11 research outputs found

    Simplified Extension of Link State PDU (LSP) Space for IS-IS

    Full text link

    IP and ATM integration: A New paradigm in multi-service internetworking

    Get PDF
    ATM is a widespread technology adopted by many to support advanced data communication, in particular efficient Internet services provision. The expected challenges of multimedia communication together with the increasing massive utilization of IP-based applications urgently require redesign of networking solutions in terms of both new functionalities and enhanced performance. However, the networking context is affected by so many changes, and to some extent chaotic growth, that any approach based on a structured and complex top-down architecture is unlikely to be applicable. Instead, an approach based on finding out the best match between realistic service requirements and the pragmatic, intelligent use of technical opportunities made available by the product market seems more appropriate. By following this approach, innovations and improvements can be introduced at different times, not necessarily complying with each other according to a coherent overall design. With the aim of pursuing feasible innovations in the different networking aspects, we look at both IP and ATM internetworking in order to investigating a few of the most crucial topics/ issues related to the IP and ATM integration perspective. This research would also address various means of internetworking the Internet Protocol (IP) and Asynchronous Transfer Mode (ATM) with an objective of identifying the best possible means of delivering Quality of Service (QoS) requirements for multi-service applications, exploiting the meritorious features that IP and ATM have to offer. Although IP and ATM often have been viewed as competitors, their complementary strengths and limitations from a natural alliance that combines the best aspects of both the technologies. For instance, one limitation of ATM networks has been the relatively large gap between the speed of the network paths and the control operations needed to configure those data paths to meet changing user needs. IP\u27s greatest strength, on the other hand, is the inherent flexibility and its capacity to adapt rapidly to changing conditions. These complementary strengths and limitations make it natural to combine IP with ATM to obtain the best that each has to offer. Over time many models and architectures have evolved for IP/ATM internetworking and they have impacted the fundamental thinking in internetworking IP and ATM. These technologies, architectures, models and implementations will be reviewed in greater detail in addressing possible issues in integrating these architectures s in a multi-service, enterprise network. The objective being to make recommendations as to the best means of interworking the two in exploiting the salient features of one another to provide a faster, reliable, scalable, robust, QoS aware network in the most economical manner. How IP will be carried over ATM when a commercial worldwide ATM network is deployed is not addressed and the details of such a network still remain in a state of flux to specify anything concrete. Our research findings culminated with a strong recommendation that the best model to adopt, in light of the impending integrated service requirements of future multi-service environments, is an ATM core with IP at the edges to realize the best of both technologies in delivering QoS guarantees in a seamless manner to any node in the enterprise

    Radio Communications

    Get PDF
    In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modiïŹed our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the ïŹeld of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks

    Analyse de sécurité et QoS dans les réseaux à contraintes temporelles

    Get PDF
    Dans le domaine des rĂ©seaux, deux prĂ©cieux objectifs doivent ĂȘtre atteints, Ă  savoir la QoS et la sĂ©curitĂ©, plus particuliĂšrement lorsqu’il s’agit des rĂ©seaux Ă  caractĂšre critique et Ă  fortes contraintes temporelles. Malheureusement, un conflit existe : tandis que la QoS Ɠuvre Ă  rĂ©duire les temps de traitement, les mĂ©canismes de sĂ©curitĂ© quant Ă  eux requiĂšrent d’importants temps de traitement et causent, par consĂ©quent, des dĂ©lais et dĂ©gradent la QoS. Par ailleurs, les systĂšmes temps rĂ©el, la QoS et la sĂ©curitĂ© ont trĂšs souvent Ă©tĂ© Ă©tudiĂ©s sĂ©parĂ©ment, par des communautĂ©s diffĂ©rentes. Dans le contexte des rĂ©seaux avioniques de donnĂ©es, de nombreux domaines et applications, de criticitĂ©s diffĂ©rentes, Ă©changent mutuellement des informations, souvent Ă  travers des passerelles. Il apparaĂźt clairement que ces informations prĂ©sentent diffĂ©rents niveaux de sensibilitĂ© en termes de sĂ©curitĂ© et de QoS. Tenant compte de cela, le but de cette thĂšse est d’accroĂźtre la robustesse des futures gĂ©nĂ©rations de rĂ©seaux avioniques de donnĂ©es en contrant les menaces de sĂ©curitĂ© et Ă©vitant les ruptures de trafic de donnĂ©es. A cet effet, nous avons rĂ©alisĂ© un Ă©tat de l’art des mĂ©canismes de sĂ©curitĂ©, de la QoS et des applications Ă  contraintes temporelles. Nous avons, ensuite Ă©tudiĂ© la nouvelle gĂ©nĂ©ration des rĂ©seaux avioniques de donnĂ©es. Chose qui nous a permis de dĂ©terminer correctement les diffĂ©rentes menaces de sĂ©curitĂ©. Sur la base de cette Ă©tude, nous avons identifiĂ© Ă  la fois les exigences de sĂ©curitĂ© et de QoS de cette nouvelle gĂ©nĂ©ration de rĂ©seaux avioniques. Afin de les satisfaire, nous avons proposĂ© une architecture de passerelle de sĂ©curitĂ© tenant compte de la QoS pour protĂ©ger ces rĂ©seaux avioniques et assurer une haute disponibilitĂ© en faveur des donnĂ©es critiques. Pour assurer l’intĂ©gration des diffĂ©rentes composantes de la passerelle, nous avons dĂ©veloppĂ© une table de session intĂ©grĂ©e permettant de stocker toutes les informations nĂ©cessaires relatives aux sessions et d’accĂ©lĂ©rer les traitements appliquĂ©s aux paquets (filtrage Ă  Ă©tats, les traductions d’adresses NAT, la classification QoS et le routage). Cela a donc nĂ©cessitĂ©, en premier lieu, l'Ă©tude de la structure existante de la table de session puis, en second lieu, la proposition d'une toute nouvelle structure rĂ©pondant Ă  nos objectifs. Aussi, avons-nous prĂ©sentĂ© un algorithme permettant l’accĂšs et l’exploitation de la nouvelle table de session intĂ©grĂ©e. En ce qui concerne le composant VPN IPSec, nous avons dĂ©tectĂ© que le trafic chiffrĂ© par le protocole ESP d’IPSec ne peut pas ĂȘtre classĂ© correctement par les routeurs de bordure. Afin de surmonter ce problĂšme, nous avons dĂ©veloppĂ© un protocole, Q-ESP, permettant la classification des trafics chiffrĂ©s et offrant les services de sĂ©curitĂ© fournis par les protocoles AH et ESP combinĂ©s. Plusieurs techniques de gestion de bande passante ont Ă©tĂ© dĂ©veloppĂ©es en vue d’optimiser la gestion du trafic rĂ©seau. Pour Ă©valuer les performances offertes par ces techniques et identifier laquelle serait la plus appropriĂ©e dans notre cas, nous avons effectuĂ© une comparaison basĂ©e sur le critĂšre du dĂ©lai, par le biais de tests expĂ©rimentaux. En derniĂšre Ă©tape, nous avons Ă©valuĂ© et comparĂ© les performances de la passerelle de sĂ©curitĂ© que nous proposons par rapport Ă  trois produits commerciaux offrant les fonctions de passerelle de sĂ©curitĂ© logicielle en vue de dĂ©terminer les points forts et faibles de notre implĂ©mentation pour la dĂ©velopper ultĂ©rieurement. Le manuscrit s’organise en deux parties : la premiĂšre est rĂ©digĂ©e en français et reprĂ©sente un rĂ©sumĂ© dĂ©taillĂ© de la deuxiĂšme partie qui est, quant Ă  elle, rĂ©digĂ©e en anglais. ABSTRACT : QoS and security are two precious objectives for network systems to attain, especially for critical networks with temporal constraints. Unfortunately, they often conflict; while QoS tries to minimize the processing delay, strong security protection requires more processing time and causes traffic delay and QoS degradation. Moreover, real-time systems, QoS and security have often been studied separately and by different communities. In the context of the avionic data network various domains and heterogeneous applications with different levels of criticality cooperate for the mutual exchange of information, often through gateways. It is clear that this information has different levels of sensitivity in terms of security and QoS constraints. Given this context, the major goal of this thesis is then to increase the robustness of the next generation e-enabled avionic data network with respect to security threats and ruptures in traffic characteristics. From this perspective, we surveyed the literature to establish state of the art network security, QoS and applications with time constraints. Then, we studied the next generation e-enabled avionic data network. This allowed us to draw a map of the field, and to understand security threats. Based on this study we identified both security and QoS requirements of the next generation e-enabled avionic data network. In order to satisfy these requirements we proposed the architecture of QoS capable integrated security gateway to protect the next generation e-enabled avionic data network and ensure the availability of critical traffic. To provide for a true integration between the different gateway components we built an integrated session table to store all the needed session information and to speed up the packet processing (firewall stateful inspection, NAT mapping, QoS classification and routing). This necessitates the study of the existing session table structure and the proposition of a new structure to fulfill our objective. Also, we present the necessary processing algorithms to access the new integrated session table. In IPSec VPN component we identified the problem that IPSec ESP encrypted traffic cannot be classified appropriately by QoS edge routers. To overcome this problem, we developed a Q-ESP protocol which allows the classifications of encrypted traffic and combines the security services provided by IPSec ESP and AH. To manage the network traffic wisely, a variety of bandwidth management techniques have been developed. To assess their performance and identify which bandwidth management technique is the most suitable given our context we performed a delay-based comparison using experimental tests. In the final stage, we benchmarked our implemented security gateway against three commercially available software gateways. The goal of this benchmark test is to evaluate performance and identify problems for future research work. This dissertation is divided into two parts: in French and in English respectively. Both parts follow the same structure where the first is an extended summary of the second

    Structural studies of a novel adhesin involved in hostspecific lactobacillus reuteri biofilm formation in the vertebrate gastrointestinal tract AND Purification method development for structural studies of WaaP: an essential gram-negative bacteria lipopolysaccharide kinase

    Get PDF
    Structural Studies of a Novel Adhesin Involved in Host-specific Lactobacillus reuteri Biofilm Formation in the Vertebrate Gastrointestinal Tract In vertebrates, strains of the gut symbiont, Lactobacillus reuteri, form biofilms on the proximal gastric stratified epithelium in a host-dependent manner. The gene for a novel serine-rich repeat (SRR) adhesin, conserved amongst rat and porcine L. reuteri, is essential for successful biofilm formation, suggesting initial adhesion to be the most crucial step for colonisation, and a possible driver of host-specificity. High resolution crystal structures of the partial binding regions (BR) of two SRR adhesins, BR55 and BR78, from porcine L. reuteri ATCC 53608 and rodent L. reuteri 100-23 strains, respectively, are reported. Although 50% similar, the BRs were highly conserved in overall structure and in the orientation of putative binding residues. BR55 and BR78’s right-handed parallel ÎČ-sheet solenoid-type fold (typical of pectate lyase like proteins), and their aromatic residue-rich putative binding cleft indicated that glycans were the most likely binding substrates. Potential binding residues were identified, allowing mutagenesis for functional studies. SAXS analysis of the complete BR55 protein revealed two regions of intrinsic disorder at the N- and C-terminal, beyond the ordered ÎČ-solenoid core. Structural information from this investigation provided valuable insights for ongoing biochemical analyses. Purification Method Development for Structural Studies of WaaP: an Essential Gram-Negative Bacteria Lipopolysaccharide (LPS) Kinase LPS is a vital component of Gram-negative bacteria outer membrane (OM), playing a crucial role in maintaining OM integrity against host-immune defenses and antibiotics. In turn, phosphorylation of the LPS core oligosaccharide is essential for structural viability of LPS in E.coli, S. enterica and P. aeruginosa. The waaP gene, encoding a Kdo sugar kinase, is a proven virulence factor, essential for phosphorylating LPS. Furthermore, waaP is conserved amongst many Gram-negative pathogens, and evokes interest as a potential antibiotic target. This thesis reports purification method development of recombinant WaaP for structural studies, and proposes strategies for accessing other WaaP homologues for crystallography. P. aeruginosa WaaP was successfully purified in adequate amounts for crystallography

    GSI Scientific Report 2011 [GSI Report 2012-1]

    Get PDF
    corecore