1,810 research outputs found
Key Management for Secure Multicast in Hybrid Satellite Networks
Keywords: This paper proposes a design for key management for secure multicast in hybrid satellite networks. Communication satellites offer an efficient way to extend IP multicast services for groups in wide-area networks. In order to be commercially viable, the multicast traffic should be accessible only to paying subscribers. Access control can be achieved by data encryption. This requires secure and efficient methods to generate, distribute and update the keys. Most current key management protocols do not scale well when applied to large dynamic groups in wide-area networks. This paper attempts to solve the above problem for groups in a hybrid network that is composed of terrestrial Ethernet LANs interconnected by ATM-based satellite channels. We investigate current group key management protocols, and design a framework for secure and scalable key management for the multicast routing architecture in the satellite network. The proposed framework is presented in detail, alongwith analysis and simulation results. Satellite network, secure multicast, group key management. 1
Evaluation of finite difference based asynchronous partial differential equations solver for reacting flows
Next-generation exascale machines with extreme levels of parallelism will
provide massive computing resources for large scale numerical simulations of
complex physical systems at unprecedented parameter ranges. However, novel
numerical methods, scalable algorithms and re-design of current state-of-the
art numerical solvers are required for scaling to these machines with minimal
overheads. One such approach for partial differential equations based solvers
involves computation of spatial derivatives with possibly delayed or
asynchronous data using high-order asynchrony-tolerant (AT) schemes to
facilitate mitigation of communication and synchronization bottlenecks without
affecting the numerical accuracy. In the present study, an effective
methodology of implementing temporal discretization using a multi-stage
Runge-Kutta method with AT schemes is presented. Together these schemes are
used to perform asynchronous simulations of canonical reacting flow problems,
demonstrated in one-dimension including auto-ignition of a premixture, premixed
flame propagation and non-premixed autoignition. Simulation results show that
the AT schemes incur very small numerical errors in all key quantities of
interest including stiff intermediate species despite delayed data at
processing element (PE) boundaries. For simulations of supersonic flows, the
degraded numerical accuracy of well-known shock-resolving WENO (weighted
essentially non-oscillatory) schemes when used with relaxed synchronization is
also discussed. To overcome this loss of accuracy, high-order AT-WENO schemes
are derived and tested on linear and non-linear equations. Finally the novel
AT-WENO schemes are demonstrated in the propagation of a detonation wave with
delays at PE boundaries
Architecture and Information Requirements to Assess and Predict Flight Safety Risks During Highly Autonomous Urban Flight Operations
As aviation adopts new and increasingly complex operational paradigms, vehicle types, and technologies to broaden airspace capability and efficiency, maintaining a safe system will require recognition and timely mitigation of new safety issues as they emerge and before significant consequences occur. A shift toward a more predictive risk mitigation capability becomes critical to meet this challenge. In-time safety assurance comprises monitoring, assessment, and mitigation functions that proactively reduce risk in complex operational environments where the interplay of hazards may not be known (and therefore not accounted for) during design. These functions can also help to understand and predict emergent effects caused by the increased use of automation or autonomous functions that may exhibit unexpected non-deterministic behaviors. The envisioned monitoring and assessment functions can look for precursors, anomalies, and trends (PATs) by applying model-based and data-driven methods. Outputs would then drive downstream mitigation(s) if needed to reduce risk. These mitigations may be accomplished using traditional design revision processes or via operational (and sometimes automated) mechanisms. The latter refers to the in-time aspect of the system concept. This report comprises architecture and information requirements and considerations toward enabling such a capability within the domain of low altitude highly autonomous urban flight operations. This domain may span, for example, public-use surveillance missions flown by small unmanned aircraft (e.g., infrastructure inspection, facility management, emergency response, law enforcement, and/or security) to transportation missions flown by larger aircraft that may carry passengers or deliver products. Caveat: Any stated requirements in this report should be considered initial requirements that are intended to drive research and development (R&D). These initial requirements are likely to evolve based on R&D findings, refinement of operational concepts, industry advances, and new industry or regulatory policies or standards related to safety assurance
IREEL: remote experimentation with real protocols and applications over emulated network
This paper presents a novel e-learning platform called IREEL. IREEL is a virtual laboratory allowing students to drive experiments with real Internet applications and end-to-end protocols in the context of networking courses. This platform consists in a remote network emulator offering a set of predefined applications and protocol mechanisms. Experimenters configure and control the emulation and the end-systems behavior in order to perform tests, measurements and observations on protocols or applications operating under controlled specific networking conditions. A set of end-to-end mechanisms, mainly focusing on transport and application level protocols, are currently available. IREEL is scalable and easy to use thanks to an ergonomic web interface
Development of a High-Fidelity Simulation Environment for Shadow-Mode Assessments of Air Traffic Concepts
This paper describes the Shadow-Mode Assessment Using Realistic Technologies for the National Airspace System (SMART-NAS) Test Bed. The SMART-NAS Test Bed is an air traffic simulation platform being developed by the National Aeronautics and Space Administration (NASA). The SMART-NAS Test Bed's core purpose is to conduct high-fidelity, real-time, human-in-the-loop and automation-in-the-loop simulations of current and proposed future air traffic concepts for the United States' Next Generation Air Transportation System called NextGen. The setup, configuration, coordination, and execution of realtime, human-in-the-loop air traffic management simulations are complex, tedious, time intensive, and expensive. The SMART-NAS Test Bed framework is an alternative to the current approach and will provide services throughout the simulation workflow pipeline to help alleviate these shortcomings. The principle concepts to be simulated include advanced gate-to-gate, trajectory-based operations, widespread integration of novel aircraft such as unmanned vehicles, and real-time safety assurance technologies to enable autonomous operations. To make this possible, SNTB will utilize Web-based technologies, cloud resources, and real-time, scalable, communication middleware. This paper describes the SMART-NAS Test Bed's vision, purpose, its concept of use, and the potential benefits, key capabilities, high-level requirements, architecture, software design, and usage
Traffic Control and Distributed Optimization Routing Problems in ATM Networks
Aggressive research as gigabit network has led to dramatic improvements in network transmission speeds. One result of these improvements has been to put pressure on router technology to keep peace. This paper describes a router nearly completed. This is more than fast enough to keep up with the latest transmission technology. This router has a back place speed of 50 gigabit and can forward tens of millions packet.Scheduling algorithm can be implemented on CVAR applications but in this research scheduling is implemented on CBR applications and the performance on WLAN network is enclosed by delivering different traffic load. QOS parameters [5] will be considered as the performance metrics on this study. The comparative study of various algorithms can show the best scheduling algorithm in WLAN with CBR applications.ATM was the focus of action research and significant investment in the early to mid 1990’s. This paper discuss several visions for ATM prevalent at the time and analyses how ATM evolved during this period this paper also consider the amplifications of this history for current connection oriented technologies such as optical transport network and MPLS
On Data Dissemination for Large-Scale Complex Critical Infrastructures
Middleware plays a key role for the achievement of the mission of future largescalecomplexcriticalinfrastructures, envisioned as federations of several heterogeneous systems over Internet. However, available approaches for datadissemination result still inadequate, since they are unable to scale and to jointly assure given QoS properties. In addition, the best-effort delivery strategy of Internet and the occurrence of node failures further exacerbate the correct and timely delivery of data, if the middleware is not equipped with means for tolerating such failures.
This paper presents a peer-to-peer approach for resilient and scalable datadissemination over large-scalecomplexcriticalinfrastructures. The approach is based on the adoption of epidemic dissemination algorithms between peer groups, combined with the semi-active replication of group leaders to tolerate failures and assure the resilient delivery of data, despite the increasing scale and heterogeneity of the federated system. The effectiveness of the approach is shown by means of extensive simulation experiments, based on Stochastic Activity Networks
The Performance of Measurement-Based Overlay Networks
The literature contains propositions for the use of overlay networks to supplement the normal IP routing functions with higher-level information in order to improve aspects of network behavior. We consider the use of such an overlay to optimize the end-to-end behavior of some special tra c ows. Measurements are used both to construct the virtual links of the overlay and to establish the link costs for use in a link-state routing protocol. The overlay attempts to forward certain packets over the least congested rather than the shortest path. We present simulation results showing that contrary to common belief overlay networks are not always bene cial and can be detrimental
- …