9,049 research outputs found

    Design of an autonomous software platform for future symbiotic service management

    Get PDF
    Nowadays, public as well as private communication infrastructures are all contending for the same limited amount of bandwidth. To optimally share network resources, symbiotic networks have been proposed, which cross logical and physical boundaries to improve the reliability, scalability, and energy efficiency of the network as a whole as well as its constituents. This paper focuses on software services in such symbiotic networks. We propose a platform for the intelligent composition of services provided by symbiotically connected parties, resulting in novel cooperation opportunities. The platform harvests Semantic Web technology to describe services in a highly expressive manner, and constructs service compositions using SeCoA, our tunable best-first search algorithm. The resulting compositions are then enacted via CaPI, a reconfigurable middleware infrastructure. By means of an illustrative scenario, we provide further insight into the platform's functioning

    Autonomous service composition in symbiotic networks

    Get PDF
    Part 2: PhD Workshop: Autonomic Network and Service ManagementInternational audienceTo cope with the ever-growing number of wired and wireless networks, we introduce the notion of so-called symbiotic networks. These networks seamlessly operate across layers and over network boundaries, resulting in improved scalability, dependability, and energy efficiency. This particular Ph.D. research focuses on software services operating in such symbiotic networks. When two or more networks merge, the services provided on them may be combined into a service composition that is much more than the sum of its parts. Driven by two distinct use cases, we aim to enable fully autonomous service composition and resource provisioning. For the first use case, an in-building over-the-top service platform, we describe a software architecture and a set of generic resource provisioning algorithms. The second use case, which focuses on wireless body area networks, will allow us to expand our research domain into highly dynamic symbiotic network environments, where services appear and disappear more frequently

    Cognitive Machine Individualism in a Symbiotic Cybersecurity Policy Framework for the Preservation of Internet of Things Integrity: A Quantitative Study

    Get PDF
    This quantitative study examined the complex nature of modern cyber threats to propose the establishment of cyber as an interdisciplinary field of public policy initiated through the creation of a symbiotic cybersecurity policy framework. For the public good (and maintaining ideological balance), there must be recognition that public policies are at a transition point where the digital public square is a tangible reality that is more than a collection of technological widgets. The academic contribution of this research project is the fusion of humanistic principles with Internet of Things (IoT) technologies that alters our perception of the machine from an instrument of human engineering into a thinking peer to elevate cyber from technical esoterism into an interdisciplinary field of public policy. The contribution to the US national cybersecurity policy body of knowledge is a unified policy framework (manifested in the symbiotic cybersecurity policy triad) that could transform cybersecurity policies from network-based to entity-based. A correlation archival data design was used with the frequency of malicious software attacks as the dependent variable and diversity of intrusion techniques as the independent variable for RQ1. For RQ2, the frequency of detection events was the dependent variable and diversity of intrusion techniques was the independent variable. Self-determination Theory is the theoretical framework as the cognitive machine can recognize, self-endorse, and maintain its own identity based on a sense of self-motivation that is progressively shaped by the machine’s ability to learn. The transformation of cyber policies from technical esoterism into an interdisciplinary field of public policy starts with the recognition that the cognitive machine is an independent consumer of, advisor into, and influenced by public policy theories, philosophical constructs, and societal initiatives

    Joining forces to create value: The emergence of an innovation ecosystem

    Get PDF
    During periods of discontinuous technological change (DTC), firms seek alliances to obtain new resources and competences. The concept of innovation ecosystems is increasingly used to address joint value creation endeavours. Interactions within an innovation ecosystem are typically organized around a technology platform consisting of shared assets, standards, and interfaces. Yet, few empirical studies explain how innovation ecosystems emerge. Based on a longitudinal case study of autonomous drive technology development at Volvo Car Group, this paper aims at showing how alliances for developing a new technology leads to the emergence of an innovation ecosystem. In the context of a DTC, the paper underlines how the initial resource constraints can be a blessing in disguise that drives a firm to seek new alliances. We identify that the alliances had a significant influence on the technology platform, transitioning it from an internal to a modular technology platform. This triggered the emergence of an innovation ecosystem, consisting of actors co-creating value and organizing around the technology platform. Further, the paper highlights the subtle distinction between modularization for outsourcing and modularization for co-creating value

    Symbiotic service composition in distributed sensor networks

    Get PDF
    To cope with the evergrowing number of colocated networks and the density they exhibit, we introduce symbiotic networks-networks that intelligently share resources and autonomously adapt to the dynamicity thereof. By allowing the software services provided in such networks to operate in an equally symbiotic manner, new opportunities for the so-called service compositions arise, which take advantage of the multitude of services and combine them to achieve goals set out by the individual networks. To accommodate services in large-scale symbiotic networks, including wireless sensor networks, we propose a software platform which autonomously constructs and orchestrates such compositions. Furthermore, upon changes in the infrastructure, the platform responds by adapting compositions to reflect the changed context. To enable the interaction between services offered by arbitrary partners, the platform deploys ontologies to achieve a common vocabulary and semantic rules to express the policies imposed by the networks involved. By applying the platform to typical scenarios from the field of sensor-augmented cargo transportation and logistics, we illustrate its applicability and, through performance evaluation, show a significant increase in process efficiency. Additionally, by means of a generic problem generator, we quantify the scalability of our platform and show the importance of an appropriate priority function, one of the core constituents of our service composition approach

    Optimization of BGP Convergence and Prefix Security in IP/MPLS Networks

    Get PDF
    Multi-Protocol Label Switching-based networks are the backbone of the operation of the Internet, that communicates through the use of the Border Gateway Protocol which connects distinct networks, referred to as Autonomous Systems, together. As the technology matures, so does the challenges caused by the extreme growth rate of the Internet. The amount of BGP prefixes required to facilitate such an increase in connectivity introduces multiple new critical issues, such as with the scalability and the security of the aforementioned Border Gateway Protocol. Illustration of an implementation of an IP/MPLS core transmission network is formed through the introduction of the four main pillars of an Autonomous System: Multi-Protocol Label Switching, Border Gateway Protocol, Open Shortest Path First and the Resource Reservation Protocol. The symbiosis of these technologies is used to introduce the practicalities of operating an IP/MPLS-based ISP network with traffic engineering and fault-resilience at heart. The first research objective of this thesis is to determine whether the deployment of a new BGP feature, which is referred to as BGP Prefix Independent Convergence (PIC), within AS16086 would be a worthwhile endeavour. This BGP extension aims to reduce the convergence delay of BGP Prefixes inside of an IP/MPLS Core Transmission Network, thus improving the networks resilience against faults. Simultaneously, the second research objective was to research the available mechanisms considering the protection of BGP Prefixes, such as with the implementation of the Resource Public Key Infrastructure and the Artemis BGP Monitor for proactive and reactive security of BGP prefixes within AS16086. The future prospective deployment of BGPsec is discussed to form an outlook to the future of IP/MPLS network design. As the trust-based nature of BGP as a protocol has become a distinct vulnerability, thus necessitating the use of various technologies to secure the communications between the Autonomous Systems that form the network to end all networks, the Internet
    • …
    corecore