3,519 research outputs found

    Security Protocol for Active Networks.

    Get PDF

    Requirements of a middleware for managing a large, heterogeneous programmable network

    Get PDF
    Programmable networking is an increasingly popular area of research in both industry and academia. Although most programmable network research projects seem to focus on the router architecture rather than on issues relating to the management of programmable networks, there are numerous research groups that have incorporated management middleware into the programmable network router software. However, none seem to be concerned with the effective management of a large heterogeneous programmable network. The requirements of such a middleware are outlined in this paper. There are a number of fundamental middleware principles that are addressed in this paper; these include management paradigms, configuration delivery, scalability and transactions. Security, fault tolerance and usability are also examined—although these are not essential parts of the middleware, they must be addressed if the programmable network management middleware is to be accepted by industry and adopted by other research projects

    Multidomain Network Based on Programmable Networks: Security Architecture

    Get PDF
    This paper proposes a generic security architecture designed for a multidomain and multiservice network based on programmable networks. The multiservice network allows users of an IP network to run programmable services using programmable nodes located in the architecture of the network. The programmable nodes execute codes to process active packets, which can carry user data and control information. The multiservice network model defined here considers the more pragmatic trends in programmable networks. In this scenario, new security risks that do not appear in traditional IP networks become visible. These new risks are as a result of the execution of code in the programmable nodes and the processing of the active packets. The proposed security architecture is based on symmetric cryptography in the critical process, combined with an efficient manner of distributing the symmetric keys. Another important contribution has been to scale the security architecture to a multidomain scenario in a single and efficient way.Publicad

    Contested Meaning of the Nation-state Through Historical Border Narratives a Case Study of the Batang Kanyau Iban, West Kalimantan

    Full text link
    Nation as a cultural-psychological phenomenon is best understood in terms of how a sense of nationhood operates in order to construct social identities or a social imagination about the modern nation-state (Anderson 1983). The forging of nationalism as a national identity cannot be seen in isolation of the rise of modernization and industrialization (Gellner 1987). Although the nation appears to be a modern phenomenon, Smith (1991) stresses that every nation preserves its own past historical artefacts, narratives, and symbols for present-day needs. This model needs to be elaborated further as it is insufficient to understand how a sense of nationhood operates among borderlanders of a state. This paper relates the story of Kalimantan\u27s Iban borderlanders who are officially registered as Indonesian subjects but live on the dividing line between two countries. This makes them appear to be ambiguous subjects who are torn between the two different historical timelines of British and Dutch colonial history (as well as postcolonial Malaysian-Indonesian history). They are marginalized in every aspect and are the forgotten subjects in the history of the broader picture of Indonesia\u27s so-called nationalism project. The explanation is twofold. The first explains how identity is constructed as multi-layered historical narratives involving local and national cultures, and second, how transnational borderlanders give meaning to nation as narrative. The primary data for this article were collected in 2002 through a series of interviews in the village of Benua Sadap, an Iban settlement on the Batang Kanyau River, close to the West Kalimantan (Indonesia) and Sarawak (Malaysia) borderline

    "General Conclusions: From Crisis to A Global Political Economy of Freedom"

    Get PDF
    In this chapter I sum up the basic problems for a new theory of 21st century financial crises in light of the Asian and other subsequent crises. My conclusion is that there are indeed deep structural causes at work in the global markets that affect the political economy of countries and regions. Methodologically, new concepts, models and theories are constructed, at ;least partially, to conduct further meaningful empirical work leading to relevant policy conclusions. This book belongs to the beginning of intellectual efforts in this direction. Political economic analyses at the country level, CGE modeling within a new theoretical framework, and neural network approach to learning in a bounded rationality framework point to a role for reforms at the state, firm and regional level. A new type of institutional analysis called the 'extended panda's thumb approach' leads to the recommendation that path dependent hybrid structures need to be constructed at the local, national, regional and global level to lead to a new global financial architecture for the prevention--- and if prevention fails--- management of financial crises.

    Distributed Reed-Solomon Codes for Simple Multiple Access Networks

    Get PDF
    We consider a simple multiple access network in which a destination node receives information from multiple sources via a set of relay nodes. Each relay node has access to a subset of the sources, and is connected to the destination by a unit capacity link. We also assume that zz of the relay nodes are adversarial. We propose a computationally efficient distributed coding scheme and show that it achieves the full capacity region for up to three sources. Specifically, the relay nodes encode in a distributed fashion such that the overall codewords received at the destination are codewords from a single Reed-Solomon code.Comment: 12 pages, 1 figur

    Policy-based autonomic control service

    Get PDF
    Recently, there has been a considerable interest in policy-based, goal-oriented service management and autonomic computing. Much work is still required to investigate designs and policy models and associate meta-reasoning systems for policy-based autonomic systems. In this paper we outline a proposed autonomic middleware control service used to orchestrate selfhealing of distributed applications. Policies are used to adjust the systems autonomy and define self-healing strategies to stabilize/correct a given system in the event of failures

    A management architecture for active networks

    Get PDF
    In this paper we present an architecture for network and applications management, which is based on the Active Networks paradigm and shows the advantages of network programmability. The stimulus to develop this architecture arises from an actual need to manage a cluster of active nodes, where it is often required to redeploy network assets and modify nodes connectivity. In our architecture, a remote front-end of the managing entity allows the operator to design new network topologies, to check the status of the nodes and to configure them. Moreover, the proposed framework allows to explore an active network, to monitor the active applications, to query each node and to install programmable traps. In order to take advantage of the Active Networks technology, we introduce active SNMP-like MIBs and agents, which are dynamic and programmable. The programmable management agents make tracing distributed applications a feasible task. We propose a general framework that can inter-operate with any active execution environment. In this framework, both the manager and the monitor front-ends communicate with an active node (the Active Network Access Point) through the XML language. A gateway service performs the translation of the queries from XML to an active packet language and injects the code in the network. We demonstrate the implementation of an active network gateway for PLAN (Packet Language for Active Networks) in a forty active nodes testbed. Finally, we discuss an application of the active management architecture to detect the causes of network failures by tracing network events in time

    Performance analysis of a security architecture for active networks in Java

    Get PDF
    Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network operation. Active networks are composed of special nodes (named Active Router) that are able to execute active code to offer the active services. This technology introduces some security threats that must be solved using a security architecture. We have developed a security architecture (ROSA) for an active network platform (SARA). Java has been used as programming language in order to provide portability, but it imposes some performance limitations. This paper analyses the penalty of using Java and proposes some mechanisms to improve the performance of cryptographic implementations in Java.Publicad
    • 

    corecore