3,519 research outputs found
Requirements of a middleware for managing a large, heterogeneous programmable network
Programmable networking is an increasingly popular area of research in both industry and academia. Although most programmable network research projects seem to focus on the router architecture rather than on issues relating to the management of programmable networks, there are numerous research groups that have incorporated management middleware into the programmable network router software. However, none seem to be concerned with the effective management of a large heterogeneous programmable network. The requirements of such a middleware are outlined in this paper. There are a number of fundamental middleware principles that are addressed in this paper; these include management paradigms, configuration delivery, scalability and transactions. Security, fault tolerance and usability are also examinedâalthough these are not essential parts of the middleware, they must be addressed if the programmable network management middleware is to be accepted by industry and adopted by other research projects
Multidomain Network Based on Programmable Networks: Security Architecture
This paper proposes a generic security architecture
designed for a multidomain and multiservice network
based on programmable networks. The multiservice
network allows users of an IP network to run
programmable services using programmable nodes
located in the architecture of the network. The
programmable nodes execute codes to process active
packets, which can carry user data and control
information. The multiservice network model defined
here considers the more pragmatic trends in
programmable networks. In this scenario, new security
risks that do not appear in traditional IP networks become
visible. These new risks are as a result of the execution of
code in the programmable nodes and the processing of the
active packets. The proposed security architecture is based
on symmetric cryptography in the critical process,
combined with an efficient manner of distributing the
symmetric keys. Another important contribution has been
to scale the security architecture to a multidomain
scenario in a single and efficient way.Publicad
Contested Meaning of the Nation-state Through Historical Border Narratives a Case Study of the Batang Kanyau Iban, West Kalimantan
Nation as a cultural-psychological phenomenon is best understood in terms of how a sense of nationhood operates in order to construct social identities or a social imagination about the modern nation-state (Anderson 1983). The forging of nationalism as a national identity cannot be seen in isolation of the rise of modernization and industrialization (Gellner 1987). Although the nation appears to be a modern phenomenon, Smith (1991) stresses that every nation preserves its own past historical artefacts, narratives, and symbols for present-day needs. This model needs to be elaborated further as it is insufficient to understand how a sense of nationhood operates among borderlanders of a state. This paper relates the story of Kalimantan\u27s Iban borderlanders who are officially registered as Indonesian subjects but live on the dividing line between two countries. This makes them appear to be ambiguous subjects who are torn between the two different historical timelines of British and Dutch colonial history (as well as postcolonial Malaysian-Indonesian history). They are marginalized in every aspect and are the forgotten subjects in the history of the broader picture of Indonesia\u27s so-called nationalism project. The explanation is twofold. The first explains how identity is constructed as multi-layered historical narratives involving local and national cultures, and second, how transnational borderlanders give meaning to nation as narrative. The primary data for this article were collected in 2002 through a series of interviews in the village of Benua Sadap, an Iban settlement on the Batang Kanyau River, close to the West Kalimantan (Indonesia) and Sarawak (Malaysia) borderline
"General Conclusions: From Crisis to A Global Political Economy of Freedom"
In this chapter I sum up the basic problems for a new theory of 21st century financial crises in light of the Asian and other subsequent crises. My conclusion is that there are indeed deep structural causes at work in the global markets that affect the political economy of countries and regions. Methodologically, new concepts, models and theories are constructed, at ;least partially, to conduct further meaningful empirical work leading to relevant policy conclusions. This book belongs to the beginning of intellectual efforts in this direction. Political economic analyses at the country level, CGE modeling within a new theoretical framework, and neural network approach to learning in a bounded rationality framework point to a role for reforms at the state, firm and regional level. A new type of institutional analysis called the 'extended panda's thumb approach' leads to the recommendation that path dependent hybrid structures need to be constructed at the local, national, regional and global level to lead to a new global financial architecture for the prevention--- and if prevention fails--- management of financial crises.
Distributed Reed-Solomon Codes for Simple Multiple Access Networks
We consider a simple multiple access network in which a destination node
receives information from multiple sources via a set of relay nodes. Each relay
node has access to a subset of the sources, and is connected to the destination
by a unit capacity link. We also assume that of the relay nodes are
adversarial. We propose a computationally efficient distributed coding scheme
and show that it achieves the full capacity region for up to three sources.
Specifically, the relay nodes encode in a distributed fashion such that the
overall codewords received at the destination are codewords from a single
Reed-Solomon code.Comment: 12 pages, 1 figur
Policy-based autonomic control service
Recently, there has been a considerable interest in policy-based, goal-oriented service management and autonomic computing. Much work is still required to investigate designs and policy models and associate meta-reasoning systems for policy-based autonomic systems. In this paper we outline a proposed autonomic middleware control service used to orchestrate selfhealing of distributed applications. Policies are used to adjust the systems autonomy and define self-healing strategies to stabilize/correct a given system in the event of failures
A management architecture for active networks
In this paper we present an architecture for network and applications management, which is based on the Active Networks paradigm and shows the advantages of network programmability. The stimulus to develop this architecture arises from an actual need to manage a cluster of active nodes, where it is often required to redeploy network assets and modify nodes connectivity. In our architecture, a remote front-end of the managing entity allows the operator to design new network topologies, to check the status of the nodes and to configure them. Moreover, the proposed framework allows to explore an active network, to monitor the active applications, to query each node and to install programmable traps. In order to take advantage of the Active Networks technology, we introduce active SNMP-like MIBs and agents, which are dynamic and programmable. The programmable management agents make tracing distributed applications a feasible task. We propose a general framework that can inter-operate with any active execution environment. In this framework, both the manager and the monitor front-ends communicate with an active node (the Active Network Access Point) through the XML language. A gateway service performs the translation of the queries from XML to an active packet language and injects the code in the network. We demonstrate the implementation of an active network gateway for PLAN (Packet Language for Active Networks) in a forty active nodes testbed. Finally, we discuss an application of the active management architecture to detect the causes of network failures by tracing network events in time
Performance analysis of a security architecture for active networks in Java
Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network operation. Active networks are
composed of special nodes (named Active Router) that are able to execute active code to offer the active services. This technology introduces some security threats that must be solved using a security architecture. We have developed a security architecture (ROSA) for an active network platform (SARA). Java has been used as
programming language in order to provide portability, but it imposes some performance limitations. This paper analyses the penalty of using Java and proposes some mechanisms to improve the performance of cryptographic
implementations in Java.Publicad
- âŠ