2,757 research outputs found
High speed all optical networks
An inherent problem of conventional point-to-point wide area network (WAN) architectures is that they cannot translate optical transmission bandwidth into comparable user available throughput due to the limiting electronic processing speed of the switching nodes. The first solution to wavelength division multiplexing (WDM) based WAN networks that overcomes this limitation is presented. The proposed Lightnet architecture takes into account the idiosyncrasies of WDM switching/transmission leading to an efficient and pragmatic solution. The Lightnet architecture trades the ample WDM bandwidth for a reduction in the number of processing stages and a simplification of each switching stage, leading to drastically increased effective network throughputs. The principle of the Lightnet architecture is the construction and use of virtual topology networks, embedded in the original network in the wavelength domain. For this construction Lightnets utilize the new concept of lightpaths which constitute the links of the virtual topology. Lightpaths are all-optical, multihop, paths in the network that allow data to be switched through intermediate nodes using high throughput passive optical switches. The use of the virtual topologies and the associated switching design introduce a number of new ideas, which are discussed in detail
Breeding progress and preparedness for massâscale deployment of perennial lignocellulosic biomass crops switchgrass, miscanthus, willow and poplar
UK: The UKâled miscanthus research and breeding was mainly supported by the Biotechnology and Biological Sciences Research Council (BBSRC), Department for Environment, Food and Rural Affairs (Defra), the BBSRC CSP strategic funding grant BB/CSP1730/1, Innovate UK/BBSRC âMUSTâ BB/N016149/1, CERES Inc. and Terravesta Ltd. through the GIANTâLINK project (LK0863). Genomic selection and genomewide association study activities were supported by BBSRC grant BB/K01711X/1, the BBSRC strategic programme grant on Energy Grasses & Bioârefining BBS/E/W/10963A01. The UKâled willow R&D work reported here was supported by BBSRC (BBS/E/C/00005199, BBS/E/C/00005201, BB/G016216/1, BB/E006833/1, BB/G00580X/1 and BBS/E/C/000I0410), Defra (NF0424) and the Department of Trade and Industry (DTI) (B/W6/00599/00/00). IT: The Brain Gain Program (Rientro dei cervelli) of the Italian Ministry of Education, University, and Research supports Antoine Harfouche. US: Contributions by Gerald Tuskan to this manuscript were supported by the Center for Bioenergy Innovation, a US Department of Energy Bioenergy Research Center supported by the Office of Biological and Environmental Research in the DOE Office of Science, under contract number DEâAC05â00OR22725. Willow breeding efforts at Cornell University have been supported by grants from the US Department of Agriculture National Institute of Food and Agriculture. Contributions by the University of Illinois were supported primarily by the DOE Office of Science; Office of Biological and Environmental Research (BER); grant nos. DEâSC0006634, DEâSC0012379 and DEâSC0018420 (Center for Advanced Bioenergy and Bioproducts Innovation); and the Energy Biosciences Institute. EU: We would like to further acknowledge contributions from the EU projects âOPTIMISCâ FP7â289159 on miscanthus and âWATBIOâ FP7â311929 on poplar and miscanthus as well as âGRACEâ H2020âEU.3.2.6. Bioâbased Industries Joint Technology Initiative (BBIâJTI) Project ID 745012 on miscanthus.Peer reviewedPostprintPublisher PD
Recommended from our members
Replication and Nested Transactions in the Eden Distributed System
Hardware redundancy in distributed systems offers the potential for increased availability and performance, but this requires software support if the full potential is to be realized. We have designed and implemented two mechanisms for such support. The first provides crash-resistant resources, replicated transparently and consistently to increase the availability of distributed data. To update multiple copies despite down nodes, we have introduced the Regeneration method used in the implementation of a replicated system directory. Regeneration restores inaccessible copies elsewhere in the network, maintains the availability of resources, and adapts to configuration changes. The second mechanism is a systell1 supporting nested transactions, which can manage the complex failure modes in a distributed system, synchronize concurrent resource access internal to applications, and facilitate safe module composition. In the tree-structured nesting, each transaction has a Transaction Manager (TM), responsible for the concurrency control and crash recovery of its subtransactions. Many concurrency control and recovery techniques can be combined in this TM Tree design framework. We chose locking and versions for the first implementation. Using Eden objects and the replicated directory, our nested transactions provide consistent concurrent access 10 location-independent, crash- resistant resources. In summary, the principal contributions of this research are the Regeneration method and the TM Tree framework. Regeneration uses the separation of hardware repair from data restoration to increase replicated data availability. TM tree composes existing techniques to derive many difficult designs for nested transaction. Both have been proven in the design and implementation of actual systems
High Peformance and Low Power On-Die Interconnect Fabrics.
Increasing power density with technology scaling has caused stagnation in operating frequency of modern day microprocessors. This has led designers to prefer multicore architectures over complex monolithic processors to keep up with the demand for rising computing throughput. Although processing units are getting smaller and simpler, the dramatic rise of their count on a single die has made the fabric that connects these processing units increasingly complex. These interconnect fabrics have become a bottleneck in improving overall system effciency. As a result, the design paradigm for multi-core chips is gradually shifting from a core-centric architecture towards an interconnect-centric architecture, where system efficiency is limited by the fabric rather than the processing ability of any individual core. This dissertation introduces three novel and synergistic circuit techniques to improve scalability of switch fabrics to make on-die integration of hundreds to thousands of cores feasible. 1) A matrix topology is proposed for designing a fully connected switch fabric that re-uses output buses for programming, and stores shue congurations at cross points. This significantly reduces routing congestion, lowers area/power, and improves per-
formance. Silicon measurements demonstrate 47% energy savings in a 64-lane SIMD processor fabricated in 65nm CMOS over a conventional implementation. 2) A novel approach to handle high radix arbitration along with data routing is proposed. It optimally uses existing cross-bar interconnect resources without requiring any additional overhead. Bandwidth exceeding 2Tb/s is recorded in a test prototype fabricated in 65nm. 3) Building on the later, a new circuit topology to manage and update priority adaptively within the switch fabric without incurring additional delay or area is then proposed. Several assist circuit techniques, such as a thyristor based sense amplifier and self regenerating bi-directional repeaters are proposed for high speed energy efficient signaling to and from the switch fabric to improve overall routing efficiency.
Using these techniques a 64 x 64 switch fabric with 128b data bus fabricated in 45nm achieves a throughput of 4.5Tb/s at single cycle latency while operating at 559MHz.Ph.D.Electrical EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/91506/1/sudhirks_1.pd
Different Strategies of Housing Design
As one of the largest consumers of energy, the housing sector and its unconscious occupants' activities negatively affect the environment. Architects and engineers have a major role in resolving the associated problems while maintaining comfort for occupants. Also very important are environmental education and awareness of appropriate environmental development in designing activity and selecting building materials and products. There are different architectural strategies that are aimed to achieve a low-energy built environment. Determining the needed strategy according to function, economy, and occupant comfort and affordability is the crucial step. This book helps the reader to achieve a sustainable development without destruction of the resources while maintaining a growing universal awareness of protecting the living and non-living environment
The converging world: The social and environmental impact of convergence
This 96-page report undertakes an ecosystem service analysis of SROI (social report on investment from linked investment in renewable energy and forest restoration in Tamil Nadu, India, as a strategic approach to low-carbon development in an international partnership between south west England and India
Energy efficient security and privacy management in sensor clouds
Sensor Cloud is a new model of computing for Wireless Sensor Networks, which facilitates resource sharing and enables large scale sensor networks. A multi-user distributed system, however, where resources are shared, has inherent challenges in security and privacy. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly the code which is disseminated to the sensors by the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex, energy intensive measures, the security and privacy of the data and the code have to be attained by way of lightweight algorithms.
In this work, we first present two data aggregation algorithms, one based on an Elliptic Curve Cryptosystem (ECC) and the other based on symmetric key system, which provide confidentiality and integrity of data against an outside adversary and privacy against an in network adversary. A fine grained access control scheme which works on the securely aggregated data is presented next. This scheme uses Attribute Based Encryption (ABE) to achieve this objective. Finally, to securely and efficiently disseminate code in the sensor cloud, we present a code dissemination algorithm which first reduces the amount of code to be transmitted from the base station. It then uses Symmetric Proxy Re-encryption along with Bloom filters and HMACs to protect the code against eavesdropping and false code injection attacks. --Abstract, page iv
- âŠ