46 research outputs found

    Multi-Terabit/s IP Switching with Guaranteed Service for Streaming Traffic

    Full text link
    traffic on the Internet continues to grow exponentially, there is a real need to solve transmission and switching scalability. Moreover, future Internet traffic will be dominated by streaming media flows, such as video-telephony, video-conferencing, 3D video, virtual reality, and many more. Consequently, network solutions will need to offer quality of service and traffic engineering together with the above mentioned scalability - i.e., over-provisioning is not likely be a viable solution to accommodate streaming media traffic. This paper describes the architecture of a ultra-scalable IP switch and the first experiments with a prototypal implementation. The switch scalability is a consequence of it operating pipeline forwarding of packets, which also results in quality of service guarantees for UDP-based streaming applications, while preserving elastic TCP-based traffic as is, i.e., without affecting any existing applications based on "best- effort" services. Moreover, the prototype demonstrates the low complexity of pipeline forwarding implementation as the deployed network gear was realized from off-the-shelf components in only nine months through the design, implementation, and testing efforts of the authors

    Application-oriented trust in distributed computing

    Get PDF
    Preserving integrity of applications being executed in remote machines is an open problem. Integrity requires that application code is not tampered with, prior to or during execution, by a rogue user or a malicious software agent. This paper presents a methodology to enforce runtime integrity of application code by means of an integritypreserving software component that is combined with the application. The software component is a trusted logic that can be replaced continuously from a remote location during run-time. For added assurance, the software component produces continuous sequence of proofs of its proper operation that are verified remotely

    Counting is almost all you need

    Get PDF
    The immune memory repertoire encodes the history of present and past infections and immunological attributes of the individual. As such, multiple methods were proposed to use T-cell receptor (TCR) repertoires to detect disease history. We here show that the counting method outperforms two leading algorithms. We then show that the counting can be further improved using a novel attention model to weigh the different TCRs. The attention model is based on the projection of TCRs using a Variational AutoEncoder (VAE). Both counting and attention algorithms predict better than current leading algorithms whether the host had CMV and its HLA alleles. As an intermediate solution between the complex attention model and the very simple counting model, we propose a new Graph Convolutional Network approach that obtains the accuracy of the attention model and the simplicity of the counting model. The code for the models used in the paper is provided at: https://github.com/louzounlab/CountingIsAlmostAllYouNeed

    The scientific payload of the Ultraviolet Transient Astronomy Satellite (ULTRASAT)

    Full text link
    The Ultraviolet Transient Astronomy Satellite (ULTRASAT) is a space-borne near UV telescope with an unprecedented large field of view (200 sq. deg.). The mission, led by the Weizmann Institute of Science and the Israel Space Agency in collaboration with DESY (Helmholtz association, Germany) and NASA (USA), is fully funded and expected to be launched to a geostationary transfer orbit in Q2/3 of 2025. With a grasp 300 times larger than GALEX, the most sensitive UV satellite to date, ULTRASAT will revolutionize our understanding of the hot transient universe, as well as of flaring galactic sources. We describe the mission payload, the optical design and the choice of materials allowing us to achieve a point spread function of ~10arcsec across the FoV, and the detector assembly. We detail the mitigation techniques implemented to suppress out-of-band flux and reduce stray light, detector properties including measured quantum efficiency of scout (prototype) detectors, and expected performance (limiting magnitude) for various objects.Comment: Presented in the SPIE Astronomical Telescopes + Instrumentation 202

    An Efficient Scheduling Algorithm for Time-Driven Switching Networks

    Get PDF
    In Time-driven Switching (TDS) networks with non-immediate forwarding (NIF) provides scheduling flexibility and consequently, reduces the blocking probability (blocking is defined to take place when transmission capacity is available, but without a feasible schedule). However, it has been shown that with NIF scheduling complexity may grow exponentially. Efficiently finding a schedule from an exponential set of potential schedules is the focus of this paper. The work first presents the mathematical formulation of the NIF scheduling problem, under a wide variety of networking requirements, then introduces an efficient (i.e., having at most polynomial complexity) search algorithm that guarantees to find at least one schedule whenever such a schedule exists. The novel algorithm uses "trellis" representations and the well-known survivor-based searching principle

    Efficient Scheduling for Heterogeneous Fractional Lambda Switching Networks

    Get PDF
    Efficient scheduling for heterogeneous fractional lambda switching (FLS) networks is required but challenging. A heterogeneous network implies bandwidth mismatch between links of varied bit rates. Moreover, when non-immediate forwarding (NIF) is used in FLS, it increases the scheduling complexity exponentially, while decreasing the blocking probability. Thus, NIF scheduling presents a serious challenge for an algorithm to be used in a large heterogeneous FLS network. In this paper, an efficient scheduling algorithm that is combined with a flexible forwarding scheme is presented. The algorithm provides a full scheduling solution for an end-to-end request in heterogeneous FλS networks. Furthermore, the algorithm has linear complexity in single-channel networks and quadratic complexity in multiple-channel WDM networks

    Overview of the MetaRing Architecture

    No full text
    The basic MetaRing architecture is a full-duplex ring providing fairness and spatial bandwidth reuse. Concurrent access and spatial bandwidth reuse enable simultaneous transmission over disjoint segments of the bidirectional ring. It therefore increases the potential throughput in each direction, by a factor of four or more. In this work, we overview the MetaRing principles: (1) Distributed global fairness algorithm, a simple and robust mechanism based on a single control signal (i.e., one bit of information) that regulates the access to the ring. (2) Protocol for service integration of: (i) synchronous or real-time tra c which is periodic and requires a connection set-up and which will have guaranteed bandwidth as well as bounded delay, and (ii) connectionless or asynchronous tra c with no real-time constraints that can use the remainder of the bandwidth. Integration is an important function for multi-media applications. (3) Protocol and requirements for multi-ring and dual-bus MetaRing networks. (4) Principles and requirements for interconnecting MetaRing with wide-area networks (WANs). We show that (i) the WAN-to-ring interconnection requires a separate queue for asynchronous tra c and relies on the use of the fairness mechanism for internal ow control, whereas (ii) the WAN-to-dual-bus con guration of the MetaRing network is simpler, since it does not require any bu ering and does not rely on a fairness mechanism for internal ow control, furthermore; it is fault tolerant and has better synchronous tra c performance

    Yoram Ofek Synchrodyne, Inc. New York, NY 10463

    No full text
    In general topology networks, routing from one node to another over a tree embedded in the network is intuitively a good strategy, since it typically results in a route length of O(log n) links, being n the number of nodes in the network. Routing from one node to another over a ring embedded in the network would result in route length of O(n) links. However, in group (manyto -many) multicast, the overall number of links traversed by each packet, i.e. the networks elements on which resources must be possibly reserved, is typically O(N) for both tree and ring embedding, where N is the size of the group. This paper focuses on the tree versus ring embedding for real-time group multicast in which all packets should reach all other nodes in the group with a bounded end-to-end delay. In this work real-time properties are guaranteed by the deployment of time-driven priority in network nodes. In order to have a better understanding of the non-trivial problem of ring versus tree embedding, we c..
    corecore