1,661 research outputs found

    A Framework of Cooperating Agents Hierarchies for Local-Area Mobility Support

    Get PDF
    Host mobility creates a routing problem in the Internet, where an IP address reflects the network\u27s point of attachment. Mobile IP, relying on a mapping between a home address and a care-of address, and a home registration process, is widely accepted as a solution for the host mobility problem in wide-area mobility scenarios. However, its home registration requirement, upon each change of point of attachment, makes it unsuitable to handle local-area mobility, resulting in large handoff latencies, increased packet loss, and disrupted services. In this dissertation, we introduce a local-area mobility support framework for IPv4 based on the deployment of multiple cooperating mobility agents hierarchies in the foreign domain. First, we introduce a hierarchy model offering a backward compatible mode to service legacy mobile hosts, unaware of local-area mobility extensions. Second, for intra-hierarchy handoffs, we identify several design deficiencies within the current Mobile IP hierarchy extension proposal, and present an enhanced regional registration framework for local handoffs that encompasses a replay protection identification value dissemination mechanism. In addition, we present two novel registration frameworks for home registrations involving local handoffs, in which we identify the dual nature of such registrations, and attempt to emphasize the local handoff aspect. One technique, maintains tunneling of data packets to the MH (Mobile Host) through an old path until a home registration reply is received to set up the new path. In contrast, the other technique adopts a more proactive bold approach in switching immediately to the new path resulting in a reduction of the handoff latency. Third, for inter-hierarchy handoffs, we present a scalable, configurable, and cooperation based framework between mobility agents hierarchies to reduce the handoffs latencies. An attempt is made to exploit the expected network proximity between hierarchies within the foreign domain, and maintain a mobile host\u27s home-registered care-of address unchanged while within the same foreign domain. In addition, the involved registration signaling design requires a reduced number of security associations between mobility agents belonging to different hierarchies, and copes with the fact that the mobile host\u27s home-registered care-of address might not be reachable

    NASA space station automation: AI-based technology review

    Get PDF
    Research and Development projects in automation for the Space Station are discussed. Artificial Intelligence (AI) based automation technologies are planned to enhance crew safety through reduced need for EVA, increase crew productivity through the reduction of routine operations, increase space station autonomy, and augment space station capability through the use of teleoperation and robotics. AI technology will also be developed for the servicing of satellites at the Space Station, system monitoring and diagnosis, space manufacturing, and the assembly of large space structures

    Make Grid systems IPv6-enabled and provide mobility support in Grid systems based on mobile IPv6.

    Get PDF
    During the last few years, systems have emerged to perform large-scale computation and data storage over IP-enabled data communication networks using Grid middleware technology. Grid middleware integrates the computational resources, which may be distributed geographically, over networks. These Grid implementations are currently supported only over IPv4. The next generation Internet Protocol - IPv6 - is replacing IPv4 with a number of improvements. Since IPv6 is expected to become the core protocol for next generation networks, Grid computing systems should be able to continue to work as the lower-layer network protocols migrate to IPv6. Therefore, we studied in depth what needed to be done to integrate IPv6 functionality into Grid middleware here we include both Grid middleware itself and its interface to the underlying networking environment. We have also given consideration to how a Grid implementation can be made to work in heterogeneous IPv4/IPv6 networks. We have used the Globus Toolkit as our working example of a Grid implementation. However, the mechanisms and approaches for integrating IPv6 into the Globus Toolkit are generic. It should cover the integration of IPv6 into most other Grid implementations and even to other IP-based applications. Another aspect of my work relates to the provision of mobility support for Grid middleware, since a lot of Grid resources and users have to be mobile in the wide-area distributed computing environment. Amongst the many mobility solutions, Mobile IP we find the most suitable it has two main advantages in its provision of mobility support in the lower-layer network infrastructure. Firstly, it separates the mobility operations from upper-layer applications, here the Grid middleware. No resultant changes are required in either the applications or the Grid implementations. Secondly, Grid hosts can maintain the identities, so that they can work continuously. The use of Mobile IPv6 rather than Mobile IPv4 is more efficient. This shows that our effort in making Grid middleware IPv6-enabled has brought advantages into the Grid computations. The success of running Grid middleware over Mobile IPv6 builds up only the lower infrastructure for the mobile-enabled Grid by solving the transparent access and handover issues in mobility scenarios. The Grid needs to be modified and improved further in order to work effectively in the mobile environment. The study indicated the major Grid-relevant issue in mobility scenarios is that the status of the Grid changes frequently. Therefore, we introduce a dynamic Grid resource discovery mechanism. Then, we categorise these important characters into four aspects. They are monitored and parameterised dynamically allowing Grid middleware to assign Grid resources dynamically. Eventually, we provide Grid resource mobility functions. Finally, while we have concentrated on the Grid environment, most of methodology and the generic approach apply equally well to other environments

    Co-constructing a new framework for evaluating social innovation in marginalized rural areas

    Get PDF
    The EU funded H2020 project \u2018Social Innovation in Marginalised Rural Areas\u2019 (SIMRA; www.simra-h2020.eu) has the overall objective of advancing the state-of-the-art in social innovation. This paper outlines the process for co- developing an evaluation framework with stakeholders, drawn from across Europe and the Mediterranean area, in the fields of agriculture, forestry and rural development. Preliminary results show the importance of integrating process and outcome-oriented evaluations, and implementing participatory approaches in evaluation practice. They also raise critical issues related to the comparability of primary data in diverse regional contexts and highlight the need for mixed methods approaches in evaluation

    The Continuum Architecture: Towards Enabling Chaotic Ubiquitous Computing

    Get PDF
    Interactions in the style of the ubiquitous computing paradigm are possible today, but only in handcrafted environments within one administrative and technological realm. This thesis describes an architecture (called Continuum), a design that realises the architecture, and a proof-of-concept implementation that brings ubiquitous computing to chaotic environments. Essentially, Continuum enables an ecology at the edge of the network, between users, competing service providers from overlapping administrative domains, competing internet service providers, content providers, and software developers that want to add value to the user experience. Continuum makes the ubiquitous computing functionality orthogonal to other application logic. Existing web applications are augmented for ubiquitous computing with functionality that is dynamically compiled and injected by a middleware proxy into the web pages requested by a web browser at the user?s mobile device. This enables adaptability to environment variability, manageability without user involvement, and expansibility without changes to the mobile. The middleware manipulates self-contained software units with precise functionality (called frames), which help the user interact with contextual services in conjunction with the data to which they are attached. The middleware and frame design explicitly incorporates the possibility of discrepancies between the assumptions of ubiquitous-computing software developers and field realities: multiple administrative domains, unavailable service, unavailable software, and missing contextual information. A framework for discovery and authorisation addresses the chaos inherent to the paradigm through the notion of role assertions acquired dynamically by the user. Each assertion represents service access credentials and contains bootstrapping points for service discovery on behalf of the holding user. A proof-of-concept prototype validates the design, and implements several frames that demonstrate general functionality, including driving discovery queries over multiple service discovery protocols and making equivalences between service types, across discovery protocols

    MFIRE-2: A Multi Agent System for Flow-based Intrusion Detection Using Stochastic Search

    Get PDF
    Detecting attacks targeted against military and commercial computer networks is a crucial element in the domain of cyberwarfare. The traditional method of signature-based intrusion detection is a primary mechanism to alert administrators to malicious activity. However, signature-based methods are not capable of detecting new or novel attacks. This research continues the development of a novel simulated, multiagent, flow-based intrusion detection system called MFIRE. Agents in the network are trained to recognize common attacks, and they share data with other agents to improve the overall effectiveness of the system. A Support Vector Machine (SVM) is the primary classifier with which agents determine an attack is occurring. Agents are prompted to move to different locations within the network to find better vantage points, and two methods for achieving this are developed. One uses a centralized reputation-based model, and the other uses a decentralized model optimized with stochastic search. The latter is tested for basic functionality. The reputation model is extensively tested in two configurations and results show that it is significantly superior to a system with non-moving agents. The resulting system, MFIRE-2, demonstrates exciting new network defense capabilities, and should be considered for implementation in future cyberwarfare applications

    Remittance flows to post-conflict states: perspectives on human security and development

    Full text link
    This repository item contains a single issue of the Pardee Center Task Force Reports, a publication series that began publishing in 2009 by the Boston University Frederick S. Pardee Center for the Study of the Longer-Range Future.Migrant remittances – that is, money or other goods sent to relatives in the country of origin– play an increasingly central role in post-conflict reconstruction and national development of conflict-affected states. Private remittances are of central importance for restoring stability and enhancing human security in post-conflict countries. Yet the dynamics of conflict-induced remittance flows and the possibilities of leveraging remittances for post-conflict development have been sparsely researched to date. This Pardee Center Task Force Report is the outcome of an interdisciplinary research project organized by the Boston University Center for Finance, Law & Policy, in collaboration with The Frederick S. Pardee Center for the Study of the Longer-Range Future. The Task Force was convened by Boston University development economist John R. Harris and international banking expert Donald F. Terry, and social anthropologist Daivi Rodima-Taylor, Visiting Researcher at the Boston University African Studies Center, served as lead researcher and editor for the report. The Task Force was asked to research, analyze, and propose policy recommendations regarding the role of remittances in post-conflict environments and their potential to serve as a major source of development funds. The report’s authors collectively suggest a broader approach to remittance institutions that provides flexibility to adapt to specific local practices and to make broader institutional connections in an era of growing population displacement and expanding human and capital flows. Conditions for more productive use of migrants’ remittances are analyzed while drawing upon case studies from post-conflict countries in Africa, Asia and Latin America. The papers in this Task Force Report establish the importance of remittances for sustaining local livelihoods as well as rehabilitating institutional infrastructures and improving financial inclusion in post-conflict environments. Highlighting the increasing complexity of global remittance systems, the report examines the growing informality of conflict-induced remittance flows and explores solutions for more efficient linkages between financial institutions of different scales and degrees of formality. It discusses challenges to regulating international remittance transfers in the context of growing concerns about transparency, and documents the increasing role of diaspora networks and migrant associations in post-conflict co-development initiatives. The Task Force Report authors outline the main challenges to leveraging remittances for post-conflict development and make recommendations for further research and policy applications

    A Vision of Africa's Future

    Get PDF
    Africa is a fast-changing continent and an area of rising global relevance, where major transformation processes are currently underway, from demographic expansion to economic development, from social progress to environmental challenges, from technological innovation to continental integration, from political change to migratory pressures. How will these complex transformations shape the Africa of tomorrow? This Report sets out a vision for Africa’s future based on five key traits: an archipelago of heterogeneous growth trajectories; the revolutionary impact of technological leapfrogging; regional integration and the growing role of sub-regional processes; the clustering of instability mainly around the core of the region; and the migration movements that originate from – but also predominantly remain within – the African continent
    • …
    corecore