvement of spread ALOHA systems using single code","authors":"H. Achi, A. Hellany, M. Nagrial","doi":"10.1109/HONET.2007.4600268","DOIUrl":"https://doi.org/10.1109/HONET.2007.4600268","url":null,"abstract":"Spread ALOHA as an advanced multiple access technique has shown several advantages over existing conventional and spread spectrum based wireless systems. Spread ALOHA is currently recognised as a simplified wireless multiple access system which provides a higher bandwidth and may accommodate high number of users. Over the last decade, several models have been developed to predict and estimate the performance of Spread ALOHA. Various combinations of protocols have been employed to enhance performance. This paper investigates the employment of a unique spreading code in conjunction with Spread ALOHA as opposed to the common method of employing distinct spreading codes for all users on the communication channel. In this paper we have modeled and simulated a Single Code Spread ALOHA (SCSA) system together with a conventional CDMA ALOHA system in order to analyse and compare the performance of both systems. Two types of PN codes were used in the simulation models, namely m-sequence and Gold codes. The simulation results showed comparable performance of both systems, and verified the suitability of m-sequence for SCSA and Gold codes for CDMA respectively.","PeriodicalId":441667,"journal":{"name":"2007 International Symposium on High Capacity Optical Networks and Enabling Technologies","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127532999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}