743,205 research outputs found
Performance analysis of a security architecture for active networks in Java
Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network operation. Active networks are
composed of special nodes (named Active Router) that are able to execute active code to offer the active services. This technology introduces some security threats that must be solved using a security architecture. We have developed a security architecture (ROSA) for an active network platform (SARA). Java has been used as
programming language in order to provide portability, but it imposes some performance limitations. This paper analyses the penalty of using Java and proposes some mechanisms to improve the performance of cryptographic
implementations in Java.Publicad
Mobility through Heterogeneous Networks in a 4G Environment
Serving and Managing users in a heterogeneous environment. 17th WWRF Meeting in Heidelberg, Germany, 15 - 17 November 2006. [Proceeding presented at WG3 - Co-operative and Ad-hoc Networks]The increase will of ubiquitous access of the users to the requested services points towards the integration of heterogeneous networks. In this sense, a user shall be able to access its services through different access technologies, such as WLAN, Wimax, UMTS and DVB technologies, from the same or different network operators, and to seamless move between different networks with active communications. In this paper we propose a mobility architecture able to support this users’ ubiquitous access and seamless movement, while simultaneously bringing a large flexibility to access network operators
Adaptive management of an active services network
The benefits of active services and networks cannot be realised unless the associated increase in system complexity can be efficiently managed. An adaptive management solution is required. Simulation results show that a distributed genetic algorithm, inspired by observations of bacterial communities, can offer many key management functions. The algorithm is fast and efficient, even when the demand for network services is rapidly varying
Service Allocation in a Mobile Fog Infrastructure under Availability and QoS Constraints
The next generation of mobile networks, namely 5G, and the Internet of Things
(IoT) have brought a large number of delay sensitive services. In this context
Cloud services are migrating to the edge of the networks to reduce latency. The
notion of Fog computing, where the edge plays an active role in the execution
of services, comes to meet the need for the stringent requirements. Thus, it
becomes of a high importance to elegantly formulate and optimize this problem
of mapping demand to supply. This work does exactly that, taking into account
two key aspects of a service allocation problem in the Fog, namely modeling
cost of executing a given set of services, and the randomness of resources
availability, which may come from pre-existing load or server mobility. We
introduce an integer optimization formulation to minimize the total cost under
a guarantee of service execution despite the uncertainty of resources
availability.Comment: 5 pages, 5 figure
Multidomain Network Based on Programmable Networks: Security Architecture
This paper proposes a generic security architecture
designed for a multidomain and multiservice network
based on programmable networks. The multiservice
network allows users of an IP network to run
programmable services using programmable nodes
located in the architecture of the network. The
programmable nodes execute codes to process active
packets, which can carry user data and control
information. The multiservice network model defined
here considers the more pragmatic trends in
programmable networks. In this scenario, new security
risks that do not appear in traditional IP networks become
visible. These new risks are as a result of the execution of
code in the programmable nodes and the processing of the
active packets. The proposed security architecture is based
on symmetric cryptography in the critical process,
combined with an efficient manner of distributing the
symmetric keys. Another important contribution has been
to scale the security architecture to a multidomain
scenario in a single and efficient way.Publicad
Principios y Aplicaciones de las Redes Activas
This paper presents an overview of a new network technology: active networks. The active networks goal is to
produce a new networking platform, flexible and extensible at runtime to accommodate the rapid evolution and
deployment of networking technologies and also to provide the increasingly sophisticated services demanded by
users. A snapshot of the architecture being developed in DARPA active networks program is presented. Finally,
potential applications of active networks are highlighted, along with some of the challenges that must be overcome
to make them a reality
- …