2,399 research outputs found

    Evolutionary optical framework - NG-PON2: controlo e sincronização de ONUs via ICTP (Inter- Channel-Termination Protocol)

    Get PDF
    The study of new technologies with the potential to support high transfer rates is important to respond to the constant evolution of Internet information consumption. The Next-Generation Passive Optical Networks (NG-PON) tries to overcome this obstacle. The most recent one, NG-PON2, uses several channels in the same fiber to transmit and receive data, considerably increasing the bandwidth of a single fiber. This new form of communication has introduced a new problem, the exchange of information between these channels with a minimum of disturbances on the network. The Inter-Channel-Termination Protocol (ICTP) was presented to certify that this communication is done correctly in a multi-operator environment. Based on a pre-built environment with the cooperative use of Gigabit PON (GPON) and NG-PON2 technologies, a system with similar characteristics to those of a real scenario was developed. In this system, two ICTP use cases were implemented and, for each one, two events were tested. The results obtained showed the possibility of being used in a real scenario, without failures and with small delays.O estudo de novas tecnologias com potencial para suportar taxas de transferência elevadas é importante para dar resposta à constante evolução do consumo de informação da Internet. As Redes Óticas Passivas de Próxima Geração (NG-PON) vêm tentar ultrapassar este obstáculo. A mais recente, NGPON2, utiliza vários canais na mesma fibra para transmitir e receber dados, aumentando consideravelmente a largura de banda de uma única fibra. Esta nova forma de comunicação veio a introduzir um novo problema: a troca de informação entre estes canais com o mínimo de distúrbios na rede. O Protocolo Inter-Channel-Termination (ICTP) foi apresentado para certificar que esta comunicação é feita corretamente num ambiente de vários operadores. Baseado num ambiente pré-construído com o uso simultâneo das tecnologias Gigabit PON (GPON) e NG-PON2, foi desenvolvido um sistema com características semelhantes às de um cenário real. Neste sistema, foram implementados dois casos de uso do ICTP e, para cada um, testaram-se dois eventos. Os resultados obtidos mostraram a possibilidade de serem usados num cenário real, sem falhas e com atrasos reduzidos.Mestrado em Engenharia de Computadores e Telemátic

    Bounded Protocols for Efficient Reliable Message Transmission

    Get PDF
    In the reliable message transmission problem (RMTP) processors communicate by exchanging messages, but the channel that connects two processors is subject to message loss, duplication, and reordering. Previous work focused on proposing protocols in asynchronous systems, where message size is finite and sequence numbers are bounded. However, if the channel can duplicate messages, lose messages, and arbitrarily reorder the messages, the problem is unsolvable. In this thesis, we consider a strengthening of the asynchronous model in which reordering of messages is bounded. In this model, we develop two efficient protocols to solve the RMTP: (1) when messages may be duplicated but not lost and (2) when messages may be duplicated and lost. This result is in contrast to the impossibility of such an algorithm when reordering is unbounded. Our protocols have the pleasing property that no messages need to be sent from the receiver to the sender

    Simulation of packet and cell-based communication networks

    Get PDF
    This thesis investigates, using simulation techniques, the practical aspects of implementing a novel mobility protocol on the emerging Broadband Integrated Services Digital Network standard. The increasing expansion of telecommunications networks has meant that the demand for simulation has increased rapidly in recent years; but conventional simulators are slow and developments in the communications field are outstripping the ability of sequential uni-processor simulators. Newer techniques using distributed simulation on a multi-processor network are investigated in an attempt to make a cell-level simulation of a non-trivial B.-I.S.D.N. network feasible. The current state of development of the Asynchronous Transfer Mode standard, which will be used to implement a B.-I.S.D.N., is reviewed and simulation studies of the Orwell Slotted Ring protocol were made in an attempt to devise a simpler model for use in the main simulator. The mobility protocol, which uses a footprinting technique to simplify hand- offs by distributing information about a connexion to surrounding base stations, was implemented on the simulator and found to be functional after a few 'special case' scenarios had been catered for

    DistriX : an implementation of UNIX on transputers

    Get PDF
    Bibliography: pages 104-110.Two technologies, distributed operating systems and UNIX are very relevant in computing today. Many distributed systems have been produced and many are under development. To a large extent, distributed systems are considered to be the only way to solve the computing needs of the future. UNIX, on the other hand, is becoming widely recognized as the industry standard for operating systems. The transputer, unlike. UNIX and distributed systems is a relatively new innovation. The transputer is a concurrent processing machine based on mathematical principles. Increasingly, the transputer is being used to solve a wide range of problems of a parallel nature. This thesis combines these three aspects in creating a distributed implementation of UNIX on a network of transputers. The design is based on the satellite model. In this model a central controlling processor is surrounded by worker processors, called satellites, in a master/ slave relationship

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Modelling a Distributed Data Acquisition System

    Get PDF
    This thesis discusses the formal modelling and verification of certain non-real-time aspects of correctness of a mission-critical distributed software system known as the ALICE Data Point Service (ADAPOS). The domain of this distributed system is data acquisition from a particle detector control system in experimental high energy particle physics research. ADAPOS is part of the upgrade effort of A Large Ion Collider Experiment (ALICE) at the European Organisation for Nuclear Research (CERN), near Geneva in France/Switzerland, for the third run of the Large Hadron Collider (LHC). ADAPOS is based on the publicly available ALICE Data Point Processing (ADAPRO) C++14 framework and works within the free and open source GNU/Linux ecosystem. The model checker Spin was chosen for modelling and verifying ADAPOS. The model focuses on the general specification of ADAPOS. It includes ADAPOS processes, a load generator process, and rudimentary interpretations for the network protocols used between the processes. For experimenting with different interpretations of the underlying network protocols and also for coping with the state space explosion problem, eight variants of the model were developed and studied. Nine Linear Temporal Logic (LTL) properties were defined for all those variants. Large numbers of states were covered during model checking even though the model turned out to have a reachable state space too large to fully exhaust. No counter-examples were found to safety properties. A significant amount of evidence hinting that ADAPOS seems to be safe, was obtained. Liveness properties and implementation-level verification among other possible research directions remain open
    corecore